pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
57
964k
source
stringlengths
39
45
__label__wiki
0.771323
0.771323
News Bytes: NZ demands phone PINs, game streaming News you may have missed. By Staff Writers on Oct 09 2018 11:11 AM New Zealand govt demands phone password The New Zealand government has passed laws that gives customs officials the power to search selected travellers’ phones as they arrive into the country. If individuals refuse to hand over their passcode to authorities, they can face a $NZ5,000 ($AU4,600) fine. A spokesperson from New Zealand customs told Information Age that the new measures have been put in place in response to digitisation. “The shift from paper-based systems to electronic systems has meant that the majority of prohibited material and documents are now stored electronically…Customs believed that the content of electronic devices was within the scope of the examination power under the 1996 Act,” she said. Microsoft and Google move to stream games Both Google and Microsoft have followed PlayStation’s lead and entered into the game streaming market. Last week, Google announced it was beginning a test of its ‘Project Stream’ service, which will allow gamers to play Assassin’s Creed Odyssey in their Chrome browser, without having to download and install the file. Users can test out the service from now until January next year. Microsoft’s service, dubbed ‘Project xCloud’, will begin trials in 2019. It will work across consoles, PCs and mobile devices and make streaming games viable on 4G networks. Stay Smart Online Week 2018 kicks off During the week of 8 to 14 October, the Australian Government will be promoting Stay Smart Online Week. The initiative aims to “reverse the threat of cybercrime” by encouraging Australians to follow simple security measures to protect themselves online. “One in four Australians were hit by cyber crime last year – that’s over six million Australians. If we’re going to fight back, we need to work together,” said Alastair MacGibbon, head of the Australian Cyber Security Centre. To promote the initiative, major organisations such as ANZ, Facebook, NAB, Australia Post, AGL and Qantas have displayed black and white ‘reverse the threat’ imagery on their websites. new zealand phone passcode google microsoft Google calendar feature exploited by hackers Tech giants warned over start-up acquisitions Google bans Huawei
cc/2019-30/en_middle_0012.json.gz/line1259
__label__cc
0.547174
0.452826
athletics' home Lady Cougars Cruise Past DACC, 74-44 An overall solid team effort led the No. 2 Illinois Central College women’s basketball team to a 74-44 win over Danville Area Community College on Saturday (Feb. 2) afternoon at Ramsey Gym. The Lady Cougars controlled the game from the outset, forcing 28 DACC turnovers while dishing out 21 assists on the afternoon to get the win, moving ICC to 20-1 overall, 3-0 in Region 24 play, and 2-0 in MWAC play. ICC raced out to an 8-0 lead as Marquitta Easley scored off of Abby Coates’ tip off the jump ball, followed by a Coates’ basket, assisted by Summer Stoewer, and two Moriah Ward buckets. Emma Henderson connected on a 3-pointer, assisted by Kathy Pinnock-Branford, to push the lead to 11-2 before DACC got on track and trimmed their deficit to 20-14 at the end of the quarter. Pinnock-Branford fired up the troops with a layup, assisted by Easley, and followed it up with taking a charge to give ICC some momentum. The Lady Cougars also employed a full-court press, which hurried the Jaguars into turnovers that ICC cashed into points. Coates scored on an old-fashioned 3-point play, assisted by Easley, and then Pinnock-Branford displayed Tom Brady accuracy as she threw a full-court Hail Mary to a streaking Easley at the other end for a layup to put ICC up 29-16. Madison Faulkner scored the next eight consecutive points as she found gaps in the DACC defense and helped ICC take a 37-20 lead into halftime. ICC steadily increased their lead into the third quarter as Stoewer splashed in a 3-pointer and Coates finished inside with an assist by Pinnock-Branford. Josi Becker then found Ward and Raven Overman for baskets in the paint and hit Henderson for a 3-pointer, giving ICC a 58-29 lead. The Lady Cougars held their largest lead at 60-29 and kept pace in the fourth period to get the win. Becker (7 pts, 3 reb, 6 asts, 3 stls) Hare (4 pts, 2 reb) Faulkner (10 pts, 6 reb) Brown (3 pts) Overman (4 pts) Ward (9 pts, 3 reb) Stoewer (7 pts, 3 reb, 3 stls) Pinnock-Branford (8 pts, 7 reb, 4 asts, 3 stls, 2 charges taken) Henderson (6 pts) Coates (7 pts, 6 reb, 4 asts) Easley (9 pts, 4 asts) The Cougars will host Parkland College on Wednesday, Feb. 6 at 5:30 p.m. in another MWAC/Region 24 matchup at. The game can be seen live at www.icc.edu/athletics. John Wood Game Rescheduled The contest vs. John Wood in Quincy has been rescheduled for Monday, Feb. 11 at 5:30 pm. ICC Athletics Contact ICC East Peoria Campus, CougarPlex, 124 — (309) 694-5426 — [email protected] Athletics Home | Illinois Central College Home Greater Peoria Sports Hall of Fame Midwest Orthopaedic Center Copyright © 2019 — Illinois Central College, 1 College Drive, East Peoria, IL 61635-0001, (309) 694-5422 It is the policy of this college that no person, on the basis of race, color, religion, gender, national origin, age, disability, sexual orientation, or veteran's status, shall be discriminated against in employment, in educational programs and activities, or in admission. Inquiries and complaints may be addressed to the Vice President of Diversity, International, & Adult Education (Revised: February 2008).
cc/2019-30/en_middle_0012.json.gz/line1262
__label__cc
0.526823
0.473177
HomePress Release: Images Reveal Potential for NIR Imaging to Detect Success of Breast Reconstruction Press Release: Images Reveal Potential for NIR Imaging to Detect Success of Breast Reconstruction Submitted by ianm on 24 September 2012 - 4:07pm In 2010 breast reconstruction entered the Top Five list of reconstructive procedures in the US, with 93,000 procedures performed, up 8% from 2009, and 18% from 2000. This is among the most common skin flap procedure performed. Skin flaps are typically used to cover areas of tissue loss or defects that arise as a result of traumatic injury, reconstruction after cancer excision and repair of congenital defects. In the case of a mastectomy—the surgical removal of the breast—skin flaps are commonly used to create a new breast. Most commonly these flaps are derived from the woman’s own abdominal tissue, which is removed and transplanted to the breast area where it is formed to take on the shape and appearance of an actual breast (this is called the flap). Skin flaps are complex procedures that require post-operative monitoring to ensure that they do not fail. Most failures arise from circulatory complications where either the arterial blood supply to the flap is blocked or insufficient to support the flap tissue or venous drainage of the flap is compromised. Near infrared (NIR) spectral imaging is a convenient, non-invasive method for surgeons to examine flaps during surgery and in the early post-operative period. The NIR technique can be used to detect and localise blood supply-related complications as well as give real-time feedback to the surgeon as they try to resolve the complication. In a paper* published in JNIRS—Journal of Near Infrared Spectroscopy, Dr Mike Sowa and his team at the National Research Council Canada report pre-clinical results showing the potential of NIR spectral imaging for intra-operative skin flap assessment. “We also show that using estimates of tissue haemoglobin oxygen saturation, imaging measurements made during surgery and in the early post-operative period are highly predictive of the outcome of the flap tissue with specificities and sensitivities exceeding 85%”, Dr Sowa stated. Oxygenation imaging immediately after surgery shows good predictive power for tissue necrosis. The prediction accuracy of the oxygen saturation parameter improves as measurements are made later in the post-operative period and becomes an excellent predictor of outcome when measurements are made one or two hours after the surgery. This method is highly capable of predicting the fate of flap tissues. Dr Sowa’s paper is just one of 11 papers in the current, special issue of JNIRS—Journal of Near Infrared Spectroscopy dedicated to NIR imaging. The issue is essential reading for anyone who needs a picture of what is inside something without destroying it. Guest Editor of the special issue, Professor Marena Manley, said the advantages of NIR imaging are substantial and include low cost analysis per sample, more rapid analysis and the ability to operate in a number of in-field or on-line/at-line environments; hence leading to savings in laboratory cost and gains in product value. *The research is published as Michael G. Sowa, Jeri R. Friesen, Michelle Levasseur, Bernhard Schattka, Leif Sigurdson and Thomas Hayakawa, “The utility of near infrared imaging in intra-operative prediction of flap outcome: a reverse McFarlane skin flap model study”, J. Near Infrared Spectrosc. 20(5), 601–615 (2012), doi: 10.1255/jnirs.1007 Information for Editors (not for publication) About the Journal of Near Infrared Spectroscopy JNIRS—Journal of Near Infrared Spectroscopy is a peer review journal published by IM Publications (www.impublications.com). It publishes high-quality, original research papers on all aspects of near infrared (NIR) spectroscopy and technology. NIR spectroscopy is used widely in the food and agriculture, pharmaceutical and chemical industries, and is finding increasing applications in other areas including medicine and the environment. Editors and journalists may request a copy of a paper or the issue; contact Katie Michael, IM Publications, Tel: +44-1243-811334, Fax: +44-1243-811711, E-mail: [email protected] For more information about the research, please contact: Michael G. Sowa 435 Ellice Avenue Winnipeg, MB, Canada, R3B 1Y6 For more information about the special issue and NIR imaging in general, please contact: Professor Marena Manley Department of Food Science Private Bag X1, Matieland (Stellenbosch) 7602 Monday, September 24, 2012 - 16:07
cc/2019-30/en_middle_0012.json.gz/line1271
__label__wiki
0.924022
0.924022
December 4, 2018 / 10:56 PM / 7 months ago UPDATE 1-Soccer-Perez double helps West Ham to 3-1 win over Cardiff * West Ham United beat Cardiff City 3-1 at the London stadium * Lucas Perez scored his first two league goals for West Ham * Michail Antonio added the third with a near-post header * Joe Ralls missed a first-half penalty for Cardiff * Visiting keeper Neil Etheridge made several fine saves * Josh Murphy headed a stoppage-time consolation for Cardiff * West Ham host Crystal Palace next, Cardiff home to Southampton (adds quotes) WEST HAM UNITED 3 CARDIFF CITY 1 Dec 4 (Reuters) - Substitute Lucas Perez scored his first two Premier League goals for West Ham United to help the east London side to a 3-1 home win over Cardiff City after the visitors had missed a penalty on Tuesday. West Ham, who have now won successive top flight fixtures for the first time since January 2017 following Saturday’s 3-0 away defeat of Newcastle United, moved up to 12th in the table on 18 points from 15 games while Cardiff stayed 16th on 11 points. Both sides missed several chances in a balanced first half before Joe Ralls squandered a gilt-edged opportunity to fire Cardiff ahead, when West Ham keeper Lukasz Fabianski easily smothered the midfielder’s tame penalty kick. That proved to be a turning point as substitute Perez, who came on for Marko Arnautovic after the Austria striker pulled a hamstring in the 40th minute, swung the contest West Ham’s way with two quick goals shortly after the break. Perez volleyed past visiting keeper Neil Etheridge in the 49th minute after Robert Snodgrass took advantage of a defensive mix-up and then doubled the home team’s lead in the 54th with a crisp finish which capped a fine move down the left flank. Michail Antonio sealed West Ham’s victory on the hour when he headed home a Snodgrass corner at the near post and Etheridge made several fine saves before Josh Murphy nodded in a stoppage-time consolation for the Bluebirds. West Ham manager Manuel Pellegrini praised Perez and his team’s revival after a poor start. “Lucas played very well, he is a striker so this game with so many players behind the ball is special for him,” the Chilean said. “It (the win) is important because we started the season badly, lost four games with one point, you need to try and win four in a row so we recover.” Writing by Zoran Milosavljevic; Editing by Toby Davis
cc/2019-30/en_middle_0012.json.gz/line1273
__label__wiki
0.995629
0.995629
‘Football feast’ overshadowed by Manchester attack, says Ajax coach Peter Boszhttps://indianexpress.com/article/sports/football/football-feast-overshadowed-by-manchester-attack-says-ajax-coach-peter-bosz-4671107/ ‘Football feast’ overshadowed by Manchester attack, says Ajax coach Peter Bosz Monday's attack following an Ariana Grande concert in Manchester has plunged the city into mourning. By AP |Stockholm | Published: May 24, 2017 11:54:17 am Peter Bosz opened by offering his condolences and those of the Dutch club to the victims and their families of Monday’s attack. (Source: AP) The Europa League final should have been a “football feast” but has been inevitably overshadowed by the bomb attack in Manchester which killed 22 people, Ajax coach Peter Bosz has said. Speaking to a news conference at the Friends Arena in Stockholm, Bosz opened by offering his condolences and those of the Dutch club to the victims and their families of Monday’s attack. “What happened yesterday in Manchester was something that we all feel. On behalf of the players, staff and everyone at Ajax, we would like to express our sympathy with the victims that unfortunately fell,” he said. “The feeling that prevails for me is that the final doesn’t have this glow that it should have. Tomorrow evening should be a football feast, but because of the events in Manchester we are all affected.” Monday’s attack following an Ariana Grande concert in Manchester has plunged the city into mourning. “I think about a week, ten days ago she (Grande) was in Amsterdam and the wives of the players went to the concert with their children, so it’s something that really touches us,” the 53-year-old said. UEFA announced that the game would be preceded by a minute’s silence for the victims and that the planned opening ceremony would be scaled back. Manchester United cancelled their planned press conference, instead taking a walk around the pitch before adjourning to their hotel, and Bosz declined to answer when asked if he would have liked the game to be postponed, saying that such decisions were outside of his control. Best Of Express Bosz believes that when the game finally gets underway his young side have a chance against one of Europe’s richest clubs. “I think we only have a chance to beat Manchester if we play our own game. We have developed a way of playing this season that I always call the Ajax way of playing,” he said. “Tomorrow, if we are capable of playing our way, we have a chance.” Bosz’s youthful charges will also benefit from the experience of some of Ajax’s 1995 Champions League-winning side. More Explained GSLV story: A rocket’s science “The young players are blessed because a lot of those players are still working at Ajax,” he explained. “We have Edwin Van der Sar, Marc Overmars, Dennis Bergkamp is one of the assistant coaches, we have other players working in the youth academy,” he said. 'Football feast' overshadowed by Manchester attack, says Ajax coach Peter Bosz 1 Claudio Ranieri ‘very stimulated’ to return to management 2 Sam Allardyce resigns as Crystal Palace manager after five months 3 Real Madrid agree to sign David De Gea in a £65m deal: Report
cc/2019-30/en_middle_0012.json.gz/line1275
__label__wiki
0.966095
0.966095
Thailand cave rescue HIGHLIGHTS: Four boys brought out, operation postponed until morninghttps://indianexpress.com/article/world/thailand-cave-rescue-live-updates-soccer-coach-students-trapped-5249407/ Thailand cave rescue HIGHLIGHTS: Four boys brought out, operation postponed until morning Thailand cave rescue HIGHLIGHTS:: Four boys of the soccer team which had been trapped inside the cave have been rescued Sunday from the flooded cave, a senior member of the rescue team said. By Express Web Desk |New Delhi | Updated: July 9, 2018 8:27:47 am Thai rescue teams arrange water pumping system at the entrance to a flooded cave complex where 12 boys and their soccer coach have been trapped since June 23, in Mae Sai, Chiang Rai province, northern Thailand. (Royal Thai Navy via AP/File) In a major breakthrough, four boys of the soccer team which had been trapped inside the cave have been rescued Sunday from the flooded cave, a senior member of the rescue team said. The kids were immediately given medical assistance. “They are currently at the field hospital near the cave, we are giving them a physical examination,” said Tossathep Boonthong, chief of Chiang Rai’s health department and part of the rescue team, was quoted as saying by Reuters. The entire rescue operation to remove all 13 from inside the cave could last two to four days, depending on weather and water conditions, said army Maj. Gen. Chalongchai Chaiyakam. With more than two weeks gone, Thailand authorities have begun the rescue operation for a group of 12 boys and their soccer coach who have been trapped in a flooded cave in northern Chiang Rai province. A former Thai Navy SEAL member died inside the cave on Thursday night due to lack of oxygen. Elon Musk had offered technological help to the Thai govt. Follow Thailand rescue mission LIVE updates Thailand cave rescue HIGHLIGHTS: Rescue Operations by the Navy's SEAL unit and divers brought out four boys. Follow this space for all the latest updates. 21:52 (IST) 08 Jul 2018 Thai navy SEALs posted on Facebook after a successful rescue mission After the successful rescue of four schoolboys, Thai navy SEALs posted on their Facebook page again, saying: "Sweet dreams everyone. Good night. Hooyah." The cave system is a formidable challenge for divers "It's dangerous to the most experienced divers to go through," said one diver who spoke to Reuters. "It's pretty scary." The cave system, in a limestone mountain range bordering Myanmar in northern Thailand, has proven to be a formidable challenge for the international rescue coalition drawing some of the world's best divers who have volunteered to help in the operation alongside Thai Navy SEALs. The first, nearly 1 kilometre (0.6 mile) long section from where the boys have been huddling in darkness is believed to be the most difficult, requiring a long dive and crawling through mud and debris, with some crevices barely wide enough for a person. "The hole is really small, I have to take off my air tank to crawl through it," a 25-year-old Thai Navy SEAL who declined to be named, told Reuters before the rescue attempt. "As I do, I feel the edges of the hole on both my back and chest." (Reuters) Four boys rescued from the cave Four boys have been rescued from inside the cave. In an earlier update, it was erroneously mentioned as six, Reuters has issued a correction. Rescue mission going better than expected: Thai official Thai official heading the cave rescue says the operation is going better than expected, he added that the healthiest children have been taken out first, reports AP. Next phase of rescue mission will start in 10-20 hours Thai official heading the cave rescue mission said that the next phase of the operation will start in 10-20 hours, reported AP Massive rescue operation to remove boys from the cave As many as 90 divers; 50 foreign and 40 Thai, involved in rescue operation to remove all those trapped in the cave - Head of rescue operation Four rescued boys taken to a nearby hospital in a helicopter A Royal Thai Police helicopter carrying rescued schoolboys takes off near Tham Luang cave complex in the northern province of Chiang Rai, Thailand. (Source: REUTERS/Tyrone Siu) Donald Trump tweets about the rescue operation in Thailand Rescued boys taken to hospital in ambulance One of two ambulances was seen leaving the cave in northern Thailand hours after an operation began to rescue the trapped youth soccer players and their coach, in Mae Sai, Chiang Rai province, in northern Thailand. (AP Photo/Sakchai Lalit) "I have received information that six have exited the cave", a senior member of the rescue team told Reuters. A helicopter flew some of the boys to the nearby city of Chiang Rai where they were taken by ambulance to hospital. Rescued kids given physical examination will be shifted to a hospital later "Two kids are out. They are currently at the field hospital near the cave," said Tossathep Boonthong, chief of Chiang Rai's health department and part of the rescue team. "We are giving them a physical examination. They have not been moved to Chiang Rai hospital yet," Tossathep told Reuters. JUST IN: First two of Thai soccer team rescued from cave, official says The first two members of a Thai schoolboy soccer team have been rescued from the flooded cave where they had been trapped for more than two weeks, a local rescue official was quoted as saying by Reuters. A team of divers from Thai navy SEAL and foreign divers will carry the rescue mission Thirteen foreign divers and five members of Thailand's elite navy SEAL unit are trying to bring the boys - some as young as 11 and weak swimmers – through narrow, submerged passageways. Bursts of heavy monsoon rain soaked the Tham Luang Cave area in northern Chiang Rai province on Sunday and storms were expected in the coming weeks, increasing the risks in what has been called a "war with water and time" to save the team. Rescuing them all could take three to four days and depended on the weather, an army commander involved in the mission said. The rescue teams had rehearsed the plan for several days, Narongsak Osottanakorn, head of the rescue mission said, and had managed to drain the water level in the cave considerably, but needed to move fast. Reduced water levels prompts rescue mission in Thailand Kobchai Boonyaorana, deputy director-general of the Disaster Prevention and Mitigation Department of the Interior Ministry, told reporters Sunday that the water level in the cave had continued to recede, and that rainfall was less than expected. But weather forecasters warned heavy rain was on its way, which could flood the area completely. They said there was a 60-per cent chance of moderate to heavy rain on Sunday afternoon, and that heavier rain would continue from Monday to Thursday. The rescue operation was launched after several days of relatively mild weather, as more than 100 million of litres of water were pumped out of the cave. (AFP) Rescuer arrives near the cave in northern Thailand Sunday, the Thai authorities are racing to pump out water from the flooded cave before more rains are forecast to hit the northern region. (AP Photo/Sakchai Lalit) Thai policemen stand guard near a cave where 12 boys and their soccer coach have been trapped since June 23, in Mae Sai, Chiang Rai province, in northern Thailand. (Source: AP Photo/Sakchai Lalit) It may take 2-4 days for the entire team to reach safety: Rescuers The risky diving operation to bring out the 12 trapped children has started and the first boy is expected to be out of the cave around 9 pm Sunday (10 am ET) at the earliest. Rescuers say it may take 2-4 days for the entire team to reach safety, depending on conditions inside the cave. The local governor in charge of the rescue says the mission was launched Sunday morning because floodwaters inside the cave are at their lowest level in days and rains forecast to hit the region risk flooding the cave again. (AP) Rescue operations continue unhindered by heavy rainfall According to Guardian reports, Thailand is hit by heavy rainfall within one mile around the cave, however, this does not hinder the rescue operations as it continues apace. Thai NavySEAL post a Facebook photo before rescue operations began The Thai Navy SEAL had shared a picture on Facebook mentioning that they were ready for the rescue operations to help the group of young boys and their coach who are trapped inside the cave with help from an international team. Elon Musk wished the team of divers luck for the rescue mission on Twitter Some good feedback from cave experts in Thailand. Iterating with them on an escape pod design that might be safe enough to try. Also building an inflatable tube with airlocks. Less likely to work, given tricky contours, but great if it does. — Elon Musk (@elonmusk) July 7, 2018 Elon Musk had wished the 'extremely talented dive team' luck in a tweet which also seems to indicate his involvement in the rescue mission. Australia is sending a medical specialist with cave-diving expertise to join the Aussie team of 17 from @AusFedPolice @DeptDefence @dfat helping Thai Government rescue 12 boys and soccer coach 🇦🇺🇹🇭 @NatTraumaCentre #AUSMAT #ThamLuangCave pic.twitter.com/Fk0zjsPmcN — Julie Bishop (@JulieBishopMP) July 7, 2018 Australian Minister for Foreign Affairs, Julie Bishop tweeted that an Australian medical specialist has also joined the team of divers involved in rescuing the group of boys trapped in the cave. Rescue operation might extend over 2-4 days The entire rescue operation to get the group of boys out of the cave might take two to four days, depending on the weather and water conditions, said Army General Chalongchai Chaiyakam. The only way to get the group out is by navigating through dark and tight passageways which is filled with muddy water and strong currents, apart from oxygen-depleted air. Former Nigerian Vice President Abubakar calls Thai govt proactive I am touched by the manpower and financial expense Thailand is putting towards rescuing 12 teenagers and their young coach trapped in a cave. It shows value for human life by the Thai government. This is a concept I recommend to our government. Every Nigerian life should matter. — Atiku Abubakar (@atiku) July 7, 2018 Appreciating Thai government's proactiveness and care to rescue the boys trapped in the cave, former Nigerian Vice President Atiku Abubakar tweeted out a message. 'War with water and time,' says governor Rainshowers have soaked the Tham Luang cave area in northern Thailand province for the past 24 hours, as predicted which heightened the risk of the rescue operations. The governor called the rescue mission which began this morning at 10 am (local time) a 'war with water and time' to save the team. The entire operation involves a mammoth response operation with a medical unit, ambulance and helicopter for every boy waiting outside the cave. Rescue operations have begun Governor Narongsak on Sunday morning announced that 'today is the D-day' for the operations to rescue the group of boys to begin. Nearly 13 foreign and five Thai divers are taking part in the rescue operations with two divers accompanying each boy during extraction. The operation began at 10 am and the governor predicted it should take at least 11 hours. A map of the cave shows the risk of being trapped within This map of the Thailand cave where the group of boys and their soccer coach are stuck shows the difficulty in reaching them and the problems faced by the boys as well as the divers who are trying to get through. (Source: AP) Officials clear media Authorities have asked the media to cordon off the area around the entrance of the cave. 12 boys, all between the ages of 11-16 along with their soccer coach have been trapped for two weeks. According to an AP report, there are speculations about a rescue mission happening anytime soon. Read more | Officials clear media as cave rescue seems imminent The death on Friday of a former Thai navy SEAL, Saman Gunan, underscored the risks of making the underwater journey. The diver, the first fatality of the rescue effort, was working in a volunteer capacity and died on a mission to place oxygen canisters along the route to where the boys and others are sheltered. Rescuers looking for other options Rescuers are also pursuing other options to extract the boys, hoping that finding a shaft or drilling into the mountain in which the cave is located will lead them to a sort of backdoor entrance, an AP report said. Oxygen tanks brought to the boys Rescuers have been unable to extend a hose pumping oxygen all the way to where the boys are, but have brought them some oxygen tanks, news agency AP reported. The boys sent handwritten notes to their families that were made public Saturday. They sounded calm and reassuring in the notes which were sent out with divers who made an 11-hour, back-and-forth journey to act as postmen. One of the boys, identified as Tun, wrote: ``Mom and Dad, please don't worry, I am fine. I've told Yod to get ready to take me out for fried chicken. With love.'' Rescue efforts continue More than 100 exploratory holes have been bored -- some shallow, but the longest 400 metres deep -- into the mountainside in an attempt to open a second evacuation route and avoid forcing the boys into a dangerous dive through submerged tunnels. Navy SEALs with boys inside Thai cave An update Saturday from the Thai navy said three navy SEALs were with the boys and their coach, one a doctor. The 13 are having health evaluations and rehabilitation, and being taught diving skills. Food, electrolyte-drinks, drinking water, medicines, and oxygen canisters have been delivered to them, the navy said. An accident on the hills near the caves leaves 6 injured Rescuers on the hill who were seeking alternative routes down into the cave, an accident occurred on Saturday night: a vehicle skidded off a dirt track, seriously injuring the driver and a passenger and harming four other volunteers, authorities said. The best window for a rescue could come in the next three or four days, the leader of the rescue effort said on Saturday. Heavy rains near the cave worsens conditions for rescuers A heavy rain shower hit northern Thailand late on Saturday, worsening conditions at the cave where rescuers were waging a "war with water and time" to save 12 trapped boys and their soccer coach, with a rescue possible within days. The rain could potentially set back progress made over the last week to drain the Tham Luang cave complex in the northern province of Chiang Rai. With oxygen levels dropping and more rainstorms forecast, time is running out on a plan to evacuate them. Medical staff are stationed outside the cave ready to tend to the boys after they are evacuated Thirteen fully staffed medical teams stand ready round the clock outside a cave in Thailand -- each with its own helicopter and ambulance. With oxygen levels dropping and rainstorms forecast, time is running out on a plan to reach the boys - since the young boys won't be able to make a dive through narrow, waterlogged passageways that would challenge experienced cavers. Medical staff involved in the mission told Reuters their first assessments will focus on the boy's breathing, signs of hypothermia and an airborne lung infection known as 'cave disease' which is caused by bat and bird droppings and can be fatal if it is untreated and spreads to other parts of the body. Israeli technology helped in locating Thai soccer team trapped inside cave Rescuers workers have reportedly used an Israeli technology to locate them. The Israeli rescuers were among the first to join this frantic mission and used state-of-the-art search and rescue technology to aid their mission, nocamels.com reported. Israeli company Maxtech Networks CEO Uzi Hanuni told the Times of Israel that their system provides voice, data and video link to the boys who were located earlier this week. Hanuni adds that around 19 devices with a battery backup of about 10 hours’ use at a time were used to complete a link to the boys in the cave. Read more Elon Musk tries his bit to help in the rescue operation in Thailand Everything is a race against time: Forest park official on the recue efforts for the trapped children Kamolchai Kotcha, an official of the forest park where the cave complex is located said, "Everything is a race against time." His team would camp out on the hill to try and finish its work before the rain came, he said. The rescue operation has grabbed the interest of other countries including Australia, Britain, China, Japan and the United States, who are offering help. "It's only natural for us to offer our help," Meir Schlomo, Israel's ambassador to Thailand, waqs quoted as sayying by Reuters. Family members pray near a cave on Saturday where the 12 boys and their soccer coach have been trapped since June 23, in Mae Sai, Chiang Rai province, in northern Thailand. The coach apologised to the parents in the first letter he and the team have sent out through divers, in which the boys say they're doing well and missing their families. (Source: AP Photo/Sakchai Lalit) Thailand cave rescue HIGHLIGHTS: A group of 12 boys and their soccer coach have been stuck in the Northern Thailand cave since June 23. There is 'limited time' to save the group before heavy rains set in, according to news agency AP. 1 Mexico’s president-elect will propose amnesty law 2 Thailand cave rescue: ‘I promise to care for kids as best as possible’, coach says in letter to parents 3 Trump govt drops charges against all inauguration protesters
cc/2019-30/en_middle_0012.json.gz/line1276
__label__cc
0.601541
0.398459
Menu Israel - English Notification centre Notification centre arrow button Seoul guide Browse flight offers South Korea’s capital is on the ascendancy, with its inimitable fashion and music scenes particularly attracting the attention of a global audience in recent years. As Seoul’s tourism industry booms, discover its intriguing blend of thoroughly modern skyscrapers and shopping malls alongside historic temples and crowded night markets. 1/6 During the Lotus Lantern festival in May, the city is festooned with vibrant lanterns Photo: 2/6 The bright lights of downtown Seoul 3/6 Discover Seoul’s rich history with a tour of Bukchon Hanok Village, an important area during the Joseon Dynasty some 600 years ago 4/6 Take a tour of the 7th century Namhansanseong mountain fortress just south-east of Seoul to see the UNESCO World Heritage birthplace of King Onjo, the first ruler of the Baekje Kingdom Photo: 5/6 Explore the peaceful grounds of Gyeongbokgung Palace 6/6 Catch a cable car up Namsan Hill to enjoy panoramic views across the city During the Lotus Lantern festival in May, the city is festooned with vibrant lanterns The bright lights of downtown Seoul Discover Seoul’s rich history with a tour of Bukchon Hanok Village, an important area during the Joseon Dynasty some 600 years ago Take a tour of the 7th century Namhansanseong mountain fortress just south-east of Seoul to see the UNESCO World Heritage birthplace of King Onjo, the first ruler of the Baekje Kingdom Explore the peaceful grounds of Gyeongbokgung Palace Catch a cable car up Namsan Hill to enjoy panoramic views across the city We've chosen the must-see highlights of this fantastic city. all Seoul attractions all Seoul attractions Eat Drink Shop Do See Yido Pottery Gallery Japanese ceramicist Yi Yoonshin is the creative force behind Yido Pottery Gallery, a ceramic-wares shop that produces handcrafted porcelain pieces. Stop by to browse the selection of exquisite ceramics, or head upstairs to its white-walled gallery on its top floor, where there are exhibitions showcasing contemporary crafts. 191 Changdeokgung-gil, Jongno-gu, Seoul 116-260 This humongous shopping complex houses everything you'd ever need. Its wide range of luxury brands and high street stores, a handful of restaurants, and the world’s largest permanent cinema screen attract diehard shoppers and movie-goers. Jungsik Place assumptions of Korean food to one side – at ‘molecular’ restaurant Jungsik, chef Jung Sik Yim boldly transforms his country’s culinary traditions into something determinedly modern. Ranked 10th in the annual list of Asia’s best restaurant, Yim’s use of traditional ingredients is far from conventional – instead, expect delicately deconstructed dishes like the crispy duck with kimchi or a green tea mousse. Don’t forget to select a bottle from the critically acclaimed wine list, or enlist the sommelier’s help and pay for a wine pairing. Contemporary arts and culture The late architect Zaha Hadid was responsible for Dongdaemun Design Plaza, the most Instagram-tagged location in Korea of 2015 and a striking symbol of Seoul’s modern attitude towards design. The neo-futuristic landmark in downtown Seoul features shops, exhibition spaces, a park on its roof, and restored parts of the ancient Seoul Fortress. Feeling inspired? Carry on to the National Museum of Modern and Contemporary Art, a $230 million art museum that opened in 2014. With ambitions to rival New York’s MoMA, it’s a formidable new star on the international art scene. Cycling along the Han River Pick up a bicycle from a rental kiosk and set off along the Han River, the fourth largest river in South Korea and an iconic symbol of the capital. Lined with bike lanes, pedestrian walkways, and public parks, the edge of the Han River is a scenic green space beloved by the city’s residents. Along the way, numerous kiosks and restaurants serve up a variety of food and drink to satiate your appetite. The Market Kitchen & Larder If you’re looking for a menu with lots of choices, The Market Kitchen’s spectacular selection of pan-Asian and international cuisine should be just the ticket. Fresh oysters, seafood and charcuterie cheese platters are just some of the delicacies on display; on Saturdays and Sundays, the champagne brunch is a decadent treat. Pressed for time? Grab a gourmet meal, prepared by the same chefs, from The Market Larder, a cosy grocer next door with a curated range of tasty items. One-of-a-kind boutiques Seoul’s Fashion Week is always a favourite with street style photographers and for good reason – South Koreans take great pride and pleasure in their apparel. At Sem Eyewear, mass production is ignored in favour of old-fashioned artisanship as each piece of the brand’s exquisite eyewear is handcrafted from durable acetate. Spend some time designing a pair of glasses that are truly reflective of your style (and then maybe you can parade around in them next Fashion Week). From fridge magnets to geometric-patterned carpets, design buffs will delight in the beautiful selection of quirky pieces on sale at J’Aime Blanc. Long after you leave South Korea, the boutique’s zany pieces will serve as an apt reminder of the country’s approach to style. Namsan Hill Smack-bang in the center of Seoul stands Namsan Hill, an 860-foot peak that offers scenic vistas across the city. Visitors enjoy hiking and picnicking in the surrounding public park – and, for those less interested in exercise, a cable car can whizz you up. At the top, snap a picture of Namsan Tower, a communication and observation tower that marks the highest point in Seoul. Seoul’s greatest historical hits Step back in time at the unmissable Changdeokgung Palace. Built in the 15th-century, it is one of the ‘Five Grand Palaces’ built during the Joseon Dynasty and considered the most beautiful. Its 87-acre garden is a particular highlight, the lotus pond, landscaped lawns and graceful trees providing a spot for quiet contemplation. At the 14th-century Seoul Fortress, originally built to protect the city against invaders, book a tour guide service to explore the winding walkways with a trained guide. And the Korean Demilitarized Zone, established to split the Korean peninsular in half after the Korean War, provides a fascinating look at the country’s more recent bloodshed. A number of tour operators offer half and full-day packages. 1-1 Cheongun-dong, Jongno-gu (Changuimun Info Center) +82 2 747 2152/3+82 2 747 2152/3 Best spots to grab a sundowner Seoul encourages late nights with an array of cocktail bars to suit any mood. As the sun sets, T Bar’s third-floor rooftop – innocuously located above a women’s tailor – offers oversized sofas on astroturf, great views, and a selection of tapas to snack on. Cafe Ronin is another intimate spot for a relaxed drink. Its mojito is particularly outstanding – the herbs used are homegrown to pack a minty punch. The much-lauded Charles H amps up the glamour in a speakeasy discreetly hidden away in the Four Seasons’ basement. Named for cocktail connoisseur and author Charles H. Baker, the bar has a cocktail list that pays tribute to the various cities that Baker once lived in, as well as a few other signature recipes. Seoul Kimchi Academy Sour, pickled kimchi is a staple of Korean cuisine so brush up on your skills at the grandly named Seoul Kimchi Academy. Overseen by a professional instructor, prepare to chop, mix and spread the paste on to cabbage leaves, then pack it up and take it home with you. After the 45 minute class, slip on a handbok – the traditional Korean dress – for an unmissable photo opportunity. Now say, “one, two, three, KIMCHIIII!” Redeem flights Multi-city / stopover Departing on Departing on Departing on Returning on Returning on Select departure date Select return date Show me flexible travel dates (plus or minus 3 days) Select departure date Select return date Select return date passenger / cabin class Passengers departing the UK, and aged 12 to 15, are exempted from the UK Air Passenger Duty (APD) Tax. Passengers booking online can request an APD Tax refund by contacting the local reservations office or Global Contact Centres. Booking of more than six passengers is currently not available online. Please contact your local reservations office. Booking of more than four passengers is currently not available online. Please contact your local reservations office. CABIN CLASS Economy 1 1 2 3 4 5 6 Tooltip about travelling as an adult. Press enter to expand. An adult travelling with children must be over 18 years of age. For ticket bookings of more than six passengers, please contact your local reservations office Children (2 to 11) 0 0 1 2 3 4 5 Tooltip about travelling with children. Press enter to expand. Children must be accompanied by an adult (at least 18 years old). For more information on bookings with children, please contact your local reservations office or view our guidelines for children travelling. If you are booking travel for children who are travelling alone, please check the age restrictions set by the operating carrier prior to booking. Infants (0 to 1) 0 0 1 2 Tooltip about travelling with infants. Press enter to expand. Please note that for online bookings, infants under two will not occupy their own seat. To book an infant-occupied seat, or if your infant turns two during your trip, please contact your local reservations office. Discount code (optional) Tooltip about travelling as an discount code. Press enter to expand. Discount code is only applicable for flexible travel dates search. Search flights Search Search flights Latest flight offers Latest offer departing from Fly to Seoul - starting from $1147 from USD$1,147 Discover Seoul by flying on our new Economy Class. Our new improved seat offers excellent comfort and a fantastic personal in-flight entertainment system to ensure you enjoy your flight. 24 Mar - 27 Mar 2019 01 May - 30 Jun 2019 29 Aug - 25 Sep 2019 01 Nov - 31 Dec 2019 3 days - 3 months Select and continue Enjoy more space and comfort 03 Feb - 27 Mar 2019 min. 3 days / max. 3 months Fares quoted include the Hong Kong Passenger Security Charge, applicable taxes and other surcharges, which may change from time to time. Please note that our cabin class options vary by aircraft fleet and destination (e.g. Premium Economy class is principally available on long-haul flights, including between Tel Aviv and Hong Kong, but may not be available on short-haul flights to/from Hong Kong unless otherwise stated). You might also like to visit At Cathay Pacific, we use our expertise to offer you authentic travel experiences. Our experts have put together inspirational guides to help you decide where to take your next dream holiday. Flights from Israel Flights from Tel Aviv Flights from Tel Aviv to Hong Kong Flights from Tel Aviv to Melbourne Flights from Tel Aviv to Tokyo Flights from Tel Aviv to Sydney
cc/2019-30/en_middle_0012.json.gz/line1277
__label__cc
0.738826
0.261174
Lesson 1: Plagiarism Plagiarism Awareness Lesson 2: Copyright Respecting Copyright Protecting Your Works Films: Plagiarism Awareness Films: Respecting Copyright Simpsons Quiz Guide for Teachers Superhero Comic Book Discussion Masterpiece & Scumble Book Discussions Edgar Allan Poe Book Discussions Complete Maus Book Discussion iMAGiNExpo Comprehensive Trademark Seminar held at Highland Heights in partnership with Law School NKU Steely Library’s Intellectual Property Awareness Center (IPAC) and its campus NKU Chase Law + Informatics Institute collaborated in presenting a Comprehensive Trademark Seminar on Friday, June 5, 2015. Over 100 people attended the day-long event, which included expert speakers from the USPTO, WIPO, the Better Business Bureau, and the Inventor’s Council of Cincinnati. Both regional PTRCs were represented, with John Schlipp of NKU Steely Library and Linda Kocis of the Public Library of Cincinnati & Hamilton County (OH) providing engaging intellectual property awareness sessions. The seminar sessions targeted two audience groups: (1) an introductory track for business, business law attorneys, business students, and information-based professionals; and (2) an advanced track for attorneys and paralegals in trademark practice. CLE credits were available for legal professionals, while CEU credits were offered for business and information-based professionals upon request. See IPAC Sessions webpage for future programs. The USPTO and WIPO were instrumental in their cooperative support of the event. Wood Herron & Evans, Cincinnati’s oldest intellectual law firm, graciously sponsored the program luncheon, while the following community organizations provided free advertising and promotion of the seminar: Better Business Bureau of Cincinnati, Small Business Development Center of Northern Kentucky, UpTech, CintriFuse, Inventor’s Council of Cincinnati, and the Northern Kentucky Chamber of Commerce. Librarians teach students about intellectual property at BookFest Books written about mystery, magic, and intrigue are always popular with younger readers. Two such books were assigned to attract fifth and sixth grade students to read, and to attend workshops at NKU’s annual BookFest on May 4, 2012, while they also developed a better understanding of plagiarism, copyright, and more. Lessons from this Creative Thinking site were applied in these workshops utilizing the youth novels Masterpiece by Elise Broach and Scumble by Ingrid Law. Both books feature creative characters within their fast-paced storylines. Analyzing the creativity of the characters of Masterpiece and Scumble engages young students. It helps them to proactively explore new directions to build stronger synthesizing research skills such as reflective writing, as well as information ethics and legal awareness. They learn to respect others’ intellectual works, to avoid plagiarism, and to become aware of copyrights, trademarks, and patents which could also apply to their own creative works. The librarians presenting the workshops are specialists in intellectual property as part of their professional responsibilities. Linda Kocis manages a Patent and Trademark Resource Center at the Public Library of Cincinnati & Hamilton County, while John Schlipp directs Steely Library’s new Intellectual Property Awareness Center (IPAC). Both partner together for many Cincinnati and Northern Kentucky regional programs involving intellectual property awareness for both the general public and NKU constituents ranging from inventors to musicians. The Book Discussion Lessons are within the Guide for Teachers section of this Creative Thinking site. Young inventor shares basics about product development Andrea Brady, a marketing and licensing professional, and daughter Natalie shared some basics of new product development at NKU’s BookFest 2010 on May 14 at Northern Kentucky University. Using a variety of products developed by independent inventors as examples, including 13-year-old Natalie’s products, (Booster Buddy and MyFear Zapper), they discussed four ways inventors use to spark their creativity when developing new ideas. See Natalie and her mother talk more about this topic in the film at right. Intellectual property experts answer questions during Inventorfest Saturday, October 24, 2009 marked the fourth InventorFest held in the Tri-State region. This year a Young Inventors Showcase featured innovators and their prototype gadgets and gizmos. In addition, old and young inventors alike were able to hear a panel of experts discuss intellectual property. Those in attendance were able to get their questions answered from Don Kelly, a mechanical engineer licensed as a patent agent; David Lafkas, patent attorney; and Don Skaggs, inventor, product developer, and entrepreneur. Four innovative product prototypes were displayed by seven students ranging from multiple sporting goods to an environmental-friendly waste discarding vehicle. After the young inventors demonstrated their products to the InventorFest audience, presentations were offered by John Schlipp, an NKU librarian familiar with business and intellectual property resources, and Don Kelly. They helped guide families on how to do their own marketing and intellectual property research related to their inventions. Watch this Creative Thinking website for future inventor and entrepreneur programs for students in the Cincinnati region. Invented practice method for pitchers Developed concept for sorting trash into recyclables and non-recyclables Shaheel created platform to practice tennis skills. Kat invented strap to attach baseball helmet to bag.
cc/2019-30/en_middle_0012.json.gz/line1282
__label__wiki
0.547299
0.547299
Shaun Wayne Howell charged with fraud CRA offers taxpayer relief to Canadians affected by wildfires Smart Employee Benefits and SAFG Benefits Solutions announce partnership Vanguard launches International High Dividend Yield ETF Neil Gross named chair of Investor Advisory Panel OSC’s LaunchPad helping fintechs Foresters announces new global chief financial officer Desjardins encouraging healthy lifestyles and disease prevention CIBC executes on its strategy Pensions and private annuities affected by the longevity gap between the rich and the poor Many Canadians not taking advantage of tax credits Don’t impose more costs on people or companies for a pharmacare plan, says FCCQ Sun Life announces Tom Murphy to drive global institutional strategy The Alberta Securities Commission (ASC) and the Alberta RCMP announced on Aug. 29 that Shaun Wayne Howell of Drayton Valley, Alberta has been charged with three counts of fraud and three counts of theft over $5,000, following an investigation by the Joint Serious Offences Team (JSOT). It is alleged that he fraudulently raised approximately $200,000 from six different investors. His first appearance in court is scheduled for Oct. 26, in Red Deer, Alberta. Enforcement partnership JSOT is an enforcement partnership between the ASC, the RCMP Federal Policing's Financial Integrity Program and Alberta Crown Prosecution Service. Alberta man charged with fraud 2 April 2019 09:30 a.m. Regulation Regulator launches board game to educate players about investment fraud 14 March 2019 11:30 a.m. Regulation Calgary man receives two years in prison for fraud and money laundering 6 March 2019 09:30 a.m. Regulation
cc/2019-30/en_middle_0012.json.gz/line1283
__label__cc
0.713687
0.286313
Why Kimberley? Resources Partners Agencies Demographics & Population Maps & Zoning EcDev Strategy - Any -AccommodationAdvertising & MediaAmusement & RecreationalAnimal, Garden & LandscapingArts, Artisans & MusiciansAutomotive Sales, Servicing, Leasing & Repairs, GasBusiness ServicesCleaning ServicesContractorsEducationFinance, Insurance and Real EstateFood & BeverageHawkers, Peddlers and BuskersHealth & First AidManufacturing/IndustrialMobile VendorsPersonal ServicesProfessional ServicesRepair & Maintenance ServicesRetail StoresServices, Churches, Clubs & Non ProfitsTransportation, Communication & Other UtilitiesWholesalers For information not included here, please contact the Schaun Goodeve, Manager of Economic Development at 250-427-9666. The City of Kimberley has published a number of informative reports and brochures pertaining to local issues and concerns – such as planning and visioning documents, resources regarding urban deer, strategies for combatting climate change and increasing affordable housing, financial reports, and more. Access the complete list of reports, brochures, plans, and strategy documents. Below are some of the key documents that provide an overview of Kimberley and its direction. Integrated Community Sustainability Plan The City of Kimberley has adopted the Integrated Community Sustainability Plan (ICSP) as our highest-level guide for decision-making. It articulates Kimberley’s vision for a bright, sustainable future – and strategies for making that future a reality. Read the plan, or learn more about the process on the City's website. Kimberley’s Official Community Plan is a comprehensive overview of Kimberley’s goals, objectives and policies that help to define our community. Its purpose is to articulate a framework for success through thoughtful development, attention to social, cultural, educational, and health needs, environmental stewardship, reliable infrastructure, effective governance, and an engaged and informed population. The plan was updated in 2018 and assists in ensuring that local decision-making takes a long-term view of Kimberley’s success as a community. Kimberley's Cultural Plan Kimberley is a creative community. We take pride in our unique culture, and we’re constantly inspired to help it evolve and grow. Our amazing local talent includes world-class writers, photographers and visual artists, talented performers, unique artisans – plus an enthusiastic community of amateur artists of all kinds! Kimberley’s residents have a reputation for volunteerism, and this community spirit has lead to the creation of numerous festivals and events that truly set Kimberley apart from other mountain communities in the region. Kimberley locals – whether they’ve grown up here or just arrived – have a strong connection to the history and heritage of the community, interacting with the overall community identity through local heritage sites and resources. The Kimberley Cultural Plan captures our community’s vision for an abundant, thriving arts, culture and heritage scene. City of Kimberley Tourism Kimberley © 2019 Invest Kimberley Website by Story & Co. A good place to be.
cc/2019-30/en_middle_0012.json.gz/line1287
__label__wiki
0.566535
0.566535
Large infrapatellar ganglionic cyst of the knee fat pad: a case report and review of the literature Ioannis Nikolopoulos1Email author, George Krinas2, Dimitris Kipriadis2, Apostolos Ilias2, Andreas Giannakopoulos2 and Stephanos Kalos2 © Nikolopoulos et al; licensee BioMed Central Ltd. 2011 Large ganglionic cystic formations arising from the infrapatellar fat pad are quite uncommon and only a few are mentioned in the literature. An open excision in these cases is mandatory. We report the case of a large infrapatellar fat pad ganglion in a 37-year-old Greek man with chronic knee discomfort. The ganglionic cyst originated from the infrapatellar fat pad and had no intrasynovial extension. The final diagnosis was determined with magnetic resonance imaging of the knee, and the lesion was treated with surgery. These lesions are asymptomatic in most cases but often are misdiagnosed as meniscal or ligamentous lesions of the knee joint. Nowadays, the therapeutic trend for such lesions is arthroscopic excision, but when there is a large ganglion, as in this case report, the treatment should be an open and thorough resection. This report is intended mostly but not exclusively for clinical physicians and radiologists. Anterior Cruciate Ligament Posterior Cruciate Ligament Ganglionic Cyst Synovial Cyst Villonodular Synovitis Cystic lesions around the knee are common. Of these, popliteal cysts are the most frequently encountered. Other cystic lesions, including meniscal or ganglion cysts, are less common [1, 2]. A ganglion, by definition, is a cystic swelling that is formed of myxoid matrix, which gives the ganglion a jelly-like consistency, and is lined with a pseudomembrane. Ganglia about the knee are rare and usually are located within the joint, in juxtaposition to the joint, or in the soft tissues around the joint, within muscles, tendons, or nerves. Intra-articular small ganglia are often confused with meniscal cysts [3]. Many of these lesions are incidental findings on magnetic resonance imaging (MRI) or arthroscopy, are of little clinical significance, and usually are asymptomatic. Ganglion cysts do not have a fixed set of common symptoms and their symptoms may correlate with size and the location within the knee joint [4]. Knee pain, clicks, stiffness, incomplete extension of the knee, and pain at the extremes of motion are common symptoms. Occasional findings include a palpable mass and bone erosion. Cysts anterior to the anterior cruciate ligament (ACL) tend to limit extension, and those posterior to the posterior cruciate ligament (PCL) to limit flexion. The infrapatellar fat pad, known as Hoffa's fat pad, is located posterior to the patellar ligament and adjoining capsule separating them from the synovium. The differential diagnosis of swelling in the infrapatellar fat pad region, as we will show, includes lipoma, synovial cyst, meniscal cyst, and ganglion. We report the case of a 37-year-old Greek man who was seen in our outpatient clinic and who had anterior left knee pain that lasted more than five months. A clinical examination showed a 5 cm visible and palpable mass at the level of the medial patellar rim of his left knee (Figure 1). Swelling inferomedially to the patella of the left knee mimics a medial meniscal cyst. Our patient had no limitation of knee range of motion apart from a minor lack of flexion and no knee effusion, and he had tenderness over the swelling upon local palpation. The results of Lachman-Noulis, Apley, and McMurray tests were negative, and X-rays showed no bony abnormalities. Initially, our predominant diagnosis was medial meniscal cyst. An MRI examination was performed with T1-weighted, proton density (PD) and T2-weighted sequences with fat saturation in sagittal, axial, and coronal planes. The MRI examination revealed a large well-defined multilobular 5 cm cystic formation in the Hoffa's fat pad with the presence of intralesional septa. The lesion showed low signal intensity on T1-weighted images and high signal intensity on T2-weighted and PD images (Figures 2, 3, 4). MRI also showed regular morphology and signal intensity of menisci, ACL, PCL, and the rest of the capsuloligamentous components, and there were a few small chondral lesions on the patellar articular surface. No intra-articular fluid was shown. Sagittal magnetic resonance images of the knee. (A, B) Sequential T1-weighted images of a cystic lesion with low signal intensity inferior to patella within the Hoffa's fat pad. (C, D) Sequential T2-weighted images, at the same level, of a well-demarcated, multilobular cystic mass with high signal intensity. Note the extrasynovial intra-articular location of the lesion. Coronal magnetic resonance images of the anterior aspect of the knee. (A, B) Sequential T2-weighted images and (C, D) sequential proton density (PD) images of a multilobulated mass with high signal intensity. Axial magnetic resonance images on the level of the inferior patellar pole. (A, B) Sequential T1-weighted images. (C, D) Sequential T2-weighted images. We decided to take our patient into surgery, but our main concern was the kind of surgical modality that was indicated for this case. Our dilemma was the choice between arthroscopic or open excision of the ganglion. After thoroughly researching the literature, we decided on an open procedure. When the surgical excision was performed, spinal anesthesia and a tourniquet were used, and the mass was approached via an incision over the cystic mass medially to the patellar tendon (Figure 5A). A multilobular mass of 5 cm was found inside the infrapatellar fat pad with a firm attachment to the capsule (Figure 5B). A very careful dissection of the whole mass along with a portion of the capsule was performed, and a substantial synovial defect was left (Figure 5C). The defect was repaired, and the wound was closed in layers. Macroscopically, there was a multilobular cystic mass with a rubbery wall and a clear jelly-like content (Figure 6A, B). The septa inside the cyst, detected on MRI, were not verified when the cyst was incised. A histological examination of the resected mass confirmed the diagnosis of ganglionic cyst. On hematoxylin-and-eosin staining, a fibrous-walled cyst associated with enclosed myxoid areas and fatty cells adjacent to the fibrous capsule was seen (Figure 7A-C). (A) Cystic mass and incision site, (B) surgical approach and lesion exposure, and (C) synovium invasion and capsule defect after lesion excision. (A) Intact total and (B) complete resected ganglionic cyst from Hoffa's fat pad with a portion of the inevitably invaded synovium. Histologic sections of the specimen show the fibrous wall of the ganglion cyst with myxoid areas (A, B) and the presence of fatty cells adjacent to fibrous capsule (C) (hematoxylin and eosin [H&E], × 100). The postoperative period was uneventful, and our patient was able to return, with no complaints, to his job and previous activities within three weeks. When he was re-evaluated six months after the operation, his knee range of motion was normal and there was no palpable swelling. He had no complaints and no pain from the knee joint on gait or during sports. A new MRI of his left knee showed no evidence of a residual cystic lesion in the remaining fat pad. Of course, there was a mild increase in signal intensity on T2-weighted sequences because of previous surgery. As expected, the right knee MRI showed no joint pathology at all (Figure 8A, B). Postoperative follow-up MRI of both knees. (A) Magnetic resonance imaging (MRI) of left knee six months after surgery shows the absence of cystic lesion with a mild increase of signal intensity of Hoffa's fat pad (arrow). (B) Right knee MRI shows a normal appearance and signal intensity of the infrapatellar fat pad (dashed arrow). Ganglion cysts within the knee cavity are rare and usually originate from the cruciate ligaments, the menisci, the alar folds that cover the patellar fat pad [5], and the popliteus tendon and from osteochondral fractures or subchondral bone cysts [6]. The reported prevalences of intra-articular ganglia in the knee are from 0.2% to 1% on knee MRI and 0.6% on knee arthroscopy [7]. Many cases of ganglia, ranging in size from 1.8 to 4.5 cm, have been reported [8], and occasionally they are bilateral. Most of them are incidental findings and of little clinical significance. The first intra-articular knee ganglion was described by Caan [9] in 1924, and there have been several references to ganglia around the knee since then. Brown and Dandy [10] reported 38 intra-articular ganglia in 6500 knee arthroscopies and half of the patients had no other abnormality. The differential diagnosis of knee cystic lesions must include ganglia, lipoma, synovial myxoma, meniscal or parameniscal cyst, synovial cysts, pigmented villonodular synovitis, synovial hemangioma, aneurysm, synovial sarcoma, and synovial chondromatosis [4]. Symptomatic ganglia usually present with a history of or signs of mimicking an internal derangement of the knee. The differential diagnosis should include meniscal injury, loose body, chondral flaps, osteoarthritis, cyst of menisci, or discoid meniscus [4, 10]. Ganglion cysts do not have a fixed set of common symptoms, and their symptoms may correlate with size and the location within the knee joint [4]. Knee pain, clicks, stiffness, incomplete extension of the knee, and pain at the extremes of motion are common symptoms. Occasional findings include a palpable mass and bone erosion. Imaging studies include plain X-rays to exclude pathologies such as a loose body or other bone abnormalities. Ultrasound (U/S), computed tomography (CT) scan, and arthrography are not very helpful examinations, and MRI is the most sensitive, specific, accurate, and noninvasive method for depicting cystic masses, including their size and location. In addition, MRI helps to exclude neoplastic lesions and to detect other intra-articular pathologies [3]. The characteristic findings of a ganglion cyst include a fluid-filled lesion with low T1-weighted and high T2-weighted signal intensities in MRI [3]. In histological sections, ganglia show a dense connective-tissue capsule with a thick jelly-like content. Microscopy shows a pseudocystic space with small multifocal areas of mucoid degeneration. A variety of treatment modalities have been employed to treat intra-articular ganglion cysts of the knee. Spontaneous size reduction has been reported [8]. Excellent results with percutaneous aspiration using U/S and CT guidance have also been obtained [11]. Recently, the trend is for arthroscopic excision of intrarticular cysts [12, 13]. However, the recurrence of ganglia after arthroscopic treatment has been reported with cyst reformation [14]. In such cases, the recurrence risk is high; therefore, patients should be followed up more carefully [15]. We believe that puncturing the lesion in an attempt to reduce its content reduces its volume but does not alter its margins. On the contrary, when the lesion collapses, it is very difficult to pinpoint the margins of the pseudocapsule extension, especially when an arthroscopy is performed for a lesion within the fat pad. Therefore, we believe that puncturing the lesion poses a high potential risk of recurrence. Of course, open excision of an infrapatellar fat pad ganglionic cyst does not nullify the recurrence risk, but given the literature data mentioned above, arthroscopic treatment of such lesions has high recurrence rates [14]. On the other hand, when an open procedure for a large ganglionic cyst of the knee has been decided upon, the preservation of an intact synovium should be the main consideration of the surgeon. Unfortunately, in our patient, the preservation of an intact synovium was inevitable because of the lesion's firm attachment to the capsule (Figure 5C). Our decision to carry on with an open excision of the ganglion lesion was based more on our pursuit for a complete resection of the lesion in order to diminish the recurrent rates and less on avoiding synovium invasion. The substantial defect of the synovium that was left after the complete resection of the ganglion was repaired by approximating the defect margins with interrupted sutures. The latter would be quite difficult with an arthroscopic procedure that primarily invades the synovium in order to excise such lesions. Our case regards a large intra-articular extrasynovial ganglion cyst and this is the reason we believe that arthroscopic intervention cannot provide a complete resection of the cyst. In such cases, the possibility of leaving even a small piece of wall lining poses a high potential risk of recurrence. Therefore, as mentioned above, an open surgical procedure is necessary. A careful clinical assessment and an MRI study both contribute significantly to the determination of the nature, location, and size of ganglionic cyst. In addition, MRI helps in treatment decision making, as was demonstrated in our case, in which the ganglionic cyst was large and was located outside the synovium but within the fat pad. We consider that open surgical excision should be reserved for cases of large ganglionic cysts because it can provide a complete resection of the lesion and minimize the risk of recurrence. On the other hand, arthroscopic treatment is more suitable for small lesions that lay strictly within the synovium. ACL: PCL: U/S: ultrasound. The authors would like to acknowledge Graeme K Hesketh, a consultant radiologist from the Computed Tomography Department of General Hospital "Asclepeion Voulas", for his kind contribution to the English translation and writing of the manuscript. IN was the major contributor in writing the manuscript, examined and followed up with the patient through complete rehabilitation, and was one of the surgeons in the operating room. GK was the first surgeon in the operating room, followed up with the patient in the outpatient clinic until discharge, and played a fundamental role in MRI interpretation. DK was actively involved in the histological examination and results and was one of the surgeons in the operating room. AI reviewed the literature and collected patient data. AG and SK supervised the writing of the manuscript, provided consulting, and guided manuscript development. All authors read and approved the final manuscript. General Hospital "Asclepeion Voulas", 1, Macedonias Street, Anixi, Attica, 14569, Greece General Hospital "Asclepeion Voulas", 1, V. Pavlou, Voula, Attica, 16673, Greece Amin M, Torreggiani W, Sparks J: Infrapatellar ganglion that developed from infrapatellar fat and had minimal intraarticular extension. Knee Surg Sports Traumatol Arthrosc. 2008, 16: 179-181. 10.1007/s00167-007-0406-9.View ArticlePubMedGoogle Scholar Antonacci V, Foster T, Fenlon H, Harper K, Eustace S: Technical report: CT-guided aspiration of anterior cruciate ligament ganglion cysts. Clin Radiol. 1998, 53: 771-773. 10.1016/S0009-9260(98)80323-1.View ArticlePubMedGoogle Scholar Bui-Mansfield LT, Youngberg RA: Intraarticular ganglia of the knee: prevelance, presentation, etiology and management. Am J Roentgenol. 1997, 168: 123-127.View ArticleGoogle Scholar Kaempffe F, D'Amato C: An unusual intra-articular ganglion of the knee with interosseous extension; a case report. J Bone Joint Surg Am. 1989, 71: 773-775.PubMedGoogle Scholar Feldman F, Singson DR, Staron BR: Magnetic resonance imaging of paraarticular and ectopic ganglia. Skeletal Radiol. 1989, 18: 353-358. 10.1007/BF00361424.View ArticlePubMedGoogle Scholar Deutsch A, Veltri MD, Altchek DW, Potter GH, Warren FR, Wickiewicz LT: Symptomatic intra-articular ganglia of the cruciate ligaments of the knee. Arthroscopy. 1994, 10: 219-223. 10.1016/S0749-8063(05)80098-2.View ArticlePubMedGoogle Scholar Franceschi F, Rizzello G, Maffei MV, Papalia R, Denaro V: Arthroscopic ganglion cyst excision in the anterolateral aspect of the knee. Arthroscopy. 2003, 19: 32e-10.1016/S0749-8063(03)00385-2.View ArticleGoogle Scholar Patel SJ, Kaplan PA, Dussault RJ, Kahler DM: Anatomy and clinical significance of the horizontal cleft in the infrapatellar fat pad: MR imaging. Am J Roentgenol. 1998, 170: 1551-1555.View ArticleGoogle Scholar Huang GS, Lee CH, Chang WP, Taylor JA, Hsueh CJ, Juan CJ, Chen CY, Yu JS: Ganglion cysts of the cruciate ligaments. Acta Radiol. 2002, 43: 419-424. 10.1034/j.1600-0455.2002.430414.x.View ArticlePubMedGoogle Scholar Brown MF, Dandy DJ: Intrarticular ganglia in the knee. Arthroscopy. 1990, 6: 322-323. 10.1016/0749-8063(90)90064-K.View ArticlePubMedGoogle Scholar Resnick D: From internal derangements of joints. Diagnosis of Bone and Joint Disorders. 1995, Philadelphia: WB Saunders, 3061-3063.Google Scholar Steiner E, Steinbach LS, Schnarkowski P, Tirman PF, Genant HK: Ganglia and cysts around joints. Radiol Clin North Am. 1996, 34: 395-425.PubMedGoogle Scholar Sundaram M, McGuire HM, Fletcher J, Wolverson KM, Heiberg E, Shields BJ: Magnetic resonance imaging of lesions of synovial origin. Skeletal Radiol. 1986, 15: 110-116. 10.1007/BF00350203.View ArticlePubMedGoogle Scholar Weber D, Friederich FN, Nidecker A, Muller W: Deep posterior knee pain caused by a ganglion of the popliteus tendon; a case report. Knee Surg Sport Traumatol Arthrosc. 1996, 4: 157-159. 10.1007/BF01577409.View ArticleGoogle Scholar Koubaa M, Laudrin P, Bauer T, Rousselin B, Hardy P: Arthroscopic treatment of Hoffa ligament cyst. Rev Chir Orthop Reparatrice Appar Mot. 2002, 88: 721-724.PubMedGoogle Scholar
cc/2019-30/en_middle_0012.json.gz/line1294
__label__wiki
0.764651
0.764651
Three Days After Christchurch, A Liberal Senator Linked Refugees To Terrorism on ‘Q&A’ What's the difference between this and Fraser Anning? by Tom Clift 19 March 2019 Just three days after the Christchurch mosque shooting left 50 people dead, Liberal senator Linda Reynolds has used an appearance on Q&A to make the thinly veiled suggestion that bringing sick refugees to Australia could lead to terrorism — while at the same time chastising politicians and commentators for using the New Zealand terror attack to make “cheap political points”. Reynolds made the comments following a question from an audience member about whether politicians and the media were responsible for an increase in Islamophobia in Australia in recent years. Please Enjoy A Liberal MP's Incredible Backflip After Realising She Was Slamming Her Own Party Asked by Q&A host Tony Jones whether she agreed politicians were using a “fear of others” for political purposes, Reynolds responded by… well… doing exactly that. “This is a very personal issue for me and the circumstances that you were talking about are things I’ve lived through,” Reynolds said. “Last month I gave probably the hardest and the most personal speech I’ve ever given in the Senate. And it was in response to Labor’s amendments to the medivac bill. And I was literally almost physically ill when I saw some of my Senate and House of Representatives colleagues in the chamber cheering and high fiving the passage of these amendments because I was one of the few in that chamber who has lived through terrorism and the impact of the Bali bombings.” “I was up there, I saw, I smelt … There are people in our own nation and there are people overseas who want to do us harm. They don’t respect our compassion. And they certainly do not respect our way of life.” At this point, Jones interrupted and asked whether Reynolds was “drawing a link between the Bali bombings and refugees coming to Australia for medical services?” “What I’m saying is having my colleagues cheer for this policy that will inevitably lead to the boat trade coming again,” she replied. Linda Reynolds seriously tried to draw a link between medivac and the Bali bombings while talking about Christchurch. Have we learned nothing? #QandA #auspol — Ruby Wallace (@_rubywallace) March 18, 2019 Reynolds went on to echo Prime Minister Scott Morrison, who on Monday denied reports that he once suggested in a shadow cabinet meeting that the Liberal party should exploit community fears of Muslims in order to win votes. “The PM has been very clear tonight it did not happen. It simply did not happen,” Reynolds said. But the Senator saved perhaps her most staggeringly hypocritical remark for last. “My bigger point is for anybody to try and politicise this issue now, while events are still unfolding in New Zealand, is inappropriate and tacky.” Yeah, no kidding. Here’s Liberal Senator Linda Reynolds invoking the spectre of terrorism in order to make us afraid of bringing sick asylum seekers to Australia for treatment. How is this different to Fraser Anning, exactly? pic.twitter.com/5ODR1DFkMl — Tom Clift (@tom_clift) March 18, 2019 For what it’s worth, Reynolds told the Q&A audience that she supported a bipartisan censure of independent senator Fraser Anning, who on Friday claimed the cause of the Christchurch terror attack was “the immigration program which allowed Muslim fanatics to migrate to New Zealand in the first place”. Anning was rightfully condemned (and egged) for his comments. But let’s be honest. Reynolds just went on national television and said the thought of bringing sick asylum seekers — many of whom come from predominantly Muslim countries — to Australia made her feel “physically ill”. She justified this by invoking the spectre of the Bali bombing, knowing full well that the people in asylum seeker detention had nothing to do with that horrific attack. She did it, like Anning, to stoke fear, and to appear tough on border security. In other words, to win votes. Reynolds’ comments weren’t as baldfaced as Annings’. But were they really that much better? tagsAuspol Christchurch terror attack immigration linda reynolds Q&A refugees
cc/2019-30/en_middle_0012.json.gz/line1305
__label__cc
0.657561
0.342439
​For Franchise Info, Call 615-697-6139 Research Just Love What Is Just Love Coffee Cafe Franchise? The Just Love Coffee Cafe Story How Big Is the Demand for New Coffee Shops? What Makes Just Love Coffee Cafe a Good Business Model to Invest In? What Is a Good Location for Just Love Coffee Cafe? What Is Special About Our Menu Initial Investments and Startup Costs How Much Money Can I Make? Why Do Our Customers Love Us? How Do We Support Our Franchisees? Why Waffled Entrees and Coffee? The Just Love Coffee Cafe Franchise Culture Just Love Coffee Cafe Franchise FAQs Franchise Application Coffee Talk: Just Love Coffee Franchise’s Roastmaster On Beans, Brews & Standing Out Just Love Coffee franchise owners benefit from the talent and skill of our seasoned roastmaster When Jason Smith became Just Love Coffee’s roastmaster, he found himself quickly going from a small, home-roasting operation to a much more robust setup. What he describes as a “very steep” learning curve has paid off, however, in award nominations and a growing line of high-quality roasts that draw coffee aficionados into every Just Love Coffee franchise on a daily basis. Here is how he sees the brand’s evolution to date, and what lies ahead: What were the early days of Just Love like? Rob [Webb, Just Love’s founder] already had created our core blends and had built out some profiles for what would come next. I learned my way around the roaster, which was a 12-kilogram machine that could roast 25 pounds at a time, because I needed to understand its capabilities. I also connected with other roasting professionals and the Specialty Coffee Association, which was then the Specialty Coffee Association of America, so I could get more insights and up our game. Their curriculum is master-level stuff, and it has greatly improved my skills and what we are able to do with our roasts. You’ve got a new roaster — what does it do for the product line? It’s capable of about three times what our current one can do and has some automation features alongside manual ones I use now. That means I can switch between the two if I want to make a change during a roast and has some other features that will be a very nice addition to the roasting process. We also can add to our product line more quickly. I’m now roasting several blends alongside our single-bean products, and we are going to start rotating them in and out so we always have something new to offer our customers, as well as favorites that will be available pretty regularly. It also means I can add something in quickly if beans become available, such as a recent batch we got from Papua New Guinea. Being able to produce these unique, small-batch roasts alongside our more regular ones is really amazing. Now we are roasting close to 1,400 pounds a week, or around 95,000 pounds a year. And those numbers are just going to keep on going up. What’s your bean-buying process like? We work with brokers, and they have people all around the world who are experts in grading the beans at their point of origin. They know the coffee growing and buying infrastructure in each country, and they have strong relationships that give us buying power. We also have a direct relationship with Mission Lazarus in southern Honduras, a missionary site with a very large coffee farm on their property. I have had the privilege of going there a couple of times to work on the mission and also spend some time on the coffee farm, so it has been a thrill for us to roast some of their beans. What do you demand from coffee suppliers? We want a guarantee that the beans are responsibly sourced, and that our brokers are working ethically with the farmers. Our coffees need to carry certifications that show they are at the high end of what’s available in that particular market. How have you improved as a roaster? One major thing is I don’t jerk the heat around during roasts anymore! The rate of rise, or how fast the temperature is changing during the roast, is vital to the process. We are now using a program that allows me to watch those curves on my computer and assess the rate of rise more closely. That means I can make a change more quickly and with less guesswork. There’s so much that can be done incorrectly! You can bring too much heat early on, or not enough heat at the end, and you wind up baking those beans. They taste like bread and crackers. I don’t know that my learning curve will ever end, because each bean is slightly different, and changing the roasting process can give you a different result that, hopefully, provides the taste you are after. How big a role do the franchise owners play in your buying and roasting process? We hear from them about what is selling well, what their customers like and what they’d like to see more of. That is really important, because if we are hearing from several franchise locations that there’s a specific issue with a coffee, we can make adjustments. The franchise owners are our customers, and we are determined to give them a great line of beans so they can increase sales and grow their businesses. After the launch of two successful locations in Nashville and Brentwood, Tennessee, one of the hottest cities in the nation, Just Love Coffee is primed for expansion in 2019. Led by an executive team with proven experience in growing franchise systems, Just Love Coffee & Eatery is an ideal investment for both new and experienced entrepreneurs who want to get in on the ground floor of the most exciting business opportunity in the $12 billion U.S. coffee shop industry. Ready to open a Just Love Coffee franchise? For in-depth details about the Just Love Coffee franchise opportunity, download the free franchise report. You also can learn more by visiting our franchise research pages. Just Love Repeats Gig As Green Room Hosts For GMA Dove Awards Just Love Founder Named A Most Admired CEO 3 Ways Just Love Coffee Shop Stands Out As a Brand Just Love Coffee Franchise Owners Opting for Multiple Locations Text Us A Question We’ll respond as soon as possible For franchise information Request Franchise Info Want to learn more about opening your own Just Love Coffee Cafe Franchise? Fill out this form to get started: Coffee Franchise Opportunities How to Open a Franchise Just Love Franchise News Reviews and Interviews Just Love Coffee Franchise Near Nashville Sets Records During Opening Week Just Love Coffee Franchise Opens In Shelby Township, Michigan Just Love Coffee Franchise Announces Flurry of New Openings © 2019 Just Love Coffee Cafe. All rights reserved. Privacy Policy. For more information, call today: ​615-697-6139. This web site and the franchise sales information on this site do not constitute an offer to sell a franchise. The offer of a franchise can only be made through the delivery of a franchise disclosure document. Certain states require that we register the franchise disclosure document in those states. The communications on this web site are not directed by us to the residents of any of those states. Moreover, we will not offer or sell franchises in those states until we have registered the franchise (or obtained an applicable exemption from registration) and delivered the franchise disclosure document to the prospective franchisee in compliance with applicable law.
cc/2019-30/en_middle_0012.json.gz/line1307
__label__cc
0.685078
0.314922
Department of Medical Biochemistry and Biophysics Webbplats på svenska News / Calendar If you want to Study at KI Become Doctoral/PHD student Work at KI Visit the University Library Visit the University Dental Clinic Participate as a research subject Biosciences and Nutrition Performs research and education in e.g. molecular endocrinology, epigenetics, structural biochemistry, cellular virology and nutrition. Cell and Molecular Biology A nationally leading academic research center of high international standard where science comes first and foremost. Public Health Sciences We conduct research, teaching and applied work based on global and public health science and epidemiology. Physiology and Pharmacology Teaching and conducting internationally acclaimed, high-quality research in physiology, pharmacology, anesthesiology and intensive care. Clinical Science and Education, Södersjukhuset Located at Södersjukhuset the department has approximately 50 employees, whereof 7 professors, 80 PhD student and 140 affiliated researchers. Clinical Neuroscience We conduct research and teaching regarding the function of the brain - from a molecular level to the effect on society. Clinical Sciences, Danderyd Hospital Conducts an extensive clinical research in several areas and about 400 first level students conduct their medical education here every year. Clinical Science, Intervention and Technology With a rich and challenging history we contribute to the development of the professionals in health care and research of tomorrow. Women's and Children's Health The research at the department deals with both basic and clinical science in women's and children's health. Laboratory Medicine The research at the department deals with both basic and clinical science in women's and children's health. Learning, Informatics, Management and Ethics Focus on research, development and education in medical education, ethics, informatics, medical management, statistics and prevention. Medicine, Huddinge Education and research within a wide range of the medical field, covering all internal medicine specialties, infectious diseases and dermatology. Medicine, Solna Education for medical as well as biomedical students, post-graduate education and research in different areas of biomedicine. Medical Biochemistry and Biophysics Basic research and higher education, the aim with our research is to understand fundamental cellular processes and their role in disease. Medical Epidemiology and Biostatistics Focus on research and teaching within the fields of epidemiology and biostatistics, host to KI Biobank and the Swedish Twin Registry. Microbiology, Tumor and Cell Biology Focus on immunology, infection biology and cell and tumor biology. Institute of Environmental Medicine A wide range of research topics are covered in the areas of epidemiology, toxicology, physiology, environmental medicine and risk assessment. Molecular Medicine and Surgery Carries out both preclinical and clinical research within numerous fields. Neurobiology, Care Sciences and Society NVS’s vision is to significantly improve human health through excellent research and education within the department´s profile areas. Neuroscience Research groups dealing with different aspects of the function of the nervous system, both under normal conditions and during different diseases. Dental Medicine Creates dental care for the future through state-of-the-art education and meaningful research. Oncology-Pathology Conducts basic, translational and clinical research and educational activities related to cancer. Included in Research Groups A-Z Research Division of Molecular Neurobiology Jens Hjerling-Leffler Group Our research group is interested in the genetic and cellular mechanisms of the postnatal development and function of the brain with a particular interest in the inhibitory system. We apply advanced mouse genetics in combination with electrophysiology and modern molecular methods. More information at www.hjerling-leffler-lab.org. Genetic mechanisms controlling the emergence of higher cognitive function Ever wondered why it might be a bad idea to lend your car to a teenager? Why do many forms of neuropsychiatric disorders including Schizophrenia, depression and bipolar-disorder have a late onset, typically late teens - early twenties? The goal of our lab is to study the cellular- and network-changes that occur after birth throughout to adulthood and which genetic programs that control these changes. We use our cell type-specific knowledge to further our understanding of genetically complex disorders with a focus on Schizophrenia. Neural diversity – function Since the days of Ramon y Cajal we have known that the forebrain inhibitory system exhibits a stunning diversity. A major research effort has gone into characterizing the morphology, marker expression and electrophysiological properties of the interneurons (see Rudy et al 2011). With modern genetics we are starting to get a molecular handle on this diversity in order to functionally target individual cell classes with agents revealing their connectivity as well as either driving their activity or silencing them. We have recently identified a number of novel classes of interneurons and are studying their role in the local and long-range circuitry. Neural diversity - stability Knowing the transcriptional state of cells gives many clues how cell classes are related to each other but even with state of the art techniques the data remains as “snapshots” of individual cells and does not tell us how these profiles can change over time. We are interested in what aspects of cell transcription and function are stable over time and which parameter are variable in response to the environment of the cells. Name Carolina Bengtsson Gonzales PhD student Jens Hjerling-Leffler Senior researcher Andreas Larsson Forskningskoordinator Jose Martinez Lopez Postdoc Fatima Memic Research assistant Hermany Munguba Vieira PhD student, Graduate Student Ana Munoz Manchado Assistant professor Kasra Nikouei PhD student, Graduate Student Hongyan Xia Laboratory technician Diversity of Interneurons in the Dorsal Striatum Revealed by Single-Cell RNA Sequencing and PatchSeq. Muñoz-Manchado AB, Bengtsson Gonzales C, Zeisel A, Munguba H, Bekkouche B, Skene NG, et al Cell Rep 2018 Aug;24(8):2179-2190.e7 Classes and continua of hippocampal CA1 inhibitory neurons revealed by single-cell transcriptomics. Harris KD, Hochgerner H, Skene NG, Magno L, Katona L, Bengtsson Gonzales C, et al PLoS Biol. 2018 06;16(6):e2006387 Genetic identification of brain cell types underlying schizophrenia. Skene NG, Bryois J, Bakken TE, Breen G, Crowley JJ, Gaspar HA, et al Nat. Genet. 2018 06;50(6):825-833 Brain structure. Cell types in the mouse cortex and hippocampus revealed by single-cell RNA-seq. Zeisel A, Muñoz-Manchado AB, Codeluppi S, Lönnerberg P, La Manno G, Juréus A, et al Science 2015 Mar;347(6226):1138-42 Novel Striatal GABAergic Interneuron Populations Labeled in the 5HT3a(EGFP) Mouse. Muñoz-Manchado A, Foldi C, Szydlowski S, Sjulson L, Farries M, Wilson C, et al Cereb. Cortex 2016 Jan;26(1):96-105 Jens Hjerling-Leffler Phone: 08-524 869 74 Email: jens.hjerling-leffler@ki.se Tabea Kemna Content curator: Jens Hjerling-Leffler Share Facebook Twitter LinkedIn Google+
cc/2019-30/en_middle_0012.json.gz/line1323
__label__cc
0.582542
0.417458
Pitbull’s ‘Aquaman’ Plot Song Is the Greatest Work of Art of the 21st Century How do you improve upon perfection? I mean, it’s perfect. That’s as good as it gets. Well, here’s one way: Get Pitbull to cover it. I guess technically this isn’t strictly a cover of Toto’s “Africa,” because it’s not called “Africa.” It’s called “Ocean to Ocean.” That’s probably because it’s from the original motion picture soundtrack of Aquaman. And Pitbull’s verses are all about being Aquaman. (Or at least being a guy who hangs out in oceans.) But the chorus of the song is just Toto’s “Africa.” Then Pitbull goes back to rapping when that’s over. With remarkable lyrics like: They tried to get rid of me But from ocean to ocean They gonna have to deal with me I’ve been overlooked, slept on, Stepped on, left for dead Always against all odds like Pac said I’ve the living Great Gatsby But these boys are with you quick And then disappear like Banksy Ocean to ocean, sea to sea I’m something that you’ve gotta see. Man, I love a good plot song. I also love people compare themselves to the Great Gatsby and Banksy in a single breath. That takes real skill. Aquaman opens in theaters on December 21. And yes, this song does appear in the movie. When it started playing I actually yelled out “NO!” in the theater. Gallery - We Found Someone Selling Old Ticket Stubs on eBay. You’re Welcome: 17 Music Videos Starring Movie Characters Source: Pitbull’s ‘Aquaman’ Plot Song Is the Greatest Work of Art of the 21st Century Filed Under: Aquaman, Pitbull
cc/2019-30/en_middle_0012.json.gz/line1324
__label__wiki
0.77855
0.77855
Sarah Sahim's posts Sarah Sahim sarah-sahim-archive Sarah Sahim is a freelance culture writer based in the UK. Her work can be found in Pitchfork, The Guardian, Rolling Stone, Playboy, and your nightmares Blood Orange struggles to find a sense of belonging on Freetown Sound In an Instagram post three weeks ago, Devonté Hynes, better known as Blood Orange, explicitly declared who his third record is for: “everyone told they’re not black enough, too black, too queer, not queer the right way, the [underappreciated]… it’s a clapback.” It’s for those who, like Hynes, find themselves at odds… Permanent Records Sloan self-reflected with charming power pop on One Chord To Another Permanent Records is an ongoing closer look at the records that matter most. From Bowie reissues to Blink-182, here’s what’s coming to record stores and streaming services in July kenneth-partridge, Dan Bogosian, Sarah Sahim, Brian Shultz, Matt Williams, Katie Rife, Annie Zaleski, Lily Moayeri, J.J. Anselmi, David Anthony, John Everhart, Alex McLevy, Noel Murray, Randall Colburn, Sean O'Neal, Scott Heisel, Marah Eakin, Kevin Warwick, and Dan Caffrey Having officially passed 2016’s midway point—look for a catch-up guide on the year’s best releases soon—the new music train just keeps on rolling. On first glance, July seems slight, but it’s stuffed in ways other months haven’t been. Featuring reissues from icons such as David Bowie and R.E.M. and new albums from… From Paul Simon to Tegan And Sara, here’s what’s coming to record stores and streaming services in June kenneth-partridge, Chris Mincher, Sarah Sahim, Brian Shultz, Philip Cosores, Annie Zaleski, Lily Moayeri, J.J. Anselmi, David Anthony, John Everhart, Alex McLevy, Ignatiy Vishnevetsky, Randall Colburn, Kevin Warwick, Zach Schonfeld, Marah Eakin, Ian Thomas, and Dan Caffrey Every Friday, dozens of new records are released into the wild. Some make big splashes, and others sink almost immediately. For most music consumers, it’s almost too much information, and save for those precious few who spend their hours glued to reviews sites and release calendars, it’s hard to know what’s coming out…
cc/2019-30/en_middle_0012.json.gz/line1325
__label__cc
0.693767
0.306233
myKIPPEWA About Kippewa Getting Ready for Camp Explore Maine Work at Kippewa Why Work at Kippewa? Experience Camp Life Customized Camping Fine & Studio Arts Outdoor Adventure & Trips Special Events & Traditions Hobbies & Special Interests Leaders-In-Training Program Kippewa Equestrian Academy Family Camp: The Perfect Maine Family Vacation Family Camp FAQs Family Camp Contact Kippewa News Stop Googling. Let’s Talk. – A New York Times Article We came across this good article, which discusses the trending practice of technological conversation and the demise of human communication and connectivity. It denotes the differences between how we think we are forming relationships to how we actually are and things to stop and think about in terms of how we communicate in a world full of screens. At camp, we see the results of face-to-face relational bonding and we experience the break from the vast technological lifestyle, but it’s important to think about these things in our every day lives as well! Stop Googling. Let’s Talk. By SHERRY TURKLE COLLEGE students tell me they know how to look someone in the eye and type on their phones at the same time, their split attention undetected. They say it’s a skill they mastered in middle school when they wanted to text in class without getting caught. Now they use it when they want to be both with their friends and, as some put it, “elsewhere.” These days, we feel less of a need to hide the fact that we are dividing our attention. In a 2015 study by the Pew Research Center, 89 percent of cellphone owners said they had used their phones during the last social gathering they attended. But they weren’t happy about it; 82 percent of adults felt that the way they used their phones in social settings hurt the conversation. I’ve been studying the psychology of online connectivity for more than 30 years. For the past five, I’ve had a special focus: What has happened to face-to-face conversation in a world where so many people say they would rather text than talk? I’ve looked at families, friendships and romance. I’ve studied schools, universities and workplaces. When college students explain to me how dividing their attention plays out in the dining hall, some refer to a “rule of three.” In a conversation among five or six people at dinner, you have to check that three people are paying attention — heads up — before you give yourself permission to look down at your phone. So conversation proceeds, but with different people having their heads up at different times. The effect is what you would expect: Conversation is kept relatively light, on topics where people feel they can drop in and out. Young people spoke to me enthusiastically about the good things that flow from a life lived by the rule of three, which you can follow not only during meals but all the time. First of all, there is the magic of the always available elsewhere. You can put your attention wherever you want it to be. You can always be heard. You never have to be bored. When you sense that a lull in the conversation is coming, you can shift your attention from the people in the room to the world you can find on your phone. But the students also described a sense of loss. One 15-year-old I interviewed at a summer camp talked about her reaction when she went out to dinner with her father and he took out his phone to add “facts” to their conversation. “Daddy,” she said, “stop Googling. I want to talk to you.” A 15-year-old boy told me that someday he wanted to raise a family, not the way his parents are raising him (with phones out during meals and in the park and during his school sports events) but the way his parents think they are raising him — with no phones at meals and plentiful family conversation. One college junior tried to capture what is wrong about life in his generation. “Our texts are fine,” he said. “It’s what texting does to our conversations when we are together that’s the problem.” It’s a powerful insight. Studies of conversation both in the laboratory and in natural settings show that when two people are talking, the mere presence of a phone on a table between them or in the periphery of their vision changes both what they talk about and the degree of connection they feel. People keep the conversation on topics where they won’t mind being interrupted. They don’t feel as invested in each other. Even a silent phone disconnects us. In 2010, a team at the University of Michigan led by the psychologist Sara Konrath put together the findings of 72 studies that were conducted over a 30-year period. They found a 40 percent decline in empathy among college students, with most of the decline taking place after 2000. Across generations, technology is implicated in this assault on empathy. We’ve gotten used to being connected all the time, but we have found ways around conversation — at least from conversation that is open-ended and spontaneous, in which we play with ideas and allow ourselves to be fully present and vulnerable. But it is in this type of conversation — where we learn to make eye contact, to become aware of another person’s posture and tone, to comfort one another and respectfully challenge one another — that empathy and intimacy flourish. In these conversations, we learn who we are. Of course, we can find empathic conversations today, but the trend line is clear. It’s not only that we turn away from talking face to face to chat online. It’s that we don’t allow these conversations to happen in the first place because we keep our phones in the landscape. In our hearts, we know this, and now research is catching up with our intuitions. We face a significant choice. It is not about giving up our phones but about using them with greater intention. Conversation is there for us to reclaim. For the failing connections of our digital world, it is the talking cure. The trouble with talk begins young. A few years ago, a private middle school asked me to consult with its faculty: Students were not developing friendships the way they used to. At a retreat, the dean described how a seventh grader had tried to exclude a classmate from a school social event. It’s an age-old problem, except that this time when the student was asked about her behavior, the dean reported that the girl didn’t have much to say: “She was almost robotic in her response. She said, ‘I don’t have feelings about this.’ She couldn’t read the signals that the other student was hurt.” The dean went on: “Twelve-year-olds play on the playground like 8-year-olds. The way they exclude one another is the way 8-year-olds would play. They don’t seem able to put themselves in the place of other children.” One teacher observed that the students “sit in the dining hall and look at their phones. When they share things together, what they are sharing is what is on their phones.” Is this the new conversation? If so, it is not doing the work of the old conversation. The old conversation taught empathy. These students seem to understand each other less. But we are resilient. The psychologist Yalda T. Uhls was the lead author on a 2014 study of children at a device-free outdoor camp. After five days without phones or tablets, these campers were able to read facial emotions and correctly identify the emotions of actors in videotaped scenes significantly better than a control group. What fostered these new empathic responses? They talked to one another. In conversation, things go best if you pay close attention and learn how to put yourself in someone else’s shoes. This is easier to do without your phone in hand. Conversation is the most human and humanizing thing that we do. I have seen this resilience during my own research at a device-free summer camp. At a nightly cabin chat, a group of 14-year-old boys spoke about a recent three-day wilderness hike. Not that many years ago, the most exciting aspect of that hike might have been the idea of roughing it or the beauty of unspoiled nature. These days, what made the biggest impression was being phoneless. One boy called it “time where you have nothing to do but think quietly and talk to your friends.” The campers also spoke about their new taste for life away from the online feed. Their embrace of the virtue of disconnection suggests a crucial connection: The capacity for empathic conversation goes hand in hand with the capacity for solitude. In solitude we find ourselves; we prepare ourselves to come to conversation with something to say that is authentic, ours. If we can’t gather ourselves, we can’t recognize other people for who they are. If we are not content to be alone, we turn others into the people we need them to be. If we don’t know how to be alone, we’ll only know how to be lonely. A VIRTUOUS circle links conversation to the capacity for self-reflection. When we are secure in ourselves, we are able to really hear what other people have to say. At the same time, conversation with other people, both in intimate settings and in larger social groups, leads us to become better at inner dialogue. But we have put this virtuous circle in peril. We turn time alone into a problem that needs to be solved with technology. Timothy D. Wilson, a psychologist at the University of Virginia, led a team that explored our capacity for solitude. People were asked to sit in a chair and think, without a device or a book. They were told that they would have from six to 15 minutes alone and that the only rules were that they had to stay seated and not fall asleep. In one experiment, many student subjects opted to give themselves mild electric shocks rather than sit alone with their thoughts. People sometimes say to me that they can see how one might be disturbed when people turn to their phones when they are together. But surely there is no harm when people turn to their phones when they are by themselves? If anything, it’s our new form of being together. But this way of dividing things up misses the essential connection between solitude and conversation. In solitude we learn to concentrate and imagine, to listen to ourselves. We need these skills to be fully present in conversation. Every technology asks us to confront human values. This is a good thing, because it causes us to reaffirm what they are. If we are now ready to make face-to-face conversation a priority, it is easier to see what the next steps should be. We are not looking for simple solutions. We are looking for beginnings. Some of them may seem familiar by now, but they are no less challenging for that. Each addresses only a small piece of what silences us. Taken together, they can make a difference. One start toward reclaiming conversation is to reclaim solitude. Some of the most crucial conversations you will ever have will be with yourself. Slow down sufficiently to make this possible. And make a practice of doing one thing at a time. Think of unitasking as the next big thing. In every domain of life, it will increase performance and decrease stress. But doing one thing at a time is hard, because it means asserting ourselves over what technology makes easy and what feels productive in the short term. Multitasking comes with its own high, but when we chase after this feeling, we pursue an illusion. Conversation is a human way to practice unitasking. Our phones are not accessories, but psychologically potent devices that change not just what we do but who we are. A second path toward conversation involves recognizing the degree to which we are vulnerable to all that connection offers. We have to commit ourselves to designing our products and our lives to take that vulnerability into account. We can choose not to carry our phones all the time. We can park our phones in a room and go to them every hour or two while we work on other things or talk to other people. We can carve out spaces at home or work that are device-free, sacred spaces for the paired virtues of conversation and solitude. Families can find these spaces in the day to day — no devices at dinner, in the kitchen and in the car. Introduce this idea to children when they are young so it doesn’t spring up as punitive but as a baseline of family culture. In the workplace, too, the notion of sacred spaces makes sense: Conversation among employees increases productivity. We can also redesign technology to leave more room for talking to each other. The “do not disturb” feature on the iPhone offers one model. You are not interrupted by vibrations, lights or rings, but you can set the phone to receive calls from designated people or to signal when someone calls you repeatedly. Engineers are ready with more ideas: What if our phones were not designed to keep us attached, but to do a task and then release us? What if the communications industry began to measure the success of devices not by how much time consumers spend on them but by whether it is time well spent? It is always wise to approach our relationship with technology in the context that goes beyond it. We live, for example, in a political culture where conversations are blocked by our vulnerability to partisanship as well as by our new distractions. We thought that online posting would make us bolder than we are in person, but a 2014 Pew study demonstrated that people are less likely to post opinions on social media when they fear their followers will disagree with them. Designing for our vulnerabilities means finding ways to talk to people, online and off, whose opinions differ from our own. Sometimes it simply means hearing people out. A college junior told me that she shied away from conversation because it demanded that one live by the rigors of what she calls the “seven minute rule.” It takes at least seven minutes to see how a conversation is going to unfold. You can’t go to your phone before those seven minutes are up. If the conversation goes quiet, you have to let it be. For conversation, like life, has silences — what some young people I interviewed called “the boring bits.” It is often in the moments when we stumble, hesitate and fall silent that we most reveal ourselves to one another. The young woman who is so clear about the seven minutes that it takes to see where a conversation is going admits that she often doesn’t have the patience to wait for anything near that kind of time before going to her phone. In this she is characteristic of what the psychologists Howard Gardner and Katie Davis called the “app generation,” which grew up with phones in hand and apps at the ready. It tends toward impatience, expecting the world to respond like an app, quickly and efficiently. The app way of thinking starts with the idea that actions in the world will work like algorithms: Certain actions will lead to predictable results. This attitude can show up in friendship as a lack of empathy. Friendships become things to manage; you have a lot of them, and you come to them with tools. So here is a first step: To reclaim conversation for yourself, your friendships and society, push back against viewing the world as one giant app. It works the other way, too: Conversation is the antidote to the algorithmic way of looking at life because it teaches you about fluidity, contingency and personality. This is our moment to acknowledge the unintended consequences of the technologies to which we are vulnerable, but also to respect the resilience that has always been ours. We have time to make corrections and remember who we are — creatures of history, of deep psychology, of complex relationships, of conversations, artless, risky and face to face. The original article can be found here ← Letter from a Parent and the Afterthoughts of Summer The Present → N is for Nature: The Benefits of Outdoor Play Girls Becoming Their Best Selves – A Campfire Conversation Podcast with Ginger Clare The Power and Importance of Handwritten Letters To Raise Brave Girls, Encourage Adventure Rock, Paper, Scissors, SUPPORT!: How Summer Camp Teaches Kids To Build Each Other Up Camp Kippewa With camp starting in just a few weeks, we wanted to focus on an idea that is seemingly so… Ginger met recently with the great folks at Campfire Conversation to discuss how we can help girls become… The art of the handwritten letter seems almost archaic at this point. The average household received just one personal… 1-800-KIPPEWA (1-800-547-7392) info@kippewa.com Summer Address (after May 15) 1 Kippewa Drive Monmouth, ME 04259 Winter Address (until May 15) Suite 102, #218, 265 Turkey Sag Trail Palmyra, Virginia 22963 Rent Camp Kippewa Looking for a Boys Camp? Camp Cobbossee is only 1/2 mile from Kippewa on Lake Cobbosseecontee. Our Family Camp is the perfect opportunity for families to enjoy a fun and exciting, all-inclusive vacation together. Virtual Tour Keep Exploring
cc/2019-30/en_middle_0012.json.gz/line1326
__label__wiki
0.825869
0.825869
KOAA Athlete of the Week: Sydney Lasater, Sand Creek Soccer There isn’t a shot that Sydney Lasater hasn’t liked. Maybe eveThe Sand Creek High School sophomore attacker has a big leg and knows how to use it, from a lot of places. “There are times where she’ll try and hit one from 40-yards where I’m like, (looks down, pauses) but then she’ll try it again and score,” said head coach Jeremy Tafoya. A reporter asked him, ‘she is the Steph Curry of Sand Creek girls soccer?’ “Yes – yes exactly.” Lasater leads the Scorpions in goals with 19 so far and and the team sits pretty in the 4A polls at No. 6 with a 6-0 record. So what’s her goal of choice? Tafoya said, “she likes to hit ‘bangers.'” What is a banger? “A banger is a really nice goal and everyone on this team hits them,” Lasater said. “It could be from really far out and go in the upper corner or be up close and be really nice. It really depends.” Tafoya says she just has a nose for the goal but Lasater says there is a lot more strategy to it. “We all know where we will be on the field – we’re really tight knight, like a family,” she said. “We all basically know where we’re going to be and be open at what time.” “I’ve actually known Sydney since she was about nine-year-old and that’s just what she does, she scores goals,” Tafoya said. Lasater has been playing soccer since she was four-years-old and stuck with it because it was fun. “I tried every other sport – tried to get my energy out – but I really liked soccer so I stuck with it.” If the Scorpions want to make a run at a 4A state title, Lasater will need to keep on hitting them all season long. “It’s just a family environment and it’s so much fun to play with them.”
cc/2019-30/en_middle_0012.json.gz/line1329
__label__cc
0.749365
0.250635
Home › National Trump’s War On Civil Rights Will Be A Focus Of The 2018 NAN Convention The National Action Network's three-day convention starts April 18. Nigel Roberts The Trump administration continues to work overtime to undermine the civil rights achievements of the past five decades. Activists, elected officials and civil right leaders will gather in New York City for the annual National Action Network (NAN) convention to address the growing crisis. See Also: 7 Ways Dr. Martin Luther King Jr. Inspires Change Today NAN’s 2018 three-day convention opens on Wednesday. This year, it will focus on the current state of the civil rights movement since the assassination 50 years ago of the Rev. Dr. Martin Luther King Jr. We are 6 days away from NAN’s National Convention! REGISTRATION IS FREE FOR ALL. This year’s Convention features civil rights leaders, faith leaders, activists, celebrities, public servants, clergy, elected officials, & more REGISTER via https://t.co/Kohu8unVkL. #NANCONV2018 pic.twitter.com/h7DQYWJztS — Reverend Al Sharpton (@TheRevAl) April 12, 2018 Since the 2017 NAN convention, President Donald Trump hit new lows. He defended racist thugs in Charlottesville. And on the eve of the Martin Luther King Jr. holiday weekend, the president sparked international outrage over this comments about Haiti and African nations, calling them “shi_hole” countries, while noting his preference for Norwegian immigrants to the United States. The policies of this racist president signal the urgency for the 2018 convention. Trump’s administration has repealed several of President Barack Obama’s criminal justice reform policies that address racial bias. Attorney General Jeff Sessions, for example, has taken steps to restart the racially biased war on drugs that led to the mass incarceration of Black men. Meanwhile, Trump’s housing secretary, Ben Carson, has been on a mission to prevent low-income people from getting fair housing. To discuss many of those issues, NAN has called upon several high-profile figures to speak at this year’s event. They include Senators Kamala Harris, Bernie Sanders and Cory Booker; former U.S. Attorney General Eric Holder and Tom Perez, chairman of the Democratic National Committee. The Rev. Al Sharpton, who founded NAN in 1991, will moderate a session titled “What is the State of the Union Under Trump,” on day one of the convention. Other topics range from dealing with the digital divide to addressing mental health in the Black community. NAN has a schedule of events posted to its website. Registration to the convention is free and open to the public. There will be a livestream for those unable to attend. Calls For Starbucks Boycott After The Company’s Weak Apology For A Racist Arrest Ben Carson Tells A Black Woman To Escape Poverty She Needs To Get Married Justice For Stephon Clark: 20 Photos Of Protest And Heartbreaking Moments In Sacramento 1. Stephon Clark's Grief-Stricken Brother Source:Getty 1 of 20 2. Stephon Clark's Brother Speaks To Protesters 3. Stephon's Clark Brother Sends Poignant Message 4. Protesters Take To The Streets 5. Black Lives Matter Activists Join Protest 6. BLM Shouts For Justice 7. Protesters Call For End To "Genocide" Of People Of Color 8. Protest Signs Speak Volumes 9. Activists Crowd The Block 10. Women Stand For Clark Source:Getty 10 of 20 11. Stopping "Cops Who Kill" 12. Clark Remembered At Wake 13. Clark Honored 14. Stephon Clark's Brother Takes A Stand 15. Hundreds Attend Sacramento City Council Meeting On Clark's Death 16. Sacramento Kings Shout Out Stephon 17. Demonstrators Protest Clark's Fatal Police Shooting 18. BLM Makes A Point 19. Protesters Begin To Make Noise About Clark 20. Protests Erupt Over Clark Continue reading Justice For Stephon Clark: 20 Photos Of Protest And Heartbreaking Moments In Sacramento Trump’s War On Civil Rights Will Be A Focus Of The 2018 NAN Convention was originally published on newsone.com
cc/2019-30/en_middle_0012.json.gz/line1332
__label__wiki
0.912072
0.912072
Kylie Jenner Sports a $1,690 Bikini That's Older Than She Is Animation and comics FILE - In this Thursday, Oct. 30, 2014 file photo, a model dressing as Japanese character Hello Kitty waits for guests to pose for a souvenir photo at Sanrio Puroland, a theme park featuring Hello Kitty in Tokyo. European Union antitrust authorities have fined the Japanese company behind Hello Kitty for restricting cross-border sales of toys, mugs, bags and other products featuring the cartoon cat girl. The EU’s antitrust commissioner, Margrethe Vestager, said Sanrio was fined 6.2 million euros ($7 million) because the company violated the bloc’s competition rules. (AP Photo/Eugene Hoshiko, File) EU fines Hello Kitty owner $7 million in antitrust ruling BRUSSELS (AP) — European Union authorities on Tuesday fined the Japanese company behind Hello Kitty for restricting cross-border online sales of toys, mugs, bags and other products featuring the cartoon cat girl. The EU's antitrust commissioner, Margrethe Vestager, said that Sanrio Co. was fined 6... FILE - This Monday, June 5, 2017, file photo released by the Alameda County Sheriff's Office shows Derick Almena at Santa Rita Jail in Alameda County, Calif. The leader of a San Francisco Bay Area warehouse where a fire killed 36 people more than two years ago has taken the stand in his defense for the first time. Almena is accused of illegally converting the so-called Ghost Ship warehouse into an artist live-work space where the Dec. 2, 2016, fire broke out during an electronic music concert. Almena testified Monday, July 8, 2019 that he feels responsible for building the community of artists and is "responsible for having the idea" for the Ghost Ship. (Alameda County Sheriff's Office via AP, File) Founder of warehouse living space testifies on deadly fire OAKLAND, Calif. (AP) — The founder of a communal living space in a San Francisco Bay Area warehouse where a fire killed 36 people more than two years ago took to the stand in his trial Monday, teary-eyed and subdued as he talked about his feelings but also animated and rambling when asked about his... FILE - This Nov. 13, 2017 file photo shows singer-actress Halle Bailey at the 2017 Glamour Women of the Year Awards in New York. Bailey, half of the sister duo Chloe x Halle, will next be going under the sea, starring as Ariel in the upcoming adaptation of “The Little Mermaid.” The live-action version will include original songs from the 1989 animated hit as well as new tunes from original composer Alan Menken and “Hamilton” creator Lin-Manuel Miranda. (Photo by Evan Agostini/Invision/AP, File) Freeform supports Halle Bailey's Ariel casting amid backlash LOS ANGELES (AP) — A Disney-owned cable network has taken aim at critics who disagreed with the decision to cast Halle Bailey as Ariel in the upcoming adaption of "The Little Mermaid." Freeform posted an open letter on Sunday in support of Bailey after some on social media used the hashtag #... This image released by PBS shows characters, from left, Tooey, voiced by Sequoia Janvier, Trini, voiced by Vienna Leacock and Molly, voiced by Sovereign Bill, in a scene from the animated series "Molly of Denali." The animated show, which highlights the adventures of a 10-year-old Athabascan girl, Molly Mabray, premieres July 15 on PBS Kids. (PBS via AP) Alaska Native girl leads animated kids TV show in US first ANCHORAGE, Alaska (AP) — Princess Daazhraii Johnson grew up eating dried salmon and moose-head soup — foods labeled weird by other kids who had no understanding of her culture and traditions. Now the Fairbanks woman and other Alaska Natives are presenting their world to a general audience with "... The combo of photos of the 14 crew members who died in a fire on a Russian navy's deep-sea research submersible, distributed on July 4, 2019, by Russian Defense Ministry Press Service, shows from a top row: Captain 1st rank Denis Dolonsky, Captain 1st rank Nikolay Filin, Captain 1st rank Vladimir Abankin, Captain 1st rank Andrei Voskresensky, Captain 1st rank Anatoly Ivanov, Captain 1st rank Denis Oparin, Captain 1st rank Konstantin Somov, Bottom row: Captain 2nd rank Alexander Avdonin, Captain 2nd rank Sergei Danilchenko, Captain 2nd rank Dmitry Solovyov, medical service Colonel Alexander Vasilyev, Captain 3rd rank Viktor Kuzmin, Captain 3rd rank Vladimir Sukhinichev, Lt. Captain Mikhail Dubkov. The Defense Ministry said the 14 seamen were killed by toxic fumes from the blaze. (Russian Defense Ministry Press Service via AP) Russia: Nuclear reactor safe on fire-hit submersible MOSCOW (AP) — The nuclear reactor on one of the Russian navy's research submersibles hasn't been damaged in a fire that killed 14 seamen, Defense Minister Sergei Shoigu said Thursday, adding that the vessel would be put back into service after repairs. The Defense Ministry said the 14 seamen were... Russian President Vladimir Putin listens to Russian Defense Minister Sergei Shoigu during their meeting in the Kremlin in Moscow, Russia, Tuesday, July 2, 2019. A fire on one of the Russian navy's deep-sea submersibles killed 14 sailors, the Russian Defense Ministry said Tuesday without giving the cause of the blaze or saying if there were survivors. (Alexei Druzhinin, Sputnik, Kremlin Pool Photo via AP) Russian defense chief says there are survivors of navy fire MOSCOW (AP) — Some crew members have survived a fire that killed 14 sailors onboard one of the Russian navy's deep-sea research submersibles, the nation's defense minister said Wednesday. Sergei Shoigu didn't specify how many crew members were rescued from Monday's fire. Speaking at the navy's... Fire kills 14 Russian sailors aboard deep-sea submersible MOSCOW (AP) — Fire broke out on one of the Russian navy's deep-sea research submersibles, and toxic fumes from the blaze killed 14 sailors aboard, Russia's Defense Ministry said Tuesday, although it released few details about the disaster or the vessel involved. The Defense Ministry did not say how... Tom Hanks, left, poses with his character Woody as he arrives at the world premiere of "Toy Story 4" on Tuesday, June 11, 2019, at the El Capitan in Los Angeles. (Photo by Chris Pizzello/Invision/AP) 'Toy Story 4' Opens Below Expectations With $118M Weekend NEW YORK (AP) — "Toy Story 4" brought the box office to life with a $118 million opening weekend after a three-week slump of underperforming sequels, but the Pixar film's below-expectations debut didn't quell continuing concerns about a rocky summer movie season. The "Toy Story 4" opening,... FILE- In this Sept. 5, 2018, file photo conspiracy theorist Alex Jones speaks outside of the Dirksen building of Capitol Hill in Washington. A federal judge will let a jury decide whether conspiracy theorist Alex Jones’ Infowars website had a legal right to sell a poster featuring the image of Pepe the Frog, a character that became hijacked by far-right extremists. U.S. District Judge Michael Fitzgerald in Los Angeles refused Thursday, May 16, 2019 to throw out a copyright infringement lawsuit against Infowars over its poster sales filed by Pepe’s creator, California artist Matt Furie.(AP Photo/Jose Luis Magana, File) Judge Refuses To Toss Suit Over Pepe The Frog Poster Sales A federal judge will let a jury decide whether conspiracy theorist Alex Jones' Infowars website had a legal right to sell a poster featuring the image of Pepe the Frog, a cartoon character that became hijacked by far-right extremists. U.S. District Judge Michael Fitzgerald refused Thursday to throw... FILE - In this Tuesday, June 20, 2017 file photo, Peter Cullen, left, and Frank Welker pose for a photo at the U.S. premiere of "Transformers: The Last Knight" at the Civic Opera House in Chicago. Cullen and Welker could be heard in children's homes across the United States starting in the fall of 1984 as the heroic Optimus Prime and villainous Megatron respectively. (Photo by Rob Grabowski/Invision/AP, File) Optimus Prime, Megatron remember 35 years of Transformers MIAMI (AP) — The Autobots have been waging their battle to destroy the evil forces of the Decepticons for 35 years, but there's no sign the men who voice the Transformers franchise's two most iconic characters would ever take up ion blasters or fusion cannons against each other. Peter Cullen and...
cc/2019-30/en_middle_0012.json.gz/line1339
__label__wiki
0.614725
0.614725
Etiquette, Morals and Heart-Softeners The Heart Softeners Love of Allaah What are the signs Signs of Allaah’s love Love for His slaveSlave? What are the signs of Allaah’s love for His slave? Praise be to Allah. You have asked about a serious and weighty matter, which none attain but very few of the righteous slaves of Allaah. The love of Allaah is "the status for which the righteous compete and strive… It is the nourishment of hearts and souls… the delight of the eyes… It is the life of which one who is denied it is dead… the light which the one who loses it is in deep darkness… the healing of which the one who is denied is sick… the joy which the one who is deprived of it lives in distress and pain… It is the spirit of faith and good deeds… by means of which one may draw closer to Allaah… which, when it is absent, one is like a body in which there is no soul." O Allaah, make us among those whom You love. The love of Allaah has signs and causes which are like the key to the door. These causes include the following: 1 –Following the guidance of the Prophet (peace and blessings of Allaah be upon him). Allaah says in His Holy Book (interpretation of the meaning): "Say (O Muhammad to mankind): If you (really) love Allaah, then follow me (i.e. accept Islamic Monotheism, follow the Qur’aan and the Sunnah/prophetic teachings), Allaah will love you and forgive you your sins. And Allaah is Oft-Forgiving, Most Merciful" [Aal ‘Imraan 3:31] 2-5 – Being humble towards the believers and stern towards the kaafirsdisbelievers, waging jihad (a battle/struggle) for the sake of Allaah, and not fearing anyone or anything but Him. Allaah has mentioned these qualities in a single verse, in which He says (interpretation of the meaning): "O you who believe! Whoever from among you turns back from his religion (Islam), Allaah will bring a people whom He will love and they will love Him; humble towards the believers, stern towards the disbelievers, fighting/striving in the way of Allaah, and never fear of the blame of the blamers" [al-Maa'idah 5:54] In this verse Allaah describes the attributes of those whom He loves, the first of which is: humility and not being arrogant towards the Muslims, and being stern towards the kaafirsdisbelievers, and not humbling or humiliating oneself before them. They (the ones whom Allaah loves) strive for the sake of Allaah, against the Shaytaan, the kuffaardisbelievers, the hypocrites and the evildoers, and they strive against their own selves (jihad al-nafs). They do not fear the blame of any blamer, because so long as they are following the commands of their religion, he will not care about anyone who mocks him or blames him. 6 – Doing naafil (supererogatory) acts of worship. Allaah says – according to a hadeeth qudsi (divinely inspired saying of the Prophet) – "My slave keeps drawing near to me by means of supererogatory acts of worship until I love Him." Supererogatory acts of worship include naafil prayers, charity, ‘Umrah, Hajj (minor and major pilgrimage to Makkah) and fasting. 8-12 – Loving, visiting one another, helping one another (financially) and offering sincere advice to one another for the sake of Allaah. These attributes were mentioned in a single hadeeth (narration) in which the Messenger (peace and blessings of Allaah be upon him) narrated that his Lord said: "My love is guaranteed for two who love one another for My sake; My love is guaranteed for two who visit one another for My sake; My love is guaranteed for two who help one another (financially) for My sake; My love is guaranteed to for two who uphold ties with one another for My sake." Narrated by Ahmad, and 4/236 and 5/236; al-Tanaasuh by Ibn Hibbaan, 3/338; the two ahaadeeth were classed as saheeh by Shaykh al-Albaani in Saheeh al-Targheeb wa’l-Tarheeb, 3019, 3020, 3021. What is meant by "two who visit one another for My sake" is that they only visit one another for the sake of Allaah, seeking thereby His pleasure for their loving one another for His sake or cooperating in worshipping Him. From al-Muntaqa Sharh al-Muwatta’, hadeeth 1779. 13 – Being tested. Calamities and disasters are a test for a person, and this is a sign that Allaah loves him, because this is like medicine: even though it is bitter, but still you offer the medicine, despite its bitterness, to the one whom you love; and Allaah’s is the highest description. According to a saheeh hadeeth (authentic narration): "The greatest reward comes from the greatest trial. When Allaah loves people, He tests them, and whoever accepts it gains the pleasure of Allaah and whoever complains earns His wrath. Narrated by al-Tirmidhi, 2396;and Ibn Maajah, 4031; classed as saheeh by Shaykh al-Albaani. For calamities to befall the believer is better than punishments being stored up for him in the Hereafter. How can it be otherwise when he is raised in status and his bad deeds are erased thereby? The Prophet (peace and blessings of Allaah be upon him) said: "When Allaah wills good for His slave, He hastens his punishment in this world, and when He wills bad for His slave, He withholds his sins until he comes with them on the Day of Resurrection." Narrated by al-Tirmidhi, 2396; classed as saheeh by al-Albaani. The scholars have explained that the one from whom calamities and trials are withheld is the hypocrite, for Allaah withholds [his punishment] in this world, so as to bring him with all his sins on the Day of Resurrection. If Allaah loves you, do not ask about the good that you will attain and the virtue that you will acquire… it is sufficient for you to know that you are the beloved of Allaah. The great fruits of the love of Allaah for His slave are as follows: 1 – People will love him and he will be accepted on earth, as it says in the hadeeth narrated by al-Bukhaari (3209): "When Allaah loves a slave, He says to Jibreel, 'I love so-and-so, so love him,' so Jibreel loves him and then calls out to the people of heaven, 'Allaah loves so-and-so, so love him,' and the people of heaven love him, and then acceptance is placed in the Earth for him." 2 – What Allaah has mentioned in the hadeeth qudsi of the great virtues of those whom He loves. It was narrated that Abu Hurayrah said: The Messenger of Allaah (peace and blessings of Allaah be upon him) said: "Whosoever shows enmity to someone devoted to Me, I shall be at war with him. My servant draws not near to Me with anything more loved by Me than the religious duties I have enjoined upon him, and My servant continues to draw near to Me with supererogatory works so that I shall love him. When I love him I am his hearing with which he hears, his seeing with which he sees, his hand with which he strikes and his foot with which he walks. Were he to ask [something] of Me, I would surely give it to him, and were he to ask Me for refuge, I would surely grant him it. I do not hesitate about anything as much as I hesitate about [seizing] the soul of My faithful servant: he hates death and I hate hurting him." Narrated by al-Bukhaari, 6502. This hadeeth qudsi includes a number of benefits of Allaah’s love for His slave: (i) "I am his hearing with which he hears" i.e., he does not listen to anything but that which Allaah loves. (ii) "his seeing with which he sees" i.e., he does not see anything but that which Allaah loves. (iii) "his hand with which he strikes" i.e., he does not do anything with his hand but that which Allaah loves. (iv) "and his foot with which he walks" i.e., he does not go towards anything but that which Allaah loves. (v) "Were he to ask [something] of Me, I would surely give it to him" i.e., his du’aa’s (supplications) are heard and his requests are granted. (vi) "and were he to ask Me for refuge, I would surely grant him it" i.e., he is protected by Allaah from all things… We ask Allaah to help us to please Him. And Allaah knows best. Source: Islam Q&A
cc/2019-30/en_middle_0012.json.gz/line1346
__label__cc
0.687042
0.312958
1 AMENDMENT TO CONSTITUTIONAL AND FEDERALISM 2 DEFENSE ACT REPEALER 5 Chief Sponsor: Ken Ivory 6 Senate Sponsor: Lincoln Fillmore 10 This bill amends a provision relating to the Constitutional and Federalism Defense Act. 13 ▸ extends the repeal date for the Constitutional and Federalism Defense Act. 20 63I-1-263, as last amended by Laws of Utah 2017, Chapters 23, 47, 95, 166, 205, 469, 21 and 470 24 Section 1. Section 63I-1-263 is amended to read: 25 63I-1-263. Repeal dates, Titles 63A to 63N. 26 (1) Subsection 63A-5-104(4)(h) is repealed on July 1, 2024. 27 (2) Section 63A-5-603, State Facility Energy Efficiency Fund, is repealed July 1, 2023. 28 (3) Title 63C, Chapter 4a, Constitutional and Federalism Defense Act, is repealed July 29 1, [2018] 2028. 30 (4) Title 63C, Chapter 4b, Commission for the Stewardship of Public Lands, is 31 repealed November 30, 2019. 32 (5) Title 63C, Chapter 16, Prison Development Commission Act, is repealed July 1, 33 2020. 34 (6) Title 63C, Chapter 17, Point of the Mountain Development Commission Act, is 35 repealed July 1, 2021. 36 (7) Title 63C, Chapter 18, Mental Health Crisis Line Commission, is repealed July 1, 38 (8) Title 63G, Chapter 21, Agreements to Provide State Services, is repealed July 1, 40 (9) Title 63H, Chapter 4, Heber Valley Historic Railroad Authority, is repealed July 1, 42 (10) Title 63H, Chapter 8, Utah Housing Corporation Act, is repealed July 1, 2026. 43 (11) On July 1, 2025: 44 (a) in Subsection 17-27a-404(3)(c)(ii), the language that states "the Resource 45 Development Coordinating Committee," is repealed; 46 (b) Subsection 23-14-21(2)(c) is amended to read "(c) provide notification of proposed 47 sites for the transplant of species to local government officials having jurisdiction over areas 48 that may be affected by a transplant."; 49 (c) in Subsection 23-14-21(3), the language that states "and the Resource Development 50 Coordinating Committee" is repealed; 51 (d) in Subsection 23-21-2.3(1), the language that states "the Resource Development 52 Coordinating Committee created in Section 63J-4-501 and" is repealed; 53 (e) in Subsection 23-21-2.3(2), the language that states "the Resource Development 54 Coordinating Committee and" is repealed; 55 (f) Subsection 63J-4-102(1) is repealed and the remaining subsections are renumbered 56 accordingly; 57 (g) Subsections 63J-4-401(5)(a) and (c) are repealed; 58 (h) Subsection 63J-4-401(5)(b) is renumbered to Subsection 63J-4-401(5)(a) and the 59 word "and" is inserted immediately after the semicolon; 60 (i) Subsection 63J-4-401(5)(d) is renumbered to Subsection 63J-4-401(5)(b); 61 (j) Sections 63J-4-501, 63J-4-502, 63J-4-503, 63J-4-504, and 63J-4-505 are repealed; 62 and 63 (k) Subsection 63J-4-603(1)(e)(iv) is repealed and the remaining subsections are 64 renumbered accordingly. 65 (12) (a) Subsection 63J-1-602.4(15) is repealed July 1, 2022. 66 (b) When repealing Subsection 63J-1-602.4(15), the Office of Legislative Research and 67 General Counsel shall, in addition to the office's authority under Subsection 36-12-12(3), make 68 necessary changes to subsection numbering and cross references. 69 (13) The Crime Victim Reparations and Assistance Board, created in Section 70 63M-7-504, is repealed July 1, 2027. 71 (14) Title 63M, Chapter 11, Utah Commission on Aging, is repealed July 1, 2027. 72 (15) Title 63N, Chapter 2, Part 2, Enterprise Zone Act, is repealed July 1, 2018. 73 (16) (a) Title 63N, Chapter 2, Part 4, Recycling Market Development Zone Act, is 74 repealed January 1, 2021. 75 (b) Subject to Subsection (16)(c), Sections 59-7-610 and 59-10-1007 regarding tax 76 credits for certain persons in recycling market development zones, are repealed for taxable 77 years beginning on or after January 1, 2021. 78 (c) A person may not claim a tax credit under Section 59-7-610 or 59-10-1007: 79 (i) for the purchase price of machinery or equipment described in Section 59-7-610 or 80 59-10-1007, if the machinery or equipment is purchased on or after January 1, 2021; or 81 (ii) for an expenditure described in Subsection 59-7-610(1)(b) or 59-10-1007(1)(b), if 82 the expenditure is made on or after January 1, 2021. 83 (d) Notwithstanding Subsections (16)(b) and (c), a person may carry forward a tax 84 credit in accordance with Section 59-7-610 or 59-10-1007 if: 85 (i) the person is entitled to a tax credit under Section 59-7-610 or 59-10-1007; and 86 (ii) (A) for the purchase price of machinery or equipment described in Section 87 59-7-610 or 59-10-1007, the machinery or equipment is purchased on or before December 31, 88 2020; or 89 (B) for an expenditure described in Subsection 59-7-610(1)(b) or 59-10-1007(1)(b), the 90 expenditure is made on or before December 31, 2020. 91 (17) Section 63N-2-512 is repealed on July 1, 2021. 92 (18) (a) Title 63N, Chapter 2, Part 6, Utah Small Business Jobs Act, is repealed 93 January 1, 2021. 94 (b) Section 59-9-107 regarding tax credits against premium taxes is repealed for 95 calendar years beginning on or after January 1, 2021. 96 (c) Notwithstanding Subsection (18)(b), an entity may carry forward a tax credit in 97 accordance with Section 59-9-107 if: 98 (i) the person is entitled to a tax credit under Section 59-9-107 on or before December 99 31, 2020; and 100 (ii) the qualified equity investment that is the basis of the tax credit is certified under 101 Section 63N-2-603 on or before December 31, 2023. 102 (19) Title 63N, Chapter 9, Part 2, Outdoor Recreational Infrastructure Grant Program, 103 is repealed January 1, 2023. 104 (20) Title 63N, Chapter 12, Part 3, Utah Broadband Outreach Center, is repealed July 105 1, 2018. 106 (21) Title 63N, Chapter 12, Part 4, Career and Technical Education Board, is repealed 107 July 1, 2018.
cc/2019-30/en_middle_0012.json.gz/line1353
__label__cc
0.674254
0.325746
First woman and 12th overall @nofussevents #tourdeben 50 miles including 5 enduro timed stages. Great event @jennygrahamis @RideCannondale Tour de Ben No Fuss Events have a reputation for putting on some of the best mountain bike events in the country and the Tour de Ben is no exception. The No Fuss team have cleverly taken a classic route through iconic Scottish highland terrain and turned it into the kind of adventure challenge that has become my favoured way to hurt myself. And this Saturday I hurt along with 300 other riders. The format of the TDB is unique. It’s an enduro race (timed stages within a set untimed route) only the set route was a 50 mile circumnavigation of The Ben Nevis massif and, just for fun, it was also timed. This effectively means that if you want to finish competitively placed you have to race a long travel bike the whole time leaving you ragged for the set stages which were also (obviously) not your typical enduro stage. Stage 1 is a short, steep, technical descent on the West Highland way into Kinlochleven. Stage 2 begins as a brutal uphill grind on loose double track to from Mamore Lodge before turning into a torturous rolling to Loch Eilde Mor. Stage 3, a loooong push / carry up to a rough col and then a descent into the next glen, has seen gown men in tears. Stage 4 involves more steep, technical riding on the built trails in the Leanachan forest only by now you are operating on sheer will power and trying to control your bike using cramping muscles. Have I made that sound like fun? It actually really is. We assembled on Fort William high street at 9.30am, the place buzzing with anticipation too great to be dampened by the falling drizzle. Jen and I wiggled our way to the front of the pack to meet up with Rob Friel before the Lochaber Pipe Band lead us out to the end of the pedestrian walkway. What happened next was an assault on my poor, underprepared body. An hour long road drag up to the West Highland Way made every cell scream at me to stop pedalling. My Cannondale Jekyll is the bike of choice for this type of thing but with big all mountain tyres weighing it down, racing it uphill will always hurt a lot. I forced myself to remember I should never make any assumptions about how my day will turn out in the first 20 agonising minutes of a race and, right enough, as my blood thinned and my lungs opened I managed to find my rhythm. I eventually reached stage 1, dibbed my timing chip and was gone. On this stage I was reminded why I ride a Jekyll. This nimble bike and I didn’t touch the ground that much on the descent into Kinlochleven. While sharp cross drains claimed rider after rider, we kept largely airborne in an effort to avoid to them. This strategy definitely carries its own risks but not the risk of puncturing which can really upset your day (whereas a head injury might just set you back a bit). I reigned it in a bit in an effort to recover some composure before Stage 2 and made my way up to Mamore Lodge on steep double track. It was at this point 2 years ago I missed the start gate and was disqualified from the race so was rather keen not to make the same mistake again. Stage 2 gets you high into the hills but not in a nice way. To the soundtrack of my ragged breath and pounding heart I completed the stage in just under 16 agonising minutes. It was all starting to hurt quite a lot now and I was still not even halfway. I rode steadily to the river crossing and the start of Stage 3. A timed section pushing bikes was going to play to my current strengths. Having just returned from 2 weeks spent hauling a 25kg fully laden Fatbike over the French Alps it was an actual pleasure to push the comparatively light Jekyll over the rough col. I appreciate this may sound a bit tweaked but I’m in good company. A post race analysis with Jenny (who made her mark on the Highalnd Trail 550 earlier in the year) revealed I was not the only one who liked the challenge. (I do remain open to the fact that I just surround myself with people as tweaked as I am so I don’t have to face up to my abnormality. Sorry Jen). The finished in fast, rutted single track and a stream crossing on which I whacked my knee off my stem. I hopped into the finish and drowned my sorrows at the feed station with electrolytes and flapjack before recovering enough composure to get back on the bike and head down the glen. With the end now in sight I summoned all my remaining energy to get to the fourth and final stage and when that didn’t prove enough I took a gel. High on sugar, it was a race against time before the sugar crash which I didn’t quite manage. I got a little out of shape on the final descent but held it together enough to finish in the second fastest female time. With wins on the other 4 stages, the race was in the bag. I finished in 4 hours and 20 mins. Jen came in an hour later beaming her usual infectious smile. She wasn’t even sweating having hauled her fully ridged Stooge round the highlands all day. Hardy. We ate soup and milled about the finish line for a couple of hours before I came to my senses and decided I really must drive down to Glasgow and pack for a 6am flight to Spain the following day. Why, when the riding is so good here, I wondered to myself? But only briefly. Thank you No Fuss and your fabulous marshals for a great event. Thank you Jen for providing the images and being arsed to stop and take them in the first place (and for sharing that infectious smile).
cc/2019-30/en_middle_0012.json.gz/line1355
__label__cc
0.747688
0.252312
Pendants on a Chain Here we provide our contact information for journalists and bloggers, share our press materials for publications, also collect past ones. Adjustable Chain Lock is Now a Part of All Leta’s Pendants and Necklaces Since the beginning of our story, we have been thinking about the necessity of having an ajustable chain lock on our necklaces and pendants. In the case of a pendant on a chain, it is a matter of aesthetics as to how you want to wear your favourite piece – tighter to your neck or closer to the decolatte. It is different and more critical in the case of a necklace as it could turn out to be too big or, the opposite, be so small that you couldn`t easily fasten it. Leta items are now available at Fabergé Museum Store We have been planning to present our items in Saint-Petersburg for a long time. Despite the delivery service with a free trying-on option, the important advantage of a jewelry brand is to provide the customer the opportunity for an authentic shopping experience with the ability to receive professional advice from a specialist. Fabergé Museum Store is now the place where you can do it all. Leta FM at Telegram Last summer we launched Leta FM to share compilations of our favorite music that was playing in our showroom in Moscow. Since then, the project has grown and become less formal at the same time. Together with original mixes being released once per season, we decided to share with you any music that inspires us. “Saving the Planet” – New Section on Our Website Today we launch “Saving the Planet” section on our site. There we have tried to express our opinion on the environmental problems that humanity has faced and about the way in which we do not shy away from them. Charity Project Along with the Friends of the Baltic Seal Fund Currently there are no more than two hundred Baltic ringed seals in the Gulf of Finland, and forty years ago the region was inhabited by several thousand species. The subspecies are on the brink of extinction here in the Russian Federation, and if we don’t take urgent measures, these rare sea mammals will disappear from the Gulf of Finland. Our charity project along with the Friends of the Baltic Seal is a great chance to tell about the existing problem and possible ways to solve it. Ambery is now Leta In our collections we mainly focused on amber, but we feel that in the future we definitely would like to try new ideas and combinations. Amber will still remain the cornerstone of our jewelry story, but today it will have a new name, not limited to its «amber» side. Leta is the same jewelry pieces with an architectural history, the same neat style and the same impeccable service, the same website and the same best team in the world. But with a new name. Lucy Zharikova Photoshoot A talented photographer Lucy Zharikova went to Yantarny this summer to create an atmospheric shoot on the Baltic Coast for Ambery. Inspired by the cold sea, fresh wind and natural textures, such as wood and smoky pebbles, Lucy subtly conveyed everything that we appreciate so much in our jewelry – simple and adjusted forms and natural beauty of amber. Chinese-language Version of Ambery Launched China’s progress toward online shopping is more important than ever for us in the wake of our mission to bring modern design to amber jewelry industry and expand Russian retail export and also our focus to give people in every country better shopping experience on our site. Leave your e-mail address above and then confirm it by clicking the link in the welcome letter. By pressing «Sign up» button you agree that your personal data will be handled in accordance with our Privacy Policy. 6 Russian Jewelry Brands You Should Get to Know It seems that art deco, minimalism and geometry were literally invented for amber. Leta Jewelry Brand Releases a New Ring to Support the Charity Project Along with the Friends of the Baltic Seal Fund A portion of each sale of this ring made by Katya Alagich will be monthly donated to the Fund to save those amazing animals. Modern Amber Jewelry: The history of Leta Yota’s corporate partner, Leta, was able to show profit only two months after its launch. Valentine's Day: 7 Amber Jewelry Items as a Perfect Gift for Your Beloved One Russian jewelry brand called Ambery creates minimalistic amber jewelry. Look at their new lookbook, shot on the Baltic Sea shore. New Brand: Amber and Minimalism of Ambery Young Russian jewelry brand proves that is is possible to create modern and stylish amber jewelry. Laconic Earrings with Amber from Russian Jewelry Brand «Ambery» If you were looking for an unusual «Russian style» gift – here it is. Trapped inside Amber: How to Start from Scratch on a Well-developed Market Ambery’s co-founders decided to create Russian amber jewelry international online store and it seems that this is a goldmine. 18 Beautiful Amber Jewelry Pieces from Russian Brand «Ambery» Their plain geometry does not distract from the natural beauty of amber, also emphasize the variety of shades. Daily from 11 to 21 (Moscow time) Any non-press inquiries will be disregarded Starosadsky per. 5/8 str. 6 By pressing «Send» button you agree that your personal data will be handled in accordance with our Privacy Policy. Customer Service Contact Saving the Baltic Seal Be the first to know about exciting new designs, special events, store openings and much more. No items in the cart.
cc/2019-30/en_middle_0012.json.gz/line1358
__label__wiki
0.928084
0.928084
Matt Watson (left) and Ian Dumigan with the trphy for game when TGS First 1V play the old boys on Australia Day. TGS, January 2019 Bev Lacey Grammar Old Boys prepare to turn back the clock by Sean Teuma 26th Jan 2019 6:00 AM CRICKET: Toowoomba Grammar is set to celebrate Australia Day in style, when the young and old do battle on the school grounsd. The TGS First XI will take on the 1999 First XI in the annual reunion match at Mills Oval today, as both teams hunt for bragging rights. Current First XI captain Matthew Watson played in the fixture last year, where his side was able to grind out a victory over their counterparts from 1998, an experience he looks forward to replicating today. "It's always a good game and a tradition. It's always played in good spirit,” Watson said. "We took it down to the last over and just got over the line. It's always very competitive and its good to catch up after the game and hear their stories. "Some of their game styles and techniques you can see out there, and you think its unusual but its just how it was played back then. "It's awesome to see how they all get along after some of them haven't seen each other for years.” The match serves as a warm-up for the upcoming GPS season, and Watson hopes they can show their might in their final lead-up. "We want to show that we have a competitive side and that we can do well in the GPS,” he said. "We've got a well balanced squad and are well prepared this year.” Heading into the fixture, the First XI has a slender lead over the Old Boys, and Old Boys life member Ian Dunnigan, who has helped to coordinate the reunion match, said they will be trying to change that today in what is fast becoming one of the key dates on the school calendar. "This will be the 14th year that it has taken place. The Old Boys have won four, the school eight and one year was a draw,” Dunnigan said. "I heard one master say a few years back that anything lasts six years at Grammar becomes a tradition. It's part of the school cricket life now. "This Old Boys team was second to Churchie (Anglican Church Grammar School) in the GPS competition, so I think they'll give the boys a pretty good run on Saturday.” While some will battle age and a number of years out of the game, Dunnigan expected a strong showing from the 1999 side. "The team this year is going to be captained by Tom Marland who was senior prefect in 1999. Tom's a lawyer in Bundaberg and he has organised his team,” he said. "Tom said they're pretty keen. They had a nets session yesterday in the new gynamsium. "A few of them played last year and a few are still playing cricket (regularly). "They wear out a bit in the heat, but they'll give the boys a run. Last year was very competitive, it was only in the last few overs that they got the runs.” Play commences at Mills Oval on the TGS school grounds from 9.30am today. premium_icon Remarkable race defined legendary ’Old Fox’ premium_icon GPS Rowing: School with the oldest boatshed in the ­country cricket tgs first xi tgs old boys toowoomba grammar twb sport
cc/2019-30/en_middle_0012.json.gz/line1371
__label__cc
0.562443
0.437557
from an original idea by Siobhan Dowd, with illustrations by Jim Kay (Walker Books) Connor has been having nightmares for a while. But one night, a monster, which seems to have been born from the yew tree in the churchyard opposite their house, comes to him at 12.07 am exactly and continues to do so every night. At first Connor thinks he is trying to scare him but the monster insists he is here to help him and that it is he, Connor, who has in fact summoned him. The Monster wants to tell Connor three stories, and the fourth story must be told by Connor, and must be his truth, how he really feels. As the Monster and Connor’s relationship develops, Connor’s story starts to unravel and the purpose of the Monster’s visit slowly becomes clearer. I don’t think anything that I will say about this book will do it one ounce of justice. This is beautiful story, touching, sometimes funny, often harrowing to a point that is almost unbearable. Based on an original idea from the much-missed Siobhan Dowd, Patrick Ness tells the tale of Connor, a young lad who lives alone with his terminally ill mother. His father lives in America with a needy new wife, his grandmother seems distant and uninterested and he has more foes than friends at school. I think it is fair to say that Connor is “living” his mother’s cancer as much as she is and through the text, so are the readers. But all is done is such a subtle, lyrical way that it is not only more effective but all the more harrowing. The Monster is a wonderful creation; part- yew tree and part-monster, it is fearsome in appearance, destructive and grumpy in temperament. But it also represents life, death and rebirth as is so beautifully illustrated in the three allegorical tales it shares with Connor and the readers. Each of the three stories has a moral and the overall message is that life is not always fair or kind , and that one needs to learn to deal with that. The Monster’s purpose is to help Connor deal with the many difficult issues in his life: the bullying, the loneliness, the pain, the guilt. The latter is the most heartbreaking, the most painfully real, the most buried feeling for Connor, and through his suffering and his journey towards acceptance, young readers are presented with an important lesson: thinking something terrible does not make you a bad person. Although the Monster dishes out some tough love throughout the book, the reader slowly realises its purpose is to make Connor accept this, and consequently you cannot help but like the creature. The ending of the story is not unexpected of course but is done in a way that will not leave any reader unshaken; it is simply immensily sad. One cannot help but wonder how Siobhan Dowd might have been feeling when she put this idea to paper, as she was possibly contemplating, ultimately, her own demise. This makes the experience of reading A Monster Calls all the more poignant. Taking on someone else’s idea cannot be easy when you are a writer, and one must applaud Patrick Ness not only for having the guts to do it, but for doing such a formidable job of it. I love both Patrick Ness and Siobhan Dowd’s books and was very excited at the prospect of this book, but also felt a bit concerned, as both authors’ styles differ so much. But it worked so wonderfully, because Ness did not try to echo Dowd’s style but rather did her idea justice in his own. His writing is direct and harsh, but filled of empathy and emotion. He has such a unique voice; there is just nobody else that can write like Patrick Ness. The book is heavily illustrated by Jim Kay and the artwork works perfectly with the text, bringing the sinister, harrowing atmosphere of the story to life. Walker have surpassed themselves, again, on the book design; it is a beautiful book,which really stands out. Patrick Ness has taken Siobhan Dowd’s original idea and with it has created a beautiful, emotional and moving novel which will stay with its readers long after they have turned the last page. Go read this book. All illustrations © Jim Kay Many thanks to Walker Books for sending me a copy of “A Monster Calls”. Red House Children’s Book Award Ceremony Noah Barleywater Runs Away Luisa at Chicklish June 28, 2011 This is such an amazing book, and I loved your review. Thank you! Gaëlle June 29, 2011 Siobhan Dowd, Patrick Ness… quelles signatures! j’aimerais drôlement voir ce titre traduit ici! Library Mice June 29, 2011 Thanks Luisa! I have really struggled with this review, it was so hard to express how I felt about the book! Gaelle, j’imagine que ca ne va pas tarder!
cc/2019-30/en_middle_0012.json.gz/line1377
__label__wiki
0.991537
0.991537
Progressive Tiffany Cabán Beats NYC Democratic Machine - Wins DA Election Scott Heins/Getty Images "When people come together, we can beat big money in elections People power is no fluke." —Rep. Alexandria Ocasio-Cortez Overcoming united opposition from New York City's powerful Democratic political machine, 31-year-old progressive public defender Tiffany Cabán declared victory in the race for Queens district attorney Tuesday night after running on a platform of decarceration, ending cash bail, decriminalizing sex work, and cracking down on predatory lenders. "They said I was too young," Cabán declared during her victory party. "They said I didn't look like a district attorney. They said we could not build a movement from the grassroots. They said we could not win." "But we did it, y'all," said Cabán, who is set to become the first openly queer district attorney of Queens. While Cabán's establishment-backed opponent Melinda Katz—the Queens borough president who benefited from a torrent of campaign cash from the real estate industry—did not concede defeat Tuesday night, Cabán's campaign expressed confidence that the remaining ballots will not be enough to swing the election. As of this writing, Cabán is ahead by just over 1,000 votes with 99 percent of precincts reporting. "I am a 31-year-old, queer Latina public defender whose parents grew up in the Woodside Housing projects," Cabán said Tuesday night. "And I decided to run. I ran because for too long, too many communities in Queens hadn't had a fair shot in our criminal-justice system." ...
cc/2019-30/en_middle_0012.json.gz/line1390
__label__cc
0.596746
0.403254
Justin Odegaard Adjunct Clinical Assistant Professor, Pathology Anatomic Pathology Board Certification: Molecular Genetic Pathology, American Board of Pathology (2013) Fellowship:Stanford University School of Medicine (2013) CA Board Certification: Anatomic Pathology, American Board of Pathology (2012) Fellowship:Stanford Hospital and Clinics (2012) CA Residency:Stanford Hospital and Clinics (2011) CA Medical Education:Stanford University School of Medicine (2009) CA Academic odegaard@stanford.edu Clinical Pathology 300 Pasteur Dr Rm L235 MC 5324 Stanford, CA 94305 IPSE, a parasite-derived host immunomodulatory protein, is a potential therapeutic for hemorrhagic cystitis. American journal of physiology. Renal physiology Zee, R. S., Mbanefo, E. C., Le, L. H., Pennington, L. F., Odegaard, J., Jardetzky, T. S., Alouffi, A., Akinwale, J., Falcone, F. H., Hsieh, M. H. 2019 Chemotherapy-induced hemorrhagic cystitis is characterized by bladder pain and voiding dysfunction caused by hemorrhage and inflammation. Novel therapeutic options to treat hemorrhagic cystitis are needed. We previously reported that systemic administration of the Schistosomiasis haematobium-derived protein H-IPSEH06 (IL-4-inducing principle from Schistosoma mansoni eggs), is superior to 3 doses of MESNA in alleviating hemorrhagic cystitis. Based on prior reports by others on S. mansoni IPSE (M-IPSE) and additional work by our group, we reasoned that H-IPSE mediates its effects on hemorrhagic cystitis by binding IgE on basophils and inducing IL-4 expression, promoting urothelial proliferation, and translocating to the nucleus to modulate expression of genes implicated in relieving bladder dysfunction. We speculated that local bladder injection of the S. haematobium IPSE ortholog IPSEH03, hereafter called H-IPSEH03, might be more efficacious in preventing hemorrhagic cystitis compared to systemic administration of IPSEH06. We report that H-IPSEH03, like M-IPSE and H-IPSEH06, activates IgE-bearing basophils in an NFAT reporter assay, indicating activation of the cytokine pathway. Further, H-IPSEH03 attenuates ifosfamide-induced increases in bladder wet weight in an IL-4-dependent fashion. H-IPSEH03 relieves hemorrhagic cystitis-associated allodynia and modulates voiding patterns in mice. Finally, H-IPSEH03 drives increased urothelial cell proliferation suggesting that IPSE induces bladder repair mechanisms. Taken together, H-IPSEH03 may be a potential novel therapeutic to treat hemorrhagic cystitis by basophil activation, attenuation of allodynia and promotion of urothelial cell proliferation. IPSE, a urogenital parasite-derived immunomodulatory protein, ameliorates ifosfamide-induced hemorrhagic cystitis through downregulation of pro-inflammatory pathways. Scientific reports Mbanefo, E. C., Le, L., Zee, R., Banskota, N., Ishida, K., Pennington, L. F., Odegaard, J. I., Jardetzky, T. S., Alouffi, A., Falcone, F. H., Hsieh, M. H. 2019; 9 (1): 1586 Ifosfamide and other oxazaphosphorines can result in hemorrhagic cystitis, a constellation of complications caused by acrolein metabolites. We previously showed that a single dose of IPSE (Interleukin-4-inducing principle from Schistosoma eggs), a schistosome-derived host modulatory protein, can ameliorate ifosfamide-related cystitis; however, the mechanisms underlying this urotoxicity and its prevention are not fully understood. To provide insights into IPSE's protective mechanism, we undertook transcriptional profiling of bladders from ifosfamide-treated mice, with or without pretreatment with IPSE or IPSE-NLS (a mutant of IPSE lacking nuclear localization sequence). Ifosfamide treatment upregulated a range of proinflammatory genes. The IL-1beta-TNFalpha-IL-6 proinflammatory cascade via NFkappaB and STAT3 pathways was identified as the key driver of inflammation. The NRF2-mediated oxidative stress response pathway, which regulates heme homoeostasis and expression of antioxidant enzymes, was highly activated. Anti-inflammatory cascades, namely Wnt, Hedgehog and PPAR pathways, were downregulated. IPSE drove significant downregulation of major proinflammatory pathways including the IL-1beta-TNFalpha-IL-6 pathways, interferon signaling, and reduction in oxidative stress. IPSE-NLS reduced inflammation but not oxidative stress. Taken together, we have identified signatures of acute-phase inflammation and oxidative stress in ifosfamide-injured bladder, which are reversed by pretreatment with IPSE. This work revealed several pathways that could be therapeutically targeted to prevent ifosfamide-induced hemorrhagic cystitis. Therapeutic exploitation of IPSE, a urogenital parasite-derived host modulatory protein, for chemotherapy-induced hemorrhagic cystitis FASEB JOURNAL Mbanefo, E. C., Le, L., Pennington, L. F., Odegaard, J. I., Jardetzky, T. S., Alouffi, A., Falcone, F. H., Hsieh, M. H. 2018; 32 (8): 4408–19 Chemotherapy-induced hemorrhagic cystitis (CHC) can be difficult to manage. Prior work suggests that IL-4 alleviates ifosfamide-induced hemorrhagic cystitis (IHC), but systemically administered IL-4 causes significant side effects. We hypothesized that the Schistosoma hematobium homolog of IL-4-inducing principle from Schistosoma mansoni eggs (H-IPSE), would reduce IHC and associated bladder pathology. IPSE binds IgE on basophils and mast cells, triggering IL-4 secretion by these cells. IPSE is also an "infiltrin," translocating into the host nucleus to modulate gene transcription. Mice were administered IL-4, H-IPSE protein or its nuclear localization sequence (NLS) mutant, with or without neutralizing anti-IL-4 antibody, or 2-mercaptoethane sulfonate sodium (MESNA; a drug used to prevent IHC), followed by ifosfamide. Bladder tissue damage and hemoglobin content were measured. Spontaneous and evoked pain, urinary frequency, and bladdergene expression analysis were assessed. Pain behaviors were interpreted in a blinded fashion. One dose of H-IPSE was superior to MESNA and IL-4 in suppressing bladder hemorrhage in an IL-4-dependent fashion and comparable with MESNA in dampening ifosfamide-triggered pain behaviors in an NLS-dependent manner. H-IPSE also accelerated urothelial repair following IHC. Our work represents the first therapeutic exploitation of a uropathogen-derived host modulatory molecule in a clinically relevant bladder disease model and indicates that IPSE may be an alternative to MESNA for mitigating CHC.-Mbanefo, E. C., Le, L., Pennington, L. F., Odegaard, J. I., Jardetzky, T. S., Alouffi, A., Falcone, F. H., Hsieh, M. H. Therapeutic exploitation of IPSE, a urogenital parasite-derived host modulatory protein, for chemotherapy-induced hemorrhagic cystitis. Comprehensive analysis of normal adjacent to tumor transcriptomes NATURE COMMUNICATIONS Aran, D., Camarda, R., Odegaard, J., Paik, H., Oskotsky, B., Krings, G., Goga, A., Sirota, M., Butte, A. J. 2017; 8: 1077 Histologically normal tissue adjacent to the tumor (NAT) is commonly used as a control in cancer studies. However, little is known about the transcriptomic profile of NAT, how it is influenced by the tumor, and how the profile compares with non-tumor-bearing tissues. Here, we integrate data from the Genotype-Tissue Expression project and The Cancer Genome Atlas to comprehensively analyze the transcriptomes of healthy, NAT, and tumor tissues in 6506 samples across eight tissues and corresponding tumor types. Our analysis shows that NAT presents a unique intermediate state between healthy and tumor. Differential gene expression and protein-protein interaction analyses reveal altered pathways shared among NATs across tissue types. We characterize a set of 18 genes that are specifically activated in NATs. By applying pathway and tissue composition analyses, we suggest a pan-cancer mechanism of pro-inflammatory signals from the tumor stimulates an inflammatory response in the adjacent endothelium. Laser-Assisted Removal of Embedded Vena Cava Filters A 5-Year First-in-Human Study CHEST Kuo, W. T., Odegaard, J. I., Rosenberg, J. K., Hofmann, L. V. 2017; 151 (2): 417-424 Many patients are subjected to the potential risks and morbidity associated with an indwelling IVC filter when standard methods fail to remove the filter. We evaluated the safety and effectiveness of the excimer laser-sheath technique for removing embedded IVC filters.Over a 5-year period, 251 consecutive patients undergoing laser-assisted filter retrieval were prospectively enrolled. There were 103 men and 148 women (mean:46 years, range:15-82). Indications for retrieval included symptomatic acute IVC thrombosis, chronic IVC occlusion, and/or pain from filter penetration. Retrieval was also performed to prevent risks from prolonged implantation and potentially to eliminate the need for lifelong anticoagulation. After retrieval failed using 3 times the standard retrieval force (digitally-measured), treatment escalation was attempted using a laser sheath powered by a 308 nm XeCl laser. Success was defined as complete filter detachment and removal from the body. Primary safety outcomes were major procedure-related complications.Laser-assisted retrieval was successful in 249/251(99.2%)(95%CI:97.2-99.9%) with mean implantation of 979 days, range:37-7098 days(>19 years), among retrievable-type filters(n=211) and permanent-type filters(n=40). Average force during failed attempts without laser was 6.7 lbs versus 3.8 lbs during laser-assisted retrievals(p < 0.0001). The major complication rate was 1.6%(95%CI:0.4%-4.0%), and all were successfully treated. Successful retrieval allowed cessation of anticoagulation in 45/46(98%)(95%CI:88%-99%) and alleviated filter-related morbidity in 55/57 patients (96%)(95%CI:88%-99%).The excimer laser-sheath technique is safe and effective for removing embedded IVC filters refractory to standard retrieval and high force. This technique can be used to alleviate or prevent filter-related morbidity and may allow cessation of filter-related anticoagulation. View details for DOI 10.1016/j.chest.2016.09.029 Laser-Assisted Removal of Embedded Vena Cava Filters: A 5-Year First-in-Human Study. Chest Kuo, W. T., Odegaard, J. I., Rosenberg, J. K., Hofmann, L. V. 2016 Next-Generation Molecular Testing of Newborn Dried Blood Spots for Cystic Fibrosis. journal of molecular diagnostics Lefterova, M. I., Shen, P., Odegaard, J. I., Fung, E., Chiang, T., Peng, G., Davis, R. W., Wang, W., Kharrazi, M., Schrijver, I., Scharfe, C. 2016; 18 (2): 267-282 Newborn screening for cystic fibrosis enables early detection and management of this debilitating genetic disease. Implementing comprehensive CFTR analysis using Sanger sequencing as a component of confirmatory testing of all screen-positive newborns has remained impractical due to relatively lengthy turnaround times and high cost. Here, we describe CFseq, a highly sensitive, specific, rapid (<3 days), and cost-effective assay for comprehensive CFTR gene analysis from dried blood spots, the common newborn screening specimen. The unique design of CFseq integrates optimized dried blood spot sample processing, a novel multiplex amplification method from as little as 1 ng of genomic DNA, and multiplex next-generation sequencing of 96 samples in a single run to detect all relevant CFTR mutation types. Sequence data analysis utilizes publicly available software supplemented by an expert-curated compendium of >2000 CFTR variants. Validation studies across 190 dried blood spots demonstrated 100% sensitivity and a positive predictive value of 100% for single-nucleotide variants and insertions and deletions and complete concordance across the polymorphic poly-TG and consecutive poly-T tracts. Additionally, we accurately detected both a known exon 2,3 deletion and a previously undetected exon 22,23 deletion. CFseq is thus able to replace all existing CFTR molecular assays with a single robust, definitive assay at significant cost and time savings and could be adapted to high-throughput screening of other inherited conditions. View details for DOI 10.1016/j.jmoldx.2015.11.005 A Rapid, High-Quality, Cost-Effective, Comprehensive and Expandable Targeted Next-Generation Sequencing Assay for Inherited Heart Diseases. Circulation research Wilson, K. D., Shen, P., Fung, E., Karakikes, I., Zhang, A., Inanloorahatloo, K., Odegaard, J., Sallam, K., Davis, R. W., Lui, G. K., Ashley, E. A., Scharfe, C., Wu, J. C. 2015; 117 (7): 603-611 Thousands of mutations across >50 genes have been implicated in inherited cardiomyopathies. However, options for sequencing this rapidly evolving gene set are limited because many sequencing services and off-the-shelf kits suffer from slow turnaround, inefficient capture of genomic DNA, and high cost. Furthermore, customization of these assays to cover emerging targets that suit individual needs is often expensive and time consuming.We sought to develop a custom high throughput, clinical-grade next-generation sequencing assay for detecting cardiac disease gene mutations with improved accuracy, flexibility, turnaround, and cost.We used double-stranded probes (complementary long padlock probes), an inexpensive and customizable capture technology, to efficiently capture and amplify the entire coding region and flanking intronic and regulatory sequences of 88 genes and 40 microRNAs associated with inherited cardiomyopathies, congenital heart disease, and cardiac development. Multiplexing 11 samples per sequencing run resulted in a mean base pair coverage of 420, of which 97% had >20× coverage and >99% were concordant with known heterozygous single nucleotide polymorphisms. The assay correctly detected germline variants in 24 individuals and revealed several polymorphic regions in miR-499. Total run time was 3 days at an approximate cost of $100 per sample.Accurate, high-throughput detection of mutations across numerous cardiac genes is achievable with complementary long padlock probe technology. Moreover, this format allows facile insertion of additional probes as more cardiomyopathy and congenital heart disease genes are discovered, giving researchers a powerful new tool for DNA mutation detection and discovery. Alterations in DNA methylation may be the key to early detection and treatment of schistosomal bladder cancer. PLoS neglected tropical diseases Conti, S. L., Honeycutt, J., Odegaard, J. I., Gonzalgo, M. L., Hsieh, M. H. 2015; 9 (6) View details for DOI 10.1371/journal.pntd.0003696 Macrophages are required for host survival in experimental urogenital schistosomiasis. FASEB journal Fu, C., Odegaard, J. I., Hsieh, M. H. 2015; 29 (1): 193-207 Urogenital schistosomiasis, Schistosoma haematobium worm infection, afflicts millions of people with egg-triggered, fibrotic bladder granulomata. Despite the significant global impact of urogenital schistosomiasis, the mechanisms of bladder granulomogenesis and fibrosis are ill defined due to the prior lack of tractable animal models. We combined a mouse model of urogenital schistosomiasis with macrophage-depleting liposomal clodronate (LC) to define how macrophages mediate bladder granulomogenesis and fibrosis. Mice were injected with eggs purified from infected hamsters or vehicle prepared from uninfected hamster tissues (xenoantigen and injection trauma control). Empty liposomes were controls for LC: 1) LC treatment resulted in fewer bladder egg granuloma-infiltrating macrophages, eosinophils, and T and B cells, lower bladder and serum levels of eotaxin, and higher bladder concentrations of IL-1α and chemokines (in a time-dependent fashion), confirming that macrophages orchestrate leukocyte infiltration of the egg-exposed bladder; 2) macrophage-depleted mice exhibited greater weight loss and bladder hemorrhage postegg injection; 3) early LC treatment postegg injection resulted in profound decreases in bladder fibrosis, suggesting differing roles for macrophages in fibrosis over time; and 4) LC treatment also led to egg dose-dependent mortality, indicating that macrophages prevent death from urogenital schistosomiasis. Thus, macrophages are a potential therapeutic target for preventing or treating the bladder sequelae of urogenital schistosomiasis.-Fu, C.-L., Odegaard, J. I., Hsieh, M. H. Macrophages are required for host survival in experimental urogenital schistosomiasis. View details for DOI 10.1096/fj.14-259572 Identification of Orai1 Channel Inhibitors by Using Minimal Functional Domains to Screen Small Molecule Microarrays CHEMISTRY & BIOLOGY Sadaghiani, A. M., Lee, S. M., Odegaard, J. I., Leveson-Gower, D. B., McPherson, O. M., Novick, P., Kim, M. R., Koehler, A. N., Negrin, R., Dolmetsch, R. E., Park, C. Y. 2014; 21 (10): 1278-1292 Store-operated calcium (SOC) channels are vital for activation of the immune cells, and mutations in the channel result in severe combined immunodeficiency in human patients. In lymphocytes, SOC entry is mediated by the Orai1 channel, which is activated by direct binding of STIM1. Here we describe an alternative approach for identifying inhibitors of SOC entry using minimal functional domains of STIM1 and Orai1 to screen a small-molecule microarray. This screen identified AnCoA4, which inhibits SOC entry at submicromolar concentrations and blocks T cell activation in vitro and in vivo. Biophysical studies revealed that AnCoA4 binds to the C terminus of Orai1, directly inhibiting calcium influx through the channel and also reducing binding of STIM1. AnCoA4, unlike other reported SOC inhibitors, is a molecule with a known binding site and mechanism of action. These studies also provide proof of principle for an approach to ion channel drug discovery. View details for DOI 10.1016/j.chembiol.2014.08.016 Ameloblastoma driver mutations revealed by next-generation sequencing of formalin-fixed paraffin-embedded specimens McClary, A. C., Sweeney, R. T., Biscocho, J., Myers, B. R., Neahring, L., Kwei, K. A., Qu, K., Gong, X., Ng, T., Jones, C. D., Varma, S., Odegaard, J. I., Rubin, B., Troxell, M. L., Pelham, R. J., Zehnder, J. L., Beachy, P. A., Pollack, J. R., West, R. B. AMER ASSOC CANCER RESEARCH. 2014 Immune responses to Schistosoma haematobium infection PARASITE IMMUNOLOGY Odegaard, J. I., Hsieh, M. H. 2014; 36 (9): 428-438 View details for DOI 10.1111/pim.12084 Identification of recurrent SMO and BRAF mutations in ameloblastomas. Nature genetics Sweeney, R. T., McClary, A. C., Myers, B. R., Biscocho, J., Neahring, L., Kwei, K. A., Qu, K., Gong, X., Ng, T., Jones, C. D., Varma, S., Odegaard, J. I., Sugiyama, T., Koyota, S., Rubin, B. P., Troxell, M. L., Pelham, R. J., Zehnder, J. L., Beachy, P. A., Pollack, J. R., West, R. B. 2014; 46 (7): 722-725 Here we report the discovery of oncogenic mutations in the Hedgehog and mitogen-activated protein kinase (MAPK) pathways in over 80% of ameloblastomas, locally destructive odontogenic tumors of the jaw, by genomic analysis of archival material. Mutations in SMO (encoding Smoothened, SMO) are common in ameloblastomas of the maxilla, whereas BRAF mutations are predominant in tumors of the mandible. We show that a frequently occurring SMO alteration encoding p.Leu412Phe is an activating mutation and that its effect on Hedgehog-pathway activity can be inhibited by arsenic trioxide (ATO), an anti-leukemia drug approved by the US Food and Drug Administration (FDA) that is currently in clinical trials for its Hedgehog-inhibitory activity. In a similar manner, ameloblastoma cells harboring an activating BRAF mutation encoding p.Val600Glu are sensitive to the BRAF inhibitor vemurafenib. Our findings establish a new paradigm for the diagnostic classification and treatment of ameloblastomas. Identification of recurrent SMO and BRAF mutations in ameloblastomas NATURE GENETICS Sweeney, R. T., McClary, A. C., Myers, B. R., Biscocho, J., Neahring, L., Kwei, K. A., Qu, K., Gong, X., Ng, T., Jones, C. D., Varma, S., Odegaard, J. I., Sugiyama, T., Koyota, S., Rubin, B. P., Troxell, M. L., Pelham, R. J., Zehnder, J. L., Beachy, P. A., Pollack, J. R., West, R. B. 2014; 46 (7): 722-725 Cellular origin of bladder neoplasia and tissue dynamics of its progression to invasive carcinoma. Nature cell biology Shin, K., Lim, A., Odegaard, J. I., Honeycutt, J. D., Kawano, S., Hsieh, M. H., Beachy, P. A. 2014; 16 (5): 469-478 Understanding how malignancies arise within normal tissues requires identification of the cancer cell of origin and knowledge of the cellular and tissue dynamics of tumour progression. Here we examine bladder cancer in a chemical carcinogenesis model that mimics muscle-invasive human bladder cancer. With no prior bias regarding genetic pathways or cell types, we prospectively mark or ablate cells to show that muscle-invasive bladder carcinomas arise exclusively from Sonic hedgehog (Shh)-expressing stem cells in basal urothelium. These carcinomas arise clonally from a single cell whose progeny aggressively colonize a major portion of the urothelium to generate a lesion with histological features identical to human carcinoma in situ. Shh-expressing basal cells within this precursor lesion become tumour-initiating cells, although Shh expression is lost in subsequent carcinomas. We thus find that invasive carcinoma is initiated from basal urothelial stem cells but that tumour cell phenotype can diverge significantly from that of the cancer cell of origin. Cellular origin of bladder neoplasia and tissue dynamics of its progression to invasive carcinoma NATURE CELL BIOLOGY Shin, K., Lim, A., Odegaard, J. I., Honeycutt, J. D., Kawano, S., Hsieh, M. H., Beachy, P. A. 2014; 16 (5): 469-U194 A new mouse model for female genital schistosomiasis. PLoS neglected tropical diseases Richardson, M. L., Fu, C., Pennington, L. F., Honeycutt, J. D., Odegaard, J. L., Hsieh, Y., Hammam, O., Conti, S. L., Hsieh, M. H. 2014; 8 (5) A new mouse model for female genital schistosomiasis. PLoS neglected tropical diseases Richardson, M. L., Fu, C., Pennington, L. F., Honeycutt, J. D., Odegaard, J. I., Hsieh, Y., Hammam, O., Conti, S. L., Hsieh, M. H. 2014; 8 (5) Over 112 million people worldwide are infected with Schistosoma haematobium, one of the most prevalent schistosome species affecting humans. Female genital schistosomiasis (FGS) occurs when S. haematobium eggs are deposited into the female reproductive tract by adult worms, which can lead to pelvic pain, vaginal bleeding, genital disfigurement and infertility. Recent evidence suggests co-infection with S. haematobium increases the risks of contracting sexually transmitted diseases such as HIV. The associated mechanisms remain unclear due to the lack of a tractable animal model. We sought to create a mouse model conducive to the study of immune modulation and genitourinary changes that occur with FGS.To model FGS in mice, we injected S. haematobium eggs into the posterior vaginal walls of 30 female BALB/c mice. A control group of 20 female BALB/c mice were injected with uninfected LVG hamster tissue extract. Histology, flow cytometry and serum cytokine levels were assessed at 2, 4, 6, and 8 weeks post egg injection. Voiding studies were performed at 1 week post egg injection.Vaginal wall injection with S. haematobium eggs resulted in synchronous vaginal granuloma development within 2 weeks post-egg injection that persisted for at least 6 additional weeks. Flow cytometric analysis of vaginal granulomata revealed infiltration by CD4+ T cells with variable expression of the HIV co-receptors CXCR4 and CCR5. Granulomata also contained CD11b+F4/80+ cells (macrophages and eosinophils) as well as CXCR4+MerTK+ macrophages. Strikingly, vaginal wall-injected mice featured significant urinary frequency despite the posterior vagina being anatomically distant from the bladder. This may represent a previously unrecognized overactive bladder response to deposition of schistosome eggs in the vagina.We have established a new mouse model that could potentially enable novel studies of genital schistosomiasis in females. Ongoing studies will further explore the mechanisms by which HIV target cells may be drawn into FGS-associated vaginal granulomata. Aortic wall thickness: an independent risk factor for aortic dissection? journal of heart valve disease Shiran, H., Odegaard, J., Berry, G., Miller, D. C., Fischbein, M., Liang, D. 2014; 23 (1): 17-24 Aortic aneurysm size is known to portend a higher likelihood of aortic complications in patients with connective tissue disorders (CTD), but other objective tools are needed to determine which patients are at greatest risk of dissection, especially those which reflect the structural integrity and strength of the aortic wall.The aortic wall pathology was evaluated in CTD patients with and without acute aortic dissection to identify parameters that affect the risk of dissection. A retrospective review was performed of aneurysm pathology from patients with Marfan syndrome (MFS; n = 53) without dissection undergoing prophylactic aortic root surgery, and acute type A aortic dissection patients (AAAoD; n = 16). Patients without a cardiovascular cause of death (n = 19) served as controls. The minimal aortic medial wall thickness was measured, and medial myxoid degeneration (MMD) and the degree of elastin loss and fragmentation were graded.The mean minimal aortic wall thickness was 1,625 +/- 364 microm in controls, and 703 +/- 256 microm and 438 +/- 322 microm for MFS and AAAoD patients, respectively. Aortic root diameters did not correlate with aortic wall thickness. A comparison of aortic medial thickness showed that the media was significantly thinner among acute dissection patients than either elective surgical patients (p = 0.02) or controls (p < 0.001). Aortic size, degree of MMD, and elastin loss did not vary significantly between CTD patients.A diminished aortic wall medial thickness may be linked to aortic dissection. High-resolution imaging techniques in the future may lead to the morphological assessment of aortic medial wall thickness in vivo becoming a reality which, in theory, could provide a more refined risk prognostication for acute aortic dissection. Transplanted terminally differentiated induced pluripotent stem cells are accepted by immune mechanisms similar to self-tolerance. Nature communications de Almeida, P. E., Meyer, E. H., Kooreman, N. G., Diecke, S., Dey, D., Sanchez-Freire, V., Hu, S., Ebert, A., Odegaard, J., Mordwinkin, N. M., Brouwer, T. P., Lo, D., Montoro, D. T., Longaker, M. T., Negrin, R. S., Wu, J. C. 2014; 5: 3903-? The exact nature of the immune response elicited by autologous-induced pluripotent stem cell (iPSC) progeny is still not well understood. Here we show in murine models that autologous iPSC-derived endothelial cells (iECs) elicit an immune response that resembles the one against a comparable somatic cell, the aortic endothelial cell (AEC). These cells exhibit long-term survival in vivo and prompt a tolerogenic immune response characterized by elevated IL-10 expression. In contrast, undifferentiated iPSCs elicit a very different immune response with high lymphocytic infiltration and elevated IFN-γ, granzyme-B and perforin intragraft. Furthermore, the clonal structure of infiltrating T cells from iEC grafts is statistically indistinguishable from that of AECs, but is different from that of undifferentiated iPSC grafts. Taken together, our results indicate that the differentiation of iPSCs results in a loss of immunogenicity and leads to the induction of tolerance, despite expected antigen expression differences between iPSC-derived versus original somatic cells. View details for DOI 10.1038/ncomms4903 Costimulation-Adhesion Blockade is Superior to Cyclosporine A and Prednisone Immunosuppressive Therapy for Preventing Rejection of Differentiated Human Embryonic Stem Cells Following Transplantation. Stem cells Huber, B. C., Ransohoff, J. D., Ransohoff, K. J., Riegler, J., Ebert, A., Kodo, K., Gong, Y., Sanchez-Freire, V., Dey, D., Kooreman, N. G., Diecke, S., Zhang, W. Y., Odegaard, J., Hu, S., Gold, J. D., Robbins, R. C., Wu, J. C. 2013; 31 (11): 2354-2363 Rationale: Human embryonic stem cell (hESC) derivatives are attractive candidates for therapeutic use. The engraftment and survival of hESC derivatives as xenografts or allografts require effective immunosuppression to prevent immune cell infiltration and graft destruction. Objective: To test the hypothesis that a short-course, dual-agent regimen of two costimulation-adhesion blockade agents can induce better engraftment of hESC derivatives compared to current immunosuppressive agents. Methods and Results: We transduced hESCs with a double fusion reporter gene construct expressing firefly luciferase (Fluc) and enhanced green fluorescent protein, and differentiated these cells to endothelial cells (hESC-ECs). Reporter gene expression enabled longitudinal assessment of cell engraftment by bioluminescence imaging. Costimulation-adhesion therapy resulted in superior hESC-EC and mouse EC engraftment compared to cyclosporine therapy in a hind limb model. Costimulation-adhesion therapy also promoted robust hESC-EC and hESC-derived cardiomyocyte survival in an ischemic myocardial injury model. Improved hESC-EC engraftment had a cardioprotective effect after myocardial injury, as assessed by magnetic resonance imaging. Mechanistically, costimulation-adhesion therapy is associated with systemic and intragraft upregulation of T-cell immunoglobulin and mucin domain 3 (TIM3) and a reduced proinflammatory cytokine profile. Conclusions: Costimulation-adhesion therapy is a superior alternative to current clinical immunosuppressive strategies for preventing the post-transplant rejection of hESC derivatives. By extending the window for cellular engraftment, costimulation-adhesion therapy enhances functional preservation following ischemic injury. This regimen may function through a TIM3-dependent mechanism. Stem Cells 2013;31:2354-2363. View details for DOI 10.1002/stem.1501 Excimer laser-assisted removal of embedded inferior vena cava filters: a single-center prospective study. Circulation. Cardiovascular interventions Kuo, W. T., Odegaard, J. I., Rosenberg, J. K., Hofmann, L. V. 2013; 6 (5): 560-566 Although chronically implanted inferior vena cava filters may result in filter-related morbidity, there is currently no routine option for removing such filters when they become firmly embedded along the vena cava endothelium.During a 3-year period, 100 consecutive patients were prospectively enrolled in a single-center study. There were 42 men and 58 women (mean age, 46 years; limits, 18-76 years). Retrieval indications included filter-related acute inferior vena cava thrombosis, chronic inferior vena cava occlusion, and pain from retroperitoneal or bowel penetration. Filter retrieval was also performed to prevent risks from prolonged implantation and to potentially eliminate the need for lifelong anticoagulation. After standard methods failed, photothermal tissue ablation was attempted with a laser sheath powered by a 308-nm xenon chloride excimer laser. Applied forces were recorded with a digital tension meter before and during laser activation. Laser-assisted retrieval was successful in 98.0% (95% confidence interval [CI], 93.0%-99.8%) with mean implantation of 855 days (limits, 37-6663 days; >18 years). The following filter types were encountered in this study: Günther-Tulip (n=34), Celect (n=12), Option (n=17), Optease (n=20, 1 failure), TrapEase (n=6, 1 failure), Simon-Nitinol (n=1), 12F Stainless Steel Greenfield (n=4), and Titanium Greenfield (n=6). The average force during failed standard retrievals was 7.2 versus 4.6 pounds during laser-assisted retrievals (P<0.0001). The major complication rate was 3.0% (95% CI, 0.6%-8.5%), the minor complication rate was 7.0% (95% CI, 0.3%-13.9%), and there were 4 adverse events (2 coagulopathic hemorrhages, 1 renal infarction, and 1 cholecystitis; 4.0%; 95% CI, 1.1%-9.9%) at mean follow-up of 500 days (limits, 84-1079 days). Scar tissue ablation was histologically confirmed in 96.0% (95% CI, 89.9%-98.9%). Successful retrieval allowed cessation of anticoagulation in 30 of 30 (100%) patients and alleviated morbidity in 23 of 24 patients (96%).Excimer laser-assisted removal is effective in removing embedded inferior vena cava filters refractory to standard retrieval and high force. This method can be safely used to prevent and alleviate filter-related morbidity.http://www.clinicaltrials.gov. Unique identifier: NCT01158482. View details for DOI 10.1161/CIRCINTERVENTIONS.113.000665 Eosinophils secrete IL-4 to facilitate liver regeneration. Proceedings of the National Academy of Sciences of the United States of America Goh, Y. P., Henderson, N. C., Heredia, J. E., Red Eagle, A., Odegaard, J. I., Lehwald, N., Nguyen, K. D., Sheppard, D., Mukundan, L., Locksley, R. M., Chawla, A. 2013; 110 (24): 9914-9919 The liver is a central organ for the synthesis and storage of nutrients, production of serum proteins and hormones, and breakdown of toxins and metabolites. Because the liver is susceptible to toxin- or pathogen-mediated injury, it maintains a remarkable capacity to regenerate by compensatory growth. Specifically, in response to injury, quiescent hepatocytes enter the cell cycle and undergo DNA replication to promote liver regrowth. Despite the elucidation of a number of regenerative factors, the mechanisms by which liver injury triggers hepatocyte proliferation are incompletely understood. We demonstrate here that eosinophils stimulate liver regeneration after partial hepatectomy and toxin-mediated injury. Liver injury results in rapid recruitment of eosinophils, which secrete IL-4 to promote the proliferation of quiescent hepatocytes. Surprisingly, signaling via the IL-4Rα in macrophages, which have been implicated in tissue repair, is dispensable for hepatocyte proliferation and liver regrowth after injury. Instead, IL-4 exerts its proliferative actions via IL-4Rα in hepatocytes. Our findings thus provide a unique mechanism by which eosinophil-derived IL-4 stimulates hepatocyte proliferation in regenerating liver. Complex retrieval of fractured, embedded, and penetrating inferior vena cava filters: a prospective study with histologic and electron microscopic analysis. Journal of vascular and interventional radiology Kuo, W. T., Robertson, S. W., Odegaard, J. I., Hofmann, L. V. 2013; 24 (5): 622-630 e1 To evaluate clinical outcomes, characterize adherent tissue, and analyze inferior vena cava (IVC) filter fractures in patients undergoing complex retrieval for management of filter-related complications. To elucidate mechanisms of filter fracture by radiographic and electron microscopic (EM) evaluation.Over 2.5 years, 50 consecutive patients with fractured and/or penetrating filter components were prospectively enrolled into a single-center study. There were 19 men and 31 women (mean age, 42 y; range, 15-73 y). All patients underwent complex filter retrieval after failure of standard methods, and retrieval indications along with resultant clinical outcomes were evaluated. Specimens with adherent tissue underwent histologic analysis, and all fractured components were studied with EM.Retrieval was successful in all 50 cases (mean implantation, 815 d; range, 20-2,599 d) among the following filters: G2X (n = 23),G2 (n = 9), Eclipse (n = 3), Recovery (n = 4), ALN (n = 1), Celect (n = 7), OptEase (n = 2), and Simon Nitinol (n = 1). Mean indwell time in fractured filters (n = 31) was 1,082 days, versus 408 days in nonfractured filters (n = 19; P = .00169). Neointimal hyperplasia/fibrosis was seen in 46 of 48 specimens with adherent tissue (96%). Among 61 fractured components from conical filters, 35 had extravascular penetration whereas 26 remained intravascular (11 free-floating in IVC, 15 embolized centrally), and EM revealed fracture modes of high-cycle fatigue (n = 53), overload (n = 6), and indeterminate (n = 2). Following retrieval, previously prescribed lifelong anticoagulation was discontinued in 30 of 31 patients (97%). Filter-related symptoms from IVC occlusion, component embolization, and penetration-induced abdominal pain, duodenal injury, and/or small-bowel volvulus were alleviated in all 26 cases (100%). There were no long-term complications at a mean follow-up of 371 days (range, 67-878 d).The risk of filter fracture increases after 408 days (ie,>1 y) of implantation and is associated with symptomatic extravascular penetration and/or intravascular embolization. Complex methods can be used to safely remove these devices, alleviate filter-related morbidity, and allow cessation of anticoagulation. View details for DOI 10.1016/j.jvir.2013.01.008 The immune system as a sensor of the metabolic state. Immunity Odegaard, J. I., Chawla, A. 2013; 38 (4): 644-654 Mammals possess a remarkable ability to maintain and defend a constant internal milieu against diverse environmental threats. Unsurprisingly, the two systems tasked with these duties, metabolism and immunity, have evolved to share a common modular architecture that allows extensive bidirectional communication and coordination. Indeed, recent observations have highlighted numerous functionally critical immune regulatory modules located within diverse metabolic circuits. In this review, we discuss the architectural commonality between immunity and metabolism and highlight how these two primordially disparate systems leverage shared regulatory axes to coordinate metabolic physiology under conditions of normality and chronic overnutrition. Such an integrated perspective both advances our understanding of basic physiology and highlights potential opportunities for therapeutic intervention in metabolic dysfunction. View details for DOI 10.1016/j.immuni.2013.04.001 Pleiotropic Actions of Insulin Resistance and Inflammation in Metabolic Homeostasis SCIENCE Odegaard, J. I., Chawla, A. 2013; 339 (6116): 172-177 Metabolism and immunity are inextricably linked both to each other and to organism-wide function, allowing mammals to adapt to changes in their internal and external environments. In the modern context of obesogenic diets and lifestyles, however, these adaptive responses can have deleterious consequences. In this Review, we discuss the pleiotropic actions of inflammation and insulin resistance in metabolic homeostasis and disease. An appreciation of the adaptive context in which these responses arose is useful for understanding their pathogenic actions in disease. View details for DOI 10.1126/science.1230721 Adipose Tissue Macrophages: Amicus adipem? Cell metabolism Odegaard, J. I., Ganeshan, K., Chawla, A. 2013; 18 (6): 767–68 Chronic overnutrition drives complex adaptations within both professional metabolic and bystander tissues that, despite intense investigation, are still poorly understood. Xu et al. (2013) now describe the unexpected ability of adipose tissue macrophages to buffer lipids released from obese adipocytes in a manner independent of inflammatory macrophage activation. View details for DOI 10.1016/j.cmet.2013.11.011 Costimulation-Adhesion Blockade is Superior to Cyclosporine A and Prednisone Immunosuppressive Therapy for Preventing Stem Cells Huber, B. C., Ransohoff, J. D., Ransohoff, K. J., Riegler, J., Ebert, A., Kodo, K., Gong, Y., Sanchez-Freire, V., Dey, D., Kooreman, N. G., Diecke, S., Zhang, W. Y., Odegaard, J., Hu, S., Gold, J. D., Robbins, R. C., Wu, J. C. 2013; 31 (9) Fat's Immune Sentinels SCIENTIST Odegaard, J., Chawla, A. 2012; 26 (12): 30-35 View details for DOI 10.3410/B4-13 Transcriptional Profiling of the Bladder in Urogenital Schistosomiasis Reveals Pathways of Inflammatory Fibrosis and Urothelial Compromise PLOS NEGLECTED TROPICAL DISEASES Ray, D., Nelson, T. A., Fu, C., Patel, S., Gong, D. N., Odegaard, J. I., Hsieh, M. H. 2012; 6 (11) Urogenital schistosomiasis, chronic infection by Schistosoma haematobium, affects 112 million people worldwide. S. haematobium worm oviposition in the bladder wall leads to granulomatous inflammation, fibrosis, and egg expulsion into the urine. Despite the global impact of urogenital schistosomiasis, basic understanding of the associated pathologic mechanisms has been incomplete due to the lack of suitable animal models. We leveraged our recently developed mouse model of urogenital schistosomiasis to perform the first-ever profiling of the early molecular events that occur in the bladder in response to the introduction of S. haematobium eggs. Microarray analysis of bladders revealed rapid, differential transcription of large numbers of genes, peaking three weeks post-egg administration. Many differentially transcribed genes were related to the canonical Type 2 anti-schistosomal immune response, as reflected by the development of egg-based bladder granulomata. Numerous collagen and metalloproteinase genes were differentially transcribed over time, revealing complex remodeling and fibrosis of the bladder that was confirmed by Masson's Trichrome staining. Multiple genes implicated in carcinogenesis pathways, including vascular endothelial growth factor-, oncogene-, and mammary tumor-related genes, were differentially transcribed in egg-injected bladders. Surprisingly, junctional adhesion molecule, claudin and uroplakin genes, key components for maintaining the urothelial barrier, were globally suppressed after bladder exposure to eggs. This occurred in the setting of urothelial hyperplasia and egg shedding in urine. Thus, S. haematobium egg expulsion is associated with intricate modulation of the urothelial barrier on the cellular and molecular level. Taken together, our findings have important implications for understanding host-parasite interactions and carcinogenesis in urogenital schistosomiasis, and may provide clues for novel therapeutic strategies. Comparison of the Acute Inflammatory Response of Two Commercial Platelet-Rich Plasma Systems in Healthy Rabbit Tendons AMERICAN JOURNAL OF SPORTS MEDICINE Dragoo, J. L., Braun, H. J., Durham, J. L., Ridley, B. A., Odegaard, J. I., Richard Luong, R., Arnoczky, S. P. 2012; 40 (6): 1274-1281 Numerous studies have shown platelet-rich plasma (PRP) preparations differ with respect to the inclusion of certain blood components, which may affect the host's cellular response.This study evaluated the inflammatory effect of Biomet GPS III leukocyte-rich PRP (LR-PRP) versus MTF Cascade leukocyte-poor PRP (LP-PRP) after intratendinous injection in an animal model. The authors anticipated that LR-PRP would incite a greater acute inflammatory response than LP-PRP.Controlled laboratory study.A total of 17 skeletally mature New Zealand White rabbits were tested. In all cases, healthy patellar tendons were treated. In the control animals, one patellar tendon was injected with 2 mL autologous whole blood, and the other was injected with 2 mL sterile saline. Seven total tendons were injected with whole blood, and 7 tendons were injected with saline. In the experimental animals, one patellar tendon was injected with 2 mL LR-PRP, and the other was injected with 2 mL LP-PRP. Ten tendons were injected with LR-PRP, and 10 tendons were injected with LP-PRP. Animals were euthanized at 5 or 14 days after injection. Tendons were harvested and stained using hematoxylin and eosin and scored semi-quantitatively for total white blood cells (WBCs), mononuclear cells (macrophages and lymphocytes), polymorphonuclear cells (PMNs), vascularity, fiber structure, and fibrosis.At 5 days after injection, tendons treated with LR-PRP had significantly greater overall tendon scores (6.3 ± 1.79 vs 1.8 ± 1.64, P = .012), as well as mean scores for fiber structure (1.4 ± 0.22 vs 0.50 ± 0.50, P = .012), denoting disrupted composition, total WBCs (1.1 ± 0.89 vs 0.10 ± 0.22, P = .014), mononuclear cells (macrophages and lymphocytes) (0.80 ± 0.45 vs 0.10 ± 0.22, P = .014), vascularity (1.7 ± 0.27 vs 0.80 ± 0.16, P = .008), and fibrosis (1.0 ± 0.35 vs 0.3 ± 0.45, P = .037) compared with tendons treated with LP-PRP. Otherwise, there were no significant differences in mononuclear cells (P = .590), PMN cells (P = 1.00), total WBCs (P = .811), vascularity (P = .650), or total tendon score (P = .596) in any of the treatment groups at 14 days.Compared with leukocyte-poor Cascade PRP, leukocyte-rich GPS III PRP causes a significantly greater acute inflammatory response at 5 days after injection. There is no significant difference in the inflammatory response or cellularity regardless of the injection type at 14 days after intratendinous injection.Platelet-rich plasma injections are frequently prepared using commercial systems and are administered for clinical treatment of chronic tendinopathy. It is important to characterize the cellular responses elucidated by different injection preparations to further understand their effect on tissue healing and aid clinical decision making. Future investigations are necessary to apply these findings to the clinical setting. View details for DOI 10.1177/0363546512442334 Comparison of the acute inflammatory response of two commercial platelet-rich plasma systems in healthy rabbit tendons. American journal of sports medicine Dragoo, J. L., Braun, H. J., Durham, J. L., Ridley, B. A., Odegaard, J. I., Luong, R., Arnoczky, S. P. 2012; 40 (6): 1274-1281 Connecting Type 1 and Type 2 Diabetes through Innate Immunity COLD SPRING HARBOR PERSPECTIVES IN BIOLOGY Odegaard, J. I., Chawla, A. 2012; 4 (4) The escalating epidemic of obesity has driven the prevalence of both type 1 and 2 diabetes mellitus to historically high levels. Chronic low-grade inflammation, which is present in both type 1 and type 2 diabetics, contributes to the pathogenesis of insulin resistance. The accumulation of activated innate immune cells in metabolic tissues results in release of inflammatory mediators, in particular, IL-1β and TNFα, which promote systemic insulin resistance and β-cell damage. In this article, we discuss the central role of innate immunity and, in particular, the macrophage in insulin sensitivity and resistance, β-cell damage, and autoimmune insulitis. We conclude with a discussion of the therapeutic implications of this integrated understanding of diabetic pathology. View details for DOI 10.1101/cshperspect.a007724 A Novel Mouse Model of Schistosoma haematobium Egg-Induced Immunopathology PLOS PATHOGENS Fu, C., Odegaard, J. I., Herbert, D. R., Hsieh, M. H. 2012; 8 (3) Schistosoma haematobium is the etiologic agent for urogenital schistosomiasis, a major source of morbidity and mortality for more than 112 million people worldwide. Infection with S. haematobium results in a variety of immunopathologic sequelae caused by parasite oviposition within the urinary tract, which drives inflammation, hematuria, fibrosis, bladder dysfunction, and increased susceptibility to urothelial carcinoma. While humans readily develop urogenital schistosomiasis, the lack of an experimentally-tractable model has greatly impaired our understanding of the mechanisms that underlie this important disease. We have developed an improved mouse model of S. haematobium urinary tract infection that recapitulates several aspects of human urogenital schistosomiasis. Following microinjection of purified S. haematobium eggs into the bladder wall, mice consistently develop macrophage-rich granulomata that persist for at least 3 months and pass eggs in their urine. Importantly, egg-injected mice also develop urinary tract fibrosis, bladder dysfunction, and various urothelial changes morphologically reminiscent of human urogenital schistosomiasis. As expected, S. haematobium egg-induced immune responses in the immediate microenvironment, draining lymph nodes, and systemic circulation are associated with a Type 2-dominant inflammatory response, characterized by high levels of interleukin-4, eosinophils, and IgE. Taken together, our novel mouse model may help facilitate a better understanding of the unique pathophysiological mechanisms of epithelial dysfunction, tissue fibrosis, and oncogenesis associated with urogenital schistosomiasis. Bilateral Thoracic Endometriosis Affecting the Lung and Diaphragm JSLS-JOURNAL OF THE SOCIETY OF LAPAROENDOSCOPIC SURGEONS Nezhat, C., King, L. P., Paka, C., Odegaard, J., Beygui, R. 2012; 16 (1): 140-142 Endometriosis of the lung and the diaphragm is rare. Patients may present with symptoms such as shortness of breath, chest pain, and shoulder pain or they may be asymptomatic. Of note, there have been few reports of bilateral catamenial disease, and no reports, to our knowledge, of bilateral pathology proven pulmonary parenchymal endometriosis.A 43-year-old with stage IV endometriosis and large leiomyoma underwent a laparoscopic hysterectomy and treatment of endometrial lesions in 2005. In March and April of 2011, she presented with bilateral pneumothoraces. She subsequently underwent video-assisted thoracoscopy as well as resection and fulguration of bilateral lung and diaphragmatic endometriosis. Pathology confirmed endometrial implants in the lung parenchyma bilaterally.Catamenial pneumothorax is the most common presentation of thoracic endometriosis. However, bilateral catamenial pneumothoraces are rare. To the best of our knowledge, this case reflects the first report of pathology proven bilateral lung and diaphragm endometriosis. View details for DOI 10.4293/108680812X13291597716384 Leukocyte set points in metabolic disease. F1000 biology reports Odegaard, J. I., Chawla, A. 2012; 4: 13-? Vertebrate tissues comprise precise admixtures of parenchymal and hematopoietic cells, whose interactions are vital to proper tissue function. By regulating this interaction, vertebrates are able to mitigate environmental stress and coordinate dramatic physiologic adaptations. For instance, under conditions of chronic nutrient excess, leukocyte recruitment and activation increase in an effort to decrease excess nutrient storage and alleviate adipocyte stress. While basal equilibria may be reestablished upon normalization of nutrient intake, a new set point characterized by insulin resistance and chronic inflammation is established if the stress persists. Consequently, although this response is adaptive in settings of acute overfeeding and infection, it has catastrophic health consequences in the modern context of obesity. Understanding how leukocyte set points (numbers and activation status) are established, maintained, and regulated in tissues is, thus, critical to our understanding of, and intervention in, chronic metabolic diseases, such as obesity and diabetes. Photothermal Ablation with the Excimer Laser Sheath Technique for Embedded Inferior Vena Cava Filter Removal: Initial Results from a Prospective Study JOURNAL OF VASCULAR AND INTERVENTIONAL RADIOLOGY Kuo, W. T., Odegaard, J. I., Louie, J. D., Sze, D. Y., Unver, K., Kothary, N., Rosenberg, J. K., Hovsepian, D. M., Hwang, G. L., Hofmann, L. V. 2011; 22 (6): 813-823 To evaluate the safety and effectiveness of the excimer laser sheath technique for removing embedded inferior vena cava (IVC) filters.Over 12 months, 25 consecutive patients undergoing attempted IVC filter retrieval with a laser-assisted sheath technique were prospectively enrolled into an institutional review board-approved study registry. There were 10 men and 15 women (mean age 50 years, range 20-76 years); 18 (72%) of 25 patients were referred from an outside hospital. Indications for retrieval included symptomatic filter-related acute caval thrombosis (with or without acute pulmonary embolism), chronic IVC occlusion, and bowel penetration. Retrieval was also performed to remove risks from prolonged implantation and potentially to eliminate need for lifelong anticoagulation. After failure of standard methods, controlled photothermal ablation of filter-adherent tissue with a Spectranetics laser sheath and CVX-300 laser system was performed. All patients were evaluated with cavography, and specimens were sent for histologic analysis.Laser-assisted retrieval was successful in 24 (96%) of 25 patients as follows: 11 Günther Tulip (mean 375 days, range 127-882 days), 4 Celect (mean 387 days, range 332-440 days), 2 Option (mean 215 days, range 100-330 days), 4 OPTEASE (mean 387 days, range 71-749 days; 1 failed 188 days), 2 TRAPEASE (mean 871 days, range 187-1,555 days), and 2 Greenfield (mean 12.8 years, range 7.2-18.3 years). There was one (4%) major complication (acute thrombus, treated with thrombolysis), three (12%) minor complications (small extravasation, self-limited), and one adverse event (coagulopathic retroperitoneal hemorrhage) at follow-up (mean 126 days, range 13-302 days). Photothermal ablation of filter-adherent tissue was histologically confirmed in 23 (92%) of 25 patients.The laser-assisted sheath technique appears to be a safe and effective tool for retrieving embedded IVC filters, including permanent types, with implantation ranging from months to > 18 years. Alternative Macrophage Activation and Metabolism ANNUAL REVIEW OF PATHOLOGY: MECHANISMS OF DISEASE, VOL 6 Odegaard, J. I., Chawla, A. 2011; 6: 275-297 Obesity and its attendant metabolic disorders represent the great public health challenge of our time. Recent evidence suggests that onset of inflammation in metabolic tissues pathogenically links obesity to insulin resistance and type 2 diabetes. In this review, we briefly summarize the extant literature, paying special attention to the central role of the tissue-associated macrophage in the initiation of metabolic inflammation. We argue that rather than representing simple inflammatory disease, obesity and metabolic syndrome represent derangements in macrophage activation with concomitant loss of metabolic coordination. As such, the sequelae of obesity are as much products of the loss of positive macrophage influences as they are of the presence of deleterious inflammation. The therapeutic implications of this conclusion are profound because they suggest that pharmacologic targeting of macrophage activation, rather than simply inflammation, might be efficacious in treating this global epidemic. View details for DOI 10.1146/annurev-pathol-011110-130138 IL-4/STAT6 immune axis regulates peripheral nutrient metabolism and insulin sensitivity PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA Ricardo-Gonzalez, R. R., Eagle, A. R., Odegaard, J. I., Jouihan, H., Morel, C. R., Heredia, J. E., Mukundan, L., Wu, D., Locksley, R. M., Chawla, A. 2010; 107 (52): 22617-22622 Immune cells take residence in metabolic tissues, providing a framework for direct regulation of nutrient metabolism. Despite conservation of this anatomic relationship through evolution, the signals and mechanisms by which the immune system regulates nutrient homeostasis and insulin action remain poorly understood. Here, we demonstrate that the IL-4/STAT6 immune axis, a key pathway in helminth immunity and allergies, controls peripheral nutrient metabolism and insulin sensitivity. Disruption of signal transducer and activator of transcription 6 (STAT6) decreases insulin action and enhances a peroxisome proliferator-activated receptor α (PPARα) driven program of oxidative metabolism. Conversely, activation of STAT6 by IL-4 improves insulin action by inhibiting the PPARα-regulated program of nutrient catabolism and attenuating adipose tissue inflammation. These findings have thus identified an unexpected molecular link between the immune system and macronutrient metabolism, suggesting perhaps the coevolution of these pathways occurred to ensure access to glucose during times of helminth infection. Prospective, Double-Blind, Randomized, Placebo-Controlled Comparison of Acetazolamide Versus Ibuprofen for Prophylaxis Against High Altitude Headache: The Headache Evaluation at Altitude Trial (HEAT) WILDERNESS & ENVIRONMENTAL MEDICINE Gertsch, J. H., Lipman, G. S., Holck, P. S., Merritt, A., Mulcahy, A., Fisher, R. S., Basnyat, B., Allison, E., Hanzelka, K., Hazan, A., Meyers, Z., Odegaard, J., Pook, B., Thompson, M., Slomovic, B., Wahlberg, H., Wilshaw, V., Weiss, E. A., Zafren, K. 2010; 21 (3): 236-243 High altitude headache (HAH) is the most common neurological complaint at altitude and the defining component of acute mountain sickness (AMS). However, there is a paucity of literature concerning its prevention. Toward this end, we initiated a prospective, double-blind, randomized, placebo-controlled trial in the Nepal Himalaya designed to compare the effectiveness of ibuprofen and acetazolamide for the prevention of HAH.Three hundred forty-three healthy western trekkers were recruited at altitudes of 4280 m and 4358 m and assigned to receive ibuprofen 600 mg, acetazolamide 85 mg, or placebo 3 times daily before continued ascent to 4928 m. Outcome measures included headache incidence and severity, AMS incidence and severity on the Lake Louise AMS Questionnaire (LLQ), and visual analog scale (VAS).Two hundred sixty-five of 343 subjects completed the trial. HAH incidence was similar when treated with acetazolamide (27.1%) or ibuprofen (27.5%; P = .95), and both agents were significantly more effective than placebo (45.3%; P = .01). AMS incidence was similar when treated with acetazolamide (18.8%) or ibuprofen (13.7%; P = .34), and both agents were significantly more effective than placebo (28.6%; P = .03). In fully compliant participants, moderate or severe headache incidence was similar when treated with acetazolamide (3.8%) or ibuprofen (4.7%; P = .79), and both agents were significantly more effective than placebo (13.5%; P = .03).Ibuprofen and acetazolamide were similarly effective in preventing HAH. Ibuprofen was similar to acetazolamide in preventing symptoms of AMS, an interesting finding that implies a potentially new approach to prevention of cerebral forms of acute altitude illness. PPAR-delta senses and orchestrates clearance of apoptotic cells to promote tolerance NATURE MEDICINE Mukundan, L., Odegaard, J. I., Morel, C. R., Heredia, J. E., Mwangi, J. W., Ricardo-Gonzalez, R. R., Goh, Y. P., Eagle, A. R., Dunn, S. E., Awakuni, J. U., Nguyen, K. D., Steinman, L., Michie, S. A., Chawla, A. 2009; 15 (11): 1266-U59 Macrophages rapidly engulf apoptotic cells to limit the release of noxious cellular contents and to restrict autoimmune responses against self antigens. Although factors participating in recognition and engulfment of apoptotic cells have been identified, the transcriptional basis for the sensing and the silent disposal of apoptotic cells is unknown. Here we show that peroxisome proliferator-activated receptor-delta (PPAR-delta) is induced when macrophages engulf apoptotic cells and functions as a transcriptional sensor of dying cells. Genetic deletion of PPAR-delta decreases expression of opsonins such as complement component-1qb (C1qb), resulting in impairment of apoptotic cell clearance and reduction in anti-inflammatory cytokine production. This increases autoantibody production and predisposes global and macrophage-specific Ppard(-/-) mice to autoimmune kidney disease, a phenotype resembling the human disease systemic lupus erythematosus. Thus, PPAR-delta has a pivotal role in orchestrating the timely disposal of apoptotic cells by macrophages, ensuring that tolerance to self is maintained. View details for DOI 10.1038/nm.2048 Mechanisms of macrophage activation in obesity-induced insulin resistance NATURE CLINICAL PRACTICE ENDOCRINOLOGY & METABOLISM Odegaard, J. I., Chawla, A. 2008; 4 (11): 619-626 Chronic inflammation is now recognized as a key step in the pathogenesis of obesity-induced insulin resistance and type 2 diabetes mellitus. This low-grade inflammation is mediated by the inflammatory (classical) activation of recruited and resident macrophages that populate metabolic tissues, including adipose tissue and liver. These findings have led to the concept that infiltration by and activation of macrophages in adipose tissue are causally linked to obesity-induced insulin resistance. Studies have shown, however, that alternatively activated macrophages taking residence in adipose tissue and liver perform beneficial functions in obesity-induced metabolic disease. Alternatively activated macrophages reduce insulin resistance in obese mice by attenuating tissue inflammation and increasing oxidative metabolism in liver and skeletal muscle. The discovery that distinct subsets of macrophages are involved in the promotion or attenuation of insulin resistance suggests that pathways controlling macrophage activation can potentially be targeted to treat these comorbidities of obesity. Thus, this Review focuses on the stimuli and mechanisms that control classical and alternative activation of tissue macrophages, and how these macrophage activation programs modulate insulin action in peripheral tissues. The functional importance of macrophage activation is further discussed in the context of host defense to highlight the crosstalk between innate immunity and metabolism. View details for DOI 10.1038/ncpendmet0976 Alternative M2 activation of Kupffer cells by PPAR delta ameliorates obesity-induced insulin resistance CELL METABOLISM Odegaard, J. I., Ricardo-Gonzalez, R. R., Eagle, A. R., Vats, D., Morel, C. R., Goforth, M. H., Subramanian, V., Mukundan, L., Ferrante, A. W., Chawla, A. 2008; 7 (6): 496-507 Macrophage infiltration and activation in metabolic tissues underlie obesity-induced insulin resistance and type 2 diabetes. While inflammatory activation of resident hepatic macrophages potentiates insulin resistance, the functions of alternatively activated Kupffer cells in metabolic disease remain unknown. Here we show that in response to the Th2 cytokine interleukin-4 (IL-4), peroxisome proliferator-activated receptor delta (PPARdelta) directs expression of the alternative phenotype in Kupffer cells and adipose tissue macrophages of lean mice. However, adoptive transfer of PPARdelta(-/-) (Ppard(-/-)) bone marrow into wild-type mice diminishes alternative activation of hepatic macrophages, causing hepatic dysfunction and systemic insulin resistance. Suppression of hepatic oxidative metabolism is recapitulated by treatment of primary hepatocytes with conditioned medium from PPARdelta(-/-) macrophages, indicating direct involvement of Kupffer cells in liver lipid metabolism. Taken together, these data suggest an unexpected beneficial role for alternatively activated Kupffer cells in metabolic syndrome and type 2 diabetes. Macrophage-specific PPAR gamma controls alternative activation and improves insulin resistance NATURE Odegaard, J. I., Ricardo-Gonzalez, R. R., Goforth, M. H., Morel, C. R., Subramanian, V., Mukundan, L., Eagle, A. R., Vats, D., Brombacher, F., Ferrante, A. W., Chawla, A. 2007; 447 (7148): 1116-U12 Obesity and insulin resistance, the cardinal features of metabolic syndrome, are closely associated with a state of low-grade inflammation. In adipose tissue chronic overnutrition leads to macrophage infiltration, resulting in local inflammation that potentiates insulin resistance. For instance, transgenic expression of Mcp1 (also known as chemokine ligand 2, Ccl2) in adipose tissue increases macrophage infiltration, inflammation and insulin resistance. Conversely, disruption of Mcp1 or its receptor Ccr2 impairs migration of macrophages into adipose tissue, thereby lowering adipose tissue inflammation and improving insulin sensitivity. These findings together suggest a correlation between macrophage content in adipose tissue and insulin resistance. However, resident macrophages in tissues display tremendous heterogeneity in their activities and functions, primarily reflecting their local metabolic and immune microenvironment. While Mcp1 directs recruitment of pro-inflammatory classically activated macrophages to sites of tissue damage, resident macrophages, such as those present in the adipose tissue of lean mice, display the alternatively activated phenotype. Despite their higher capacity to repair tissue, the precise role of alternatively activated macrophages in obesity-induced insulin resistance remains unknown. Using mice with macrophage-specific deletion of the peroxisome proliferator activated receptor-gamma (PPARgamma), we show here that PPARgamma is required for maturation of alternatively activated macrophages. Disruption of PPARgamma in myeloid cells impairs alternative macrophage activation, and predisposes these animals to development of diet-induced obesity, insulin resistance, and glucose intolerance. Furthermore, gene expression profiling revealed that downregulation of oxidative phosphorylation gene expression in skeletal muscle and liver leads to decreased insulin sensitivity in these tissues. Together, our findings suggest that resident alternatively activated macrophages have a beneficial role in regulating nutrient homeostasis and suggest that macrophage polarization towards the alternative state might be a useful strategy for treating type 2 diabetes. Quantitative expansion of ES cell-derived myeloid progenitors capable of differentiating into macrophages JOURNAL OF LEUKOCYTE BIOLOGY Odegaard, J. I., Vats, D., Zhang, L., Ricardo-Gonzalez, R., Smith, K. L., Sykes, D. B., Kamps, M. P., Chawla, A. 2007; 81 (3): 711-719 Macrophages participate in physiologic and pathologic processes through elaboration of distinct activation programs. Studies with macrophage cell systems have revealed much concerning the importance of this pleiotropic cell; however, these studies are inherently limited by three factors: heterogeneity of the target cell population, poor capacity to elaborate various activation programs, and lack of a genetically tractable model system for loss- and gain-of-function studies. Although definitive, hematopoietic lineages can be isolated from embryonic stem (ES) cells, these isolation procedures are inefficient and time-consuming and require elaborate cell-sorting protocols. We therefore examined whether myeloid precursors, capable of differentiating into macrophages, could be conditionally expanded in vitro. Here, we report methods for selective isolation and immortalization of ES cell-derived myeloid precursors by estrogen-regulated HoxA9 protein. Using this new macrophage differentiation system, an unlimited number of custom-designed macrophages with defined functional characteristics can be generated from any targeted ES cell. In combination with knockout or small interfering RNA knockdown technologies, this macrophage differentiation system provides a powerful tool for high throughput analysis of regulatory mechanisms controlling macrophage activation in health and disease. View details for DOI 10.1189/jlb.0906590 Oxidative metabolism and PGC-1 beta attenuate macrophage-mediated inflammation CELL METABOLISM Vats, D., Mukundan, L., Odegaard, J. I., Zhang, L., Smith, K. L., Morel, C. R., Wagner, R. A., Greaves, D. R., Murray, P. J., Chawla, A. 2006; 4 (3): 255-255 Oxidative metabolism and PGC-1 beta attenuate macrophage-mediated inflammation CELL METABOLISM Vats, D., Mukundan, L., Odegaard, J. I., Zhang, L., Smith, K. L., Morel, C. R., Greaves, D. R., Murray, P. J., Chawla, A. 2006; 4 (1): 13-24 Complex interplay between T helper (Th) cells and macrophages contributes to the formation and progression of atherosclerotic plaques. While Th1 cytokines promote inflammatory activation of lesion macrophages, Th2 cytokines attenuate macrophage-mediated inflammation and enhance their repair functions. In spite of its biologic importance, the biochemical and molecular basis of how Th2 cytokines promote maturation of anti-inflammatory macrophages is not understood. We show here that in response to interleukin-4 (IL-4), signal transducer and activator of transcription 6 (STAT6) and PPARgamma-coactivator-1beta (PGC-1beta) induce macrophage programs for fatty acid oxidation and mitochondrial biogenesis. Transgenic expression of PGC-1beta primes macrophages for alternative activation and strongly inhibits proinflammatory cytokine production, whereas inhibition of oxidative metabolism or RNAi-mediated knockdown of PGC-1beta attenuates this immune response. These data elucidate a molecular pathway that directly links mitochondrial oxidative metabolism to the anti-inflammatory program of macrophage activation, suggesting a potential role for metabolic therapies in treating atherogenic inflammation.
cc/2019-30/en_middle_0012.json.gz/line1393
__label__wiki
0.750767
0.750767
Asghar Rastegar, MD Professor of Medicine; Director, Office of Global Health; Chief, Fitkin Firm, YNHH Internal Medicine: Nephrology | Office of Global Health | Yale/Stanford J&J Global Health Scholars Program Yale Institute for Global Health Global Health Studies MacMillan Center: African Studies | Middle East Studies I am a clinical nephrologist with strong interest in intensive care nephrology including disorders of acid base and electrolytes. My other academic interest revloves around education and training of young physicians both in the US and abroad. In my role as the Director of Global Health Office and co-director of Yale-Stanford J&J Global Health Scholar Program, I have focused on development of bilateral relationship with institutions in resource poor regions with the goal of improving human capacity in health care sector. I continue to cooporate with the International Society of Nephrology with special interest in the development of nephrology as a specialty in Russia and Iran. University of Wisconsin (1968) Chief Resident University of Pennsylvania Hospital AB of Internal Medicine, Nephrology (1978) Rwanda Human Resources for Health Program Rwanda (2012) GHLI joined universities across the U.S. to support the Rwandan Ministry of Health's Human Resources for Health Program to develop skilled workers to meet the country's health care delivery needs. The program aims to build the capacity of Rwandan universities and teaching hospitals to develop a... Yale/Stanford J&J Global Health Scholars Program Asmara, Eritrea (2011) Co-Director of the the Yale/Stanford Johnson & Johnson Global Health Scholars Program, which annually selects up to 40 physicians during their residencies and career physicians for six-week rotations at one of our mentored sites outside the US. Rotations are largely directed at clinical... Yale/Stanford J&J Global Health Scholars Program Monrovia, Liberia (2011) Yale/Stanford J&J Global Health Scholars Program Kampala, Uganda (2011) Yale/Stanford J&J Global Health Scholars Program Sukadana, Indonesia (2009) Yale/Stanford J&J Global Health Scholars Program Tugela Ferry, South Africa (2009) Medical Education Russia (2008) Professor Rastegar conducts collaborative work with Kazan State Medical University on modernizing medical education at undergrad and graduate level. Nephrology Russia (2008) Professor Rastegar conducts collaborative research on nephrology. Email asghar.rastegar@yale.edu Yale University-Office of Global HealthLaboratory for Medicine and Pediatrics (LMP) 15 York Street, Ste Suite 1074 Internal MedicinePO Box 208033 Office of Global Health
cc/2019-30/en_middle_0012.json.gz/line1394
__label__wiki
0.725274
0.725274
DUBAI BEGINS COUNTDOWN TO HOST 2018 ICCA CONGRESS Conclusion of congress in Prague marks the official handover to Dubai Dubai will host the event’s 57th edition in November 2018 Dubai, United Arab Emirates. 22 November 2017: Dubai is gearing up to host the 57th Congress of the International Congress and Convention Association (ICCA) next year, following the conclusion of this year’s edition in Prague. Dubai was named host city for the 57th ICCA Congress in 2014, following a successful bid for the event that was led by Dubai Business Events and Dubai World Trade Centre. To be held from 11 – 14 November 2018 at Dubai World Trade Centre, the congress will see meeting industry professionals from all over the world gather in Dubai to discuss key challenges and opportunities within the business events industry. A delegation from Dubai received the formal handover from hosts in Prague during the closing ceremony of the Congress on November 15. At the ceremony, Dubai representatives, including Steen Jakobsen, Director of Dubai Business Events, and Mahir Julfar, Senior Vice President, Venues Management at Dubai World Trade Centre, presented Dubai’s unique facets to attending ICCA members and delegates. An earlier session saw Marjan Faraidooni, Senior Vice President of Legacy Impact and Development at Expo 2020 Dubai, discuss the legacy that will be left after the conclusion of the first World Expo to be held in the Middle East, North Africa and South Asia region. Issam Kazim, CEO of Dubai Corporation for Tourism and Commerce Marketing, said: “This is a fantastic opportunity for us to showcase Dubai’s most recent advances as a world-class city with unrivalled connectivity to key industry bodies from around the world. Hosting business events forms a core part of our sustainable economic diversification efforts, and is a key driver in our Tourism Vision for 2020. We look forward to welcoming ICCA delegates next year and hosting an event that plays an important role in the development and growth of the business events industry.” As Dubai’s visitor offerings continue to evolve, the city is developing a range of new attractions, hotels, venues and infrastructure projects that are set to bolster Dubai’s standing as a global hub for tourism and business events. Dubai has seen a consistent rise in business and tourism figures, becoming the fourth most visited city in the world in 2016, with 14.9 million overnight visitors last year. In the first 9 months of 2017, the city welcomed 11.58 million international visitors, up more than 7.5% on the same period last year. ICCA CEO Martin Sirk said: “The timing of ICCA’s Congress in Dubai couldn’t be better. Economies throughout the Gulf and Middle East are going through huge changes to their business models and are diversifying into a wide range of exciting new sectors; association-related meetings activity is bubbling up across trade, healthcare and high-tech scientific sectors, thanks to both home-grown demand and driven by expansion and outreach from US and European organisations; and we’ll arrive when preparations for Expo 2020 Dubai are reaching a critical point, providing all manner of experiential meetings-related content for our members to think about. We’re very excited to bring the world of ICCA to Dubai in 2018!” Business events continue to play a key role in achieving Dubai Tourism Vision 2020 and UAE Vision 2021. These ambitious plans outline concrete steps to further develop the city into a global knowledge hub that advances a range of key industries and drives innovation across vital global sectors. With Dubai’s sustained successes as a destination of choice, business events play an increasingly prominent role in the national agenda of economic diversification and establishing a knowledge-based economy. Follow us on Facebook / Instagram #micemedia_online / Twitter #MICEmedia #MICEindustry #ICCA #ICCADubai #Dubai2020 #DubaiTourism #visitDubai #CityMarketing #DestinationMarketing Categories: About us Discovering Guam Until very recently not many people could have told you where Guam was located, or even what was there. Recent political events have certainly changed that. With intense, global media attention in recent months, however, many outlets like CNN, the BBC and others took the time to really look behind the breaking news. What they found and repeatedly reported on was the amazing people, the beauty of the island, the wonderful attractions and the importance of tourism to its economy. The stories revealed the special spirit of the nearly 170,000 residents who are predominantly American citizens but who also strongly honor the ancient and vibrant Chamorro culture. They also unveiled stunning images of the unspoiled, stunning, natural beauty of Guam. From an economic standpoint, they talked about the growing leisure travel, conference & meeting, and incentive travel market in Guam – propelled not only by its authentic style and unique experience opportunities, but also its modern hotels and convention center and strong technology infrastructure. Guam will once again have a booth at IMEX America #3041 and is anticipating great interest from event planners and buyers from the US, Asia, Australia and many other regions. Who’s Been Coming and Why? In just one example of who’s coming to Guam, the United Nations World Tourism Organization (UNWTO) & PATA (Pacific Asian Travel Association) held their 2016 Annual Conference in Guam which brought many influential industry leaders to the island, and delighted them with all that Guam has to offer, Japanese, South Korean, Chinese, Taiwanese and American tourists and incentive groups have also been enjoying their experiences of Guam. While Guam has more than 8,860 modern hotel rooms and hotels run by leading brands such as Hyatt, Sheraton, Hilton and Westin – as well as the new Guam Convention Center at the Dusit Thani Guam Resort – Guam also has its own distinctive local style which creates memorable events and experiences. Business and pleasure visitors alike can take in outdoor fiestas featuring traditional, Chamorro food and festivities like fresh caught seafood & edible seaweed, traditional dancing, music and coconut cracking. Hiking and walking up into the hills of Guam – or “Boonie Stomping” as it’s known locally – uncovers gorgeous flora, fauna and jungle waterfalls. Golf, dolphin watching and water sports like snorkeling and diving are also among the many activities offering a wide range of incentive options. Guam has also built a strong technology infrastructure with superfast Wifi – bringing together the best of unplugged and fully connected options and activities. The world is discovering Guam – and that it has plenty to offer. https://www.guamvisitorsbureau.com/ Guam Visitors Bureau www.guamvisitorsbureau.com #Guam #UNWTO #WTO #PATA #IMEXAmerica #MICEnews #MICEmedia #TourismNews Tags: #3041, Asia, Australia, Boonie Stomping, Discovering Guam, Dusit Thani Guam Resort, Guam, Guam Convention Center, IMEX America, Pacific Asian Travel Association, PATA, PATA (Pacific Asian Travel Association), United Nations World Tourism Organization, US, World Tourism Organization, WTO Kenes Group and BestCities Global Alliance ready to open doors with their first original event Final preparations are underway as BestCities Global Alliance, visitBerlin – one of the Alliance’s partner destinations – and leading Professional Conference Organiser, Kenes Group, get ready to welcome delegates to their inaugural original event in Berlin. Senior level attendees from leading international pharma and biotech companies, academia and government institutions are expected at the Summit on Controversies in Precision Medicine (CPMed), due to take place at the Ameron Hotel Abion Spreebogen Waterside, 13-15 November 2017. The Summit is the first event following a landmark agreement signed by Kenes and BestCities, to initiate and manage original events in the 12 BestCities global locations. With a shared ambition to deliver high-level meetings for doctors, researchers, and specialists, not formally structured through existing associations, the events are a unique opportunity to study a specialised area of expertise, providing a valuable knowledge sharing and networking platform. Under the leadership of Prof. Dan Peer, Director of Tel Aviv University Cancer Biology Research Centre and Translational Medicine, CPMed will address the challenges in precision medicine head-on. Titled, “Where do we stand in drug development?”, the Summit will create a focused environment for quality and open scientific debate on the value and direction of the industry. With an interactive architecture, the event is designed to provide the participants with exciting opportunities to ignite solutions, network and innovate. Work is already underway to initiate a number of future original events through the collaboration of BestCities, Kenes Group and high-profile opinion leaders from around the world, in key fields where there is a potential to create an original event. Ravit Shani Levi, Director of Global Market Development at Kenes Group, said “CPMed is an important first step into initiating a series of original events that leave a legacy. Under Prof. Dan Peer’s leadership and the outstanding support from our partners at BestCities and visitBerlin, we are looking forward to this new original event becoming an innovative platform for knowledge exchange, education, and networking in the field of precision medicine.” Paul Vallee, Managing Director of BestCities, said: “Working together with Kenes, BestCities is committed to delivering impactful meetings that offer genuine value, insight and innovation to the global medical community. With its focus on a niche but crucial topic, CPMed is the ideal first event to showcase BestCities and Kenes shared long-term ambition for initiated conferences and our commitment to help build lasting legacies between associations and destinations.” Burkhard Kieker, CEO of visitBerlin, said: “Berlin is known around the world as a centre for innovation and has a first-class network of universities and research centres. This is particularly beneficial for meetings related to science and medicine. In addition, the city offers affordable accommodation compared to other cities and a wide range of cultural offerings. This unique blend is convincing an increasing number of convention and event organisers. Berlin is proud to be a strong partner in the new BestCities initiative with Kenes Group.” For more information on CPMed visit: www.precisionmedicine.kenes.com For more information on BestCities visit: www.bestcities.net #CPMed #visitBerlin #bestcities #MICEmedia #MICEnews #TourismNews #CityMarketing #DestinationMarketing Tags: Ameron Hotel Abion Spreebogen Waterside, BestCities, BestCities initiative, Burkhard Kieker, CEO of visitBerlin, CPMed, Global Alliance, Global Market Development, Kenes Group, Prof. Dan Peer, Tel Aviv University Cancer Biology Research Centre Outrigger Resorts Launches Exclusive Global Honeymoon Platform PHUKET, THAILAND – To coincide with the start of ITB Asia in Singapore, Oct. 25, Outrigger Resorts is launching a range of nine honeymoon packages for all of its Pacific, Asian and Indian Ocean beachfront resorts this week. The packages cover some of the most desirable and iconic honeymoon destinations in the world: Maldives, Mauritius, Hawaii, Fiji, Guam, and Phuket and Koh Samui in Thailand. “Outrigger has made it easy for couples to plan a dream honeymoon and celebrate in paradise,” said Sean Dee, executive vice president and chief marketing officer at Outrigger Enterprises Group, who is attending ITB Asia this week. “Our global honeymoon platform is an extension of the Outrigger Resorts Signature Experiences – inviting guests to ‘Escape Ordinary’ – and in this case, love every minute of the authentic tropical adventure.” Each Outrigger “Honeymoon Getaway Package” is customized to the host location; standard inclusions typically feature breakfast in bed, romantic flower decorations and a selection of rich chocolates or a chilled bottle of sparkling wine. Newlyweds visiting Outrigger Konotta Maldives Resort would enjoy a dreamy sunset cruise with cocktails and canapés or at Outrigger Mauritius Beach Resort an extraordinary honeymoon dinner on the beach and a 30-minute couple’s massage. Six of the Outrigger Resorts in Maldives, Thailand, Fiji and Mauritius are also announcing “Ultimate Honeymoon Packages.” In these, couples enjoy all the features of the “Honeymoon Getaway,” plus additional romantic elements, such as a sundown cruise and Swedish massage at Castaway Island, Fiji; a couple’s spa treatment and VIP Mercedes-Benz airport transfers Outrigger Laguna Phuket Beach Resort; a honeymoon seafood dinner on the resort jetty and a couple’s massage in the VIP cabin at the spa for Outrigger Mauritius Beach Resort; and a candlelit dinner for two on the beach at Outrigger Konotta Maldives Resort. Newlywed honeymoon couples can also join Outrigger Resorts’ beachfront vow renewal ceremonies at each Outrigger Resort. “Pledging allegiance to each other through a local culture ceremony adds additional emotional depth to the honeymoon experience,” said Dee. Outrigger Resorts, which is celebrating its 70th Platinum Anniversary this year, has offered free vow renewal ceremonies at select properties for the past 15 years. With approximately 1,000 couples renewing their vows at Outrigger each year, that’s 15,000 couples who have already rekindled their love at Outrigger. For the “Honeymoon Getaway” and “Ultimate Honeymoon” packages, each Outrigger resort requires a minimum stay between three to five nights, depending on the destination. The travel period for the honeymoon packages at all Outrigger Resorts is through Dec. 31, 2018. Guests must provide proof that their marriage date occurred less than one year prior to arrival. Full details, terms and conditions are available on the Outrigger honeymoon overview page here on Outrigger.com. A click from the page shows the dynamic pricing of all honeymoon packages across the resorts. Prices vary according to date and can be viewed in each visitor’s preferred currency. #UltimateHoneymoon #Outrigger #OutriggerResorts #HotelNews #HotelMarketing #MICEnews #TourismNews Tags: Fiji, Guam, Hawaii, Honeymoon Getaway, Honeymoon Packages, ITB Asia, ITB Asia in Singapore, KOH SAMUI, Maldives, Mauritius, Outrigger Konotta Maldives Resort, Outrigger Mauritius Beach Resort, Outrigger Resorts in Maldives, Outrigger Resorts Launches Exclusive Global Honeymoon Platform, Thailand, Ultimate Honeymoon SINGAPORE: INSIDE OUT BRINGS SINGAPORE CREATIVE TALENTS TO SYDNEY Singapore, November 2017 – Singapore: Inside Out, a creative showcase featuring works by some of Singapore’s leading contemporary creative talents, opened in Sydney today and will run until 5 November. The showcase in Sydney will feature 20 award-winning creative talents from Singapore and Australia across various disciplines. Interspersed at various locations within the trendy Chippendale precinct, including The Old Clare Hotel and Kensington Street will be visual and performance art installations incorporating sound art, light projections, live dance and live music performances. Mr Lionel Yeo, Chief Executive of the Singapore Tourism Board (STB) said, “We are delighted to share with our Australian friends a showcase of Singapore’s burgeoning creative scene and celebrate the passion of our talents. This showcase in Sydney will offer a fresh look at Singapore and pave the way for more opportunities for our creative talents.” Curated with the Australian audience in mind, the Sydney edition is led by Mr Randy Chan, the Principal Architect of Singapore architectural studio, Zarch Collaboratives. Themed “Movement”, Singapore: Inside Out Sydney reflects on different movements within the creative process, as well as Singapore’s multi-cultural society which has inspired diverse practices that challenge perceptions of what is generally assumed to be Singaporean. Over the next three days, visitors to Singapore: Inside Out showcase can expect to experience immersive artworks, collaborations and an energetic line-up of live programmes across a variety of creative disciplines. These will include a number of newly commissioned artworks and performances such as “New World Park” by music collective Syndicate who will traverse vintage songs of the Malay Archipelago and modern electronica beats, inspired by one of the first of Singapore’s renowned amusement parks; “Emerging Pool of Talent” by Larry Peh which draws inspiration from the fact that both Singapore and Sydney are surrounded by water, as well as “Motion Theory”, a kinetic installation borne from a collaboration between Ong Kian Peng and Murasaki Penguin. Select artists also present fresh takes of their previously-exhibited works, such as “At the Angle of Repose” by Grace Tan which builds on her kwodrent[1] series and “The Forest Speaks Back III” by, Donna Ong which responds to The Old Clare Hotel’s heritage as a former brewery by integrating beer bottles into her re-imagined tropical forest. The showcase programme also features a series of dialogue sessions by SG:IO artists as well as creative industry experts and academia from Australia. The discussions will explore various topics such as creativity and innovation in the shared economy and impact of culinary collaboration. Partner events happening along Kensington Street further shine the spotlight on Singapore’s creative scene and talents, who are joining hands with renowned Australian establishments to present unique dining, entertainment and retail experiences. These include: • Eastside Kitchen + Bar x Fat Lulu’s Four Hands Dinner featuring one of Singapore’s renowned stand-up comedians, Rishi Budhrani (2 to 4 November 2017) • New Ubin Seafood Pop-Up at Alex Lee Kitchen (3 to 5 November 2017) • The Dessert Collective: Candlenut x KOI Dessert Bar x Tarte by Cheryl Koh (3-5 November 2017) • SGMUSO Live Music Showcase featuring Linying, MAS1A and Sam Rui (3 to 5 November 2017)​ • Binary Style x Extraordinary Ordinary Day Limited Edition Scarves (3 to 5 November 2017) • Demochoco x Kakawa Limited Edition Chocolates (3 to 5 November 2017) • Singapore Designers’ Showcase (3 to 5 November 2017) ​Please refer to Annex A for a more detailed programme on Singapore: Inside Out Sydney Ms Audra Morrice, Chef and Judge of MasterChef Asia said, “Before visiting Singapore: Inside out, I was aware that Singapore had been promoting the arts for a number of years. However for me, this showcase really shows Singapore opening up even more avenues in the arts scene. It is really nice that Singapore is pushing boundaries and taking its creative scene and its artists to the rest of the world, such as Sydney.” Close to thirty key members of the Australian trade and media attended a special preview of the showcase yesterday, alongside a Singapore-Sydney collaboration dinner prepared by chefs Malcolm Lee (SG), chef-owner of the world’s first and only Michelin-starred Peranakan restaurant of Candlenut, and Clayton Wells of the two hatted Automata (AU) to officially kick-start the Sydney edition of Singapore: Inside Out. The Sydney showcase will also conclude Singapore: Inside Out’s journey for this year. The Tokyo edition, featuring 13 artists and seven partner events across various locations in the city, was held on August 25 to 27 and attracted over 7,000 visitors. To download images of Singapore: Inside Out Sydney, please click on this link: Photo Library – Singapore Inside Out 2017 ​ Please visit www.visitsingapore.com/en_AU/see-do-singapore/arts/performance-arts/singapore-inside-out/ for more information and a full listing of events. ​ ​Follow Singapore: Inside Out on: #SGInsideOut [1] “the kwodrent series” explores wearable structures that over time, evolve into sculptural objects and site-specific installations influenced by geometry. Tags: Automata, ​Follow Singapore, Emerging Pool of Talent, Inside Out, Inside Out Singapore, Judge of MasterChef, Malay Archipelago, Malcolm Lee, Mr Lionel Yeo, Ms Audra Morrice, SGInsideOut, Singapore Inside Out, Singapore Tourism Board, Singapore Tourism Board (STB), Singapore-Sydney, STB, Sydney edition of Singapore, The Old Clare Hotel, visiting Singapore MICEmedia on Facebook
cc/2019-30/en_middle_0012.json.gz/line1398
__label__wiki
0.884862
0.884862
To obtain a Building Permit with the Town of Millville, you must provide the following: Homeowners Association (HOA) approval letter (if the residence is located within a community with an HOA); Copy of a Sussex County Building Permit (to see what projects require a Sussex County building permit, please click here); One (1) set of detailed plans – this often shows the dimensions, measurements, materials used for the job; Site survey – this is the birds-eye view plan of the lot with the structure on it, as well as where the project (i.e., fence, deck, shed, etc.) will be placed; Completed & signed Town Building Permit application, which can be found by clicking here; and (if applicable) COMMERCIAL ONLY: Click here for Rt. 26 & Rt. 17 Commercial Building Design Standards & Guidelines and complete checklist. Complete and sign both pages of the Building Permit Application/Agreement form and include all applicable checklist items listed on the application. The Town has a minimum of five (5) business days from the date the application is received to review the construction plans and return to the applicant along with the Plan Review/Building Permit fee due. If a company/builder/contractor is hired to do the work, they will need to have a Town of Millville Business License; to apply for a Town Business License, please click here. To calculate how much a building permit will cost, please refer to the Town’s Fee Schedule (particularly the sections: “Review of Building Plans,” and “Building Permit Fees”): REVIEW OF BUILDING PLANS* Cost per sq. ft. Minimum Flat Rate New Residential Construction, Additions (Increase to Floor Area) $0.25 $50.00 — New Commercial Construction $0.40 $300.00 — Residential Renovations & Repairs $0.25 $40.00 — Decks, Porches, Patios $0.25 $40.00 — Accessory Structures $0.25 $100.00 — Commercial Renovations & Repairs $0.40 $100.00 — BUILDING PERMIT FEES°* Cost per sq. ft. Minimum Flat Rate New Residential Construction $1.25 — — New Residential Construction that the Town Determines will require a 3rd party building inspector; however, the building inspector will have to be approved by the Town’s engineer $0.125 — — Additions (Increase to Floor Area) $1.25 — — New Commercial Construction $1.30 — — New Commercial Construction that the Town Determines will require a 3rd party building inspector; however, the building inspector will have to be approved by the Town’s engineer $0.125 — — Residential Renovations & Repairs** See Multiplier Below $50.00 — Decks, Porches, Patios** See Multiplier Below $60.00 — Removable Pavers** — — $30.00 Accessory Structures (Unfinished Floor) $0.75 $50.00 — Accessory Structures (Finished Floor) $1.25 $100.00 — Commercial Fit-out/Renovations & Repairs $0.50 $200.00 — Fences: Rail, Chain Link, Wood or Vinyl ** See Multiplier Below $50.00 — Sidewalks and Driveways** See Multiplier Below $50.00 — Demolition of any Structure or Building** See Multiplier Below $50.00 — Moving any Structure or building our of Town Limits** See Multiplier Below $50.00 — Swimming Pools: In ground only** See Multiplier Below $250.00 — Metal or Masonry Fireplace — $250.00 — NEW CONSTRUCTION FEES (FOR RESIDENTIAL & COMMERCIAL ONLY) FEE Re-Site & Final Topo Survey Review $200 First Responder Impact Fee $500 °The fee for building permits will be doubled if a permit is not obtained prior to the beginning of construction. Penalties as specified in 155-65 are also applicable. (As per Resolution 18-05) *Should additional inspection(s) or construction plan review be necessary, the Town will bill the applicant for any necessary additional professional fees as encumbered throughout the building process. Professional fees must be paid by the applicant prior to the issuance of a building permit or certificate of occupancy. Total Construction Value Base Multiplier Rate Total Permit Up to $999.00 $ 50.00 $1,000 to $40,000 $ 50.00 $11 per additional 1,000 > 1,001 $40,001 and Over $ 479.00 $10 per additional 1,000 > 40,001 NOTE: ANY ENTITY EXEMPT FROM AD VALOREM TAXES SHALL NOT BE LIABLE FOR BUILDING PERMIT FEES; HOWEVER, THE ENTITY WILL BE RESPONSIBLE FOR REIMBURSING THE TOWN ANY PROFESSIONAL ENGINEERING OR LEGAL FEES ASSOCIATED WITH THE PERMIT. For Minor/Major Subdivisions: Fill out the application found here.
cc/2019-30/en_middle_0012.json.gz/line1403
__label__wiki
0.508102
0.508102
Dr. Bill Chachkes of Football Reporters Online to Guest Tonight on Insightful Player™ Television Show on MingleMediaTV.com September 20, 2011 minglemediatvnetwork Dr. Bill Chachkes, Managing Partner/Executive Editor, Football Reporters Online (FRO) on Insightful Player™ Streaming Video TV Show on MingleMediaTV.com Tuesday, September 20th 7 PM EST Watch LIVE here today: Mingle Media TV Dr. Bill Chachkes, Managing Partner/Executive Editor, Football Reporters Online (FRO) Dr. Bill Chachkes, Managing Partner/Executive Editor, Football Reporters Online (FRO) will be the guest of the weekly Insightful Player online show on MingleMediaTV.com tonight, September 20 at 7 p.m. ET . Mingle Media TV produces and broadcasts over 40 hours of web series and event coverage each week. Chrissy Carew, a Master Certified personal and business coach based in Nashua, NH founded Insightful Player™ in April 2010 with a vision of providing an answer to a crucial worldwide calling for messages of hope that provoke positive actions. “I’m excited to have the chance to interview Dr. Bill Chachkes, who has been a tremendous supporter of what we’re trying to accomplish with Insightful Player,™” said Carew, who was inducted into the International Coaching Federation (ICF) New England Chapter’s newly-established Hall of Fame on June 13. There are 32 members of the Insightful Player™ team. To be named to this team, one must be a person of integrity, such as a current or former NFL player, who shares their personal message of hope for the sole purpose of lifting the spirits of all, especially children. The Insightful Player book, published by Morgan-James Publishing, will be released in October. On the show, Dr. Bill Chachkes and Chrissy Carew will discuss the challenges retired players face, how to play the game right and train right (so players don’t get hurt), introduction of the new high tech safety helmet and chin guard, the growth of Football Reporters Online (FRO) and their combine next March. FRO is an accredited media organization that has multiple affiliated partners including the Football Writers of America & the National Sportswriters and Sportscasters Association. FRO is a multi-media approach themed company that provides player and team analysis on the collegiate and professional levels. FRO’s distinct content niche is forged through its key connections: · The NFL and the League Office · Top coaches and players from the professional and collegiate ranks · NFL Alumni · Mainstream and alternative media personalities and outlets · Cutting-edge technology partners FRO’s yearly draft guide is sent to every NFL Team, in addition to all NCAA Sports Information Directors & athletic directors, as well as other professional football leagues such as the UFL, AFL, CFL and AAFL. FRO’s executive management team has over 65 years of combined experience covering the NFL and the NFL Draft, as well as College and High School Football, as well as topics relating to the athletes and their world around them. Outside of the draft guide FRO also produces three live weekly radio shows via Blog Talk Radio. Bill has attended the NFL draft since 1972, when he said, “I can pick these players as well as any GM,” to his dad, a lifelong College and Pro Football fan, career federal law enforcer, and career citizen soldier. Bill began studying the game of football under his dad’s watchful eye at age five when he attended his first New York Giants game at Yankee Stadium in 1965. When other kids wanted to be the star QB, Bill was practicing his punting & place-kicking. Several years later he and his dad were writing letters to Giants GM George Young to suggest players to draft, the family having been season ticket holders since 1937. Mr. Young would always reply by hand written letter. This past year was Bill’s 27th straight year with a press credential to the NFL Draft. Bill has covered and reported on several hundred College, Pro, and High School football games since 1986, and is a featured expert speaker for several groups on football training, the history of the game, and scouting and talent evaluation for coaches, players, parents, and fans at every level. The Insightful Player™ is brought to you by Coach Chrissy Carew, Master Certified Personal and Business Coach. Chrissy has been deeply inspired by her father, the late Coach Walter Carew, Sr. Her beloved father is in several Halls of Fame as a high school football coach (as well as high school and college player). He used the game as a way to help kids build strong character and teach them valuable life skills. The Insightful Player™ was created to help make our world a much better place. Launched on February 8, 2010, online media and live web TV Network Company, Mingle Media TV produces and broadcasts over 40 hours of web series and event coverage each week. It’s audience reach online is over 250,000 weekly views of their video coverage, web series and live broadcasts and are currently in the top 20,000 websites in the U.S. For more information on Coach Chrissy Carew and Insightful Player, visit www.theinsightfulplayer.com and call 603-897-0610. askdrfootballChrissy CarewDr. Bill ChachkesfootballFootball Reporters OnlineFROindie tvInsightful Player TVinterviewlive interviewlive streaming videominglemediatv.commotivational speakernflNFL playersstreaming videotalk showweb tv
cc/2019-30/en_middle_0012.json.gz/line1404
__label__wiki
0.937691
0.937691
Taylor Swift ‘We Are Never Ever Getting Back Together’ Lyrics Used on Strangers [Video] Alexandra Capotorto Juan Naharro Gimenez, Getty Images We already know how catchy Taylor Swift's song 'We Are Never Ever Getting Back Together' is. We reluctantly start singing it in the most random of places, and we mean reluctantly in the sense that the people around us probably want to run away screaming. But hey, at least we're not alone! We Taylor Swift-singing wannabes find ourselves in the great company of Ellen DeGeneres, pretty much everyone's favorite television host. She and 'The Ellen Show' writer Amy came up with a little prank that involved the addictive Swift song and it's pretty hilarious. Known for her hijinks against Swift -- you know, the ones where she constantly scares the pop-country singer -- this time, DeGeneres seeks out to trick strangers! "My writer Amy goes out and talks to unsuspecting people using only song lyrics," said DeGeneres. "And this time I sent her to Lowe's and I had her speak to people using only the lyrics from Taylor Swift's song 'We Are Never Ever Getting Back Together." What ensues though is downright hilarious. Strangers not only amuse Amy by conversing with her, but some even ask if she's okay after the supposed break up she's talking about. Check out the video above to get the full experience! You won't regret it. Like... ever. Next: The Perfect Valentine's Day Gift for Taylor Swift! Source: Taylor Swift ‘We Are Never Ever Getting Back Together’ Lyrics Used on Strangers [Video] Filed Under: taylor swift
cc/2019-30/en_middle_0012.json.gz/line1405
__label__wiki
0.881731
0.881731
Doom Abuse Album Review of Doom Abuse by The Faint. Home » Pop/Rock » Doom Abuse The Faint Record label: SQE Genre(s): Pop/Rock, Alternative/Indie Rock, Indie Rock, New Wave/Post-Punk Revival 68 Music Critic Score Buy Doom Abuse from Amazon Doom Abuse - Fairly Good, Based on 12 Critics The 405 - 80 Based on rating 8/10 Head here to submit your own review of this album. Six years is a long time, especially in music. Trends come and fads flitter away into the ether. What was once the flavour of the month is now akin to a rotten, fetid mess snubbed by indie snobs and buzzband hyping websites (no names, I can't afford the lawsuits). Filter - 78 Based on rating 78%% Exploding in a squall of feedback and white noise, “Help In The Head”—the opening track from Doom Abuse, the first album of new material in six years from Omaha’s The Faint—sets us up for a rollicking, fast-paced trip to and from the very beginnings of electronic music. Echoing equal parts Ministry, Gary Numan and, at times, Dead Kennedys (albeit with better vocals), Doom Abuse is a cathartic slap in the face from a band that sounds completely revitalized after its multi-year slumber. . Paste Magazine - 72 Based on rating 7.2/10 Within the family of Saddle Creek, the Omaha label founded by Bright Eyes’ Conor Oberst, The Faint never really made sense sonically, their music a sort of black sheep amongst the other artists. In its prime, the band would have fit in more with what was happening in New York in the early ‘00s, with dance-punk and a fondness for the less vibrant color spectrum—not necessarily perpetually dark, but overcast for sure—catching on. Black sheep turns out to be a more apt metaphor than usual. AllMusic - 70 Their first collection of new music since 2008's ambitious, electro-rock-studded Fasciinatiion, Doom Abuse finds the venerable Omaha post-punk-dance-metal-pop hybrid speaking a language familiar to anybody who has followed them since their 1995 Conor Oberst-era inception. Helped along by the meaty first single "Help in the Head," the Faint are as dissatisfied as ever with society, but they don't let the permeable injustices of the world get in the way of having a good time musically, and while the 12 cuts that make up their appropriately titled sixth long-player are still raging against the machine, they do so with the resigned wisdom, or work ethic, of age. Sometimes, all of the sticking it to the man can feel a little too on the nose, as is the case with the relentless yet redundant "Dress Code" and "Loss of Head," but there are enough dyed-in-the-wool, Faint-astic crowd-pleasers like "Animal Needs," "Unseen Hand," and "Your Stranger" to goad a pit into a proper feeding frenzy. Consequence of Sound - 65 Based on rating B- Before modern, synthy dance rock came into vogue, before dubstep, even before The Postal Service, teens looking for something to satisfy both their us-vs.-them, heartbroken moodiness and the need to dance like crazy people had the dark new wave of The Faint. The Faint made it cool for hipsters to dance in the late ’90s, and for that we thank them. 1999’s Blank-Wave Arcade and 2001’s Danse Macabre were indie dance night staples, where basement-dwelling, Adderall-riddled teens could shake and sweat to something that didn’t involve the terms “boy band” or “pop princess.” The Faint have in some respects come a long way from that initial dance revolution success, which pulled them out of Omaha and into the national limelight. Under The Radar - 65 In their latest release, indie dance-rock pioneers The Faint embrace their industrial post-punk spirit. Their music has always been on the "noisy" end of the spectrum, and Doom Abuse is no exception. Every element dances on the verge of clipping or glitching, and The Faint's brand of controlled chaos holds the album together like a corset. . Pitchfork - 61 When the Faint released their debut album Sine Sierra, Conor Oberst was a band member and they were known as Norman Bailer. That was nearly twenty years ago, and if that makes you feel old, imagine how the Faint must’ve felt when they went on hiatus following 2008’s Fasciination. For sullen teens who thought Nine Inch Nails and Rage Against the Machine were for jocks, the Faint's angsty, political electro-punk could've seemed like the most exciting shit imaginable, and by the time they reunited to play festivals in 2012, everyone was free to admit “Agenda Suicide” kinda kicked ass. DIY Magazine - 60 Based on rating 3/5 The Faint’s 2008 album, ‘Fasciinatiion’ was a little bit… well, lame. A massive disappointment. Not nearly as good as the band who gave the world the still magnificent ‘Danse Macabre’ should put out even on a bad day. And it’s as if the Nebraskan synth-punks knew it: shortly after the record’s release, they – as the official word goes - “ceased to exist”.‘Doom Abuse’ is then as much a surprise to the band as it is to us – and it’s a pleasant surprise, at least. PopMatters - 60 It’s typically right around a band’s fourth or fifth album that the innovation ceases, replaced by a sense of settling in. The identity is established, the fan base has peaked, and it’s time to carry on with a tried and true approach. Such is the place the Faint occupy now, as evidenced by Doom Abuse, the band’s seventh album. That it is their first album after a hiatus — previous record Fasciination released in 2008 — shines a brighter spotlight on the question of their continued relevance. New Musical Express (NME) - 60 Once the missing link between the disparate early 00s New York scenes of electroclash and The Strokes, The Faint foretold new rave with ‘Danse Macabre’ around 2001. Having jerk-danced their way off the Ultra New Wave map in 2008 they now return with album seven, their goth-tinged electro-rock undimmed, their melodies unsettlingly wonky and their heads filled with scary voices (‘Help In The Head’, ‘Evil Voices’, ‘Mental Radio’). A good seven years out of date, ‘Doom Abuse’ is pure synth-pop mania, frequently teetering between unadulterated Trent Reznor pop brilliance (‘Unseen Hand’, ‘Lesson From The Darkness’) and impressions of Skrillex driving a monster truck through a Savages gig in a video arcade (‘Animal Needs’, ‘Dress Code’). Their review was very positive 2013’s best punk album wasn’t defined by slashing guitars or hyperactive drums; the best punk record of 2013 was brought to you by the electronic nightmare modernism of Kanye West. Sharpening, melting, and warping craped-up keyboards and cyborg drum machines until they howled like an expressionist reboot of Suicide, Yeezus managed to be last year’s most breathless, vitriolic, and urgent album by capturing the maelstrom angst of punk without the crutch of its stereotyped trappings. And the more I listened to it, the more I found myself hoping Yeezus wasn’t simply a seismic event, but was also the start of an epoch. During the ’00s indie-dance boom, The Faint rose to prominence by muscling keyboards back into rock music with geeky flair. But over time, the Omaha band’s most enduring tunes—including the flailing new wave homage “Worked Up So Sexual,” the gothic post-punk of 2001’s Danse Macabre and the corrosive “Paranoiattack”—also tended to share DNA with punk rock’s freewheeling energy and raw immediacy. When The Faint de-emphasized these qualities on 2008’s slick, digital-focused Fasciination, its music suffered; the record felt labored over and forced. 'Doom Abuse' is available now More Pop/Rock Reviews: Click here for more Music Critic reviews of Pop/Rock Albums.
cc/2019-30/en_middle_0012.json.gz/line1414
__label__cc
0.668092
0.331908
Love Match Score: -58 Mike born February 17, 1965 Aquarius ♒ Michelle born April 24, 1965 Taurus ♉ 1. Scoring Overview 2. Score Interpretation 3. Recommended Reading 4. Another Love Match 5. Share This Score Scoring Overview A negative test score indicates discord in the relationship. The couple might be physically attracted to each other, but it is going to be rough. There might be a lot of disagreements and may even harm each other. The association will need many adjustments for it to work. Read the interpretation in the next section to find out what aspects cause harmony and discord. A score of +20 and below indicates average harmony. This is a casual relationship from everyday people. The pair may say hi and hello to each other, but there is no deep connection between them. This is sometimes called the “friends zone.” A score of +21 to +40 indicates greater harmony beyond friendship. A score of +41 to +60 is a sign of a good match. A score of +61 to +80 indicates general compatibility. +81 to +100 is an excellent score but is hard to find. A score above +100 ranks high on the love compatibility meter. The pair has a lot of common grounds to enjoy. Whenever there is a conflict, the couple can easily overcome it without affecting their relationship. A score above +200 is very rare to find. This is an extraordinary match! Both individuals are very committed to nurturing one another. Some will call this pair “soul mates.” Mike and Michelle’s Relationship Michelle and Mike’s relationship is more than just Sun sign compatibility of Taurus and Aquarius. No individual is a pure Taurus or Aquarius but instead is a unique combination of signs and planets. The following interpretation defines the synastry or interplanetary aspects between the planets in Mike’s birth chart and the planets in Michelle’s birth chart. There is no evil planet in the combinations. No single combination can make or break the relationship. The list goes from the most harmonious (positive) to the most discordant (negative). A neutral score means it can go both ways. If there are many positive elements, they can pull the neutral ones with them making the relationship a favorable one. The opposite can also happen where a lot of negative aspects can pull the neutral ones causing a general discord in the relationship. Mike’s Moon Sextiles Michelle’s Neptune (+7.81 harmony) – Mike’s emotional needs combine pleasantly with Michelle’s sense of spirituality, imagination, or mystical inclination. The relationship stimulates mutual inspiration and devotion to each other. Telepathic communication with each other is possible. Both Mike and Michelle have an affinity in mystical, esoteric, or even occult studies. There is a minor irritation when both seem distant or aloof to the other. Mike’s Mars Trines Michelle’s Jupiter (+6.45 harmony) – Mike’s sexual drive, temper, and powers of self-assertion combine very effortlessly with Michelle’s sense of growth, expansion, or generosity. There is harmony in sharing outdoor activities like sports and travel. Michelle has a broad impact on Mike’s vigor and erotic enthusiasm. Mike challenges Michelle to expand further. This aspect is also favorable in business partnerships. Mike’s Jupiter Trines Michelle’s Pluto (+5.16 harmony) – Mike’s sense of growth, expansion, or generosity combines very effortlessly with Michelle’s sense of transformation, change, or power and destiny. Both have the potential to accomplish something big together. There is harmony in encouraging the spiritual enlightenment of one another. Michelle’s Venus Trines Mike’s Uranus (+4.84 harmony) – Michelle’s sense of sexuality, attraction, or intimacy combines very effortlessly with Mike’s sense of independence, freedom, and originality. There is harmony that brings out the latent creative genius in each other. A mystical or glamorous aura is present in the relationship. Mike surprises Michelle in one way or another. Michelle has a pleasant way of toning down Mike’s eccentricity. Michelle’s Venus Sextiles Mike’s Saturn (+4.67 harmony) – Michelle’s sense of sexuality, attraction, or intimacy combines pleasantly with Mike’s sense of commitment, necessity, or duty. Mike’s protective nature stimulates Michelle’s loving nature. Trust is a rare and precious part of the association. This aspect is good for a long-term relationship. Michelle’s Mercury Sextiles Mike’s Venus (+3.44 harmony) – Michelle’s mentality and powers of perception combine pleasantly with Mike’s sense of sexuality, attraction, or intimacy. Michelle’s communication style stimulates Mike’s emotions, visions, and needs. The graceful flow of tenderness from Mike makes Michelle feel exciting and sexy. There is a fascinating exchange of ideas in the relationship. This aspect is favorable in marriage. Michelle’s Neptune Sextiles Mike’s Pluto (+3.41 harmony) – Michelle’s mystical or spiritual inclination combines pleasantly with Mike’s sense of transformation, change, or power and destiny. The spiritual urge of Michelle stimulates the reforming urge of Mike. Both will support and encourage each other’s spiritual enlightenment. The relationship inspires each other to meet the world with compassion and grace. Mike’s Sun Sextiles Michelle’s Sun (+2.54 harmony) – The individual sense of identity, ego, will, and character combine pleasantly with the couple. The similar temperaments of Mike and Michelle can stimulate each other to achieve their goals in life. There is a strong sense of compatibility between Michelle and Mike. Both are supportive of each other’s basic needs. This aspect is mutually beneficial for marriage. Michelle’s Sun Sextiles Mike’s Saturn (+2.29 harmony) – Michelle’s sense of identity, ego, will, and character combine pleasantly with Mike’s sense of commitment, necessity, or duty. Michelle and Mike can stimulate each other to work towards their common goals. There is a sense of practicality in the relationship. Michelle and Mike can agree on how to handle their problems. Both know how to allocate duties and responsibilities. Michelle’s Venus Trines Mike’s Pluto (+2.29 harmony) – Michelle’s sense of sexuality, attraction, or intimacy combines very effortlessly with Mike’s sense of transformation, change, or power and destiny. There is harmony when both enjoy moving forward and growing through the relationship. There are feelings of relief and enlightenment after a relationship challenge. The magnetic attraction between Michelle and Mike makes it impossible to separate them permanently. Michelle’s Moon Conjuncts Mike’s Venus (+1.66 harmony) – Michelle’s emotional needs combine with Mike’s sense of sexuality, attraction, or intimacy. The fusion of mutual devotion and affection in each other produces a happy union. The relationship encourages cooperation and attention to fairness. Both are in agreement on financial and social matters. Occasional small disagreements are quickly resolved. Neither Michelle nor Mike is useful in setting boundaries. Mike’s Jupiter Sextiles Michelle’s Saturn (+1.51 harmony) – Mike’s sense of growth, expansion, or generosity combines pleasantly with Michelle’s sense of commitment, necessity, or duty. Michelle’s practicality stimulates Mike’s expansive ideas. Mike provides vision while Michelle creates structure. Both work better as a team to achieve a common goal. This aspect is also favorable in a business partnership. Mike’s Uranus Sextiles Michelle’s Neptune (+1.37 harmony) – Mike’s respect for expression of individuality combines pleasantly with Michelle’s mystical, spiritual inclinations. Both help each other to bring their individual ideas to life. The relationship encourages each other to think outside the box. Michelle and Mike have a strong intuitive connection. Michelle’s Saturn Trines Mike’s Neptune (+0.99 harmony) – Michelle’s sense of commitment, necessity, or duty combines very effortlessly with Mike’s sense of spirituality, imagination, or mystical inclination. Michelle’s practical instincts are in harmony with Mike’s visions and dreams. Michelle has a good sense of reality that Mike might not have. Mike is aware of a different dimension that can help Michelle. Mike’s Jupiter Trines Michelle’s Uranus (+0.71 harmony) – Mike’s sense of growth, expansion, or generosity combines very effortlessly with Michelle’s sense of independence, freedom, and originality. Mike’s visions are in harmony with Michelle’s creative genius. Mike will expand Michelle’s goals and creativity. Michelle adds innovation and excitement to Mike’s projects. This aspect brings out humanitarian qualities in each other. Michelle’s Sun Trines Mike’s Uranus (+0.67 harmony) – Michelle’s sense of identity, ego, will, and character combine very effortlessly with Mike’s sense of independence, freedom, and originality. Mike’s unusual nature blends harmoniously well with Michelle’s highly creative life. The relationship stimulates each other’s innovation and exchange of progressive ideas. There is a smooth flow of encouragement and individualism between Michelle and Mike. Mike’s Moon Trines Michelle’s Jupiter (+0.66 harmony) – Mike’s emotional needs combine very effortlessly with Michelle’s sense of growth, expansion, or generosity. There is harmony in the right mood and feeling of comfort in the relationship. Mike encourages and nurtures Michelle’s expansive ideas. Michelle is patient, tolerant, protective, and will not harbor any ill-will against Mike. Both boost confidence and respect in each other. This aspect is conducive to fertility and childbearing if the wife’s health and age can support it. There’s a sense of luck and financial benefits from Michelle to Mike. An element of teacher and student energy is present in the relationship. The roles can reverse and both take a turn in learning from and teaching each other. Michelle’s Venus Conjuncts Mike’s Jupiter (+0.61 harmony) – Michelle’s sense of sexuality, attraction, or intimacy combines with Mike’s spirit of growth, expansion, or generosity. Both enjoy the same pastimes, cultural activities, and other forms of entertainment. There is fusion in the relationship that brings out good qualities like optimism and self-confidence in each other. Mike’s Moon Trines Michelle’s Venus (+0.54 harmony) – Mike’s emotional needs combine very effortlessly with Michelle’s sense of sexuality, attraction, or intimacy. There is harmony in the deep mutual devotion and affection in each other. Michelle’s cuteness charms Mike’s soul. Both are in agreement on creative undertakings and social engagements. Mike and Michelle can easily forgive each other on minor conflicts. This aspect boosts a strong physical attraction for love and marriage. Mike’s Mars Sextiles Michelle’s Neptune (+0.35 harmony) – Mike’s sexual drive, temper, and powers of self-assertion combine pleasantly with Michelle’s sense of spirituality, imagination, or mystical inclination. The initiative of Mike stimulates the sacrificial tendency in Michelle. Mike and Michelle will support each other to a significant degree, both emotionally and creatively. Mike’s Jupiter Conjuncts Michelle’s Jupiter (+0.06 harmony) – The individual sense of growth, expansion, or generosity combines with ease within the couple. Mike and Michelle’s ideals and beliefs are aligned. Both appreciate each other’s good qualities. Learning and education are essential in the relationship. The relationship encourages optimism, self-confidence, and humor. Mike’s Pluto Conjuncts Michelle’s Pluto (neutral) – The individual sense of transformation, change, or power and destiny combine with ease within the couple. Mike and Michelle enjoy the same cultural references. Michelle and Mike have a great time talking about the good old days since both came from the same generation. Michelle’s Uranus Conjuncts Mike’s Pluto (neutral) – Michelle’s sense of independence, freedom, and originality may combine or resist with Mike’s sense of transformation, change, or power and destiny. The intensity will depend on other factors of the relationship. This is favorable if Michelle and Mike have more aspects in harmony than in discord. Mike’s Uranus Conjuncts Michelle’s Uranus (neutral) – The individual sense of independence, freedom, and originality combine with ease between the couple. Both Mike and Michelle complement each other’s individuality and independence. There is mutual appreciation in the relationship. Both bring out the eccentric side of one another. Mike’s Neptune Conjuncts Michelle’s Neptune (neutral) – The individual sense of spirituality, imagination, or mysticism combines with ease within the couple. Both Mike and Michelle share the same tastes in art, music, or religion. The relationship encourages positive traits of creativity and dreaminess. It also has the tendency to promote negative characteristics of laziness or indecisiveness in Mike or Michelle. Mike’s Moon Conjuncts Michelle’s Pluto (neutral) – Mike’s emotional needs combine with Michelle’s sense of transformation, change, or power and destiny. The fusion can be either very good or very bad depending on other aspects of the relationship. There is a powerful physical attraction between Michelle and Mike. Michelle expands the ideas, imagination, and viewpoints of Mike. Sometimes Mike will find Michelle to be possessive, jealous, and domineering. Mike’s Moon Conjuncts Michelle’s Uranus (neutral) – Mike’s emotional needs combine with Michelle’s sense of independence, freedom, and originality. The fusion excites mutual interest and is intellectually stimulating. There’s a degree of spontaneous, unexpected, and magnetic attraction linking Mike and Michelle. Boredom is never a problem in the relationship. Sometimes Mike’s traditional attitude clashes with Michelle’s odd behavior. The union arouses romantic feelings that can be temporary unless other harmonious aspects support it. Mike’s Uranus Conjuncts Michelle’s Pluto (neutral) – Mike’s sense of independence, freedom, and originality may combine or resist with Michelle’s sense of transformation, change, or power and destiny. The intensity will depend on other factors of the relationship. This is favorable if Mike and Michelle have more aspects in harmony than in discord. Michelle’s Moon Squares Mike’s Jupiter (-0.19 discord) – Michelle’s emotional needs interact stressfully with Mike’s sense of growth, expansion, or generosity. It’s common to have disagreements about religion, finances, and family matters. The friction between Michelle and Mike is not enough to create serious difficulty in the relationship. Michelle may feel uncomfortable when Mike misunderstands a passing mood. Mike may make extravagant pledges making Michelle to expect too much and be disappointed when the promises are broken. Michelle’s Jupiter Opposes Mike’s Neptune (-0.79 discord) – Michelle’s sense of growth, expansion, or generosity confronts and challenges Mike’s sense of spirituality, imagination, or mystical inclination. There is tension in spiritual or philosophical beliefs. The relationship has the tendency to encourage bad habits of extravagance, gambling, or laziness. Michelle’s Mars Conjuncts Mike’s Pluto (-0.85 discord) – A delicate combination of Michelle’s sexual drive, temper, and powers of self-assertion with Mike’s sense of transformation, change, or power and destiny. There is resistance to the display of authority by the other. Both can be vindictive toward each other. The relationship is extremely competitive for Michelle and Mike. Mike’s Venus Squares Michelle’s Venus (-1.03 discord) – The individual sense of sexuality, attraction, or intimacy interacts stressfully within the couple. Both have different romantic styles. There is friction in the different way each other expresses affection. Agreement on financial matters can be complicated. Both will occasionally challenge each other about morality, social life, or cultural sentiments. This can become a tense and uncomfortable relationship but with an active element of attraction. Mike’s Moon Conjuncts Michelle’s Mars (-1.25 discord) – Mike’s emotional needs combine with Michelle’s sexual drive, temper, and powers of self-assertion. Michelle arouses the imagination and instinctual mind of Mike. This aspect stimulates physical attraction between opposite sex. The attraction between Mike and Michelle will be healthy if other aspects of the relationship are generally harmonious. Sometimes the aggressive nature of Michelle can be unbearable to the emotional character of Mike. Both Michelle and Mike are intimate and dynamic in supporting each other. Mike’s Mercury Squares Michelle’s Jupiter (-1.46 discord) – Mike’s mentality and powers of perception interact stressfully with Michelle’s sense of growth, expansion, or generosity. There is friction in the exchange of ideas in the relationship. Mike will seem petty to Michelle. Michelle might promise more than can be delivered. This is not a serious conflict if there are many harmonious aspects to the relationship. Michelle’s Mars Conjuncts Mike’s Uranus (-1.86 discord) – Michelle’s sexual drive, temper, and powers of self-assertion can combine with Mike’s sense of independence, freedom, and originality. There is a massive potential for success if the individual ambitions and goals are the same. If not, it will make cooperation difficult. The relationship brings out the aggressive and independent spirit in each other. Mike’s Sun Squares Michelle’s Neptune (-2.42 discord) – Mike’s sense of identity, ego, will, and character interact stressfully with Michelle’s sense of spirituality, imagination, or mystical inclination. The friction between Mike and Michelle can cause misunderstanding, doubt, confusion, distrust, deception, and sometimes infidelity. There is a lack of trust in the relationship. Michelle can be elusive, misleading, or even deceptive towards Mike. Mike’s Sun Opposes Michelle’s Uranus (-2.67 discord) – Mike’s sense of identity, ego, will, and character confront and challenge Michelle’s sense of independence, freedom, and originality. There is tension in the selfish nature of Mike and the independent nature of Michelle. Both are out of touch with the need for space in the relationship. The bond that initially attracted Michelle and Mike together becomes a confusing tug of war between togetherness and individuality. Michelle’s Jupiter Squares Mike’s Saturn (-3.91 discord) – Michelle’s sense of growth, expansion, or generosity interacts stressfully with Mike’s sense of commitment, necessity, or duty. There is friction in Mike’s view of responsibility and Michelle’s dreams of expansion. Mike places too much responsibility on Michelle. Michelle feels confined and frustrated. Mike’s Jupiter Opposes Michelle’s Neptune (-4.46 discord) – Mike’s sense of growth, expansion, or generosity confronts and challenges Michelle’s sense of spirituality, imagination, or mystical inclination. There is tension in spiritual or philosophical beliefs. The relationship has the tendency to encourage bad habits of extravagance, gambling, or laziness. Mike’s Saturn Conjuncts Michelle’s Saturn (-4.52 discord) – The individual sense of commitment, necessity, or duty combines with ease within the couple. Mike and Michelle share the same ideas regarding security and ambitions. Both want things to be the same way and can understand each other’s problems. This aspect can have a devitalizing effect if Mike and Michelle are a young couple who are doing the same wrong things together. Mike’s Venus Squares Michelle’s Neptune (-4.64 discord) – Mike’s sense of sexuality, attraction, or intimacy interacts stressfully with Michelle’s sense of spirituality, imagination, or mystical inclination. There may be a one-sided attraction between Mike and Michelle. There is likely to be a certain amount of confusion, deception, even evasion in one or both. Unfounded jealousies can cause friction and misinterpretation of each other’s attitudes toward the relationship. Mike’s Sun Squares Michelle’s Jupiter (-5.10 discord) – Mike’s sense of identity, ego, will, and character interact stressfully with Michelle’s spirit of growth, expansion, or generosity. Mike and Michelle have the tendency to encourage each other’s self-indulgence, extravagance, and recklessness. There is friction in individual ego, ambition, and belief. Both Michelle and Mike may see each other as demanding or overbearing. They expect too much from one another. Mike’s Mercury Squares Michelle’s Neptune (-5.70 discord) – Mike’s mentality and powers of perception interact stressfully with Michelle’s sense of spirituality, imagination, or mystical inclination. Michelle’s indulgence in random thoughts can cause confusion in Mike’s method of thinking. Both Mike and Michelle are capable of lying to each other. Michelle’s willful dishonesty can lead to misunderstanding and friction in the relationship. One or both may keep secrets about past relationships as a method of self-preservation. Mike’s Sun Opposes Michelle’s Mars (-5.97 discord) – Mike’s sense of identity, ego, will, and character confront and challenge Michelle’s sexual drive, temper, and powers of self-assertion. There is a competitive bond between Mike and Michelle. Tension and power struggle is typical in the relationship. Cooperation is difficult to achieve, and there is a tendency to fight over objectives. There is a natural level of irritation when Michelle and Mike are together. Mike’s Saturn Opposes Michelle’s Pluto (-6.89 discord) – Mike’s sense of commitment, necessity, or duty confronts and challenges Michelle’s sense of transformation, change, or power and destiny. There is tension in the relationship when Mike and Michelle compete for influence and dominance. Michelle may try to reform Mike’s strict and severe attitudes toward life. Mike’s conservative opinion weakens the inner energy of Michelle. Mike’s Saturn Opposes Michelle’s Uranus (-11.34 discord) – Mike’s sense of commitment, necessity, or duty confronts and challenges Michelle’s sense of independence, freedom, and originality. There is tension between Mike’s practicality and Michelle’s innovative nature. Mike wants solidarity while Michelle wants alteration. Michelle’s Saturn Opposes Mike’s Pluto (-12.80 discord) – Michelle’s sense of commitment, necessity, or duty confronts and challenges Mike’s sense of transformation, change, or power and destiny. There is tension in the relationship when Michelle and Mike compete for influence and dominance. Mike may try to reform Michelle’s strict and severe attitudes toward life. Michelle’s conservative opinion weakens the inner energy of Mike. Mike’s Moon Opposes Michelle’s Saturn (-15.20 discord) – Mike’s emotional needs confront and challenge Michelle’s sense of commitment, necessity, or duty. The tension can easily create misunderstanding between Michelle’s practicality and Mike’s emotions. Both have opposite ways of handling everything from finance, lifestyle, and stress. Mike resents Michelle’s constant discipline. Michelle is frustrated by the moody disposition of Mike. Michelle sees the conservative and safe side of any situation. Mike sees the intuitive and magical side. Michelle’s Saturn Opposes Mike’s Uranus (-19.65 discord) – Michelle’s sense of commitment, necessity, or duty confronts and challenges Mike’s sense of independence, freedom, and originality. There is tension between Michelle’s practicality and Mike’s innovative nature. Michelle wants solidarity while Mike wants alteration. Michelle’s Mars Opposes Mike’s Saturn (-24.33 discord) – Michelle’s sexual drive, temper, and powers of self-assertion confront and challenge Mike’s sense of commitment, necessity, or duty. There is tension in Michelle’s impulsive attitude and Mike’s instinct to be prudent. The relationship has many problems of adjustment. There are 4 mutual receptions in Mike and Michelle’s planet combinations. Planets in mutual reception enhance each other. This will add +40 harmony to the total score. The remaining -13.00 discord is due to some minor aspects or planets in parallel. Mike and Michelle don’t let the discordant aspects become a discouragement. It merely indicates the level of difficulty, but it’s not impossible to overcome. A firm determination can overcome any obstacle no matter how big it is. As the saying goes “love can conquer all.” This is only a quick assessment of the relationship compatibility between Mike and Michelle. If both place and time of births are known, an in-depth interpretation is available in the Star Lovers Report. Try a free sample with no obligation to buy. Are you an astrology enthusiast? You can learn more about the Love Match Project including the resouces used in creating the program. Ssshhh! Mike, don’t let Michelle know. You are most compatible with a person born on January 11, 1994. You have a whooping birthday love match score of +247 with that person. Check it out and imagine what it feels like to be with your soul mate. Quickly test the compatibility between two persons. Are they a match or not? Just enter their nicknames and birthdays. You’ll get a quick analysis of the different aspects of their relationship. The short interpretations are based on the influence of each planet on each other’s personality. In astrology this is often referred to as “Romantic Compatibility Analysis”. All fields are required. Nickames must contain letters only. No spaces, numbers, or special characters. For security and privacy reasons don’t give a full name. Nickname #1 Birthday #1 month January February March April May June July August September October November December day 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991 1990 1989 1988 1987 1986 1985 1984 1983 1982 1981 1980 1979 1978 1977 1976 1975 1974 1973 1972 1971 1970 1969 1968 1967 1966 1965 1964 1963 1962 1961 1960 1959 1958 1957 1956 1955 1954 1953 1952 1951 1950 1949 1948 1947 1946 1945 1944 1943 1942 1941 1940 1939 1938 1937 1936 1935 1934 1933 1932 1931 1930 1929 1928 1927 1926 1925 1924 1923 1922 1921 1920 1919 1918 1917 1916 1915 1914 1913 1912 1911 1910 1909 1908 1907 1906 1905 1904 1903 1902 1901 I have read the updated Privacy Policy and Terms of Service . I understand the results are publicly accessible to anyone. Just for fun! Try your love match score with anyone. Even officemates, schoolmates, or find out the score for your parents and relatives. Don’t limit yourself – you can even pair yourself with any celebrity. Just use the search bar to find out the birth date of any famous person. Do you know some lovey-dovey who needs a little push in their relationship? Tease them by sharing a Love Match ninja page! See what reaction they will have. Don’t know where to start? Try these famous celebrity couples and find out if their relationship will work or not. Justin Bieber & Hailey Baldwin Danica Patrick & Aaron Rodgers Tom Holland & Zendaya Brooke & Sam (+67) Malayna & Dre (+62) A & B (-29) Arshad & Ursa (+35) L & M (-27) Subodh & Nikita (+34) Sue & Jim (+21) Aks & Uns (-3)
cc/2019-30/en_middle_0012.json.gz/line1420
__label__cc
0.520799
0.479201
Colman-Egan launches 17 graduates into the world Members of the Colman-Egan Class of 2019 turn their tassels after receiving diplomas Saturday. More photos on page 2 of this week’s Moody County Enterprise. By: Brenda Wade Schmidt - Updated: 2 months ago While the senior year of high school is a lot of lasts, graduation brings out some first, said Garrett Satterly, a Colman-Egan graduate who share memories of the class of 2019. “Senior year is the last year we roam the hallways as students at Colman-Egan,” he said. “Today we wake up as students, but we go to sleep as graduates.” Satterly was one of 17 students to earn a diploma Saturday at the school’s commencement. The new alumni have plans for further school and the military. Honor students recognized included Madison Voelker with high honors and Riley Blissmer, Victoria Bryan, Satterly and Brooklyn Shafer with honors. Teacher and coach Chad Williamson told the students that as a class of millennials, they will have the opportunity for great things, even though they come with a generational stigma of being late to work, if they show up at all. “Prove them wrong. Be early; get your stuff done,” he said of their pursuit of their dreams. “It’s going to be hard. It’s never easy. I hate to tell you this but the easiest part of your life might be done.” Along the way, he asked them to remember to use their life skills. “Be a person that people will regret not getting to know better,” Williamson said. “Once you do get to know them, be a person they’re glad to get to know. “You talk about your last 13 years and how fun that was,” he said. “If you play your cards right, the next 13 will be even better.” Colman-Egan was the first high school in Moody County to graduate its seniors this spring. The Flandreau Indian School will honor 53 students at 10 a.m. today. The students represent the 42 tribes that attend the school and include seven students who are from Flandreau. Flandreau High School will hand out diplomas to 31 students on Saturday. The ceremony will begin at 2 p.m. in the school gym. Board passes school budget Colman-Egan graduation
cc/2019-30/en_middle_0012.json.gz/line1430
__label__wiki
0.609526
0.609526
Search results for "Japan" What happens with our pets when we’re not home? This movie continues the original movie with Max and his friends. Country: France, Japan, USA Genre: Action, Adventure, Comedy, Family, Mystery 23rd movie in the “Detective Conan” franchise. Genre: Action, Comedy, Drama, Mystery Husband and wife Gabe and Adelaide Wilson take their kids to their beach house expecting to unplug and unwind with friends. But as night descends, their serenity turns to tension and chaos when some shocking visitors arrive uninvited. Is It Wrong to Try to Pick Up Girls in a Dungeon? – Arrow of the Orion In the city of Orario, beneath an impossibly tall tower, lies the dungeon. Only adventurers who form partnerships with the gods themselves have any hope of defeating the monsters that lie within. But the dungeon is not the only place where monsters exist. Far from Orario, in the ruins of an ancient city, a new threat arises. To counter this… Genre: Action, Adventure, Comedy, Fantasy, Romance Kamen Rider Build NEW WORLD: Kamen Rider Cross-Z Kamen Rider Build NEW WORLD: Kamen Rider Cross-Z is a post-series V-Cinema film of Kamen Rider Build. It will focus on the character of Ryuga Banjo, Kamen Rider Cross-Z, along with Kamen Rider Prime Rogue. It was announced immediately following the broadcast of the final episode of Kamen Rider Build. The film will have a limited theatrical release in Japanese… Genre: Action, Adventure As Hiccup fulfills his dream of creating a peaceful dragon utopia, Toothless’ discovery of an untamed, elusive mate draws the Night Fury away. When danger mounts at home and Hiccup’s reign as village chief is tested, both dragon and rider must make impossible decisions to save their kind. When a devastating attack shatters Mark Hogancamp and wipes away all memories, no one expected recovery. Putting together pieces from his old and new life, Mark meticulously creates a wondrous town named Marwen where he can heal and be heroic. As he builds an astonishing art installation — a testament to the most powerful women he knows — through his… Genre: Comedy, Drama, Fantasy Earth is peaceful following the Tournament of Power. Realizing that the universes still hold many more strong people yet to see, Goku spends all his days training to reach even greater heights. Then one day, Goku and Vegeta are faced by a Saiyan called ‘Broly’ who they’ve never seen before. The Saiyans were supposed to have been almost completely wiped… The Grinch hatches a scheme to ruin Christmas when the residents of Whoville plan their annual holiday celebration. Country: China, France, Japan, USA Genre: Comedy, Family, Fantasy Godzilla: The Planet Eater With no means for defeating Godzilla Earth, mankind watches as King Ghidorah, clad in a golden light, descends on the planet. The heavens and earth shake once again as the war moves to a higher dimension. : 7.4 (115,028) A look at the life of the astronaut, Neil Armstrong, and the legendary space mission that led him to become the first man to walk on the Moon on July 20, 1969. Okko’s Inn 12-year-old Oriko Seki, who lost her parents in a car accident, ended up living in her grandmother’s Onsen Ryokan “Haru no Ya.” With the ghost “Uribou” cohabitating with her and all the other odds, she ended up training to be a young female innkeeper. At first, she didn’t like the training, but gradually felt her admiration for her title and… All Might and Deku accept an invitation to go abroad to a floating and mobile manmade city, called ‘I Island’, where they research quirks as well as hero supplemental items at the special ‘I Expo’ convention that is currently being held on the island. During that time, suddenly, despite an iron wall of security surrounding the island, the system is… The movie follows a 4-year old boy who is struggling to cope with the arrival of a little sister in the family until things turn magical. A mysterious garden in the backyard of the boy’s home becomes a gateway allowing the child to travel back in time and encounter his mother as a little girl and his great-grandfather as a… High school student Ichigo Kurosaki lives an ordinary life, besides being able to see ghosts and the blurry memories of his mother death under strange circumstances when he was a kid. His peaceful world suddenly breaks as he meets Rukia Kuchiki, a God of Death. Pokémon the Movie: The Power of Us Every year the citizens of Fura City celebrate a Wind Festival. Where people live together with the wind. Long Ago, on the final day of the festival the Legendary Pokemon Lugia and bestow the blessings of the wind upon the people. This Film Focuses on Everyone’s Story. from Lisa, a high school girl who is just starting out as a… After one of their shoplifting sessions, Osamu and his son come across a little girl in the freezing cold. At first reluctant to shelter the girl, Osamu’s wife agrees to take care of her after learning of the hardships she faces. Although the family is poor, barely making enough money to survive through petty crime, they seem to live happily… Godzilla: City on the Edge of Battle Humanity’s desperate battle to reclaim the Earth from Godzilla continues. The key to defeating the King of the Monsters may be Mechagodzilla, a robotic weapon thought to have been lost nearly 20,000 years ago. Digimon Adventure Tri. – Chapter 6: Future The world has begun to collapse. The rampaging Meicoomon absorbs Tailmon, who underwent a dark evolution, and changes form into the immensely powerful Ordinemon. In accordance with Yggdrasil’s expectation, the real world is about to be engulfed by the Digital World. Meanwhile, Homeostasis considers Ordinemon to be out of control and puts into motion its final plan that will entangle… Pup Star: World Tour PUP STAR is back, with an all-new movie that takes the popular singing dogs on trip around the world, where Tiny and friends find fantastic new songs and meet exciting new canine singers that prove music really is the universal language. Country: Canada, Japan, USA Genre: Comedy, Family, Music Shaun Russell takes her son and daughter on a weekend getaway to her late father’s secluded, high-tech vacation home in the countryside. The family soon gets an unwelcome surprise when four men break into the house to find hidden money. After managing to escape, Shaun must now figure out a way to turn the tables on the desperate thieves and… Batman Ninja Gorilla Grodd’s time displacement machine transports many of Batman’s worst enemies to feudal Japan, along with the Dark Knight and a few of his allies. Detective Conan: Zero the Enforcer After a sudden explosion at Edge of Ocean island in Tokyo, Tōru Amuro, codename Zero, begins to investigate. Meanwhile, private eye Kogorō is arrested as a suspect, so Conan Edogawa conducts his own investigation to prove his innocence, but Amuro stands in his way. Genre: Action, Crime, Drama, Mystery Do You Trust this Computer? Science fiction has long anticipated the rise of machine intelligence, and today a new generation of self-learning computers has begun to reshape every aspect of our lives. Will A.I. usher in an age of unprecedented potential, or prove to be our final invention? Pacific Rim: Uprising It has been ten years since The Battle of the Breach and the oceans are still, but restless. Vindicated by the victory at the Breach, the Jaeger program has evolved into the most powerful global defense force in human history. The PPDC now calls upon the best and brightest to rise up and become the next generation of heroes when… Country: China, Japan, UK, USA Dive into the hidden industry of digital cleaning, which rids the Internet of unwanted violence, porn and political content. Who is controlling what we see…and what we think? Country: Austria, Brazil, Canada, Denmark, Germany, Italy, Japan, Netherlands, Sweden, Switzerland, UK, USA Maquia: When the Promised Flower Blooms A story of encounters and partings interwoven between people; this is a human drama with feelings that touch one’s heart gradually, which everyone has experienced at least once. Hard-working Yuria runs a small printing company. Despite her best efforts, she can’t seem to attract the attention of Kazunari, a polite yet aloof client who is more interested in flirting with Mako, Yuria’s ditzy younger sister and employee. Meanwhile, Kazunari has his hands full with Takuji, his rough-hewn brother who was recently released from prison and is crashing at… Oh Lucy! A lonely, chain-smoking office lady in Tokyo falls for her teacher when she decides to take English lessons. When her teacher disappears, she sets out on a journey to find him. Colors of Wind Yuri leaves Ryo with mysterious words. Ryo goes to Hokkaido knowing that his doppelganger magician is missing. Ryo realizes Yuri was also the magician’s lover and he learns magic. The story that crosses over two identities, illusion and magic. GARO: Fang of God Ryuga Dogai returns to investigate a new mystery – the theft of Makai Knights armour. Among the victims are Ryuga’s old comrades from the Volcity crisis, Takeru and Aguri. The three will face off against an enemy previously though defeated – Zinga. Genre: Action, Drama, Horror Two alchemist brothers go on a quest for the Philosopher’s Stone after an attempt to revive their dead mother goes horribly wrong. Hey Arnold! The Jungle Movie An upcoming two-hour American animated television film split into two parts. Based on Craig Bartlett’s Hey Arnold! TV series, it will serve as a sequel to the series finale in which Arnold found his father’s journal and read about the life of his scientist parents, including their first meeting, birthing him, and a map showing the route they took to… Country: Japan, South Korea, USA Genre: Adventure, Comedy Godzilla: Planet of the Monsters In the year 2048, the human race is forced to leave Earth after decades of losing against Godzilla and other giant monsters. They take a twenty-year journey to another planet called Tau Ceti-e, but upon arrival, they discover that the planet has become uninhabitable. As living conditions on their ship deteriorate, a young man named Haruo spearheads a movement to… Ten years after his retirement, ‘death-match’ wrestler Nick Mondo is distressed to find a new generation mimicking his former self destructive antics. Outrage Coda Ôtomo gets involved with new Yakuza battles after he comes back the Yakuza society. Blade Runner: Black Out 2022 This animated short revolves around the events causing an electrical systems failure on the west coast of the US. According to Blade Runner 2049’s official timeline, this failure leads to cities shutting down, financial and trade markets being thrown into chaos, and food supplies dwindling. There’s no proof as to what caused the blackouts, but Replicants — the bio-engineered robots… Three American tourists follow a mysterious map deep into the jungles of Japan searching for an ancient temple. When spirits entrap them, their adventure quickly becomes a horrific nightmare. Genre: History, Horror
cc/2019-30/en_middle_0012.json.gz/line1435
__label__wiki
0.862488
0.862488
Cisco MediaSense Release 9.1(1) Cisco Cisco MediaSense Release 9.1(1) Licensing Information Open Source Used In Cisco MediaSense 11.5(1) 1 Open Source Used In Cisco MediaSense 11.5(1) Cisco Systems, Inc. Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-101596850 1 2 3 … 6316 Cisco Cisco MediaSense Release 9.1(1) Summary of Contents of licensing information for Cisco Cisco MediaSense Release 9.1(1) Page 1 Open Source Used In Cisco MediaSense 11.5(1) Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses,... Page 2 This document contains licenses and notices for open source software used in this product. With respect to the free/open... Page 3 1.13.1 Available under license 1.14 Apache Commons Digester 1.8.1 1.14.1 Available under license 1.15 Apache Commons EL 1 1.15.1... Page 4 1.31.1 Available under license 1.32 at 3.1.10 :43.el6 1.32.1 Available under license 1.33 atk 1.30.0 :1.el6 1.33.1 Available under... Page 5 1.51 bind 9.8.2 :0.30.rc1.el6_6.2 1.51.1 Available under license 1.52 bind 9.8.2 :0.23.rc1.el6_5.1 1.52.1 Available under license 1.53 binutils 2.20.51.0.2... Page 6 1.70.1 Available under license 1.71 commons-beanutils 1.8.0 :DUPLICATE 1.71.1 Available under license 1.72 commons-cli 1.0 1.72.1 Notifications 1.72.2 Available... Page 7 1.89.1 Available under license 1.90 cronie 1.4.4 :7.el6 1.90.1 Available under license 1.91 cronie 1.4.4 :12.el6 1.91.1 Available under... Page 8 1.108.1 Available under license 1.109 dbus-glib_GPLv2 0.86 :6.el6_4 1.109.1 Available under license 1.110 dbus-python 0.83.0 :6.1.el6 1.110.1 Available under... Page 9 1.128 e2fsprogs 1.41.12 :21.el6 1.128.1 Available under license 1.129 e2fsprogs-lib 1.41.9 1.129.1 Available under license 1.130 e2fsprogs_lgpl 1.41.12 :11.el6... Page 10 1.147.1 Available under license 1.148 findutils 4.4.2 :6.el6 1.148.1 Available under license 1.149 fipscheck 1.2.0 :7.el6 1.149.1 Available under... Page 11 1.167 gdk-pixbuf2 2.24.1 :5.el6 1.167.1 Available under license 1.168 glib2 2.28.8 :Jun 5 2011 Matthias Clasen 1.168.1 Available under... Page 12 1.186.1 Available under license 1.187 grub 0.97 :93.el6 1.187.1 Available under license 1.188 grub 0.97 :75.el6 1.188.1 Available under... Page 13 1.206 hmaccalc 0.9.12 :2.el6 1.206.1 Available under license 1.207 httpclient 4.3.2 1.207.1 Available under license 1.208 httpcore 4.3.1 1.208.1... Page 14 1.225.1 Available under license 1.226 Jakarta ECS 1.4.2 1.226.1 Notifications 1.226.2 Available under license 1.227 jakarta-taglibs 1.1.2 1.227.1 Available... Page 15 1.244.1 Available under license 1.245 jquery.mousewheel 3.1.6 1.245.1 Available under license 1.246 jquery.placeholder 3.0.2 1.246.1 Available under license 1.247... Page 16 1.264 ksh 20120801 :21.el6 1.264.1 Available under license 1.265 ksh 20100621 :16.el6 1.265.1 Available under license 1.266 less 436... Page 17 1.283.1 Available under license 1.284 libgpg-error 1.7 :4.el6 1.284.1 Available under license 1.285 libICE 1.0.6 :1.el6 1.285.1 Available under... Page 18 1.302.1 Available under license 1.303 libsrtp 1.5.3 1.303.1 Available under license 1.304 libssh2 1.4.2 :2.el6_7.1 1.304.1 Available under license... Page 19 1.322 libuuid 2.17.2 :12.9.el6 1.322.1 Available under license 1.323 libX11 1.6.0 :2.2.el6 1.323.1 Available under license 1.324 libX11 1.3... Page 20 1.341.1 Available under license 1.342 libXi 1.3 :3.el6 1.342.1 Available under license 1.343 libXinerama 1.1 :1.el6 1.343.1 Available under... Page 21 1.361 Log4j 1.2.12 1.361.1 Available under license 1.362 Log4j 1.2.16 1.362.1 Available under license 1.363 logrotate 3.7.8 :17.el6 1.363.1... Page 22 1.379.1 Available under license 1.380 mdadm 3.3 :6.el6 1.380.1 Available under license 1.381 mdadm 3.2.2 :9.el6 1.381.1 Available under... Page 23 1.399 net-tools 1.60 :110.el6_2 1.399.1 Available under license 1.400 newt 0.52.11 :3.el6 1.400.1 Available under license 1.401 nspr 4.10.2... Page 24 1.418.1 Available under license 1.419 numactl 2.0.9 :2.el6 1.419.1 Available under license 1.420 OpenJpa 2.2.0 1.420.1 Available under license... Page 25 1.436.1 Available under license 1.437 openswan 2.6.32 :27.2.el6_5 1.437.1 Available under license 1.438 openswan 2.6.32 :37.el6 1.438.1 Available under... Page 26 1.456 pcre 7.8 :3.1.el6 1.456.1 Available under license 1.457 perl 5.10.1 :130.el6_4 1.457.1 Available under license 1.458 pflogsumm 1.1.1... Page 27 1.475.1 Available under license 1.476 postfix 2.6.6 :2.2.el6_1 1.476.1 Available under license 1.477 procps 3.2.8 :30.el6 1.477.1 Available under... Page 28 1.495 readline 6.0 :3.el6 1.495.1 Available under license 1.496 readline 6.0 :4.el6 1.496.1 Available under license 1.497 redhat-release-server 6Server... Page 29 1.514 setools 3.3.7 :4.el6 1.514.1 Available under license 1.515 setroubleshoot 3.0.47 :6.el6 1.515.1 Available under license 1.516 setroubleshoot-plugins 3.0.40... Page 30 1.533.1 Available under license 1.534 squashfs-tools 4.0 :5.el6 1.534.1 Available under license 1.535 sshfs-fuse 2.3 :1 1.535.1 Available under... Page 31 1.553 syslog-ng 3.2.5 :3.el6 1.553.1 Available under license 1.554 syslog-ng_modules 3.2.5 :3.el6 1.554.1 Available under license 1.555 sysstat 9.0.4... Page 32 1.572.1 Available under license 1.573 tomcat 7.0.64 1.573.1 Available under license 1.574 Tomcat 7.0.59 1.574.1 Available under license 1.575... Page 33 1.592 uri.js 1.10.1 1.592.1 Available under license 1.593 usbutils 003 :4.el6 1.593.1 Available under license 1.594 usermode 1.102 :3.el6... Page 34 1.611 xml-commons-resolver 1.1 :4.18.el6 1.611.1 Notifications 1.611.2 Available under license 1.612 xmlstarlet 1.0.1 1.612.1 Available under license 1.613 XStream... Page 35 Copyright 1988, 1989, 1991, 1992 by Carnegie Mellon University All Rights Reserved Permission to use, copy, modify, and distribute... Page 36 config.guess config.sub ----------------------------- GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc.... Page 37 that everyone understands that there is no warranty for this free software. If the software is modified by someone... Page 38 distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of... Page 39 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written... Page 40 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a... Page 41 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to... Page 42 If you develop a new program, and you want it to be of the greatest possible use to the... Page 43 <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit... Page 44 distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone... Page 45 2. You may modify your copy or copies of the Program or any portion of it, thus forming a... Page 46 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections... Page 47 Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,... Page 48 those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this... Page 49 How to Apply These Terms to Your New Programs If you develop a new program, and you want it... Page 50 Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James... Page 51 THE PART OF OCI OR ANY OF ITS SUBSIDIARIES OR AFFILIATES TO ASSIST IN ITS USE, CORRECTION, MODIFICATION OR... Page 52 Copyright and Licensing Information for ACE(TM), TAO(TM), CIAO(TM), DAnCE(TM), and CoSMIC(TM) [1]ACE(TM), [2]TAO(TM), [3]CIAO(TM), DAnCE(TM), and [4]CoSMIC(TM) (henceforth referred... Page 53 students be liable for any lost revenue or profits or other special, indirect and consequential damages. DOC software is... Page 54 12. http://www.cs.wustl.edu/~schmidt/ACE.html 13. http://www.cs.wustl.edu/~schmidt/TAO.html 14. http://www.dre.vanderbilt.edu/CIAO/ 15. http://www.dre.vanderbilt.edu/~schmidt/DOC_ROOT/DAnCE/ 16. http://www.dre.vanderbilt.edu/cosmic/ 17. http://www.dre.vanderbilt.edu/ 18. http://www.isis.vanderbilt.edu/ 19. http://www.cs.wustl.edu/~schmidt/doc-center.html 20. http://www.cs.wustl.edu/~schmidt/commercial-support.html 21.... Page 55 that is built using DOC software. Note, however, that you may not misappropriate the DOC software code, such as... Page 56 be used to endorse or promote products or services derived from this source without express written permission from Washington... Page 57 Files: MPC/* Copyright: 2003-2006 OCI. St. Louis MO USA License: other-BSD MPC (Licensed Product) is protected by copyright, and... Page 58 RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY LICENSED PRODUCT OR ANY PART THEREOF. IN... Page 59 not authorized to license or distribute it to anyone else except as part of a product or program developed... Page 60 Files: TAO/tao/DynamicInterface/Unknown_User_Exception.h TAO/tao/DynamicInterface/ExceptionList.h TAO/tao/DynamicInterface/Request.h TAO/tao/DynamicInterface/Server_Request.h TAO/tao/default_ports.h TAO/tao/Stub.h TAO/tao/corba.h TAO/tao/GIOP_Message_Base.h TAO/tao/Stub.cpp TAO/tao/Object.h TAO/tao/TAO_Server_Request.h TAO/tao/CDR.h TAO/tao/orbconf.h TAO/tao/AnyTypeCode/Marshal.cpp TAO/tao/AnyTypeCode/append.cpp TAO/tao/AnyTypeCode/NVList.h TAO/tao/Object.cpp TAO/tao/Principal.h... Page 61 one. However, any uses other than the foregoing uses shall require the express written consent of Sun Microsystems, Inc.... Page 62 Copyright: 2001-2004 Unicode, Inc. License: other Limitations on Rights to Redistribute This Code Unicode, Inc. hereby grants the right... Page 63 copyright or ownership. In addition, submitters acknowledge that any such submission might become part of the copyright maintained on... Page 64 /*=================================================================== Copyright (c) 1996 Hewlett-Packard Company ATTENTION: USE OF THIS SOFTWARE IS SUBJECT TO THE FOLLOWING TERMS. Permission to... Page 65 in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be given in... Page 66 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN... Page 67 modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above... Page 68 may copy and extend functionality (but may not remove functionality) of the Interface Definition Language CFE without charge, but... Page 69 SunOS, SunSoft, Sun, Solaris, Sun Microsystems or the Sun logo are trademarks or registered trademarks of Sun Microsystems, Inc.... Page 70 Sun, Sun Microsystems and the Sun logo are trademarks or registered trademarks of Sun Microsystems, Inc. SunSoft, Inc. 2550... Page 71 THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR ARISING FROM A COURSE OF DEALING,... Page 72 You may copy, modify, distribute, or sublicense the LICENSED PRODUCT without charge as part of a product or software... Page 731.2 acl 2.2.49 :6.el6 1.2.1 Available under license : /* File: acl_create_entry.c Copyright (C) 1999, 2000 Andreas Gruenbacher <a.gruenbacher@bestbits.at> This... Page 74 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of... Page 75 there is no warranty for the free library. Also, if the library is modified by someone else and passed... Page 76 operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less... Page 77 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in... Page 78 this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part... Page 79 However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of... Page 80 executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in... Page 81 based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the... Page 82 and the section as a whole is intended to apply in other circumstances. It is not the purpose of... Page 83 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT... Page 84 You should have received a copy of the GNU Lesser General Public License along with this library; if not,... Page 85 distribute copies of the software, or if you modify it. For example, if you distribute copies of such a... Page 86 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any... Page 87 collective works based on the Program. In addition, mere aggregation of another work not based on the Program with... Page 88 void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from... Page 89 to distribute software through any other system and a licensee cannot impose that choice. This section is intended to... Page 90 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE... Page 91 The hypothetical commands 'show w' and 'show c' should show the appropriate parts of the General Public License. Of... Page 92 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is... Page 93 patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in... Page 94 whole or in part contains or is derived from the Program or any part thereof, to be licensed as... Page 95 customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to... Page 96 this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any... Page 97 specifies a version number of this License which applies to it and "any later version", you have the option... Page 98 the "copyright" line and a pointer to where the full notice is found. <one line to give the program's... Page 99 Public License instead of this License. 1.4 acpid 1.0.10 :2.1.el6 1.4.1 Available under license : GNU GENERAL PUBLIC LICENSE... Page 100 Also, for each author's protection and ours, we want to make certain that everyone understands that there is no... Page 101 of it, thus forming a work based on the Program, and copy and distribute such modifications or work under... Page 102 source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily... Page 103 the Program or works based on it. 6. Each time you redistribute the Program (or any work based on... Page 104 the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised... Page 105 If you develop a new program, and you want it to be of the greatest possible use to the... Page 106 <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit... Page 107 "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as... Page 108 institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or... Page 109 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by... Page 110 APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach... Page 111 "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND... Page 112 ========================================================================= == jmdns is licensed under the Apache License Version 2.0 == ========================================================================= ========================================================================= == For the mx4j, mx4j-remote,... Page 113 ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY... Page 114 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation... Page 115 the documentation and/or other materials provided with the distribution. Neither the name of XStream nor the names of its... Page 116 1.4. â&#128;&#156;Executableâ&#128; means the Covered Software in any form other than Source Code. o 1.5. â&#128;&#156;Initial Developerâ&#128; means the... Page 117 cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than... Page 118 + (c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or... Page 119 offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability... Page 120 may create and use a modified version of this License if You: (a) rename the license and remove any... Page 121 CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY... Page 122 Copyright 2005-2008 The Apache Software Foundation This product includes software developed by The Apache Software Foundation (http://www.apache.org/). ========================================================================= ==... Page 123 == MX4J Notice == ========================================================================= This product includes software developed by the MX4J project (http://sourceforge.net/projects/mx4j). ============================================================== Jetty Web Container... Page 124 For other details please see the README.txt file. Apache ActiveMQ Copyright 2005-2006 The Apache Software Foundation This product includes... Page 125 Some portions of the code are Copyright: 2006 Tim Vernum 1999 Jason Gilbert. The jboss integration module contains some... Page 126 This product includes software developed by JiveSoftware (http://www.igniterealtime.org/). ========================================================================= == Woodstox Notice (http://woodstox.codehaus.org) == ========================================================================= This product currently only... Page 127 ========================================================================= == Spring Notice == ========================================================================= This product includes software developed by the Apache Software Foundation (http://www.apache.org). This product... Page 128 ========================================================================= == Derby Notice == ========================================================================= Portions of Derby were orginally developed by International Business Machines Corporation and are... Page 129 ============================================================== Jetty Web Container Copyright 1995-2006 Mort Bay Consulting Pty Ltd ============================================================== This product includes some software developed at... Page 130 entirety in unmodified form, along with a number of other contributions, constituting separate and independent works in themselves, are... Page 131 rights include the right to make such modifications as are technically necessary to exercise the rights in other media... Page 132 DAMAGES. 7. Termination 1. This License and the rights granted hereunder will terminate automatically upon any breach by You... Page 133 This software was generated using XSDs from the Jabber Software Foundation http://www.xmpp.org/schemas/ Copyright (c) 1999-2006 The Jabber Software Foundation... Page 134 Copyright (c) 1999-2006 The Jabber Software Foundation http://www.xmpp.org/about/copyright.shtml These XSD files are licensed under the Creative Commons License 2.5... Page 135 notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright... Page 136 Foundation (http://www.apache.org/). The javax.servlet package used by Jetty is copyright Sun Microsystems, Inc and Apache Software Foundation. It is... Page 137 can use it too, but we suggest you first think carefully about whether this license or the ordinary General... Page 138 libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library,... Page 139 program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed... Page 140 a) The modified work must itself be a software library. b) You must cause the files modified to carry... Page 141 instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License... Page 142 work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if... Page 143 d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent... Page 144 distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this... Page 145 original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those... Page 146 SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS... Page 147 # Copyright (C) 1994 X Consortium # # Permission is hereby granted, free of charge, to any person obtaining... Page 148 # distribute this file as part of a program that contains a # configuration script generated by Autoconf, you... Page 149 the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of... Page 150 means either the Program or any derivative work under copyright law: that is to say, a work containing the... Page 151 These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived... Page 152 form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,... Page 153 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the... Page 154 NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO... Page 155 You should have received a copy of the GNU General Public License along with this program; if not, write... Page 156 * capture and playback. This latency is measured from driver (diff when * playback and capture was started). Scheduler... Page 157 These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify... Page 158 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any... Page 159 exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere... Page 160 otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this... Page 161 system; it is up to the author/donor to decide if he or she is willing to distribute software through... Page 162 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR... Page 163 under certain conditions; type 'show c' for details. The hypothetical commands 'show w' and 'show c' should show the... Page 164 * outstanding shares, or (iii) beneficial ownership of such entity. * * "You" (or "Your") shall mean an individual... Page 165 * copyright license to reproduce, prepare Derivative Works of, * publicly display, publicly perform, sublicense, and distribute the *... Page 166 * do not modify the License. You may add Your own attribution * notices within Derivative Works that You... Page 167 * 9. Accepting Warranty or Additional Liability. While redistributing * the Work or Derivative Works thereof, You may choose... Page 168 Recherche en Informatique et en Automatique</a>, <a href= "http://www.keio.ac.jp/">Keio University</a>). All Rights Reserved. http://www.w3.org/Consortium/Legal/ This W3C work (including software,... Page 169 This formulation of W3C's notice and license became active on August 14 1998 so as to improve compatibility with... Page 170 * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with... Page 171 Copyright 1999-2006 The Apache Software Foundation This product includes software developed by The Apache Software Foundation (http://www.apache.org/). This product... Page 172 C. Any new file that is contributed or otherwise made available under the terms of this License. 1.10. Original... Page 173 from the Contributor Version; (2)"for infringements caused by: (i)"third party modifications of Contributor Version, or (ii)"the combination of Modifications... Page 174 License and distribute the Larger Work as a single product. In such a case, You must make sure the... Page 175 and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer... Page 176 regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make... Page 177 "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not... Page 178 where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their... Page 179 for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies... Page 180 of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the... Page 181 The person or persons who have associated work with this document (the "Dedicator" or "Certifier") hereby either (a) certifies... Page 182 * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce... Page 1831.11.1 Available under license : Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION... Page 184 "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions... Page 185 (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c)... Page 186 agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS,... Page 187 you may not use this file except in compliance with the License. You may obtain a copy of the... Page 188 byte[] decode(byte[] pArray) throws DecoderException; } The commons-codec team is pleased to announce the Codec 1.3 release! http://jakarta.apache.org/commons/codec/ The... Page 189 o This version is relesed under the Apache License 2.0 , please see LICENSE.txt. Previous versions were released under... Page 191 cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct... Page 192 any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms... Page 193 To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets... Page 194 direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or... Page 195 this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce,... Page 196 wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do... Page 197 has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work... Page 198 * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may... Page 199 including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form... Page 200 worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer... Page 201 You may add Your own copyright statement to Your modifications and may provide additional or different license terms and... Page 202 of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any... Page 203 * reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted... Page 204 * */ 1.16 Apache Commons FileUpload 1.3.1 1.16.1 Available under license : /\*\s* \*\s*Licensed to the Apache Software Foundation... Page 205 "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation... Page 206 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to... Page 207 as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or... Page 208 License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility,... Page 209 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1... Page 210 means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not... Page 211 attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part... Page 212 appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this... Page 213 distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either... Page 214 "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from)... Page 215 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with... Page 216 with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks,... Page 217 comment syntax for the file format. We also recommend that a file or class name and description of purpose... Page 218 TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use,... Page 219 the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication... Page 220 that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those... Page 221 PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any... Page 222 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an... Page 223 License Agreement", informally known as the "Intel Harmony CLA". ========================================================================= The Derby build relies on source files supplied by... Page 224 Apache Xalan (Xalan XSLT processor) Copyright 1999-2006 The Apache Software Foundation Apache Xalan (Xalan serializer) Copyright 1999-2006 The Apache... Page 225 Apache Xerces Java Copyright 1999-2006 The Apache Software Foundation This product includes software developed at The Apache Software Foundation... Page 226 * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the... Page 2271.21 Apache Log4j Project 1.2.11 1.21.1 Available under license : Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS... Page 228 separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.... Page 229 (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and... Page 230 origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by... Page 231 Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use... Page 232 OGNL is the creation of Luke Blanshard and Drew Davidson. Copyright ) 1997-2003, Drew Davidson and Luke Blanshard. All... Page 233 or other dealings in this Software without prior written authorization of the copyright holder. Apache License Version 2.0, January... Page 235 Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices... Page 236 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and... Page 237 http://www.slf4j.org/ Data compression support is provided by the JZLib library package, which is open source software, written by JCraft,... Page 238 | case of linking over a controlled interface. The intent is to add a | Java Specification Request or... Page 239 freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom... Page 240 consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered... Page 241 former contains code derived from the library, whereas the latter must be combined with the library in order to... Page 242 fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming... Page 243 a storage or distribution medium does not bring the other work under the scope of this License. 3. You... Page 244 linked without the Library, or if the work is itself a library. The threshold for this to be true... Page 245 interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid... Page 246 distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received... Page 247 impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of... Page 248 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE,... Page 2531.24 Apache Xalan 2.7.1. 1.24.1 Available under license : Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR... Page 254 of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by... Page 255 meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy... Page 256 except as required for reasonable and customary use in describing the origin of the Work and reproducing the content... Page 258 - CUP Parser Generator runtime (javacup\runtime) - see LICENSE.txt ========================================================================= The source distribution package (ie. all source and tools... Page 2591.25 Apache Xerces 2.6.2. 1.25.1 Notifications : This product includes software developed by the Apache Software Foundation (http://www.apache.org/). 1.25.2 Available... Page 260 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT... Page 261 NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY... Page 266 Copyright 2002 Yuval Oren under the terms of the Apache Software License 2.0 - JSR-173 Streaming API for XML... Page 267 We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives... Page 268 You may charge a fee for the physical act of transferring a copy, and you may at your option... Page 269 under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided... Page 270 prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any... Page 271 original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those... Page 272 END OF TERMS AND CONDITIONS Appendix: How to Apply These Terms to Your New Programs If you develop a... Page 273 school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the... Page 274 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to... Page 275 is covered only if its contents constitute a work based on the Program (independent of having been made by... Page 276 Thus, it is not the intent of this section to claim rights or contest your rights to work written... Page 277 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any... Page 278 implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through... Page 279 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS... Page 280 Gnomovision version 69, Copyright (C) 19yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type 'show... Page 2811.29 asm 3.3 1.29.1 Available under license : Copyright (c) 2000-2005 INRIA, France Telecom All rights reserved. Redistribution and use... Page 282 If you did not receive this Content directly from the Eclipse Foundation, the Content is being redistributed by another... Page 283 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,... Page 284 "Recipient" means anyone who receives the Program under this Agreement, including all Contributors. 2. GRANT OF RIGHTS a) Subject... Page 285 in a reasonable manner on or through a medium customarily used for software exchange. When the Program is made... Page 286 EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY... Page 287 * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the... Page 288 * originally written at the National Center for Supercomputing Applications, * University of Illinois, Urbana-Champaign. */ 1.31 at 3.1.10... Page 289 distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone... Page 290 2. You may modify your copy or copies of the Program or any portion of it, thus forming a... Page 291 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections... Page 292 Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,... Page 293 those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this... Page 294 How to Apply These Terms to Your New Programs If you develop a new program, and you want it... Page 295 Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James... Page 296 For example, if you distribute copies of such a program, whether gratis or for a fee, you must give... Page 297 source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy... Page 298 In addition, mere aggregation of another work not based on the Program with the Program (or with a work... Page 299 However, parties who have received copies, or rights, from you under this License will not have their licenses terminated... Page 301 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL... Page 302 The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of... Page 303 # # # FSF changes to this file are in the public domain. # # Calling this script install-sh... Page 304 These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify... Page 305 concluded that weaker conditions might promote sharing better. However, unrestricted linking of non-free programs would deprive the users of... Page 306 Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The... Page 308 compelled to copy the source along with the object code. 5. A program that contains no derivative of any... Page 309 a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used... Page 310 facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined... Page 311 It is not the purpose of this section to induce you to infringe any patents or other property right... Page 312 WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT... Page 313 You should have received a copy of the GNU Library General Public License along with this library; if not,... Page 314 have the freedom to distribute copies of free software (and charge for this service if you wish), that you... Page 315 a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and... Page 316 "Source code" for a work means the preferred form of the work for making modifications to it. For a... Page 317 (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent... Page 318 must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software... Page 319 Library is used in it and that the Library and its use are covered by this License. You must... Page 320 facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the... Page 321 all those who receive copies directly or indirectly through you, then the only way you could satisfy both it... Page 322 decision will be guided by the two goals of preserving the free status of all derivatives of our free... Page 323 version 2 of the License, or (at your option) any later version. This library is distributed in the hope... Page 324 your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public... Page 325 that is to say, a work containing the Program or a portion of it, either verbatim or with modifications... Page 326 identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate... Page 327 operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or... Page 328 any particular circumstance, the balance of the section is intended to apply and the section as a whole is... Page 329 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT... Page 330 with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA... Page 331 The licenses for most software are designed to take away your freedom to share and change it. By contrast,... Page 332 GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program... Page 333 notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute... Page 334 The source code for a work means the preferred form of the work for making modifications to it. For... Page 335 License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For... Page 336 programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted... Page 337 (at your option) any later version. This program is distributed in the hope that it will be useful, but... Page 3381.37.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation,... Page 339 authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that... Page 340 stating that you changed the files and the date of any change. b) You must cause any work that... Page 341 cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under... Page 342 these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted... Page 343 address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version... Page 344 To do so, attach the following notices to the program. It is safest to attach them to the start... Page 345 This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine... Page 351 END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new... Page 352 necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program 'Gnomovision'... Page 353 * it under the terms of the GNU General Public License as published by * the Free Software Foundation;... Page 354 * version of this file under the BSD license, indicate your decision * by deleting the provisions above and... Page 357 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object... Page 358 distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this... Page 359 certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this... Page 360 POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If... Page 361 You should also get your employer (if you work as a programmer) or your school, if any, to sign... Page 362 # when there is no Makefile. # # This script is compatible with the BSD install script, but was... Page 363 (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for... Page 364 you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy... Page 365 Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the... Page 366 modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License... Page 367 may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among... Page 369 necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'... Page 370 for this service if you wish); that you receive source code or can get it if you want it;... Page 371 Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser"... Page 372 (which use some of those functions and data) to form executables. The "Library", below, refers to any such software... Page 373 d) If a facility in the modified Library refers to a function or a table of data to be... Page 374 subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part... Page 375 6. As an exception to the Sections above, you may also combine or link a "work that uses the... Page 376 For an executable, the required form of the "work that uses the Library" must include any data and utility... Page 377 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a... Page 378 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time... Page 379 If you develop a new library, and you want it to be of the greatest possible use to the... Page 380 # # Copyright (C) 1994 X Consortium # # Permission is hereby granted, free of charge, to any person... Page 381 *WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *IN NO EVENT SHALL THE HOWL PROJECT OR... Page 382 not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies... Page 383 General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser... Page 384 A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application... Page 385 c) You must cause the whole of the work to be licensed at no charge to all third parties... Page 386 Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU... Page 387 Any executables containing that work also fall under Section 6, whether or not they are linked directly with the... Page 388 materials or that you have already sent this user a copy. For an executable, the required form of the... Page 389 the Library or works based on it. 10. Each time you redistribute the Library (or any work based on... Page 390 the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised... Page 391 How to Apply These Terms to Your New Libraries If you develop a new library, and you want it... Page 392 #!/bin/sh # $Id$ # # This file is part of avahi. # # avahi is free software; you can... Page 393 exit 0 1.43 axis 1.4 1.43.1 Available under license : Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND... Page 394 editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes... Page 395 Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided... Page 396 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names... Page 397 same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner]... Page 398 otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of... Page 399 worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and... Page 400 of the NOTICE file are for informational purposes only and do not modify the License. You may add Your... Page 401 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer,... Page 402 Portions Copyright 2005-2007 WSO2, Inc. This product also includes schemas and specification developed by: - the W3C consortium (http://www.w3c.org)... Page 404 deleted from the Contributor Version; (2)�for infringements caused by: (i)�third party modifications of Contributor Version, or (ii)�the combination of... Page 408 parrt@cs.usfca.edu parrt@antlr.org /* ==================================================================== * The Apache Software License, Version 1.1 * * Copyright (c) 2001 The Apache Software... Page 409 * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the... Page 410 "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9... Page 411 and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing... Page 412 (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that... Page 413 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or... Page 414 this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. *... Page 415 not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work... Page 416 Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You... Page 417 the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted... Page 418 END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache... Page 419 a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b)... Page 420 Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity. Each... Page 421 Each Contributor must identify itself as the originator of its Contribution, if any, in a manner that reasonably allows... Page 422 6. DISCLAIMER OF LIABILITY EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE... Page 423 estoppel or otherwise. All rights in the Program not expressly granted under this Agreement are reserved. This Agreement is... Page 424 product, an acknowledgment in the product documentation would be appreciated but is not required. 3. Altered source versions must... Page 425 "Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale... Page 426 a) it complies with the terms and conditions of this Agreement; and b) its license agreement: i) effectively disclaims... Page 427 offering. The obligations in this section do not apply to any claims or Losses relating to any actual or... Page 428 If Recipient institutes patent litigation against a Contributor with respect to a patent applicable to software (including a cross-claim... Page 429 1.0. Any modifications or additions to files from the LZMA compression module for NSIS, however, are subject to the... Page 430 addition of the Contribution causes such combination to be covered by the Licensed Patents. The patent license shall not... Page 431 the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial... Page 432 Recipient under this Agreement shall terminate as of the date such litigation is filed. In addition, if Recipient institutes... Page 433 copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to... Page 4341.47 backbone.js 0.5.1 1.47.1 Available under license : Copyright (c) 2011 Alexander Flatter Permission is hereby granted, free of charge,... Page 435 When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed... Page 436 modification follow. TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License.... Page 437 A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or,... Page 438 convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others... Page 439 a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The... Page 440 model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all... Page 441 "Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and... Page 442 removal in certain cases when you modify the work.) You may place additional permissions on material, added by you... Page 443 the above requirements apply either way. 8. Termination. You may not propagate or modify a covered work except as... Page 444 An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing... Page 445 to copy, free of charge and under the terms of this License, through a publicly available network server or... Page 446 the Program, the only way you could satisfy both those terms and this License would be to refrain entirely... Page 447 IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.... Page 448 GNU General Public License for more details. You should have received a copy of the GNU General Public License... Page 449 Message-Id: <9508011257.AA00672@los.ora.com> Subject: Re: Ksh debugger from Rosenblatt's book [for bash] To: Chet Ramey <chet@odin.INS.CWRU.Edu> Cc: cmarie@ora.com, cam@iinet.com.au, brosenblatt@tm.com... Page 450 } From: Chet Ramey <chet@odin.ins.cwru.edu> } To: john@armory.com } Subject: ksh scripts } Cc: chet@odin.ins.cwru.edu } Reply-To: chet@po.cwru.edu }... Page 451 >me distribute them with bash-2.0. Thanks. Sure. I think there's a later copy in ~ftp/friedman/shell-inits/init-4.89.tar.gz. There are also some... Page 452 whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction... Page 453 pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to... Page 454 VERBATIM COPYING You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this... Page 455 It is requested, but not required, that you contact the authors of the Document well before redistributing any large... Page 456 and required Cover Texts given in the Document's license notice. @item Include an unaltered copy of this License. @item... Page 457 copied from the Document, you may at your option designate some or all of these sections as invariant. To... Page 458 sections Entitled ``Endorsements.'' @item COLLECTIONS OF DOCUMENTS You may make a collection consisting of the Document and other documents... Page 459 of those notices and disclaimers. In case of a disagreement between the translation and the original version of this... Page 460 License ``or any later version'' applies to it, you have the option of following the terms and conditions either... Page 461 license notices just after the title page: @smallexample @group Copyright (C) @var{year} @var{your name}. Permission is granted to copy,... Page 462 The purpose of this License is to make a manual, textbook, or other functional and useful document "free" in... Page 463 The "Invariant Sections" are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the... Page 464 A section "Entitled XYZ" means a named subunit of the Document whose title either is precisely XYZ or contains... Page 465 reasonably) on the actual cover, and continue the rest onto adjacent pages. If you publish or distribute Opaque copies... Page 466 terms of this License, in the form shown in the Addendum below. G. Preserve in that license notice the... Page 467 through arrangements made by) any one entity. If the Document already includes a cover text for the same cover,... Page 468 License in all other respects regarding verbatim copying of that document. 7. AGGREGATION WITH INDEPENDENT WORKS A compilation of... Page 469 except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, or distribute it is void,... Page 470 "Massive Multiauthor Collaboration Site" (or "MMC Site") means any World Wide Web server that publishes copyrightable works and also... Page 471 combination of the three, merge those two alternatives to suit the situation. If your document contains nontrivial examples of... Page 472 X-Www: http://www.armory.com/~spcecdt/ X-Mailer: Mail User's Shell (7.2.5 10/14/92) To: chet@po.cwru.edu Subject: Re: ksh scripts Message-ID: <9505092233.aa13001@deepthought.armory.com> Sure. The canonical... Page 473 Received: from po.cwru.edu (root@po.CWRU.Edu [129.22.4.2]) by odin.INS.CWRU.Edu with ESMTP (8.6.10+cwru/CWRU-2.1-ins) id MAA08685; Thu, 25 May 1995 12:19:05 -0400 (from... Page 474 price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of... Page 475 TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also... Page 476 standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language,... Page 477 of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that... Page 478 it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under... Page 479 product that is covered by this License, on a durable physical medium customarily used for software interchange, for a... Page 480 procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that... Page 481 for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material... Page 482 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any... Page 483 organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that... Page 484 then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself... Page 485 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission... Page 486 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY... Page 487 You should have received a copy of the GNU General Public License along with this program. If not, see... Page 490 announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you... Page 492 distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a... Page 493 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,... Page 494 the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program... Page 495 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.... Page 496 there is no warranty for the free library. Also, if the library is modified by someone else and passed... Page 497 non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the... Page 498 writing it). Whether that is true depends on what the Library does and what the program that uses the... Page 499 distribute the same sections as part of a whole which is a work based on the Library, the distribution... Page 500 work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this... Page 501 uses the Library", as object code and/or source code, so that the user can modify the Library and then... Page 502 a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any... Page 504 NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO... Page 506 <!-- $Id: copyright.xsl,v 1.8 2009-07-10 23:47:58 tbox Exp $ --> <!-- Generate ISC copyright comments from Docbook copyright metadata.... Page 507 </xsl:for-each> <xsl:value-of select="$isc.copyright.text"/> </xsl:with-param> </xsl:call-template> </xsl:variable> </xsl:stylesheet> <!-- - Local variables: - mode: sgml - End: --> Copyright (C)... Page 508 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ----------------------------------------------------------------------------- Copyright (C) 1995-2000 by Network Associates,... Page 509 CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF... Page 510 Copyright (c) 2004 Masarykova universita (Masaryk University, Brno, Czech Republic) All rights reserved. Redistribution and use in source and... Page 511 may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE... Page 512 met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following... Page 513 ----------------------------------------------------------------------------- Copyright 2000 Aaron D. Gifford. All rights reserved. Redistribution and use in source and binary forms, with or... Page 514 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR... Page 515 OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE... Page 516 ----------------------------------------------------------------------------- Copyright (C) 2004 Nominet, Ltd. Permission to use, copy, modify, and distribute this software for any purpose with... Page 517 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE... Page 518 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH... Page 519 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions... Page 520 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;... Page 521 available for free to anybody. In other words, this package is created under a Public Domain license. 1.52 bind... Page 522 Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted,... Page 523 Copyright (c) 1987, 1990, 1993, 1994 The Regents of the University of California. All rights reserved. Redistribution and use... Page 524 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.... Page 525 ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,... Page 526 copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the... Page 527 are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the... Page 528 ----------------------------------------------------------------------------- Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. Redistribution and use in source and... Page 529 Copyright (c) 2000-2002 Japan Network Information Center. All rights reserved. By using this file, you agree to the terms... Page 530 copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND NOMINET DISCLAIMS... Page 531 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions... Page 532 is created under a Public Domain license. Copyright (c) 2000-2002 Japan Network Information Center. All rights reserved. By using... Page 534 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY... Page 5351.53 binutils 2.20.51.0.2 :5.36.el6 1.53.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C)... Page 536 that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that... Page 537 permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a... Page 538 includes interface definition files associated with source files for the work, and the source code for shared libraries and... Page 539 is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention... Page 540 and which are not combined with it such as to form a larger program, in or on a volume... Page 541 Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these... Page 542 network may be denied when the modification itself materially and adversely affects the operation of the network or violates... Page 543 f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions... Page 544 Termination of your rights under this section does not terminate the licenses of parties who have received copies or... Page 545 A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or... Page 546 work if you are a party to an arrangement with a third party that is in the business of... Page 547 option of following the terms and conditions either of that numbered version or of any later version published by... Page 549 The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a... Page 550 You may convey a covered work under sections 3 and 4 of this License without being bound by section... Page 551 b) Accompany the Combined Work with a copy of the GNU GPL and this license document. c) For a... Page 552 b) Give prominent notice with the combined library that part of it is a work based on the Library,... Page 554 the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered... Page 555 sections when you distribute them as separate works. But when you distribute the same sections as part of a... Page 556 If distribution of executable or object code is made by offering access to copy from a designated place, then... Page 558 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY... Page 559 Also add information on how to contact you by electronic and paper mail. If the program is interactive, make... Page 560 This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any... Page 561 one; be sure to read it in full, and don't assume that anything in it is the same as... Page 562 The "Library", below, refers to any such software library or work which has been distributed under these terms. A... Page 564 This option is useful when you wish to copy part of the code of the Library into a program... Page 565 6. As an exception to the Sections above, you may also compile or link a "work that uses the... Page 566 It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany... Page 567 infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court... Page 568 license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish... Page 569 "copyright" line and a pointer to where the full notice is found. <one line to give the library's name... Page 580 Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James... Page 581 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,... Page 582 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN... Page 583 Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved. Developed at SunPro, a Sun Microsystems, Inc. business. Permission... Page 584 (11) Christopher G. Demetriou Copyright (c) 2001 Christopher G. Demetriou All rights reserved. Redistribution and use in source and... Page 585 CA 95134 USA (13) Royal Institute of Technology Copyright (c) 1999 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm,... Page 586 documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS''... Page 588 THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT... Page 589 This file is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR... Page 590 made to this software or documentation, and that the name of Intel Corporation not be used in advertising or... Page 591 credits must appear in the documentation. 3. Altered versions must be plainly marked as such, and must not be... Page 594 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN... Page 595 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS... Page 597 Copyright (c) 1994-2007 Red Hat, Inc. All rights reserved. This copyrighted material is made available to anyone wishing to... Page 598 Redistribution and use in source and binary forms is permitted provided that the above copyright notice and following paragraph... Page 599 Advanced Micro Devices, Inc. 29K Support Products Mail Stop 573 5900 E. Ben White Blvd. Austin, TX 78741 800-292-9263... Page 600 (c) Copyright 1986 HEWLETT-PACKARD COMPANY To anyone who acknowledges that this file is provided "AS IS" without any express... Page 602 3. Neither the name of Xilinx nor the names of its contributors may be used to endorse or promote... Page 604 Program (independent of having been made by running the Program). Whether that is true depends on what the Program... Page 607 generous contributions to the wide range of software distributed through that system in reliance on consistent application of that... Page 608 REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY... Page 609 Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show... Page 611 changing the library, is in some sense simply using the library, and is analogous to running a utility program... Page 612 straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work... Page 613 its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that... Page 614 under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable... Page 615 You must give prominent notice with each copy of the work that the Library is used in it and... Page 616 7. You may place library facilities that are a work based on the Library side-by-side in a single library... Page 617 may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of... Page 618 copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our... Page 619 modify it under the terms of the GNU Library General Public License as published by the Free Software Foundation;... Page 620 Copyright (c) 1981-2000 The Regents of the University of California. All rights reserved. Redistribution and use in source and... Page 621 GNU CC is free software; you can redistribute it and/or modify it under the terms of the GNU General... Page 622 a trade secret of ARRAY Technology Corporation. Use, duplication, or disclosure is subject to the terms of a separate... Page 623 (10) Hans-Peter Nilsson Copyright (C) 2001 Hans-Peter Nilsson Permission to use, copy, modify, and distribute this software is freely... Page 625 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE... Page 627 modified by someone else and passed on, the recipients should know that what they have is not the original... Page 628 system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the... Page 629 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in... Page 630 entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the... Page 631 However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of... Page 632 that the user who changes the contents of definitions files in the Library will not necessarily be able to... Page 636 You should have received a copy of the GNU Lesser General Public License along with this library; if not,... Page 637 you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a... Page 638 "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and... Page 639 implementation is available to the public in source code form. A "Major Component", in this context, means a major... Page 640 the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 3. Protecting Users' Legal Rights From... Page 641 License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and... Page 642 only if you received the object code with such an offer, in accord with subsection 6b. d) Convey the... Page 643 part of a transaction in which the right of possession and use of the User Product is transferred to... Page 644 b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal... Page 645 license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally... Page 646 rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other... Page 647 If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance... Page 648 section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this... Page 649 GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT... Page 650 If the program does terminal interaction, make it output a short notice like this when it starts in an... Page 651 freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom... Page 652 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which... Page 653 a warranty) and that users may redistribute the program under these conditions, and telling the user how to view... Page 654 making modifications to it. For an executable work, complete source code means all the source code for all modules... Page 655 may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of... Page 656 to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software... Page 657 This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the... Page 658 documentation, are copyright (C) 1996-2006 Julian R Seward. All rights reserved. Redistribution and use in source and binary forms,... Page 659 Preamble The licenses for most software are designed to take away your freedom to share and change it. By... Page 660 any free program. We wish to make sure that a company cannot effectively restrict the users of a free... Page 661 The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a... Page 662 Library. You may charge a fee for the physical act of transferring a copy, and you may at your... Page 663 collective works based on the Library. In addition, mere aggregation of another work not based on the Library with... Page 664 When a "work that uses the Library" uses material from a header file that is part of the Library,... Page 665 copy of the library already present on the user's computer system, rather than copying library functions into the executable,... Page 666 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this... Page 668 LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR... Page 670 * distribution of binary-only commercial software. Since the goal of * the Linux project as a whole is not... Page 671 To: mps@bridge.intra Subject: Re: testregex licensing question X-GMX-Antivirus: -1 (not scanned, may not use virus scanner) X-GMX-Antispam: 0 (Mail... Page 673 distribution of the software without specific, written prior permission. M.I.T. makes no representations about the suitability of this software... Page 674 of it in new free programs; and that you are informed that you can do these things. To protect... Page 675 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user... Page 677 Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is... Page 679 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by... Page 680 file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line... Page 681 License is intended to guarantee your freedom to share and change free software--to make sure the software is free... Page 682 0. This License applies to any program or other work which contains a notice placed by the copyright holder... Page 683 these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself... Page 684 code means all the source code for all modules it contains, plus any associated interface definition files, plus the... Page 685 license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through... Page 686 Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided... Page 688 1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications. 1.2. "Contributor Version" means the... Page 689 hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code"... Page 690 by: i) the modification of the Original Code or ii) the combination of the Original Code with other software... Page 691 License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in... Page 692 (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are... Page 693 the Initial Developer or such Contributor as a result of any such terms You offer. 3.7. Larger Works. You... Page 694 license (except to note that your license differs from this License) and (b) otherwise make it clear that Your... Page 695 Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above. (b) any... Page 696 all U.S. Government End Users acquire Covered Code with only those rights set forth herein. 11. MISCELLANEOUS. This License... Page 697 Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express... Page 698 General Public License applies to most of the Free Software Foundation's software and to any other program whose authors... Page 699 a notice placed by the copyright holder saying it may be distributed under the terms of this General Public... Page 700 does not normally print such an announcement, your work based on the Program is not required to print an... Page 701 control compilation and installation of the executable. However, as a special exception, the source code distributed need not include... Page 702 the only way you could satisfy both it and this License would be to refrain entirely from distribution of... Page 703 of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse... Page 704 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have... Page 705 # (at your option) any later version. # # This program is distributed in the hope that it will... Page 706 an MIT license to simplify any use of this code for reference purposes in using cairo itself. Other files... Page 707 complete object files to the recipients, so that they can relink them with the library after making changes to... Page 708 be allowed to use the library. A more frequent case is that a free library does the same job... Page 709 compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License;... Page 710 root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable... Page 711 source code from the same place satisfies the requirement to distribute the source code, even though third parties are... Page 712 of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever... Page 714 License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For... Page 715 programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which... Page 716 <one line to give the library's name and a brief idea of what it does.> Copyright (C) <year> <name... Page 717 1.3. "Covered Code" means the Original Code or Modifications or the combination of the Original Code and Modifications, in... Page 718 well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival... Page 719 trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor... Page 720 Electronic Distribution Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic... Page 721 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If... Page 722 4. Inability to Comply Due to Statute or Regulation. If it is impossible for You to comply with any... Page 723 7. DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF... Page 724 Participant. 8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or... Page 725 necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable... Page 726 Portions created by ______________________ are Copyright (C) ______ _______________________. All Rights Reserved. Contributor(s): ______________________________________. Alternatively, the contents of this... Page 727 anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain... Page 728 Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of... Page 729 your rights to work written entirely by you; rather, the intent is to exercise the right to control the... Page 730 except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is... Page 731 through that system in reliance on consistent application of that system; it is up to the author/donor to decide... Page 733 Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome... Page 735 either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term... Page 736 and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not... Page 737 itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from... Page 738 apply and the section as a whole is intended to apply in other circumstances. It is not the purpose... Page 740 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you... Page 755 proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary... Page 768 Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with... Page 782 "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal... Page 783 excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."... Page 784 distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within... Page 785 unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any... Page 7861.72 commons-cli 1.0 1.72.1 Notifications : This product includes software developed by the Apache Software Foundation (http://www.apache.org/). 1.72.2 Available under... Page 787 * THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO,... Page 788 "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall... Page 789 Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms... Page 790 or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be... Page 791 and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this... Page 792 -------------------------------------------------------------------------------- /* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See... Page 801 This product includes software developed by The Apache Software Foundation (http://www.apache.org/). 1.76 commons-lang3 3.1 1.76.1 Available under license :... Page 807 or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes... Page 808 (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark,... Page 809 of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of... Page 812 conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the... Page 814 this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You... Page 815 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of... Page 816 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM... Page 818 you have the freedom to distribute copies of free software (and charge for this service if you wish); that... Page 819 entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other... Page 820 prepared so as to be conveniently linked with application programs (which use some of those functions and data) to... Page 821 charge to all third parties under the terms of this License. d) If a facility in the modified Library... Page 822 that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from... Page 823 whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above,... Page 828 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of... Page 829 connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.... Page 830 conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading... Page 831 4. MODIFICATIONS You may copy and distribute a Modified Version of the Document under the conditions of sections 2... Page 832 unaltered in their text and in their titles. Section numbers or the equivalent are not considered part of the... Page 833 adding at the end of it, in parentheses, the name of the original author or publisher of that section... Page 834 Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some... Page 835 or any later version published by the Free Software Foundation; with the Invariant Sections being LIST THEIR TITLES, with... Page 836 permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright... Page 837 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original... Page 839 This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation... Page 840 ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and... Page 841 GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to... Page 842 of it, thus forming a work based on the Library, and copy and distribute such modifications or work under... Page 843 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License... Page 844 If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small... Page 845 three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more... Page 846 terminated so long as such parties remain in full compliance. 9. You are not required to accept this License,... Page 848 FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE... Page 858 OR ANY PART THEREOF. In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits... Page 859 THIS SOFTWARE IS PROVIDED BY CARNEGIE MELLON UNIVERSITY AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,... Page 860 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The files inet/getnameinfo.c and sysdeps/posix/getaddrinfo.c are copyright (C) by... Page 861 numbered 2 because it goes with version 2 of the ordinary GPL.] Preamble The licenses for most software are... Page 862 transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be... Page 863 contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the... Page 867 Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special... Page 868 Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the... Page 869 Such new versions will be similar in spirit to the present version, but may differ in detail to address... Page 870 possible use to the public, we recommend making it free software that everyone can redistribute and change. You can... Page 871 1. The author is not responsible for the consequences of use of this software, no matter how awful, even... Page 872 distribute copies of the software, or if you modify it. For example, if you distribute copies of such a... Page 874 collective works based on the Program. In addition, mere aggregation of another work not based on the Program with... Page 875 void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from... Page 876 to distribute software through any other system and a licensee cannot impose that choice. This section is intended to... Page 877 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE... Page 8791.81.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation,... Page 880 authors of previous versions. Some devices are designed to deny users access to install or run modified versions of... Page 881 distribution (with or without modification), making available to the public, and in some countries other activities as well. To... Page 882 such as by intimate data communication or control flow between those subprograms and other parts of the work. The... Page 883 users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may... Page 884 used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion... Page 885 e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding... Page 886 Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is... Page 887 it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on... Page 888 reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not... Page 889 by this License, of making, using, or selling its contributor version, but do not include claims that would be... Page 890 the work, and under which the third party grants, to any of the parties who would receive the covered... Page 891 GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program... Page 893 the library. If this is what you want to do, use the GNU Lesser General Public License instead of... Page 894 (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute... Page 895 A "covered work" means either the unmodified Program or a work based on the Program. To "propagate" a work... Page 896 control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free... Page 897 measures. When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to... Page 898 work need not make them do so. A compilation of a covered work with other separate and independent works,... Page 899 may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided... Page 900 The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or... Page 901 authors of the material; or e) Declining to grant rights under trademark law for use of some trade names,... Page 902 received notice of violation of this License (for any work) from that copyright holder, and you cure the violation... Page 903 A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on... Page 904 A patent license is "discriminatory" if it does not include within the scope of its coverage, prohibits the exercise... Page 905 Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the... Page 906 an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability... Page 907 if any, to sign a "copyright disclaimer" for the program, if necessary. For more information on this, and how... Page 908 For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass... Page 909 "recipients" may be individuals or organizations. To "modify" a work means to copy from or adapt all or part... Page 910 (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs,... Page 911 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological... Page 912 regardless of how they are packaged. This License gives no permission to license the work in any other way,... Page 913 d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer... Page 914 fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied... Page 915 Notices displayed by works containing it; or c) Prohibiting misrepresentation of the origin of that material, or requiring that... Page 916 finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by... Page 917 rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit)... Page 918 arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some... Page 919 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU... Page 920 SUCH DAMAGES. 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided... Page 922 want it, that you can change the software or use pieces of it in new free programs, and that... Page 923 "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply... Page 924 The "System Libraries" of an executable work include anything, other than the work as a whole, that (a) is... Page 925 not control copyright. Those thus making or running the covered works for you must do so exclusively on your... Page 926 released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4... Page 927 conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c)... Page 928 suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered... Page 929 add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms... Page 930 provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your... Page 931 licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a... Page 932 consistent with the requirements of this License, to extend the patent license to downstream recipients. "Knowingly relying" means you... Page 933 Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a... Page 934 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY... Page 935 Also add information on how to contact you by electronic and paper mail. If the program does terminal interaction,... Page 942 along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,... Page 9501.87.1 Available under license : /* $Id: cpuspeed.cc 7 2007-02-06 01:20:52Z carl $ Copyright 2002 - 2008 This program is... Page 951 the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of... Page 958 [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU... Page 959 that what they have is not the original version, so that the original author's reputation will not be affected... Page 962 this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part... Page 964 executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in... Page 965 based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the... Page 966 apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose... Page 967 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT... Page 968 This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the... Page 976 wordlist, after install. Otherwise it will not install the dictionaries. This is left as a manual step since on... Page 977 *** Advantages of CrackLib *** 1) it WORKS! I wrote something similar ("goodpass") a few years back, which went... Page 978 - after all that, it's PROBABLY a safe(-ish) password. 8-) *** Instructions for building CrackLib... STEP 0) Engage your... Page 979 These files are NOT byte-order independent, in fact they are probably ARCHITECTURE SPECIFIC, mostly due to speed constraints. If... Page 980 you must have enough free space available for use by the "sort" command, when the dictionary is built. So:... Page 981 - it can't catch everything. Just most things. - it calls getpwuid(getuid()) to look up the user, this MAY... Page 982 } #else { char *msg; if (msg = (char *) FascistCheck(pwbuf, CRACKLIB_DICTPATH)) { printf("Please use a different password.\n"); printf("The... Page 989 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Also add information on how to contact you by electronic... Page 990 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA... Page 991 * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the... Page 992 if you want it, that you can change the software or use pieces of it in new free programs;... Page 993 covered by this License; they are outside its scope. The act of running the Program is not restricted, and... Page 995 distribution of the source code, even though third parties are not compelled to copy the source along with the... Page 996 such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which... Page 997 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM... Page 998 when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with... Page 999 * published in UNIX Review, Vol. 6, No. 8. * * Redistribution and use in source and binary forms,... Page 1000 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR... Page 1001 freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom... Page 1002 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which... Page 1003 a warranty) and that users may redistribute the program under these conditions, and telling the user how to view... Page 1004 making modifications to it. For an executable work, complete source code means all the source code for all modules... Page 1005 may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of... Page 1006 to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software... Page 1007 This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the... Page 1008 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is... Page 1009 program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it... Page 1010 part thereof, to be licensed as a whole at no charge to all third parties under the terms of... Page 1011 c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative... Page 1012 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason... Page 1013 later version", you have the option of following the terms and conditions either of that version or of any... Page 1014 <one line to give the program's name and a brief idea of what it does.> Copyright (C) <year> <name... Page 1015 Public License instead of this License. This originates from X11R5 (mit/util/scripts/install.sh), which was # later released in X11R6 (xc/config/util/install.sh)... Page 1016 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.... Page 1017 patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for... Page 1018 c) If the modified program normally reads commands interactively when run, you must cause it, when started running for... Page 1019 to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the... Page 1020 infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court... Page 1021 Software Foundation. If the Program does not specify a version number of this License, you may choose any version... Page 1022 Copyright (C) <year> <name of author> This program is free software; you can redistribute it and/or modify it under... Page 10231.95 csvjdbc .10 1.95.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991,... Page 1024 such a program is covered only if its contents constitute a work based on the Library (independent of the... Page 1025 themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate... Page 1026 Library, but is designed to work with the Library by being compiled or linked with it, is called a... Page 1027 Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete... Page 1028 the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:... Page 1029 refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under... Page 1030 and reuse of software generally. NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO... Page 1031 The GNU LGPL applies to the CUPS and CUPS Imaging libraries located in the "cups" and "filter" subdirectories of... Page 1032 the CUPS imaging library with Apple OS-Developed Software without releasing the source code of the Apple OS-Developed Software. You... Page 1033 The KSC copyright and license apply only to Kerberos-related feature code in CUPS. Such code is typically conditionally compiled... Page 1034 Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software... Page 1035 under the terms of this General Public License. The "Program", below, refers to any such program or work, and... Page 1036 the Program is not required to print an announcement.) These requirements apply to the modified work as a whole.... Page 1037 special exception, the source code distributed need not include anything that is normally distributed (in either source or binary... Page 1038 refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under... Page 1039 of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF... Page 1040 GNU General Public License for more details. You should have received a copy of the GNU General Public License... Page 1041 Preamble The licenses for most software are designed to take away your freedom to share and change it. By... Page 1042 we have made it clear that any patent must be licensed for everyone's free use or not licensed at... Page 1043 party saying it may be distributed under the terms of this Library General Public License (also called "this License").... Page 1044 b) You must cause the files modified to carry prominent notices stating that you changed the files and the... Page 1045 ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not... Page 1046 Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may... Page 1047 reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that... Page 1048 original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may... Page 1049 but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.... Page 1050 everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the... Page 1051 Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,... Page 1052 problems to some. This document attempts to describe what licenses libcurl and the other libraries use and what possible... Page 1053 grant you different permissions and impose different obligations. You should select the license that best meets your needs. axTLS... Page 1054 libidn http://josefsson.org/libidn/ (Used for IDNA support) Uses the GNU Lesser General Public License [3]. LGPL is a variation of... Page 1055 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,... Page 1056 extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights... Page 1057 claims: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify,... Page 1058 Contributor Version; 2) separate from the Contributor Version; 3) for infringements caused by: i) third party modifications of Contributor... Page 1059 If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the... Page 1060 You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for... Page 1061 6.1. New Versions. Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to... Page 1062 shall survive. 8.2. If You initiate litigation by asserting a patent infringement claim (excluding declatory judgment actions) against Initial... Page 1063 OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR... Page 1064 work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or... Page 1065 Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall... Page 1066 "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions... Page 1067 (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c)... Page 1068 agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS,... Page 1069 you may not use this file except in compliance with the License. You may obtain a copy of the... Page 1070 Java Architecture for XML Binding (JAXB API) (http://jaxb.java.net/jaxb-api) javax.xml.bind:jaxb- api:jar:2.2.6:compile License: COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0... Page 1071 Jetty :: IO Utility (http://www.eclipse.org/jetty/jetty-io) org.eclipse.jetty:jetty-io:jar:8.1.7.v20120910 License: Eclipse Public License - Version 1.0 (http://www.eclipse.org/org/documents/epl-v10.php) Jetty :: Security (http://www.eclipse.org/jetty/jetty-security) org.eclipse.jetty:jetty-security:jar:8.1.7.v20120910... Page 1072 Copyright 2006-2013 The Apache Software Foundation This product includes software developed at The Apache Software Foundation (http://www.apache.org/). This product... Page 1073 Portions of the included xmlbeans library were originally based on the following: - software copyright (c) 2000-2003, BEA Systems,... Page 1074 Portions of the included XmlSchema library are Copyright 2006 International Business Machines Corp. Portions of the included xml-apis library... Page 1075 are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the... Page 10761.100 cyrus-sasl 2.1.23 :15.el6 1.100.1 Available under license : Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) All rights reserved. This package... Page 1077 copied and put under another distrubution license [including the GNU Public License.] The reason behind this being stated in... Page 1078 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING * OUT OF OR IN CONNECTION WITH THE... Page 1079 Copyright 1998 by Carnegie Mellon University All Rights Reserved Permission to use, copy, modify, and distribute this software and... Page 1080 # prior written permission. For permission or any other legal # details, please contact # Office of Technology Transfer... Page 1081 documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all... Page 1082 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN... Page 1083 documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of... Page 1085 modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to... Page 1086 interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and... Page 1087 an offer, in accord with Subsection b above.) The source code for a work means the preferred form of... Page 1088 excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations... Page 1089 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different,... Page 1090 it under the terms of the GNU General Public License as published by the Free Software Foundation; either version... Page 10911.104.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation,... Page 1092 authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that... Page 1093 stating that you changed the files and the date of any change. b) You must cause any work that... Page 1094 cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under... Page 1095 these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted... Page 1096 address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version... Page 1097 To do so, attach the following notices to the program. It is safest to attach them to the start... Page 1098 proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary... Page 1099 * modules it contains. It does not include source code for modules or * files that typically accompany the... Page 1100 * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the... Page 1101 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON... Page 1102 offer for sale the Original Work and Derivative Works. 3) Grant of Source Code License. The term "Source Code"... Page 1103 WARRANTY, either express or implied, including, without limitation, the warranties of NON-INFRINGEMENT, MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.... Page 1104 conflict-of-law provisions. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly... Page 1105 licenses in many respects but it is intended to solve a few problems with those licenses. * The AFL... Page 1113 The Academic Free License v. 2.1 This Academic Free License (the "License") applies to any original work of authorship... Page 1114 permission of the Licensor. Nothing in this License shall be deemed to grant any rights to trademarks, copyrights, patents,... Page 1115 and limitation may not apply to You. 9) Acceptance and Termination. If You distribute copies of the Original Work... Page 1116 14) Definition of "You" in This License. "You" throughout this License, whether in upper or lower case, means an... Page 1117 * The AFL includes the warranty by the licensor that it either owns the copyright or that it is... Page 1118 you have. You must make sure that they, too, receive or can get the source code. And you must... Page 1119 notices that refer to this License and to the absence of any warranty; and give any other recipients of... Page 1120 a storage or distribution medium does not bring the other work under the scope of this License. 3. You... Page 1121 5. You are not required to accept this License, since you have not signed it. However, nothing else grants... Page 1122 be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is... Page 1123 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A... Page 1124 be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits... Page 1125 if you want it, that you can change the software or use pieces of it in new free programs;... Page 1126 covered by this License; they are outside its scope. The act of running the Program is not restricted, and... Page 1127 this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part... Page 1128 distribution of the source code, even though third parties are not compelled to copy the source along with the... Page 1129 such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which... Page 1130 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM... Page 1131 If the program is interactive, make it output a short notice like this when it starts in an interactive... Page 1132 EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.... Page 1133 # The plan is that this can be called by configure scripts if you # don't specify an explicit... Page 1134 it. And you must show them these terms so they know their rights. Our method of protecting your rights... Page 1135 changes in the actual functions of the Library.) The hope is that this will lead to faster development of... Page 1136 complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each... Page 1137 it. Thus, it is not the intent of this section to claim rights or contest your rights to work... Page 1138 creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than... Page 1139 Library will not necessarily be able to recompile the application to use the modified definitions.) b) Accompany the work... Page 1140 attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your... Page 1141 to distribute software through any other system and a licensee cannot impose that choice. This section is intended to... Page 1142 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR... Page 1143 necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob'... Page 1144 your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public... Page 1145 that is to say, a work containing the Program or a portion of it, either verbatim or with modifications... Page 1146 identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate... Page 1147 operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or... Page 1148 any particular circumstance, the balance of the section is intended to apply and the section as a whole is... Page 1149 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT... Page 1150 with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA... Page 1151 numbered 2 because it goes with version 2 of the ordinary GPL.] Preamble The licenses for most software are... Page 1152 transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be... Page 1153 contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the... Page 1154 a) The modified work must itself be a software library. b) You must cause the files modified to carry... Page 1155 instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License... Page 1156 work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if... Page 1157 Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special... Page 1158 Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the... Page 1159 Such new versions will be similar in spirit to the present version, but may differ in detail to address... Page 1160 possible use to the public, we recommend making it free software that everyone can redistribute and change. You can... Page 11611.113.1 Available under license : # Copyright (c) 2004-2010 by Internet Systems Consortium, Inc. ("ISC") # Copyright (c) 1995-2003 by... Page 1162 Copyright (c) 1995-2003 Internet Software Consortium. Copyright (c) 2006 Novell, Inc. All rights reserved. Redistribution and use in source... Page 1163 THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,... Page 1164 Copyright (c) 2004 Internet Systems Consorium, Inc. ("ISC") Copyright (c) 1995-2003 Internet Software Consortium. Copyright (c) 2006 Novell, Inc.... Page 1165 from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS... Page 1173 @node GNU Free Documentation License @appendixsec GNU Free Documentation License @cindex FDL, GNU Free Documentation License @center Version 1.1,... Page 1174 A ''Modified Version'' of the Document means any work containing the Document or a portion of it, either copied... Page 1175 this License requires to appear in the title page. For works in formats which do not have any title... Page 1176 option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that... Page 1177 giving the public permission to use the Modified Version under the terms of this License, in the form shown... Page 1178 If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material... Page 1179 ''History''; likewise combine any sections entitled ''Acknowledgments'', and any sections entitled ''Dedications''. You must delete all sections entitled ''Endorsements.''... Page 1180 License, the original English version will prevail. @item TERMINATION You may not copy, modify, sublicense, or distribute the Document... Page 1181 Free Documentation License''. @end group @end smallexample If you have no Invariant Sections, write ''with no Invariant Sections'' instead... Page 1182 of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to... Page 1183 The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR... Page 1185 allowed only for noncommercial distribution and only if you received the program in object code or executable form with... Page 1186 conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License,... Page 1187 this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to... Page 1188 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General... Page 11891.118 dmidecode 2.12 :5.el6_5 1.118.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 1190 software. If the software is modified by someone else and passed on, we want its recipients to know that... Page 1191 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry... Page 1192 b) Accompany it with a written offer, valid for at least three years, to give any third party, for... Page 1193 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a... Page 1194 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to... Page 1195 possible use to the public, the best way to achieve this is to make it free software which everyone... Page 1196 <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit... Page 1197 the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of... Page 1198 means either the Program or any derivative work under copyright law: that is to say, a work containing the... Page 1199 These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived... Page 1200 form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,... Page 1201 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the... Page 1202 NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO... Page 1203 You should have received a copy of the GNU General Public License along with this program; if not, write... Page 1204 The licenses for most software are designed to take away your freedom to share and change it. By contrast,... Page 1205 restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the... Page 1206 modification follow. Pay close attention to the difference between a "work based on the library" and a "work that... Page 1207 You may charge a fee for the physical act of transferring a copy, and you may at your option... Page 1208 In addition, mere aggregation of another work not based on the Library with the Library (or with a work... Page 1209 derivative work of the Library even though the source code is not. Whether this is true is especially significant... Page 1210 will operate properly with a modified version of the library, if the user installs one, as long as the... Page 1211 the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or... Page 1212 system; it is up to the author/donor to decide if he or she is willing to distribute software through... Page 12151.120 dmraid-events 1.0.0.rc16 :11.el6 1.120.1 Available under license : Copyright (C) 2004-2006 Heinz Mauelshagen, Red Hat GmbH. All rights reserved.... Page 1216 When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses... Page 1217 a shared library, the combination of the two is legally speaking a combined work, a derivative of the original... Page 1218 Each licensee is addressed as "you". A "library" means a collection of software functions and/or data prepared so as... Page 1219 stating that you changed the files and the date of any change. c) You must cause the whole of... Page 1220 these notices. Once this change is made in a given copy, it is irreversible for that copy, so the... Page 1221 Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work... Page 1222 e) Verify that the user has already received a copy of these materials or that you have already sent... Page 1223 Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,... Page 1224 excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.... Page 1225 END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new... Page 1233 Public License instead of this License. 1.121 dos2unix 3.1 :37.el6 1.121.1 Available under license : * Copyright (c) 1994,... Page 1234 The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses... Page 1235 stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect... Page 1236 tells the user that there is no warranty for the work (except to the extent that warranties are provided),... Page 1237 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program,... Page 1238 keep intact all notices of the absence of any warranty; and give all recipients a copy of this License... Page 1239 in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a... Page 1240 tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold... Page 1241 License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire... Page 1242 License, you may add to a covered work material governed by the terms of that license document, provided that... Page 1243 modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or... Page 1244 propagate the contents of its contributor version. In the following three paragraphs, a "patent license" is any express agreement... Page 1245 otherwise be available to you under applicable patent law. 12. No Surrender of Others' Freedom. If conditions are imposed... Page 1246 author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty.... Page 1256 (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for... Page 1257 you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy... Page 1258 Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the... Page 1259 modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License... Page 1260 may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among... Page 1261 END OF TERMS AND CONDITIONS Appendix: How to Apply These Terms to Your New Programs If you develop a... Page 1262 Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James... Page 1263 On Debian systems, the complete text of the GNU General Public License version 2 can be found in `/usr/share/common-licenses/GPL-2'.... Page 1264 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave,... Page 1265 Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of... Page 1266 b) You must cause any work that you distribute or publish, that in whole or in part contains or... Page 1267 machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above... Page 1268 restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third... Page 1269 Each version is given a distinguishing version number. If the Program specifies a version number of this License which... Page 1270 to attach them to the start of each source file to most effectively convey the exclusion of warranty; and... Page 1271 consider it more useful to permit linking proprietary applications with the library. If this is what you want to... Page 1272 communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source... Page 1273 stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion... Page 1274 The most recent officially distributed version can be found at http://e2fsprogs.sourceforge.net. If you need to make a distribution, that's... Page 1275 For example, if you distribute copies of such a program, whether gratis or for a fee, you must give... Page 1276 conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the... Page 1277 In addition, mere aggregation of another work not based on the Program with the Program (or with a work... Page 1278 this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You... Page 1279 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of... Page 1280 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM... Page 1281 The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of... Page 1282 have the freedom to distribute copies of free software (and charge for this service if you wish), that you... Page 1283 a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and... Page 1284 "Source code" for a work means the preferred form of the work for making modifications to it. For a... Page 1285 (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent... Page 1286 must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software... Page 1287 Library is used in it and that the Library and its use are covered by this License. You must... Page 1288 facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the... Page 1289 all those who receive copies directly or indirectly through you, then the only way you could satisfy both it... Page 1290 decision will be guided by the two goals of preserving the free status of all derivatives of our free... Page 1291 version 2 of the License, or (at your option) any later version. This library is distributed in the hope... Page 1300 This package, the EXT2 filesystem utilities, is protected by the GNU Public License. Copyright (c) 1993, 1994, 1995, 1996,... Page 1301 This is the Debian GNU/Linux prepackaged version of the ss command-line interface parsing library library. It is currently distributed... Page 1302 Public License can be found in `/usr/share/common-licenses/GPL-2'. This package was added to the e2fsprogs debian source package by Theodore... Page 1303 copyright (c) 2001 Alcove <http://www.alcove.com/> copyright (c) 1997 Klee Dienes copyright (c) 1995-1996 Michael Nonweiler <mrn20@cam.ac.uk> Upstream Author: Theodore... Page 1304 a more recent version that is still in ALPHA testing (i.e., either using the "WIP" test distributions or one... Page 1305 rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which... Page 1306 along with the Program. You may charge a fee for the physical act of transferring a copy, and you... Page 1307 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object... Page 1308 signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These... Page 1309 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by... Page 1310 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF... Page 1311 You should also get your employer (if you work as a programmer) or your school, if any, to sign... Page 1312 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to... Page 1313 Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing,... Page 1314 interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying,... Page 1315 be optional: if the application does not supply it, the square root function must still compute square roots.) These... Page 1316 from a designated place, then offering equivalent access to copy the source code from the same place satisfies the... Page 1317 directing the user to the copy of this License. Also, you must do one of these things: a) Accompany... Page 1318 a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any... Page 1320 NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO... Page 1321 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public License for more details. You should... Page 1322 `echo $(my_dir) | sed -e 's;lib/;;'`/$(BSD_LIB) $(BSD_LIB)) install-shlibs install:: $(BSD_LIB) @echo "INSTALL_PROGRAM $(BSDLIB_INSTALL_DIR)/$(BSD_LIB)" @$(INSTALL_PROGRAM) $(BSD_LIB) \ $(DESTDIR)$(BSDLIB_INSTALL_DIR)/$(BSD_LIB) @-$(LDCONFIG) install-strip:... Page 1323 3. The name of the author may not be used to endorse or promote products derived from this software... Page 1324 * Permission to use, copy, modify, and distribute this software and * its documentation for any purpose is hereby... Page 1326 GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program... Page 1327 notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute... Page 1328 The source code for a work means the preferred form of the work for making modifications to it. For... Page 1329 License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For... Page 1330 programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted... Page 1331 (at your option) any later version. This program is distributed in the hope that it will be useful, but... Page 1332 Copyright (C) 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted... Page 1333 version, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free... Page 1334 General Public License rather than by this special one. GNU LIBRARY GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING,... Page 1335 2. You may modify your copy or copies of the Library or any portion of it, thus forming a... Page 1336 the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public... Page 1337 threshold for this to be true is not precisely defined by law. If such an object file uses only... Page 1338 specified materials from the same place. d) Verify that the user has already received a copy of these materials... Page 1339 modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License... Page 1340 so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates... Page 1342 * (Student Information Processing Board) * * Permission to use, copy, modify, and distribute this software and * its... Page 1343 These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify... Page 1344 concluded that weaker conditions might promote sharing better. However, unrestricted linking of non-free programs would deprive the users of... Page 1345 Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The... Page 1347 compelled to copy the source along with the object code. 5. A program that contains no derivative of any... Page 1348 a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used... Page 1349 facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined... Page 1350 It is not the purpose of this section to induce you to infringe any patents or other property right... Page 1351 WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT... Page 1352 You should have received a copy of the GNU Library General Public License along with this library; if not,... Page 1353 in new free programs; and that you know you can do these things. To protect your rights, we need... Page 1354 running the Program is not restricted, and the output from the Program is covered only if its contents constitute... Page 1355 entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the... Page 1356 compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute... Page 1357 integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous... Page 1358 TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE... Page 1359 Gnomovision version 69, Copyright (C) 19yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type 'show... Page 1360 "The Library" refers to a covered work governed by this License, other than an Application or a Combined Work... Page 1361 a header file that is part of the Library. You may convey such object code under terms of your... Page 1362 Version. e) Provide Installation Information, but only if you would otherwise be required to provide such information under section... Page 1363 whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of... Page 1364 that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that... Page 1365 permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a... Page 1366 includes interface definition files associated with source files for the work, and the source code for shared libraries and... Page 1367 is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention... Page 1368 and which are not combined with it such as to form a larger program, in or on a volume... Page 1369 Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these... Page 1370 network may be denied when the modification itself materially and adversely affects the operation of the network or violates... Page 1371 f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions... Page 1372 Termination of your rights under this section does not terminate the licenses of parties who have received copies or... Page 1373 A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or... Page 1374 work if you are a party to an arrangement with a third party that is in the business of... Page 1375 option of following the terms and conditions either of that numbered version or of any later version published by... Page 1376 END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new... Page 1377 The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a... Page 1378 Also, for each author's protection and ours, we want to make certain that everyone understands that there is no... Page 1379 of it, thus forming a work based on the Program, and copy and distribute such modifications or work under... Page 1380 source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily... Page 1381 the Program or works based on it. 6. Each time you redistribute the Program (or any work based on... Page 1382 the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised... Page 1383 If you develop a new program, and you want it to be of the greatest possible use to the... Page 1391 be called something other than 'show w' and 'show c'; they could even be mouse-clicks or menu items--whatever suits... Page 1392 disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer... Page 1393 General Public License applies to most of the Free Software Foundation's software and to any other program whose authors... Page 1394 a notice placed by the copyright holder saying it may be distributed under the terms of this General Public... Page 1395 does not normally print such an announcement, your work based on the Program is not required to print an... Page 1396 control compilation and installation of the executable. However, as a special exception, the source code distributed need not include... Page 1397 the only way you could satisfy both it and this License would be to refrain entirely from distribution of... Page 1398 of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse... Page 1399 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have... Page 1407 This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine... Page 14081.140 FAT32 0.6 1.140.1 Available under license : /* * Copyright (C) 2003-2009 JNode.org * 2009-2013 Matthias Treydte <mt@waldheinz.de> *... Page 1409 surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or... Page 1410 The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a... Page 1411 d) If a facility in the modified Library refers to a function or a table of data to be... Page 1412 However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of... Page 1413 For an executable, the required form of the "work that uses the Library" must include any data and utility... Page 1416 version 2 or later (GPL v2+). See the file COPYING.GPLv2 for details. None of these parts are used by... Page 1417 for you. Read the file COPYING.LGPLv3 or, if you have enabled GPL parts, COPYING.GPLv3 to learn the exact legal... Page 1425 The licenses for most software and other practical works are designed to take away your freedom to share and... Page 1426 Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use... Page 1427 the interface presents a list of user commands or options, such as a menu, a prominent item in the... Page 1428 copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited... Page 1429 You may charge any price or no price for each copy that you convey, and you may offer support... Page 1430 (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for... Page 1431 doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, "normally... Page 1432 that they are valid under applicable law. If additional permissions apply only to part of the Program, that part... Page 1433 If you add terms to a covered work in accord with this section, you must place, in the relevant... Page 1434 10. Automatic Licensing of Downstream Recipients. Each time you convey a covered work, the recipient automatically receives a license... Page 1435 agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent... Page 1436 If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this... Page 1437 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT... Page 1438 This program is free software: you can redistribute it and/or modify it under the terms of the GNU General... Page 1439 the version number 2.1.] Preamble The licenses for most software are designed to take away your freedom to share... Page 1440 Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure... Page 1441 that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification... Page 1442 warranty; and distribute a copy of this License along with the Library. You may charge a fee for the... Page 1443 exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere... Page 1444 When a "work that uses the Library" uses material from a header file that is part of the Library,... Page 1445 Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present... Page 1446 where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link... Page 1447 implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through... Page 1448 PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY... Page 1450 The "Corresponding Application Code" for a Combined Work means the object code and/or source code for the Application, including... Page 1451 the following: a) Give prominent notice with each copy of the Combined Work that the Library is used in... Page 1452 License, and convey such a combined library under terms of your choice, if you do both of the following:... Page 14601.143.1 Available under license : FFmpeg: Most files in FFmpeg are under the GNU Lesser General Public License version 2.1... Page 1461 * The files libavcodec/jfdctfst.c, libavcodec/jfdctint_template.c and libavcodec/jrevdct.c are taken from libjpeg, see the top of the files for licensing... Page 1469 Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this... Page 1470 can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The... Page 1471 parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of... Page 1472 can regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code... Page 1473 You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that... Page 1474 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections... Page 1475 A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System... Page 1476 source code form), and must require no special password or key for unpacking, reading or copying. 7. Additional Terms.... Page 1477 All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as... Page 1478 You are not required to accept this License in order to receive or run a copy of the Program.... Page 1479 patent sublicenses in a manner consistent with the requirements of this License. Each contributor grants you a non-exclusive, worldwide,... Page 1480 for and in connection with specific products or compilations that contain the covered work, unless you entered into that... Page 1481 versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version... Page 1483 GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin... Page 1484 library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the... Page 1485 In other cases, permission to use a particular library in non-free programs enables a greater number of people to... Page 1493 This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the... Page 1494 A "Combined Work" is a work produced by combining or linking an Application with the Library. The particular version... Page 1495 b) Accompany the object code with a copy of the GNU GPL and this license document. 4. Combined Works.... Page 1496 the Minimal Corresponding Source and Corresponding Application Code. If you use option 4d1, you must provide the Installation Information... Page 14971.144.1 Available under license : $File: COPYING,v 1.1 2008/02/05 19:08:11 christos Exp $ Copyright (c) Ian F. Darwin 1986, 1987,... Page 1498 this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice,... Page 1499 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # ltmain.sh -... Page 1500 # TION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. # # Except as contained... Page 1501 * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS... Page 1502 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,... Page 1503 "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation... Page 1504 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to... Page 1505 as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or... Page 1506 License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility,... Page 1507 software and other kinds of works. The licenses for most software and other practical works are designed to take... Page 1508 of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software... Page 1509 extent that warranties are provided), that licensees may convey the work under this License, and how to view a... Page 1510 All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable... Page 1511 recipients a copy of this License along with the Program. You may charge any price or no price for... Page 1512 a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by... Page 1513 or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product... Page 1514 Additional permissions that are applicable to the entire Program shall be treated as though they were included in this... Page 1515 of that license document, provided that the further restriction does not survive such relicensing or conveying. If you add... Page 1516 not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License... Page 1517 In the following three paragraphs, a "patent license" is any express agreement or commitment, however denominated, not to enforce... Page 1518 12. No Surrender of Others' Freedom. If conditions are imposed on you (whether by court order, agreement or otherwise)... Page 1519 later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE... Page 1520 Copyright (C) <year> <name of author> This program is free software: you can redistribute it and/or modify it under... Page 1521 modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above... Page 1522 price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of... Page 1523 the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered... Page 1524 sections when you distribute them as separate works. But when you distribute the same sections as part of a... Page 1525 If distribution of executable or object code is made by offering access to copy from a designated place, then... Page 1527 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY... Page 1528 Also add information on how to contact you by electronic and paper mail. If the program is interactive, make... Page 1529 is provided "as is" without express or implied warranty. THE AUTHOR(S) DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,... Page 15301.153 Freemarker 2.3.19 1.153.1 Available under license : FreeMarker 1.x was released under the LGPL license. Later, by community consensus,... Page 1531 behalf of the Visigoth Software Society. For more information on the Visigoth Software Society, please see http://www.visigoths.org/ ------------------------------------------------------------------------------ FREEMARKER... Page 1532 * 4. Neither the name "FreeMarker", "Visigoth", nor any of the names of the * project contributors may be... Page 1533 "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall... Page 1534 You must give any other recipients of the Work or Derivative Works a copy of this License; and You... Page 1535 and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of... Page 1536 * "This product includes software developed by the * Visigoth Software Society (http://www.visigoths.org/)." * Alternately, this acknowledgement may appear... Page 1537 to the original BSD license *with* an advertising clause that forces you to explicitly cite the FreeType project in... Page 1538 o You can use this software for whatever you want, in parts or full form, without having to pay... Page 1539 original, unmodified form as distributed in the original archive. If you are unsure whether or not a particular file... Page 1540 -------------- Neither the FreeType authors and contributors nor you shall use the name of the other for commercial, advertising,... Page 1548 Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty.... Page 1549 using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You... Page 1550 refers to any such program or work, and a "work based on the Program" means either the Program or... Page 1552 anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so... Page 1557 Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for... Page 1558 addressed as "you". A "library" means a collection of software functions and/or data prepared so as to be conveniently... Page 1562 distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating... Page 1564 Each version is given a distinguishing version number. If the Library specifies a version number of this License which... Page 1565 ordinary General Public License). To apply these terms, attach the following notices to the library. It is safest to... Page 1567 Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing... Page 1568 GNU LIBRARY GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to... Page 1569 of it, thus forming a work based on the Library, and copy and distribute such modifications or work under... Page 1570 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License... Page 1571 If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small... Page 1572 d) Verify that the user has already received a copy of these materials or that you have already sent... Page 1573 all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each... Page 1574 written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of... Page 1575 How to Apply These Terms to Your New Libraries If you develop a new library, and you want it... Page 1576 That's all there is to it! # Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, #... Page 1598 Copyright (C) 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted... Page 1607 END OF TERMS AND CONDITIONS Appendix: How to Apply These Terms to Your New Libraries If you develop a... Page 16081.159 gawk 3.1.7 :10.el6 1.159.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C)... Page 1609 For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software.... Page 1610 To "propagate" a work means to do anything with it that, without permission, would make you directly or secondarily... Page 1611 which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files... Page 1612 circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect... Page 1613 works, which are not by their nature extensions of the covered work, and which are not combined with it... Page 1614 Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available... Page 1615 the User Product in which it has been modified or installed. Access to a network may be denied when... Page 1616 trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone... Page 1619 specifically granted under this License. You may not convey a covered work if you are a party to an... Page 1620 Public License "or any later version" applies to it, you have the option of following the terms and conditions... Page 1623 distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone... Page 1624 2. You may modify your copy or copies of the Program or any portion of it, thus forming a... Page 1625 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections... Page 1626 Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,... Page 1627 those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this... Page 1628 Appendix: How to Apply These Terms to Your New Programs If you develop a new program, and you want... Page 1630 you. You must make sure that they, too, receive or can get the source code. If you link a... Page 1631 permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs... Page 1632 writing it). Whether that is true depends on what the Library does and what the program that uses the... Page 1633 distribute the same sections as part of a whole which is a work based on the Library, the distribution... Page 1634 work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this... Page 1635 uses the Library", as object code and/or source code, so that the user can modify the Library and then... Page 1639 Also add information on how to contact you by electronic and paper mail. You should also get your employer... Page 1640 distribute copies of the software, or if you modify it. For example, if you distribute copies of such a... Page 1641 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any... Page 1642 collective works based on the Program. In addition, mere aggregation of another work not based on the Program with... Page 1643 void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from... Page 1645 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE... Page 1646 under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the... Page 1655 countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License... Page 1657 That's all there is to it! GCC RUNTIME LIBRARY EXCEPTION Version 3.1, 31 March 2009 Copyright (C) 2009 Free... Page 1658 use of source code generators and preprocessors need not be considered part of the Compilation Process, since the Compilation... Page 1659 have the freedom to distribute copies of free software (and charge for them if you wish), that you receive... Page 1660 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws... Page 1661 interfaces specified for a particular programming language, one that is widely used among developers working in that language. The... Page 1662 with facilities for running those works, provided that you comply with the terms of this License in conveying all... Page 1663 b) The work must carry prominent notices stating that it is released under this License and any conditions added... Page 1664 medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this... Page 1665 and execute modified versions of a covered work in that User Product from a modified version of its Corresponding... Page 1666 Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized... Page 1667 You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise... Page 1668 work results from an entity transaction, each party to that transaction who receives a copy of the work also... Page 1669 available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or... Page 1670 13. Use with the GNU Affero General Public License. Notwithstanding any other provision of this License, you have permission... Page 1671 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY... Page 1672 along with this program. If not, see <http://www.gnu.org/licenses/>. Also add information on how to contact you by electronic and... Page 1673 An "Application" is any work that makes use of an interface provided by the Library, but which is not... Page 1674 (ten or fewer lines in length), you do both of the following: a) Give prominent notice with each copy... Page 1675 GNU GPL, and only to the extent that such information is necessary to install and execute a modified version... Page 16761.161 gd 2.0.35 :11.el6 1.161.1 Available under license : Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002... Page 1677 This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not... Page 1678 * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT... Page 1679 This does not affect your ownership of the derived work itself, and the intent is to assure proper credit... Page 1680 To protect your rights, we need to prevent others from denying you these rights or asking you to surrender... Page 1681 "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers... Page 1682 than the work as a whole, that (a) is included in the normal form of packaging a Major Component,... Page 1683 and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with... Page 1684 "keep intact all notices". c) You must license the entire work, as a whole, under this License to anyone... Page 1685 c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding... Page 1686 modification has been made. If you convey an object code work under this section in, or with, or specifically... Page 1687 a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or... Page 1688 this License (including any patent licenses granted under the third paragraph of section 11). However, if you cease all... Page 1689 Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it... Page 1690 actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's... Page 1691 under version 3 of the GNU Affero General Public License into a single combined work, and to convey the... Page 1692 THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES... Page 1693 If the program does terminal interaction, make it output a short notice like this when it starts in an... Page 1695 covered by this License. b) Accompany the object code with a copy of the GNU GPL and this license... Page 1696 you use option 4d0, the Installation Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If you... Page 1697 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of... Page 1698 program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free... Page 1699 parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you... Page 1702 either of that version or of any later version published by the Free Software Foundation. If the Program does... Page 1704 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place,... Page 1712 permission to copy, distribute and/or modify the library. Also, for each distributor's protection, we want to make certain that... Page 1717 least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no... Page 1718 terminated so long as such parties remain in full compliance. 9. You are not required to accept this License,... Page 1719 be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is... Page 1720 CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS... Page 1721 <signature of Ty Coon>, 1 April 1990 Ty Coon, President of Vice That's all there is to it! GNU... Page 1722 Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license... Page 1724 appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to... Page 1725 Thus, it is not the intent of this section to claim rights or contest your rights to work written... Page 1726 library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When... Page 1727 b) Accompany the work with a written offer, valid for at least three years, to give the same user... Page 1728 rights under this License. However, parties who have received copies, or rights, from you under this License will not... Page 1730 AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR... Page 1731 library `Frob' (a library for tweaking knobs) written by James Random Hacker. <signature of Ty Coon>, 1 April 1990... Page 1732 code. If you link other code with the library, you must provide complete object files to the recipients, so... Page 1733 a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case... Page 1738 distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single... Page 1739 distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a... Page 1740 programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which... Page 1741 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser... Page 1742 share and change all versions of a program--to make sure it remains free software for all its users. We,... Page 1743 avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this,... Page 1744 1. Source Code. The "source code" for a work means the preferred form of the work for making modifications... Page 1745 covered work is covered by this License only if the output, given its content, constitutes a covered work. This... Page 1746 5. Conveying Modified Source Versions. You may convey a work based on the Program, or the modifications to produce... Page 1747 b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by... Page 1748 of the particular user or of the way in which the particular user actually uses, or expects or is... Page 1749 this License without regard to the additional permissions. When you convey a copy of a covered work, you may... Page 1750 additional terms that apply to those files, or a notice indicating where to find the applicable terms. Additional terms,... Page 1751 Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run,... Page 1752 party means to make such an agreement or commitment not to enforce a patent against the party. If you... Page 1753 excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy... Page 1754 APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"... Page 1756 software--to make sure the software is free for all its users. This General Public License applies to most of... Page 1757 0. This License applies to any program or other work which contains a notice placed by the copyright holder... Page 1758 License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based... Page 1759 associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a... Page 1761 make exceptions for this. Our decision will be guided by the two goals of preserving the free status of... Page 1762 but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the... Page 1773 This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the... Page 1774 ensure that, in the event an Application does not supply the function or data, the facility still operates, and... Page 1775 recombine or relink the Application with a modified version of the Linked Version to produce a modified Combined Work,... Page 1776 Library as you received it specifies that a certain numbered version of the GNU Lesser General Public License "or... Page 1777 To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to... Page 1778 Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages... Page 1779 copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or... Page 1780 in the event an application does not supply such function or table, the facility still operates, and performs whatever... Page 1781 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in... Page 1782 modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give... Page 1783 components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself... Page 1784 You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of... Page 1785 specifies a version number of this License which applies to it and "any later version", you have the option... Page 1786 To apply these terms, attach the following notices to the library. It is safest to attach them to the... Page 1787 License is intended to guarantee your freedom to share and change free software--to make sure the software is free... Page 1789 these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself... Page 1790 code means all the source code for all modules it contains, plus any associated interface definition files, plus the... Page 1791 license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through... Page 1792 Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided... Page 1796 announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you... Page 1800 the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program... Page 1807 Copyright (C) 19yy <name of author> This program is free software; you can redistribute it and/or modify it under... Page 1808 GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation, Inc. 675 Mass Ave,... Page 1809 that everyone understands that there is no warranty for this free library. If the library is modified by someone... Page 1810 works together with the library. Note that it is possible for a library to be covered by the ordinary... Page 1814 c) If distribution of the work is made by offering access to copy from a designated place, offer equivalent... Page 1815 signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These... Page 1816 certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this... Page 1817 FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN... Page 1818 That's all there is to it! 1.165 gdbm 1.8.0 :36.el6 1.165.1 Available under license : GNU GENERAL PUBLIC LICENSE... Page 18261.166 gdk-pixbuf2 2.24.1 :6.el6_7 1.166.1 Available under license : GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C)... Page 1836 Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James... Page 1837 or for a fee, you must give the recipients all the rights that we gave you. You must make... Page 1838 libraries themselves. This Library General Public License is intended to permit developers of non-free programs to use free libraries,... Page 1839 on the Library (independent of the use of the Library in a tool for writing it). Whether that is... Page 1841 linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a... Page 1842 with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so... Page 1843 that part of it is a work based on the Library, and explaining where to find the accompanying uncombined... Page 1844 integrity of the free software distribution system which is implemented by public license practices. Many people have made generous... Page 1845 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE... Page 1848 treats it as such. Because of this blurred distinction, using the ordinary General Public License for libraries did not... Page 1849 making modifications to it. For a library, complete source code means all the source code for all modules it... Page 1850 application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if... Page 1851 If distribution of object code is made by offering access to copy from a designated place, then offering equivalent... Page 1852 during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as... Page 1857 AND/OR REDISTRIBUTE THE WORK AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR... Page 18581.169 glibc 2.12 :1.166.el6_7.3 1.169.1 Available under license : GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C)... Page 1872 all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each... Page 1873 countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of... Page 1874 How to Apply These Terms to Your New Programs If you develop a new program, and you want it... Page 1876 distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain... Page 1877 of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License... Page 1878 portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without... Page 1879 table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in... Page 1880 derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and... Page 1881 engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library... Page 1882 which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the... Page 1883 this License. ^L 11. If, as a consequence of a court judgment or allegation of patent infringement or for... Page 1886 license: Copyright (C) 1991 Regents of the University of California. All rights reserved. Redistribution and use in source and... Page 1887 INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN... Page 1888 CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS... Page 1889 All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that... Page 1890 documentation and/or other materials provided with the distribution. 4. [The copyright holder has authorized the removal of this clause.]... Page 1891 We have designed this License in order to use it for manuals for free software, because free software needs... Page 1892 to text formatters. A copy made in an otherwise Transparent file format whose markup has been designed to thwart... Page 1893 the full title with all words of the title equally prominent and visible. You may add other material on... Page 1894 List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications... Page 1895 preserve the section's title, and preserve in the section all the substance and tone of each of the contributor... Page 1896 You may combine the Document with other documents released under this License, under the terms defined in section 4... Page 1897 If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the... Page 1898 @end enumerate @page @appendixsubsec ADDENDUM: How to use this License for your documents To use this License in a... Page 1899 credits must appear in the documentation. 3. Altered versions must be plainly marked as such, and must not be... Page 1907 it if you want it; that you can change the software and use pieces of it in new free... Page 1908 the library. We call this license the "Lesser" General Public License because it does Less to protect the user's... Page 1909 The "Library", below, refers to any such software library or work which has been distributed under these terms. A... Page 1911 This option is useful when you wish to copy part of the code of the Library into a program... Page 1912 6. As an exception to the Sections above, you may also combine or link a "work that uses the... Page 1915 versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit... Page 1916 If you develop a new library, and you want it to be of the greatest possible use to the... Page 1917 Software Foundation. These notices all require that a copy of the notice be included in the accompanying documentation and... Page 1918 advertising or publicity pertaining to distribution of the document or software without specific, written prior permission. THE SOFTWARE IS... Page 1919 Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that both the... Page 1920 The following license covers the files from Intel's "Highly Optimized Mathematical Functions for Itanium" collection: Intel License Agreement Copyright... Page 1921 way or form. 1. All terms of the all other applicable copyrights and licenses must be followed. 2. Redistributions... Page 1922 Copyright (C) 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is... Page 19321.171 glibc 2.12 :1.149.el6_6.5 1.171.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C)... Page 1934 becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent... Page 1939 distribute. ^L 7. You may place library facilities that are a work based on the Library side-by-side in a... Page 1941 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible... Page 1942 <one line to give the library's name and a brief idea of what it does.> Copyright (C) <year> <name... Page 1951 WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. The Sun RPC support (from rpcsrc-4.0) is covered by the following... Page 1952 Carnegie Mellon requests users of this software to return to Software Distribution Coordinator School of Computer Science Carnegie Mellon... Page 1953 modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above... Page 1954 may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE... Page 1957 A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application... Page 1958 c) You must cause the whole of the work to be licensed at no charge to all third parties... Page 1959 Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU... Page 1960 distribute the object code for the work under the terms of Section 6. Any executables containing that work also... Page 1962 You are not responsible for enforcing compliance by third parties to this License. 11. If, as a consequence of... Page 19721.173 gmp 4.3.1 :7.el6_2.2 1.173.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C)... Page 1987 You may convey a covered work under sections 3 and 4 of this License without being bound by section... Page 1988 b) Accompany the Combined Work with a copy of the GNU GPL and this license document. c) For a... Page 1989 b) Give prominent notice with the combined library that part of it is a work based on the Library,... Page 1990 software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of... Page 1991 make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program... Page 1992 The "source code" for a work means the preferred form of the work for making modifications to it. "Object... Page 1993 content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by... Page 1994 You may convey a work based on the Program, or the modifications to produce it from the Program, in... Page 1996 actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of... Page 1997 When you convey a copy of a covered work, you may at your option remove any additional permissions from... Page 1998 where to find the applicable terms. Additional terms, permissive or non-permissive, may be stated in the form of a... Page 1999 receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You... Page 2000 patent against the party. If you convey a covered work, knowingly relying on a patent license, and the Corresponding... Page 2001 covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as... Page 2002 HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,... Page 2004 As used herein, "this License" refers to version 3 of the GNU Lesser General Public License, and the "GNU... Page 2005 3. Object Code Incorporating Material from Library Header Files. The object code form of an Application may incorporate material... Page 2006 a copy of the Library already present on the user's computer system, and (b) will operate properly with a... Page 2007 General Public License ever published by the Free Software Foundation. If the Library as you received it specifies that... Page 2008 rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you... Page 2009 are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages... Page 2010 straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work... Page 2011 its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that... Page 2012 under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable... Page 2013 You must give prominent notice with each copy of the work that the Library is used in it and... Page 2014 the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not... Page 2015 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason... Page 2016 conditions either of that version or of any later version published by the Free Software Foundation. If the Library... Page 2017 safest to attach them to the start of each source file to most effectively convey the exclusion of warranty;... Page 2019 products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains... Page 2020 feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for... Page 2022 non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence... Page 2023 machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code... Page 2024 A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used... Page 2025 "Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of... Page 2026 a further restriction but permits relicensing or conveying under this License, you may add to a covered work material... Page 2027 nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright... Page 2028 make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.... Page 2029 any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.... Page 2030 permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing... Page 2033 a) under this License, provided that you make a good faith effort to ensure that, in the event an... Page 2034 suitable for, and under terms that permit, the user to recombine or relink the Application with a modified version... Page 2035 Each version is given a distinguishing version number. If the Library as you received it specifies that a certain... Page 2038 packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable... Page 2039 your copyrighted material outside their relationship with you. Conveying under any other circumstances is permitted solely under the conditions... Page 2040 c) You must license the entire work, as a whole, under this License to anyone who comes into possession... Page 2042 If you convey an object code work under this section in, or with, or specifically for use in, a... Page 2044 paragraph of section 11). However, if you cease all violation of this License, then your license from a particular... Page 2045 the predecessor has it or can get it with reasonable efforts. You may not impose any further restrictions on... Page 2046 covered work in a country, or your recipient's use of the covered work in a country, would infringe one... Page 2047 combined work, and to convey the resulting work. The terms of this License will continue to apply to the... Page 2048 GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT... Page 2049 notice like this when it starts in an interactive mode: <program> Copyright (C) <year> <name of author> This program... Page 20531.178.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright (C) 2007 Free Software Foundation,... Page 2054 authors of previous versions. Some devices are designed to deny users access to install or run modified versions of... Page 2055 distribution (with or without modification), making available to the public, and in some countries other activities as well. To... Page 2056 such as by intimate data communication or control flow between those subprograms and other parts of the work. The... Page 2057 users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may... Page 2058 used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion... Page 2059 e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding... Page 2060 Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is... Page 2061 it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on... Page 2062 reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not... Page 2063 by this License, of making, using, or selling its contributor version, but do not include claims that would be... Page 2064 the work, and under which the third party grants, to any of the parties who would receive the covered... Page 2065 GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program... Page 2067 the library. If this is what you want to do, use the GNU Lesser General Public License instead of... Page 2068 it. And you must show them these terms so they know their rights. We protect your rights with a... Page 2069 case, there is little to gain by limiting the free library to free software only, so we use the... Page 2074 Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such... Page 2075 license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through... Page 2076 Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving... Page 2077 License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any... Page 2078 free software---to make sure the software is free for all its users. This license, the Lesser General Public License,... Page 2079 Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU... Page 2080 @subheading TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION @enumerate 0 @item This License Agreement applies to any software... Page 2081 fee. @item You may modify your copy or copies of the Library or any portion of it, thus forming... Page 2083 However, linking a ``work that uses the Library'' with the Library creates an executable that is a derivative of... Page 2084 uses the Library'', as object code and/or source code, so that the user can modify the Library and then... Page 2085 You may place library facilities that are a work based on the Library side-by-side in a single library together... Page 2086 @item If, as a consequence of a court judgment or allegation of patent infringement or for any other reason... Page 2087 specifies a version number of this License which applies to it and ``any later version'', you have the option... Page 2088 @iftex @heading END OF TERMS AND CONDITIONS @end iftex @ifinfo @center END OF TERMS AND CONDITIONS @end ifinfo @page... Page 2089 @smallexample Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by... Page 2090 @item APPLICABILITY AND DEFINITIONS This License applies to any manual or other work, in any medium, that contains a... Page 2091 for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an... Page 2092 You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the... Page 2093 Document well before redistributing any large number of copies, to give them a chance to provide you with an... Page 2094 @item Include an unaltered copy of this License. @item Preserve the section Entitled ``History'', Preserve its Title, and add... Page 2095 list of Invariant Sections in the Modified Version's license notice. These titles must be distinct from any other section... Page 2096 @item COLLECTIONS OF DOCUMENTS You may make a collection consisting of the Document and other documents released under this... Page 2097 or disclaimer, the original version will prevail. If a section in the Document is Entitled ``Acknowledgements'', ``Dedications'', or ``History'',... Page 2098 of any later version that has been published (not as a draft) by the Free Software Foundation. If the... Page 2099 @smallexample @group Copyright (C) @var{year} @var{your name}. Permission is granted to copy, distribute and/or modify this document under the... Page 2100 @heading Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works.... Page 2101 individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the... Page 2102 through a computer network, with no transfer of a copy, is not conveying. An interactive user interface displays ``Appropriate... Page 2103 regenerate automatically from other parts of the Corresponding Source. The Corresponding Source for a work in source code form... Page 2105 in or on a volume of a storage or distribution medium, is called an ``aggregate'' if the compilation and... Page 2106 equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding... Page 2107 modified object code on the User Product (for example, the work has been installed in ROM). The requirement to... Page 2108 displayed by works containing it; or @item Prohibiting misrepresentation of the origin of that material, or requiring that modified... Page 2113 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE... Page 2114 You should have received a copy of the GNU General Public License along with this program. If not, see... Page 2117 work under this License, and how to view a copy of this License. If the interface presents a list... Page 2121 into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor... Page 2122 be treated as though they were included in this License, to the extent that they are valid under applicable... Page 2123 not survive such relicensing or conveying. If you add terms to a covered work in accord with this section,... Page 2124 covered work, you indicate your acceptance of this License to do so. 10. Automatic Licensing of Downstream Recipients. Each... Page 2129 as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble The licenses... Page 2131 linked with the Library has the freedom and the wherewithal to run that program using a modified version of... Page 2132 all the notices that refer to this License and to the absence of any warranty; and distribute a copy... Page 2133 your rights to work written entirely by you; rather, the intent is to exercise the right to control the... Page 2134 Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from... Page 2135 b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1)... Page 2147 # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software... Page 2149 The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS 0. Definitions. "This License" refers... Page 2150 form of a work. A "Standard Interface" means an interface that either is an official standard defined by a... Page 2151 You may make, run and propagate covered works that you do not convey, without conditions so long as your... Page 2152 terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent... Page 2153 long as you offer spare parts or customer support for that product model, to give anyone who possesses the... Page 2154 the only significant mode of use of the product. "Installation Information" for a User Product means any methods, procedures,... Page 2155 it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.)... Page 2156 form of a separately written license, or stated as exceptions; the above requirements apply either way. 8. Termination. You... Page 2157 An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing... Page 2158 and the Corresponding Source of the work is not available for anyone to copy, free of charge and under... Page 2159 to collect a royalty for further conveying from those to whom you convey the Program, the only way you... Page 2160 THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND... Page 2161 the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program... Page 2162 Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The... Page 2163 have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially... Page 2164 to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice,... Page 2165 same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on... Page 2166 keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply... Page 2167 of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this... Page 2170 restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying... Page 2171 to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to... Page 2172 patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run,... Page 2173 Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement... Page 2174 Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author... Page 2175 free software which everyone can redistribute and change under these terms. To do so, attach the following notices to... Page 2176 # This originates from X11R5 (mit/util/scripts/install.sh), which was # later released in X11R6 (xc/config/util/install.sh) with the # following copyright... Page 2192 changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed... Page 2193 computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public,... Page 2194 linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow... Page 2195 modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights... Page 2196 "aggregate" if the compilation and its resulting copyright are not used to limit the access or legal rights of... Page 2198 protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must... Page 2199 material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the... Page 2200 this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new... Page 2201 hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its... Page 2202 to the third party based on the extent of your activity of conveying the work, and under which the... Page 2203 Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose... Page 2205 may consider it more useful to permit linking proprietary applications with the library. If this is what you want... Page 2206 Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and... Page 2207 A "covered work" means either the unmodified Program or a work based on the Program. To "propagate" a work... Page 2208 work) run the object code and to modify the work, including scripts to control those activities. However, it does... Page 2209 similar laws prohibiting or restricting circumvention of such measures. When you convey a covered work, you waive any legal... Page 2210 interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of... Page 2211 copy the object code is a network server, the Corresponding Source may be on a different server (operated by... Page 2212 The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or... Page 2213 d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining... Page 2214 violation by some reasonable means, this is the first time you have received notice of violation of this License... Page 2215 A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on... Page 2216 A patent license is "discriminatory" if it does not include within the scope of its coverage, prohibits the exercise... Page 2217 address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a... Page 2218 reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection... Page 2219 You should also get your employer (if you work as a programmer) or school, if any, to sign a... Page 2220 1. APPLICABILITY AND DEFINITIONS This License applies to any manual or other work that contains a notice placed by... Page 2221 PostScript, PDF, proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for... Page 2222 If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a... Page 2223 H. Include an unaltered copy of this License. I. Preserve the section entitled "History", and its title, and add... Page 2224 permission from the previous publisher that added the old one. The author(s) and publisher(s) of the Document do not... Page 2225 A compilation of the Document or its derivatives with other separate and independent documents or works, in or on... Page 2226 http:///www.gnu.org/copyleft/. Each version of the License is given a distinguishing version number. If the Document specifies that a particular... Page 2234 ======================================================================== The groff macro file om.tmac and the html documentation pertaining to it are copyright (c) 2002 Peter Schaffter.... Page 2235 Terence Parr parrt@cs.usfca.edu parrt@antlr.org /*** * http://asm.objectweb.org/ * * ASM: a very small and fast Java bytecode manipulation framework... Page 2236 "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by,... Page 2237 on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant... Page 2238 of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source... Page 2239 result of this License or out of the use or inability to use the Work (including but not limited... Page 2240 /* * Copyright 2006 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. * *... Page 22411.187 grub 0.97 :93.el6 1.187.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 2242 that everyone understands that there is no warranty for this free software. If the software is modified by someone... Page 2243 distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of... Page 2244 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written... Page 2256 # # Calling this script install-sh is preferred over install.sh, to prevent # `make' implicit rules from creating a... Page 2257 /* * Mach Operating System * Copyright (c) 1991,1990 Carnegie Mellon University * All Rights Reserved. * * Permission... Page 2266 We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives... Page 2268 under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided... Page 2269 prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any... Page 2270 original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those... Page 2272 school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the... Page 2273 for this service if you wish); that you receive source code or can get it if you want it;... Page 2274 Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser"... Page 2275 (which use some of those functions and data) to form executables. The "Library", below, refers to any such software... Page 2277 subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part... Page 2280 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a... Page 2283 the modified or translated version available in electronic form without charge. However, mere aggregation as part of a larger... Page 2294 OTHER PARTIES PROVIDE THE WORK "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT... Page 2302 this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any... Page 2303 "any later version", you have the option of following the terms and conditions either of that version or of... Page 2306 free use or not licensed at all. Most GNU software, including some libraries, is covered by the ordinary GNU... Page 2307 General Public License (also called "this License"). Each licensee is addressed as "you". A "library" means a collection of... Page 2309 that version instead if you wish.) Do not make any other change in these notices. Once this change is... Page 2311 the source code distributed need not include anything that is normally distributed (in either source or binary form) with... Page 2312 subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the... Page 2314 redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License). To apply these terms,... Page 2323 licensee, and is addressed as ``you''. You accept the license if you copy, modify or distribute the work in... Page 2324 @acronym{DTD}, and standard-conforming simple @acronym{HTML}, PostScript or @acronym{PDF} designed for human modification. Examples of transparent image formats include @acronym{PNG},... Page 2325 @item COPYING IN QUANTITY If you publish printed copies (or copies in media that commonly have printed covers) of... Page 2326 @enumerate A @item Use in the Title Page (and on the covers, if any) a title distinct from that... Page 2327 Preserve the network location, if any, given in the Document for public access to a Transparent copy of the... Page 2328 through arrangements made by) any one entity. If the Document already includes a cover text for the same cover,... Page 2329 @item AGGREGATION WITH INDEPENDENT WORKS A compilation of the Document or its derivatives with other separate and independent documents... Page 2330 automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this... Page 2331 with the Invariant Sections being @var{list their titles}, with the Front-Cover Texts being @var{list}, and with the Back-Cover Texts... Page 2338 Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show... Page 2339 with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a... Page 2340 that says that the Document is released under this License. If a section does not fit the above definition... Page 2341 ``Dedications'', ``Endorsements'', or ``History''.) To ``Preserve the Title'' of such a section when you modify the Document means that... Page 2343 @item Add an appropriate copyright notice for your modifications adjacent to the other copyright notices. @item Include, immediately after... Page 2344 may not be included in the Modified Version. @item Do not retitle any existing section to be Entitled ``Endorsements''... Page 2345 multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the... Page 2346 @item TRANSLATION Translation is considered a kind of modification, so you may distribute translations of the Document under the... Page 2347 as a draft) by the Free Software Foundation. @end enumerate @page @heading ADDENDUM: How to use this License for... Page 23481.195 hal 0.5.14 :11.el6 1.195.1 Available under license : HAL is licensed to you under your choice of the Academic... Page 2349 this obligation by placing a machine-readable copy of the Source Code in an information repository reasonably calculated to permit... Page 2350 theory, whether in tort (including negligence), contract, or otherwise, shall the Licensor be liable to any person for any... Page 2351 12) Attorneys Fees. In any action to enforce the terms of this License or seeking damages relating thereto, the... Page 2352 * The AFL contains a complete copyright grant to the software. The BSD and Apache licenses are vague and... Page 2353 this service if you wish), that you receive source code or can get it if you want it, that... Page 2355 on the Program, the distribution of the whole must be on the terms of this License, whose permissions for... Page 2356 access to copy the source code from the same place counts as distribution of the source code, even though... Page 2357 patents or other property right claims or to contest validity of any such claims; this section has the sole... Page 2358 OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE... Page 2360 Work: Licensed under the Academic Free License version 2.1 1) Grant of Copyright License. Licensor hereby grants You a... Page 2361 in this License shall be interpreted to prohibit Licensor from licensing under different terms from this License any Original... Page 2362 create Derivative Works based upon the Original Work or to exercise any of the rights granted in Section 1... Page 2363 direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii)... Page 2364 license will control changes. The Apache license contains a copyright notice, but the BSD, MIT and UoI/NCSA licenses do... Page 2372 3) Grant of Source Code License. The term "Source Code" means the preferred form of the Original Work for... Page 2373 the warranties of NON-INFRINGEMENT, MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY OF... Page 2374 Convention on Contracts for the International Sale of Goods is expressly excluded. Any use of the Original Work outside... Page 2375 those licenses. * The AFL is written so as to make it clear what software is being licensed (by... Page 2395 Due to the incompatibility between the GPL and the OpenSSL licence, you must apply the GPL/LGPL licence with the... Page 2403 these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights... Page 2404 We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than... Page 2405 which has been distributed under these terms. A "work based on the Library" means either the Library or any... Page 2406 the facility, other than as an argument passed when the facility is invoked, then you must make a good... Page 2407 the Library into a program that is not a library. 4. You may copy and distribute the Library (or... Page 2408 work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms... Page 2409 the materials to be distributed need not include anything that is normally distributed (in either source or binary form)... Page 2413 Upstream Author: Mark S. Lord <mlord@pobox.com> Copyright: /* hdparm.c - Command line interface to get/set hard disk parameters */... Page 2414 anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain... Page 2415 Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of... Page 2417 except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is... Page 2418 through that system in reliance on consistent application of that system; it is up to the author/donor to decide... Page 2420 Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome... Page 2422 modified by someone else and passed on, the recipients should know that what they have is not the original... Page 2423 system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the... Page 2424 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in... Page 2427 that the user who changes the contents of definitions files in the Library will not necessarily be able to... Page 2431 You should have received a copy of the GNU Lesser General Public License along with this library; if not,... Page 2433 combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if... Page 24421.204 hicolor-icon-theme 0.11 :1.1.el6 1.204.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 2449 necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program 'Gnomovision'... Page 24501.206 hmaccalc 0.9.12 :2.el6 1.206.1 Available under license : /* * Copyright 2009 Red Hat, Inc. * * Redistribution and... Page 2451 the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and... Page 2452 "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received... Page 2453 within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in... Page 2454 liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as... Page 2455 This product includes software developed at The Apache Software Foundation (http://www.apache.org/). 1.208 httpcore 4.3.1 1.208.1 Available under license :... Page 2456 transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions... Page 2457 by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the... Page 2458 reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions.... Page 2459 END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache... Page 2460 1. Definitions "Collective Work" means a work, such as a periodical issue, anthology or encyclopedia, in which the Work... Page 2461 The above rights may be exercised in all media and formats whether now known or hereafter devised. The above... Page 2462 CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR... Page 24701.210 hwdata 0.233 :7.6.el6 1.210.1 Available under license : This data is licenced under 2 different licenses 1) GNU General... Page 2474 distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this... Page 2475 certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this... Page 2476 POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If... Page 2478 UNICODE, INC. LICENSE AGREEMENT - DATA FILES AND SOFTWARE Unicode Data Files include all data files under the directories... Page 2479 dealings in these Data Files or Software without prior written authorization of the copyright holder. 1.212 InformixDB 2.5 1.212.1... Page 2487 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of... Page 24941.215 iotop 0.3.2 :7.el6 1.215.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 2508 The hypothetical commands 'show w' and 'show c' should show the appropriate parts of the General Public License. Of... Page 25301.220 iptables 1.4.7 :4.el6 1.220.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 2537 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If... Page 2539 is covered only if its contents constitute a work based on the Program (independent of having been made by... Page 2541 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any... Page 2543 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS... Page 2544 Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type 'show... Page 2545 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES,... Page 2546 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS... Page 2553 mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer)... Page 2561 the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of... Page 2568 * You should have received a copy of the GNU General Public License * along with this program in... Page 2569 copyright notice that is included in or attached to the work (an example is provided in the Appendix below).... Page 2570 or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate... Page 2571 this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms... Page 2572 boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!)... Page 2573 * 3. The end-user documentation included with the redistribution, if * any, must include the following acknowlegement: * "This... Page 2574 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1... Page 2575 to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control... Page 2576 excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work... Page 2577 risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under... Page 2578 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing... Page 2579 THE PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS OF ANY OTHER ENTITY. EACH COPYRIGHT HOLDER DISCLAIMS ANY LIABILITY TO THE... Page 2580 B. Any new file that contains any part of the Original Software or previous Modification; or C. Any new... Page 2581 otherwise makes the Modifications available to a third party. (d) Notwithstanding Section2.2(b) above, no patent license is granted: (1)for... Page 2582 3.6. Larger Works. You may create a Larger Work by combining Covered Software with other code not governed by... Page 2583 alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software... Page 2584 regulation which provides that the language of a contract shall be construed against the drafter shall not apply to... Page 2585 1.7. ''Larger Work'' means a work which combines Covered Code or portions thereof with code not governed by the... Page 2586 Code or ii) the combination of the Original Code with other software or devices. 2.2. Contributor Grant. Subject to... Page 2587 is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the... Page 2588 You must make it absolutely clear that any terms which differ from this License are offered by You alone,... Page 2589 8. TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with... Page 2590 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S.... Page 25911.231 java-1.5.0-gcj 1.5.0.0 :29.1.el6 1.231.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 2599 prior permission. The authors and their employers disclaim all warranties with regard to this software, including all implied warranties... Page 2600 [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU... Page 2601 author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a... Page 2602 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user... Page 2603 you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all... Page 2605 contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by... Page 2606 to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable... Page 2607 b) Give prominent notice with the combined library of the fact that part of it is a work based... Page 2609 OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT... Page 2610 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Also add information on how to contact you... Page 2611 included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF... Page 2612 Contributor (if any), and the Modifications made by that particular Contributor. 1.3. "Covered Software" means (a) the Original Software,... Page 2613 (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone... Page 2614 this License are fulfilled for the Covered Software. 4. Versions of the License. 4.1. New Versions. Sun Microsystems, Inc.... Page 2615 survive termination. 7. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT,... Page 2616 DO NOT TRANSLATE OR LOCALIZE *************************************************************************** %%The following software may be included in this product: Rome Use of any... Page 2617 Apache License, Version 1.1 (historic) http://www.apache.org/licenses/LICENSE-1.1 The 1.1 version of the Apache License was approved by the ASF in... Page 2618 Foundation # FAQ # Licenses # News # Public Records # Donations # Thanks # Contact Foundation Projects #... Page 2619 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the disclaimer that... Page 2621 Use of any of this software is governed by the terms of the license below: Streaming API for XML... Page 2622 Implementation. 1.8. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including wit hout limitation, method, process,... Page 2623 2.1. Copyright Grant. Subject to the terms of this Agreement, each Contributor hereby grants You a non-exclusive, worldwide, royalty-free... Page 2624 3.0 DISTRIBUION RESTRICTIONS. 3.1. Application of Agreement. The Modifications which You create or to which You contribute are governed... Page 2625 "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal... Page 2626 incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each... Page 2627 You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution... Page 2628 indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by... Page 2629 1.12. ?Source Code? means (a) the common form of computer software code in which modifications are made and (b)... Page 2630 otherwise makes the Modifications available to a third party. (d) Notwithstanding Section 2.2(b) above, no patent license is granted:... Page 2631 which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby... Page 2632 6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein... Page 2633 held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This... Page 2634 surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or... Page 2635 change. b) You must cause any work that you distribute or publish, that in whole or in part contains... Page 2637 to time. Such new versions will be similar in spirit to the present version, but may differ in detail... Page 2639 As a special exception, the copyright holders of this library give you permission to link this library with independent... Page 2640 * only if the new code is made subject to such option by the copyright * holder. */ COMMON... Page 2641 Original Software or previous Modification; or C. Any new file that is contributed or otherwise made available under the... Page 2642 otherwise dispose of the Original Software (or portions thereof). (c) The licenses granted in Sections 2.1(a) and (b) are... Page 2643 (d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from... Page 2644 applicable version of this License or the recipients" rights hereunder. You may choose to offer, and to charge a... Page 2645 distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right... Page 2647 NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY... Page 2648 distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission... Page 2649 gratis or for a fee, you must give the recipients all the rights that you have. You must make... Page 2650 copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the... Page 2651 with the Program (or with a work based on the Program) on a volume of a storage or distribution... Page 2652 parties remain in full compliance. 5. You are not required to accept this License, since you have not signed... Page 2654 OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR... Page 2657 this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in... Page 2658 You may add Your own copyright statement to Your modifications and may provide additional or different license terms and... Page 2659 on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if... Page 2661 Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms... Page 2662 or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be... Page 2663 and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this... Page 2664 https://glassfish.dev.java.net/public/CDDLv1.0.html. The UnixCrypt.java code ~Implements the one way cryptography used by Unix systems for simple password protection. Copyright 1996... Page 2665 whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this... Page 2666 # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the... Page 26671.240.1 Available under license : Copyright (c) 2000-2010, JPackage Project All rights reserved. Redistribution and use in source and binary... Page 2668 Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. "Covered Code" means... Page 2669 any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential... Page 2670 hereby grants You a world-wide, royalty-free, non-exclusive license (a) under intellectual property rights (other than patent or trademark) Licensable... Page 2671 Any Modification which You create or to which You contribute must be made available in Source Code form under... Page 2672 Contributor has sufficient rights to grant the rights conveyed by this License. 3.5. Required Notices. You must duplicate the... Page 2673 not governed by the terms of this License and distribute the Larger Work as a single product. In such... Page 2674 Exhibit A shall not of themselves be deemed to be modifications of this License.) 7. DISCLAIMER OF WARRANTY. COVERED... Page 2675 any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the... Page 2676 This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to... Page 2677 The Original Code is ______________________________________. The Initial Developer of the Original Code is ________________________. Portions created by ______________________ are... Page 26781.243 jquery-ui 1.10.3 1.243.1 Available under license : Copyright 2013 jQuery Foundation and other contributors http://jquery.com/ Permission is hereby granted,... Page 2679 The above copyright notice and this permission notice shall be included in all copies or substantial portions of the... Page 2687 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.... Page 2688 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE... Page 2689 */ MIT License Copyright (c) 2012 Jon Nylander, project maintained at https://bitbucket.org/pellepim/jstimezonedetect Permission is hereby granted, free of charge,... Page 2701 necessarily infringed by the use or sale of its Contribution alone or when combined with the Program. "Program" means... Page 2702 a) it complies with the terms and conditions of this Agreement; and b) its license agreement: i) effectively disclaims... Page 2703 offering. The obligations in this section do not apply to any claims or Losses relating to any actual or... Page 2704 If Recipient institutes patent litigation against a Contributor with respect to a patent applicable to software (including a cross-claim... Page 2705 modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright... Page 2706 The files chvt.c clrunimap.c deallocvt.c fgconsole.c findfile.c getfd.c getkeycodes.c getunimap.c kbd_mode.c loadunimap.c psffontop.c psfxtable.c resizecons.c screendump.c setkeycodes.c setleds.c setmetamode.c... Page 2708 source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy... Page 2710 However, parties who have received copies, or rights, from you under this License will not have their licenses terminated... Page 2711 impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of... Page 2712 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL... Page 2714 License without this special exception. This special exception was added by the Free Software Foundation in version 2.2 of... Page 2722 */ 1.254 kernel 2.6.32 :573.18.1.el6 1.254.1 Available under license : Copyright (c) 2006-2013, Intel Corporation. All rights reserved. Redistribution.... Page 2731 SOFTWARE LICENSE AGREEMENT The accompanying software in binary code form (Software), is licensed to you, or, if you are... Page 2732 RELIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT SHALL BROADCOM OR ANY OF ITS LICENSORS HAVE... Page 2733 THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT... Page 2734 Copyright (C) 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA Everyone is permitted to copy... Page 2735 want its recipients to know that what they have is not the original version, so that any problems introduced... Page 2736 Note that it is possible for a library to be covered by the ordinary General Public License rather than... Page 2737 fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming... Page 2739 linked without the Library, or if the work is itself a library. The threshold for this to be true... Page 2740 from a designated place, offer equivalent access to copy the above specified materials from the same place. d) Verify... Page 2741 prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any... Page 2742 an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not... Page 2743 DAMAGES. END OF TERMS AND CONDITIONS Appendix: How to Apply These Terms to Your New Libraries If you develop... Page 2744 Copyright (c) 2003-2011 QLogic Corporation QLogic Linux qlge NIC Driver You may modify and redistribute the device driver code... Page 2750 Copyright (c) 2009-2013 QLogic Corporation QLogic Linux qlcnic NIC Driver You may modify and redistribute the device driver code... Page 2756 Copyright (c) 2003-2006 QLogic Corporation QLogic Linux Networking HBA Driver This program includes a device driver for Linux 2.6... Page 2757 AverMedia fix and more flexible card recognition Alan Cox <alan@lxorguk.ukuu.org.uk> Video4Linux interface and 2.1.x kernel adaptation Chris Kleitsch Hardware... Page 2758 for his LIRC infrared handler Andreas Oberritter <obi@linuxtv.org> Dennis Noermann <dennis.noermann@noernet.de> Felix Domke <tmbinc@elitedvb.net> Florian Schirmer <jolt@tuxbox.org> Ronny Strutz... Page 2759 for the lgdt330x frontend driver, and various bugfixes Michael Krufky <mkrufky@m1k.net> for maintaining v4l/dvb inter-tree dependencies Taylor Jacob <rtjacob@earthlink.net>... Page 2760 1. Redistributions of source code must retain this LICENSE.FlashPoint file, without modification, this list of conditions, and the following... Page 2763 when run, you must cause it, when started running for such interactive use in the most ordinary way, to... Page 2764 received the program in object code or executable form with such an offer, in accord with Subsection b above.)... Page 2765 otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.... Page 2766 Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are... Page 2773 * R. D. Rechenmacher <ron@fnal.gov>, Aug. 6, 1997 * * Linux driver for the IDT77201 NICStAR PCI ATM controller.... Page 2774 This program is free software; you can redistribute it and/or modify it under the terms of version 2 of... Page 2775 macros or inline functions from these files, or you compile these files and link them with other works to... Page 2783 * * mq_open_tests.c * Tests the various situations that should either succeed or fail to * open a posix... Page 2784 giving you legal permission to copy, distribute and/or modify it. For the developers' and authors' protection, the GPL clearly... Page 2785 on the Program. To "propagate" a work means to do anything with it that, without permission, would make you... Page 2786 System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but... Page 2787 When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the... Page 2788 A compilation of a covered work with other separate and independent works, which are not by their nature extensions... Page 2789 that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find... Page 2790 requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed... Page 2791 e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or... Page 2792 copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of... Page 2793 License of the Program or a work on which the Program is based. The work thus licensed is called... Page 2794 the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more... Page 2795 Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the... Page 2796 If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to... Page 2797 might be different; for a GUI interface, you would use an "about box". You should also get your employer... Page 2804 along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston,... Page 2819 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is... Page 2820 patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in... Page 2821 whole or in part contains or is derived from the Program or any part thereof, to be licensed as... Page 2822 customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to... Page 2823 this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any... Page 2825 the "copyright" line and a pointer to where the full notice is found. <one line to give the program's... Page 2826 Public License instead of this License. # This file is free software; you can redistribute it and/or modify it... Page 2852 you have the freedom to distribute copies of free software (and charge for this service if you wish); that... Page 2853 entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other... Page 2854 prepared so as to be conveniently linked with application programs (which use some of those functions and data) to... Page 2855 charge to all third parties under the terms of this License. d) If a facility in the modified Library... Page 2856 that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from... Page 2857 whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above,... Page 2860 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time... Page 28621.260 keyutils_lgpl 1.4 :3.el6 1.260.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C)... Page 2863 with the library after making changes to the library and recompiling it. And you must show them these terms... Page 2864 library does the same job as widely used non-free libraries. In this case, there is little to gain by... Page 2867 distribute the source code, even though third parties are not compelled to copy the source along with the object... Page 2869 7. You may place library facilities that are a work based on the Library side-by-side in a single library... Page 2870 may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of... Page 2871 copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our... Page 2872 modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation;... Page 2873 without specific, written prior permission. Furthermore if you modify this software you must label your software as modified software... Page 2874 INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING, WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE... Page 2875 provided "as is" without express or implied warranty. THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR... Page 2876 * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.... Page 2877 NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,... Page 2878 and the initial implementation of incremental propagation, including the following new or changed files: include/iprop_hdr.h kadmin/server/ipropd_svc.c lib/kdb/iprop.x lib/kdb/kdb_convert.c lib/kdb/kdb_log.c... Page 2880 provided with the distribution. * The copyright holder's name is not used to endorse or promote products derived from... Page 2881 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE,... Page 2882 The implementations of UTF-8 string handling in src/util/support and src/lib/krb5/unicode are subject to the following copyright and permission notice:... Page 2883 OpenLDAP is a registered trademark of the OpenLDAP Foundation. Copyright 1999-2003 The OpenLDAP Foundation, Redwood City, California, USA. All... Page 2884 Copyright (C) 2010, Oracle America, Inc. All rights reserved. Redistribution and use in source and binary forms, with or... Page 2885 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer... Page 2886 of the software, derivative works or modified versions, and any portions thereof. NRL ALLOWS FREE USE OF THIS SOFTWARE... Page 2887 modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software... Page 2888 Copyright (C) 1994 by the University of Southern California EXPORT OF THIS SOFTWARE from the United States of America... Page 2889 This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of... Page 2890 Copyright (C) 1997, 1998 The NetBSD Foundation, Inc. All rights reserved. This code was contributed to The NetBSD Foundation... Page 2891 New Mexico State University Permission is hereby granted, free of charge, to any person obtaining a copy of this... Page 2893 3. Neither the name of the University nor the names of its contributors may be used to endorse or... Page 2894 Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. License to copy and use this software is granted... Page 2895 contemplating export to obtain such a license before exporting. WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute... Page 2896 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER... Page 2897 this file under either the BSD or the GPL. GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C)... Page 2905 lib/libgss/g_glue.c lib/libgss/g_imp_name.c lib/libgss/g_imp_sec_context.c lib/libgss/g_init_sec_context.c lib/libgss/g_initialize.c lib/libgss/g_inquire_context.c lib/libgss/g_inquire_cred.c lib/libgss/g_inquire_names.c lib/libgss/g_process_context.c lib/libgss/g_rel_buffer.c lib/libgss/g_rel_cred.c lib/libgss/g_rel_name.c lib/libgss/g_rel_oid_set.c lib/libgss/g_seal.c lib/libgss/g_sign.c lib/libgss/g_store_cred.c lib/libgss/g_unseal.c lib/libgss/g_userok.c lib/libgss/g_utils.c... Page 29061.262 krb5 1.10.3 :10.el6_4.3 1.262.1 Available under license : Copyright (C) 1985-2012 by the Massachusetts Institute of Technology. All rights... Page 2907 'kadmin/dbutil', 'kadmin/passwd', 'kadmin/server', 'lib/kadm5', and portions of 'lib/rpc': Copyright, OpenVision Technologies, Inc., 1993-1996, All Rights Reserved WARNING: Retrieving the... Page 2908 Copyright (C) 1998 by the FundsXpress, INC. All rights reserved. Export of this software from the United States of... Page 2909 DISCLAIMER This software is provided 'as is' with no explcit or implied warranties in respect of any properties, including,... Page 2910 The bundled verto source code is subject to the following license: Copyright 2011 Red Hat, Inc. Permission is hereby... Page 2911 lib/gssapi/mechglue/g_inquire_cred.c lib/gssapi/mechglue/g_inquire_names.c lib/gssapi/mechglue/g_process_context.c lib/gssapi/mechglue/g_rel_buffer.c lib/gssapi/mechglue/g_rel_cred.c lib/gssapi/mechglue/g_rel_name.c lib/gssapi/mechglue/g_rel_oid_set.c lib/gssapi/mechglue/g_seal.c lib/gssapi/mechglue/g_sign.c lib/gssapi/mechglue/g_store_cred.c lib/gssapi/mechglue/g_unseal.c lib/gssapi/mechglue/g_userok.c lib/gssapi/mechglue/g_utils.c lib/gssapi/mechglue/g_verify.c lib/gssapi/mechglue/gssd_pname_to_uid.c lib/gssapi/mechglue/mglueP.h lib/gssapi/mechglue/oid_ops.c lib/gssapi/spnego/gssapiP_spnego.h lib/gssapi/spnego/spnego_mech.c... Page 2912 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO... Page 2913 ------------------- Portions contributed by Novell, Inc., including the LDAP database backend, are subject to the following license: Copyright (C)... Page 2914 ALL RIGHTS RESERVED Permission is granted to use, copy, create derivative works and redistribute this software and such derivative... Page 2916 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN... Page 2917 THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT... Page 2918 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,... Page 2919 pertaining to distribution of the software without specific, written prior permission. CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD... Page 2920 Copyright (C) 1991, 1992, 1994 by Cygnus Support. Permission to use, copy, modify, and distribute this software and its... Page 2921 notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright... Page 2922 This code is derived from software contributed to Harvard by Jeremy Rassen. Redistribution and use in source and binary... Page 2924 CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY... Page 2925 any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice... Page 2926 Copyright (C) 2000 The Regents of the University of Michigan. All rights reserved. Copyright (C) 2000 Dug Song <dugsong@UMICH.EDU>.... Page 2927 License is also granted to make and use derivative works provided that such works are identified as "derived from... Page 2928 the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as... Page 2930 COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT... Page 2931 lib/krb5/kadm5/kadm_host_srv_names.c lib/krb5/kdb/kdb_convert.c lib/krb5/kdb/kdb_hdr.h lib/krb5/kdb/kdb_log.c lib/krb5/kdb/kdb_log.h lib/libgss/g_accept_sec_context.c lib/libgss/g_acquire_cred.c lib/libgss/g_canon_name.c lib/libgss/g_compare_name.c lib/libgss/g_context_time.c lib/libgss/g_delete_sec_context.c lib/libgss/g_dsp_name.c lib/libgss/g_dsp_status.c lib/libgss/g_dup_name.c lib/libgss/g_exp_sec_context.c lib/libgss/g_export_name.c lib/libgss/g_glue.c lib/libgss/g_imp_name.c lib/libgss/g_imp_sec_context.c... Page 2932 distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to... Page 2940 lib/gss_mechs/mech_krb5/et/kdb5_err.c lib/gss_mechs/mech_spnego/mech/gssapiP_spnego.h lib/gss_mechs/mech_spnego/mech/spnego_mech.c lib/krb5/kadm5/kadm_host_srv_names.c lib/krb5/kdb/kdb_convert.c lib/krb5/kdb/kdb_hdr.h lib/krb5/kdb/kdb_log.c lib/krb5/kdb/kdb_log.h lib/libgss/g_accept_sec_context.c lib/libgss/g_acquire_cred.c lib/libgss/g_canon_name.c lib/libgss/g_compare_name.c lib/libgss/g_context_time.c lib/libgss/g_delete_sec_context.c lib/libgss/g_dsp_name.c lib/libgss/g_dsp_status.c lib/libgss/g_dup_name.c lib/libgss/g_exp_sec_context.c lib/libgss/g_export_name.c... Page 2941 copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without... Page 2949 FundsXpress, and others. Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, and Zephyr are trademarks of the Massachusetts... Page 2950 Kerberos 5 distribution. This donation underscores our commitment to continuing Kerberos technology development and our gratitude for the valuable... Page 2951 All rights reserved. LICENSE TERMS The free distribution and use of this software in both source and binary form... Page 2953 lib/gssapi/mechglue/g_acquire_cred.c lib/gssapi/mechglue/g_canon_name.c lib/gssapi/mechglue/g_compare_name.c lib/gssapi/mechglue/g_context_time.c lib/gssapi/mechglue/g_delete_sec_context.c lib/gssapi/mechglue/g_dsp_name.c lib/gssapi/mechglue/g_dsp_status.c lib/gssapi/mechglue/g_dup_name.c lib/gssapi/mechglue/g_exp_sec_context.c lib/gssapi/mechglue/g_export_name.c lib/gssapi/mechglue/g_glue.c lib/gssapi/mechglue/g_imp_name.c lib/gssapi/mechglue/g_imp_sec_context.c lib/gssapi/mechglue/g_init_sec_context.c lib/gssapi/mechglue/g_initialize.c lib/gssapi/mechglue/g_inquire_context.c lib/gssapi/mechglue/g_inquire_cred.c lib/gssapi/mechglue/g_inquire_names.c lib/gssapi/mechglue/g_process_context.c... Page 2954 are subject to the following license: Copyright (C) 2004 Sun Microsystems, Inc. Permission is hereby granted, free of charge,... Page 2955 derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS... Page 2956 TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND... Page 2957 modifications, as long as this notice is preserved. This file is distributed in the hope that it will be... Page 2958 statements and notices, 2. Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions,... Page 2959 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions... Page 2960 disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the "Oracle America,... Page 2961 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS... Page 2962 This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth... Page 2963 CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ------------------- Portions of the implementation of... Page 2964 was developed by the University of Southern California. DISCLAIMER OF WARRANTY. THIS SOFTWARE IS PROVIDED "AS IS". The University... Page 2965 SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,... Page 2966 copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the... Page 2968 this kind of disclaimer?) ------------------- The following notice applies to SWIG-generated code in `src/util/profile/profile_tcl.c': Copyright (C) 1999-2000, The University... Page 2971 original M.I.T. software. Neither M.I.T., the Open Computing Security Group, nor CyberSAFE Corporation make any representations about the suitability... Page 2973 * * * A copy of the License is available at * * http://www.eclipse.org/org/documents/epl-v10.html * * (with md5 checksum... Page 2974 distribute and sublicense the Contribution of such Contributor, if any, and such derivative works, in source code and object... Page 2975 Contributors may not remove or alter any copyright notices contained within the Program. Each Contributor must identify itself as... Page 2976 HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 7. GENERAL If any provision of this Agreement is... Page 2977 1. DEFINITIONS "Contribution" means: a) in the case of the initial Contributor, the initial code and documentation distributed under... Page 2978 Licensed Patents. The patent license shall not apply to any other combinations which include the Contribution. No hardware per... Page 2979 b) a copy of this Agreement must be included with each copy of the Program. Contributors may not remove... Page 2980 distributing the Program and assumes all risks associated with its exercise of rights under this Agreement, including but not... Page 2981 as the Agreement Steward to a suitable separate entity. Each new version of the Agreement will be given a... Page 2983 use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to... Page 2984 An interactive user interface displays "Appropriate Legal Notices" to the extent that it includes a convenient and prominently visible... Page 2985 The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights... Page 2986 appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any... Page 2987 You may convey a covered work in object code form under the terms of sections 4 and 5, provided... Page 2988 included in conveying the object code work. A "User Product" is either (1) a "consumer product", which means any... Page 2989 7. Additional Terms. "Additional permissions" are terms that supplement the terms of this License by making exceptions from one... Page 2990 governed by this License along with a term that is a further restriction, you may remove that term. If... Page 2991 occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However,... Page 2992 Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use,... Page 2995 state the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to... Page 2996 Copyright (C) 1984-2009 Mark Nudelman Redistribution and use in source and binary forms, with or without modification, are permitted... Page 2997 When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed... Page 2998 TERMS AND CONDITIONS 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also... Page 2999 A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or,... Page 3000 in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively... Page 3001 a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The... Page 3002 copy of the Corresponding Source for all the software in the product that is covered by this License, on... Page 3003 "Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and... Page 3004 additional permissions on material, added by you to a covered work, for which you have or can give appropriate... Page 3005 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any... Page 3006 organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered... Page 3007 publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to... Page 3008 License would be to refrain entirely from conveying the Program. 13. Use with the GNU Affero General Public License.... Page 3009 ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR... Page 3011 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS... Page 30151.269 libaio 0.3.107 :10.el6 1.269.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C)... Page 3016 complete object files to the recipients, so that they can relink them with the library after making changes to... Page 3019 application-supplied function or table used by this function must be optional: if the application does not supply it, the... Page 3021 copyright notice for the Library among them, as well as a reference directing the user to the copy of... Page 3022 use both them and the Library together in an executable that you distribute. ^L 7. You may place library... Page 3024 ^L 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are... Page 3026 [This is the first released version of the library GPL. It is numbered 2 because it goes with version... Page 3027 patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in... Page 3028 0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or... Page 3029 above, provided that you also meet all of these conditions: a) The modified work must itself be a software... Page 3030 this, you must alter all the notices that refer to this License, so that they refer to the ordinary... Page 3031 functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether... Page 3034 13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time... Page 30361.271.1 Available under license : This package was debianized by Nathan Scott nathans@debian.org on Sun, 19 Nov 2000 07:37:09 -0500.... Page 3038 language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other... Page 3041 circumstances. It is not the purpose of this section to induce you to infringe any patents or other property... Page 3042 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS... Page 3044 2. Redistributions in binary form must reproduce all prior and current copyright notices, this list of conditions, and the... Page 3045 written permission. ALTERNATIVELY, this product may be distributed under the terms of the GNU Library General Public License, in... Page 3046 this license or the ordinary General Public License is the better strategy to use in any particular case, based... Page 3047 libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library,... Page 3048 0. This License Agreement applies to any software library or other program which contains a notice placed by the... Page 3052 than the cost of performing this distribution. d) If distribution of the work is made by offering access to... Page 3054 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by... Page 3055 LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU... Page 3063 necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision'... Page 3069 Any executables containing that work also fall under Section 6, whether or not they are linked directly with the... Page 3070 materials or that you have already sent this user a copy. For an executable, the required form of the... Page 3071 the Library or works based on it. 10. Each time you redistribute the Library (or any work based on... Page 3072 the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised... Page 3073 ^L How to Apply These Terms to Your New Libraries If you develop a new library, and you want... Page 3074 That's all there is to it! 1.275 libcgroup 0.40.rc1 :12.el6 1.275.1 Available under license : GNU LESSER GENERAL PUBLIC... Page 3075 For example, if you distribute copies of the library, whether gratis or for a fee, you must give the... Page 3076 For example, on rare occasions, there may be a special need to encourage the widest possible use of a... Page 3078 a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or... Page 3079 medium customarily used for software interchange. If distribution of object code is made by offering access to copy from... Page 3080 this License. You must supply a copy of this License. If the work during execution displays copyright notices, you... Page 3081 restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot... Page 3083 license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish... Page 3084 have at least the "copyright" line and a pointer to where the full notice is found. <one line to... Page 3086 software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we... Page 3089 that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a... Page 3090 file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions... Page 3093 versions of the Library General Public License from time to time. Such new versions will be similar in spirit... Page 30951.277.1 Available under license : COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2009, Daniel Stenberg, <daniel@haxx.se>. All rights reserved.... Page 3096 OpenSSL http://www.openssl.org/source/license.html (May be used for SSL/TLS support) Uses an Original BSD-style license with an announcement clause that makes... Page 3097 Kerberos4 is Modified BSD-licensed. MIT Kerberos http://web.mit.edu/kerberos/www/dist/ (May be used for GSS support) MIT licensed, that shouldn't collide with... Page 3098 [3] = LGPL - GNU Lesser General Public License: http://www.gnu.org/licenses/lgpl.html [4] = MPL - Mozilla Public License: http://www.mozilla.org/MPL/ 1.278... Page 31001.280 libdrm 2.4.25 :2.el6 1.280.1 Available under license : /* xf86drmSL.c -- Skip list support * Created: Mon May 10... Page 3101 # GNU Libtool is free software; you can redistribute it and/or modify # it under the terms of the... Page 3102 # # # FSF changes to this file are in the public domain. # # Calling this script install-sh... Page 3103 * Copyright " 2007 Intel Corporation * Copyright 2006 Tungsten Graphics, Inc., Bismarck, ND., USA * All Rights Reserved.... Page 3112 of this license document, but changing it is not allowed. [This is the first released version of the Lesser... Page 3121 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT... Page 3122 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should... Page 3123 can use it too, but we suggest you first think carefully about whether this license or the ordinary General... Page 3124 this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is... Page 3129 d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent... Page 3132 RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH... Page 3141 * is provided "as is" without express or implied warranty. * * KEITH PACKARD DISCLAIMS ALL WARRANTIES WITH REGARD... Page 3142 gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You... Page 3143 To "modify" a work means to copy from or adapt all or part of the work in a fashion... Page 3144 (if any) on which the executable work runs, or a compiler used to produce the work, or an object... Page 3145 3. Protecting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological... Page 3146 permission to license the work in any other way, but it does not invalidate such permission if you have... Page 3147 d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer... Page 3148 Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply... Page 3149 c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked... Page 3150 holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.... Page 3151 (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling,... Page 3152 covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to... Page 3153 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU... Page 3154 17. Interpretation of Sections 15 and 16. If the disclaimer of warranty and limitation of liability provided above cannot... Page 3166 The C library (libidn.a), C# library (Libidn.dll) and Java library (libidn-*.jar) are licensed under the GNU Lesser General Public... Page 3181 This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation... Page 3182 General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We... Page 3183 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other... Page 3185 License instead of this License to a given copy of the Library. To do this, you must alter all... Page 3186 structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the... Page 3187 specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If... Page 3191 Ty Coon, President of Vice That's all there is to it! Libidn README -- Important introductory notes. Copyright (C)... Page 3192 The Independent JPEG Group's JPEG software ========================================== This distribution contains a release of the Independent JPEG Group's free JPEG... Page 3193 If you want to understand how the JPEG code works, we suggest reading one or more of the REFERENCES,... Page 3194 the software is not intended to be read as a tutorial on JPEG. (See the REFERENCES section for introductory... Page 3195 acknowledge us. Permission is NOT granted for the use of any IJG author's name or company name in advertising... Page 3196 Communications of the ACM, April 1991 (vol. 34 no. 4), pp. 30-44. (Adjacent articles in that issue discuss MPEG... Page 3197 (Compression tag 7). Copies of this Note can be obtained from http://www.ijg.org/files/. It is expected that the next revision... Page 3198 following disclaimer. &#149;Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following... Page 32061.290 libnet 1.1.5 :2004/03/01 20:26:11 mike 1.290.1 Available under license : * Copyright (c) 1998 - 2004 Mike D. Schiffman... Page 3207 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # As a special exception to... Page 3215 # # This script is compatible with the BSD install script, but was written # from scratch. # This... Page 3216 #CPU_TYPE-MANUFACTURER-KERNEL-OPERATING_SYSTEM # It is wrong to echo any other type of specification /* nih-dbus-tool * * annotation.c - annotation... Page 3217 your libraries, too. When we speak of free software, we are referring to freedom, not price. Our General Public... Page 3218 they blur the distinction we usually make between modifying or adding to a program and simply using it. Linking... Page 3226 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library... Page 3227 written permission. THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE... Page 3228 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL,... Page 3229 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation... Page 3240 Tom Lane Glenn Randers-Pehrson Willem van Schaik libpng versions 0.89, June 1996, through 0.96, May 1997, are Copyright (c)... Page 3241 The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source code... Page 3243 Program (independent of having been made by running the Program). Whether that is true depends on what the Program... Page 3246 generous contributions to the wide range of software distributed through that system in reliance on consistent application of that... Page 3247 REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY... Page 3249 it freely, subject to the following restrictions: 1. Redistributions of source code must retain the above copyright notice, disclaimer,... Page 3257 libpng versions 1.2.6, August 15, 2004, through 1.2.49, March 29, 2012, are Copyright (c) 2004, 2006-2009 Glenn Randers-Pehrson, and... Page 3258 For the purposes of this copyright and license, "Contributing Authors" is defined as the following set of individuals: Andreas... Page 3259 Glenn Randers-Pehrson glennrp at users.sourceforge.net March 29, 2012 1.298 libselinux 2.0.94 :5.8.el6 1.298.1 Available under license : This library... Page 3261 any patent license obtained for a version of the library must be consistent with the full freedom of use... Page 3262 "work based on the library" and a "work that uses the library". The former contains code derived from the... Page 3263 and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your... Page 3264 with the Library (or with a work based on the Library) on a volume of a storage or distribution... Page 3265 Whether this is true is especially significant if the work can be linked without the Library, or if the... Page 3266 the user installs one, as long as the modified version is interface-compatible with the version that the work was... Page 3282 # # This script is compatible with the BSD install script, but was written # from scratch. 1.302 libSM... Page 3283 Except as contained in this notice, the name of The Open Group shall not be used in advertising or... Page 3285 * copyright notice, this list of conditions and the * following disclaimer. * * Redistributions in binary form must... Page 3286 * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the... Page 3287 GNU General Public License for most of our software; it applies also to any other work released this way... Page 3288 patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification... Page 3290 rights of fair use or other equivalent, as provided by copyright law. You may make, run and propagate covered... Page 3292 (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for... Page 3293 is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses... Page 3295 Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as... Page 3296 propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this... Page 3297 If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work... Page 3298 License and any other pertinent obligations, then as a consequence you may not convey it at all. For example,... Page 3299 OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS... Page 3301 freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom... Page 3302 consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered... Page 3303 former contains code derived from the library, whereas the latter must be combined with the library in order to... Page 3307 interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid... Page 3308 distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received... Page 3310 WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE,... Page 3311 Yoyodyne, Inc., hereby disclaims all copyright interest in the library 'Frob' (a library for tweaking knobs) written by James... Page 3312 or can get the source code. And you must show them these terms so they know their rights. Developers... Page 3313 in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called... Page 3314 The "Corresponding Source" for a work in object code form means all the source code needed to generate, install,... Page 3315 No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under... Page 3316 d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has... Page 3317 Corresponding Source in the same way through the same place at no further charge. You need not require recipients... Page 3318 if neither you nor any third party retains the ability to install modified object code on the User Product... Page 3319 requiring that modified versions of such material be marked in reasonable ways as different from the original version; or... Page 3320 Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the... Page 3321 sale, or importing the Program or any portion of it. 11. Patents. A "contributor" is a copyright holder who... Page 3322 or convey a specific copy of the covered work, then the patent license you grant is automatically extended to... Page 3323 The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to... Page 3325 parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you... Page 3326 software does. But this License is not limited to software manuals; it can be used for any textual work,... Page 3327 general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of... Page 3328 @item VERBATIM COPYING You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that... Page 3329 Opaque copy (directly or through your agents or retailers) of that edition to the public. It is requested, but... Page 3330 @item Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the... Page 3332 ''History''; likewise combine any sections Entitled ''Acknowledgements'', and any sections Entitled ''Dedications''. You must delete all sections Entitled ''Endorsements.''... Page 3333 Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the... Page 3334 Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered... Page 3335 To use this License in a document you have written, include a copy of the License in the document... Page 3347 # DO NOT EDIT! GENERATED AUTOMATICALLY! # Copyright (C) 2002-2009 Free Software Foundation, Inc. # # This file is... Page 3349 that what they have is not the original version, so that the original author's reputation will not be affected... Page 3354 Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable... Page 3355 Sections above. b) Give prominent notice with the combined library of the fact that part of it is a... Page 3358 Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public... Page 33591.310 libtiff 3.9.4 :9.el6_3 1.310.1 Available under license : Copyright (c) 1988-1997 Sam Leffler Copyright (c) 1991-1997 Silicon Graphics, Inc.... Page 3372 that is part of the Library, the object code for the work may be a derivative work of the... Page 3373 rather than copying library functions into the executable, and (2) will operate properly with a modified version of the... Page 3374 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this... Page 3376 LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR... Page 3413 License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any... Page 34141.315.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software... Page 3415 We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this... Page 3417 running a program using the Library is not restricted, and output from such a program is covered only if... Page 3418 and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not... Page 3419 5. A program that contains no derivative of any portion of the Library, but is designed to work with... Page 3420 changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the... Page 3421 library, provided that the separate distribution of the work based on the Library and of the other library facilities... Page 3423 of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY... Page 3428 program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed... Page 3433 distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this... Page 3434 original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those... Page 3435 SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS... Page 3446 EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY... Page 3447 License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,... Page 3458 other libraries whose authors decide to use it. You can use it for your libraries, too. When we speak... Page 3459 The reason we have a separate public license for some libraries is that they blur the distinction we usually... Page 3460 Library" means either the Library or any derivative work under copyright law: that is to say, a work containing... Page 3461 is invoked, then you must make a good faith effort to ensure that, in the event an application does... Page 3463 under terms of your choice, provided that the terms permit modification of the work for the customer's own use... Page 3464 use both them and the Library together in an executable that you distribute. 7. You may place library facilities... Page 3467 Copyright (C) <year> <name of author> This library is free software; you can redistribute it and/or modify it under... Page 34681.320.1 Available under license : GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation,... Page 3469 Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for... Page 3470 former contains code derived from the library, while the latter only works together with the library. Note that it... Page 3474 than the cost of performing this distribution. c) If distribution of the work is made by offering access to... Page 3478 Ty Coon, President of Vice That's all there is to it! 1.321 libutempter 1.1.5 :4.1.el6 1.321.1 Available under license... Page 3490 * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that... Page 3492 either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term... Page 3494 itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from... Page 3495 apply and the section as a whole is intended to apply in other circumstances. It is not the purpose... Page 3497 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. Also add information on how to contact you by electronic... Page 3498 * THIS SOFTWARE IS PROVIDED BY GUNNAR RITTER AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES,... Page 3513 IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this... Page 3514 LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE... Page 3517 Development Agreement for the CDE/Motif PST. ---------------------------------------- Copyright 1992 by Oki Technosystems Laboratory, Inc. Copyright 1992 by Fuji Xerox... Page 3518 OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ---------------------------------------- Copyright... Page 3519 EVENT SHALL OMRON BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS... Page 3520 ---------------------------------------- Copyright 1991 by the Open Software Foundation Permission to use, copy, modify, distribute, and sell this software and... Page 3521 ---------------------------------------- Copyright (c) 1993, 1995 by Silicon Graphics Computer Systems, Inc. Permission to use, copy, modify, and distribute this... Page 3522 IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE... Page 3523 DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO... Page 3524 OPEN SOFTWARE FOUNDATION AND TOSHIBA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY... Page 3525 WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL OPEN... Page 3526 SONY CORPORATION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN... Page 3527 Open Software Foundation not be used in advertising or publicity pertaining to distribution of the software without specific, written... Page 3528 that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Fuji... Page 3529 to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute,... Page 3531 ---------------------------------------- Copyright (c) 2007-2009, Troy D. Hanson All rights reserved. Redistribution and use in source and binary forms, with... Page 3532 Copyright IBM Corporation 1993 All Rights Reserved License to use, copy, modify, and distribute this software and its documentation... Page 35331.324 libX11 1.3 :2.el6 1.324.1 Available under license : Licenses The XFree86 Project January 2002 1. XFree86 License XFree86 code... Page 3534 Copyright (C) <date> X Consortium Permission is hereby granted, free of charge, to any person obtaining a copy of... Page 3535 2.2 Berkeley-based copyrights: 2.2.1 General Redistribution and use in source and binary forms, with or without modifica- tion, are... Page 3536 notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.... Page 3537 CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOURCE CODE. 2.4 GLX Public License GLX PUBLIC LICENSE (Version 1.0... Page 3538 choice, which may contain terms different from this License, provided that (i) Recipient is in compliance with the terms... Page 3539 the Subject Software, including but not limited to, all export and import control laws and regulations of the U.S.... Page 3540 SO THAT EXCLUSION AND LIMITATION MAY NOT APPLY TO RECIPIENT. 11. Indemnity. Recipient shall be solely responsible for damages... Page 3541 The Original Software is GLX version 1.2 source code, released February, 1999. The developer of the Original Software is... Page 3542 f. "Accompanying Technology" means any software or other technology that is not a Modification and that is distributed or... Page 3544 harmless from and against any loss, liability, damages, costs or expenses (including the payment of reasonable attorneys fees) arising... Page 3545 developed by Silicon Graphics, Inc. Those portions of the Subject Software (as defined in the License) that were created... Page 3546 A. Any addition to the contents of a file containing Original Code and/or addition to or deletion from the... Page 3547 time any related Modification is added, such addition of the Modification causes such combination to be covered by the... Page 3548 accordance with this Section 3.2, Recipient may relicense only such rights, in Original Code and Modifications by SGI, as... Page 3549 under the terms of that version, or choose to use such Covered Code under the terms of any subsequent... Page 3550 the United States and the State of California as applied to agreements entered into and to be performed entirely... Page 3551 documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies... Page 35541.328 libxcb 1.9.1 :2.el6 1.328.1 Available under license : Copyright (C) 2001-2006 Bart Massey, Jamey Sharp, and Josh Triplett. All... Page 3555 representations about the suitability of this software for any purpose. It is provided "as is" without express or implied... Page 3556 # ltmain.sh - Provide generalized library-building support services. # NOTE: Changing this file will not affect anything until you... Page 3557 * SUN MICROSYSTEMS DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND... Page 3558 CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF... Page 3559 PERFORMANCE OF THIS SOFTWARE. 1.332 libXcursor 1.1.10 :2.el6 1.332.1 Available under license : Copyright " 2002 Keith Packard Permission... Page 3561 # X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN # AN ACTION OF CONTRACT,... Page 35621.335 libXext 1.1 :3.el6 1.335.1 Available under license : Copyright 1986, 1987, 1988, 1989, 1994, 1998 The Open Group Permission... Page 3563 Equipment Corporation. Copyright (c) 1997 by Silicon Graphics Computer Systems, Inc. Permission to use, copy, modify, and distribute this... Page 3565 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN... Page 35661.336 libXext 1.3.2 :2.1.el6 1.336.1 Available under license : Copyright 1986, 1987, 1988, 1989, 1994, 1998 The Open Group Permission... Page 3567 dealings in this Software without prior written authorization from Digital Equipment Corporation. Copyright (c) 1997 by Silicon Graphics Computer... Page 3568 Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is... Page 3570 Copyright (c) 1994, 1995 X Consortium, Inc. and Hewlett-Packard Company. Permission to use, copy, modify, and distribute this documentation... Page 3571 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. #... Page 35721.338 libXfixes 5.0.1 :2.1.el6 1.338.1 Available under license : Copyright 2001,2003 Keith Packard Permission to use, copy, modify, distribute, and... Page 35731.339 libXft 2.1.13 :4.1.el6 1.339.1 Available under license : Copyright 2001,2003 Keith Packard Permission to use, copy, modify, distribute, and... Page 3575 copyright notice and this permission notice appear in supporting documentation, and that the name of Keith Packard not be... Page 3576 both that copyright notice and this permission notice appear in supporting documentation, and that the name of Hewlett-Packard not... Page 3578 EVENT SHALL HEWLETT-PACKARD BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS... Page 3579 # General Public License for more details. # # You should have received a copy of the GNU General... Page 35801.343 libXinerama 1.1 :1.el6 1.343.1 Available under license : This is a stub file. This package has not yet had... Page 3582 # # FSF changes to this file are in the public domain. # # Calling this script install-sh is... Page 3583 OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR... Page 35851.347 libxml2 2.7.6 :20.el6_7.1 1.347.1 Available under license : Except where otherwise noted in the source code (e.g. the files... Page 3586 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO... Page 3587 Lorens Younes BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR... Page 3588 * deal in the Software without restriction, including without limitation the * rights to use, copy, modify, merge, publish,... Page 3589 OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF... Page 35901.351 libXrandr 1.3.0 :4.el6 1.351.1 Available under license : Copyright 2000, Compaq Computer Corporation, Copyright 2002, Hewlett Packard, Inc. Permission... Page 3591 # along with GNU Libtool; see the file COPYING. If not, a copy # can be downloaded from http://www.gnu.org/licenses/gpl.html,... Page 35921.352.1 Available under license : Copyright 2001,2003 Keith Packard Permission to use, copy, modify, distribute, and sell this software and... Page 3594 # of this software and associated documentation files (the "Software"), to # deal in the Software without restriction, including... Page 35951.354.1 Available under license : Licence for libxslt except libexslt ---------------------------------------------------------------------- Copyright (C) 2001-2002 Daniel Veillard. All Rights Reserved. Permission... Page 3596 NECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice,... Page 3597 For more information about the DocBook DTD, see http://www.oasis-open.org/docbook/ Simplified DocBk XML V3.1.7.1 DTD Copyright (C) 1999 Norman Walsh... Page 3598 without fee is hereby granted in perpetuity, provided that the above copyright notice and this paragraph appear in all... Page 3599 source code. And you must show them these terms so they know their rights. We protect your rights with... Page 3600 and give any other recipients of the Program a copy of this License along with the Program. You may... Page 3601 the scope of this License. 3. You may copy and distribute the Program (or a work based on it,... Page 3604 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH... Page 3606 * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without... Page 3607 documentation, and that the name of Network Computing Devices not be used in advertising or publicity pertaining to distribution... Page 3608 # is built using GNU Libtool, you may include this file under the # same distribution terms that you... Page 3609 in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY... Page 3610 RED HAT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN... Page 3611 Copyright 1994 Network Computing Devices, Inc. Permission to use, copy, modify, distribute, and sell this documentation for any purpose... Page 3633 and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or... Page 3634 Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise... Page 3635 (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that... Page 3636 whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent... Page 36371.362 Log4j 1.2.16 1.362.1 Available under license : Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE,... Page 3638 of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by... Page 3639 meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy... Page 3640 except as required for reasonable and customary use in describing the origin of the Work and reproducing the content... Page 3641 Copyright 1999-2005 The Apache Software Foundation Licensed under the Apache License, Version 2.0 (the "License"); you may not use... Page 3648 when it starts in an interactive mode: Gnomovision version 69, Copyright (C) 19yy name of author Gnomovision comes with... Page 3656 * This software is not subject to any license of the American Telephone * and Telegraph Company or the... Page 3657 * * 4. This notice may not be removed or altered. */ #!/usr/bin/perl # sort_res.perl5 - Script to group... Page 3665 * * Written by Victor A. Abell * * This software is not subject to any license of the... Page 3666 #or perl sort_res.perl5 <program name> # # 12/2005 (FabF) #-size reset in loop (script was broken in 4.76) #-isexec... Page 3673 Yoyodyne, Inc., hereby disclaims all copyright interest in the program 'Gnomovision' (which makes passes at compilers) written by James... Page 37171.373 lvm2_libs 2.02.87 :6.el6 1.373.1 Available under license : GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C)... Page 3719 allowed to use the library. A more frequent case is that a free library does the same job as... Page 3720 and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they... Page 3721 root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable... Page 3722 source code from the same place satisfies the requirement to distribute the source code, even though third parties are... Page 3723 of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever... Page 3725 License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For... Page 3726 write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write... Page 3750 that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is... Page 3751 a) You must cause the modified files to carry prominent notices stating that you changed the files and the... Page 3752 years, to give any third party, for a charge no more than your cost of physically performing source distribution,... Page 3753 original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose... Page 3754 be similar in spirit to the present version, but may differ in detail to address new problems or concerns.... Page 3787 when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with... Page 38021.381 mdadm 3.2.2 :9.el6 1.381.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 3810 part of a Larger Work, in any way to provide a service, including but not limited to delivery of... Page 3811 verbatim, unmodified copies of the Original Code, for commercial or non-commercial purposes, provided that in each instance: (a) You... Page 3812 2.4 Third Party Rights. You expressly acknowledge and agree that although Apple and each Contributor grants the licenses to... Page 3813 7. Versions of the License. Apple may publish revised and/or new versions of this License from time to time.... Page 3814 damages (other than as may be required by applicable law) under this License exceed the amount of fifty dollars... Page 3815 survive, including but not limited to Sections 3, 5, 8, 9, 10, 11, 12.2 and 13. No party will... Page 3816 enforceability of either of those Sections, this License will immediately terminate and You must immediately discontinue any use of... Page 38171.383 mgetty 1.1.36 :8.el6 1.383.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 3825 1.11. Patent Claims means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus... Page 3826 portions of such combination). (c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor... Page 3827 terms of a license of Your choice, which may contain terms different from this License, provided that You are... Page 3828 THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED... Page 3829 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Software with only those... Page 3830 General Public License is intended to guarantee your freedom to share and change free software--to make sure the software... Page 3831 disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any... Page 3833 system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed... Page 3835 * * Copyright (c) 1997-2010 Oracle and/or its affiliates. All rights reserved. * * The contents of this file... Page 38431.386 mockito 1.8.5 1.386.1 Available under license : The MIT License Copyright (c) 2007 Mockito contributors Permission is hereby granted,... Page 3844 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;... Page 3845 represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not... Page 3846 modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any... Page 3847 names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in... Page 3848 identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License");... Page 3849 Copyright (c) 2003-2008, Objenesis Team and all contributors Permission is hereby granted, free of charge, to any person obtaining... Page 38641.389 moment 2.1.0 1.389.1 Available under license : Copyright (c) 2011-2012 Tim Wood Permission is hereby granted, free of charge,... Page 38721.391 mt-st 1.1 :4.el6 1.391.1 Available under license : NOTE! This copyright does *not* cover user programs that use kernel... Page 3880 A copy of the Lesser General Public License (lesser.txt) is included in this archive or goto the GNU website... Page 3882 software only, so we use the Lesser General Public License. In other cases, permission to use a particular library... Page 3883 covered by this License; they are outside its scope. The act of running a program using the Library is... Page 3884 identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate... Page 3886 machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under... Page 3890 version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope... Page 3897 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Also add information on how to contact you... Page 3898 This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held... Page 38991.394 nc 1.84 :22.el6 1.394.1 Available under license : /* * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> * * Redistribution... Page 3900 -- -- -- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS -- -- OR IMPLIED,... Page 3901 These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify... Page 3903 exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere... Page 3904 otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this... Page 3907 This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.... Page 3915 Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is... Page 3916 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE... Page 3918 THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT... Page 3920 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,... Page 3929 complete object files to the recipients so that they can relink them with the library, after making changes to... Page 3930 libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header... Page 3934 executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in... Page 3937 THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR... Page 3938 school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the... Page 3939 1.6. "Executable Form" means any form of the work other than Source Code Form. 1.7. "Larger Work" means a... Page 3940 whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or... Page 3941 or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).... Page 3942 than the cost of distribution to the recipient; and (b) You may distribute such Executable Form under the terms... Page 3943 describe the limitations and the code they affect. Such description must be placed in a text file included with... Page 3944 * repair, or correction. This disclaimer of warranty constitutes an * * essential part of this License. No use... Page 3945 10. Versions of the License --------------------------- 10.1. New Versions Mozilla Foundation is the license steward. Except as provided in... Page 3946 --------------------------------------------------------- This Source Code Form is "Incompatible With Secondary Licenses", as defined by the Mozilla Public License, v. 2.0.... Page 3947 (a) that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or (b)... Page 3948 means the form of the work preferred for making modifications. 1.14. "You" (or "Your") means an individual or a... Page 3949 modifications of Covered Software, or (ii) the combination of its Contributions with other software (except as part of its... Page 3950 3.2. Distribution of Executable Form If You distribute Covered Software in Executable Form then: (a) such Covered Software must... Page 3951 4. Inability to Comply Due to Statute or Regulation --------------------------------------------------- If it is impossible for You to comply with... Page 3952 * Covered Software is provided under this License on an "as is" * * basis, without warranty of any... Page 3953 ---------------- This License represents the complete agreement concerning the subject matter hereof. If any provision of this License is... Page 3954 If it is not possible or desirable to put the notice in a particular file, then You may include... Page 3955 terms of a Secondary License. 1.6. "Executable Form" means any form of the work other than Source Code Form.... Page 3956 purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of... Page 3957 This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as... Page 3958 the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a... Page 3959 statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum... Page 3960 * Should any Covered Software prove defective in any respect, You * * (not any Contributor) assume the cost... Page 3961 that the language of a contract shall be construed against the drafter shall not be used to construe this... Page 3962 Exhibit B - "Incompatible With Secondary Licenses" Notice --------------------------------------------------------- This Source Code Form is "Incompatible With Secondary Licenses", as... Page 3963 Copyright 2008, Google Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification,... Page 3964 Note on LGPL Compatibility -------------------------- The above also applies to combining MPLed code in a single library with code... Page 3965 a separate file or files, that is not Covered Software. 1.8. "License" means this document. 1.9. "Licensable" means having... Page 3966 -------------------------------- 2.1. Grants Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license: (a) under intellectual property rights (other... Page 3967 No Contributor makes additional grants as a result of Your choice to distribute the Covered Software under a subsequent... Page 3968 the recipients' rights in the Source Code Form under this License. 3.3. Distribution of a Larger Work You may... Page 3969 5. Termination -------------- 5.1. The rights granted under this License will terminate automatically if You fail to comply with... Page 3970 ************************************************************************ * * * 7. Limitation of Liability * * -------------------------- * * * * Under no circumstances and... Page 3971 Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward... Page 3972 This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. If a copy... Page 3973 to dual licence in this way, and may, if they wish, distribute under the terms of either of the... Page 3982 * comments in nssck.api for more information. */ #include "ckpem.h" #define MODULE_NAME pem #define INSTANCE_NAME (NSSCKMDInstance *)&pem_mdInstance #include "nssck.api"... Page 3983 Within this directory, each of the file listed below is licensed under the terms given in the file LICENSE-MPL,... Page 3984 licences does not overlap, so no issues arise. Mozilla Public License Version 2.0 ================================== 1. Definitions -------------- 1.1. "Contributor"... Page 3985 whether at the time of the initial grant or subsequently, any and all of the rights conveyed by this... Page 3986 (a) under intellectual property rights (other than patent or trademark) Licensable by such Contributor to use, reproduce, make available,... Page 3987 Each Contributor represents that the Contributor believes its Contributions are its original creation(s) or it has sufficient rights to... Page 3988 Software with a work governed by one or more Secondary Licenses, and the Covered Software is not Incompatible With... Page 3989 Contributor are reinstated (a) provisionally, unless and until such Contributor explicitly and finally terminates Your grants, and (b) on... Page 3990 * (including negligence), contract, or otherwise, shall any * * Contributor, or anyone who distributes Covered Software as *... Page 3991 You may distribute the Covered Software under the terms of the version of the License under which You originally... Page 3992 the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/ Software distributed under the License is distributed... Page 4002 ***** BEGIN LICENSE BLOCK ***** Version: MPL 1.1/GPL 2.0/LGPL 2.1 The contents of this file are subject to the... Page 4003 lap.pod mpi-test.pod prime.txt prng.pod 1.408 nss-softokn 3.14.3 :9.el6 1.408.1 Available under license : NSS is available under the Mozilla... Page 4004 1.2. "Contributor Version" means the combination of the Contributions of others (if any) used by a Contributor and that... Page 4005 1.11. "Patent Claims" of a Contributor means any patent claim(s), including without limitation, method, process, and apparatus claims, in... Page 4006 The licenses granted in Section 2.1 with respect to any Contribution become effective for each Contribution on the date... Page 4007 Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted in Section 2.1. 3. Responsibilities ------------------- 3.1.... Page 4008 or limitations of liability) contained within the Source Code Form of the Covered Software, except that You may alter... Page 4009 infringement claim (excluding declaratory judgment actions, counter-claims, and cross-claims) alleging that a Contributor Version directly or indirectly infringes any... Page 4010 * incidental or consequential damages, so this exclusion and * * limitation may not apply to You. * *... Page 4011 such modified license differs from this License). 10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses If... Page 4012 The Initial Developer of the Original Code is Netscape Communications Corporation. Portions created by Netscape are Copyright (C) 1994-2000... Page 4013 General Public License (GPL) version 2, or any later version of that license, to make a Larger Work, and... Page 4022 the provisions above, a recipient may use your version of this file under the terms of any one of... Page 4023 The above also applies to combining MPLed code in a single library with code under the GNU Lesser General... Page 4024 means this document. 1.9. "Licensable" means having the right to grant, to the maximum extent possible, whether at the... Page 4025 Each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license: (a) under intellectual property rights (other than patent or... Page 4026 permitted under the terms of Section 3.3). 2.5. Representation Each Contributor represents that the Contributor believes its Contributions are... Page 4027 You may create and distribute a Larger Work under terms of Your choice, provided that You also comply with... Page 4028 5.1. The rights granted under this License will terminate automatically if You fail to comply with any of its... Page 4029 * 7. Limitation of Liability * * -------------------------- * * * * Under no circumstances and under no legal... Page 4030 publish new versions of this License. Each version will be given a distinguishing version number. 10.2. Effect of New... Page 40311.411 nss-softokn 3.14.3 :3.el6_4 1.411.1 Available under license : NSS is available under the Mozilla Public License, version 2, a... Page 4032 1.3. "Contribution" means Covered Software of a particular Contributor. 1.4. "Covered Software" means Source Code Form to which the... Page 4033 License, by the making, using, selling, offering for sale, having made, import, or transfer of either its Contributions or... Page 4034 The licenses granted in this Section 2 are the only rights granted under this License. No additional rights or... Page 4035 3.1. Distribution of Source Form All distribution of Covered Software in Source Code Form, including any Modifications that You... Page 4036 You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one... Page 4037 5.3. In the event of termination under Sections 5.1 or 5.2 above, all end user license agreements (excluding distributors... Page 4038 8. Litigation ------------- Any litigation relating to this License may be brought only in the courts of a jurisdiction... Page 4039 If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this... Page 4040 in which case the provisions of the GPL or the LGPL are applicable instead of those above. If you... Page 4050 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street,... Page 4068 Rights Reserved. Contributor(s): Alternatively, the contents of this file may be used under the terms of either the GNU... Page 4069 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the... Page 4070 entity. 2. Source Code License. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free,... Page 4071 (c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes Commercial Use... Page 4072 Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code,... Page 4073 any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify... Page 4074 5. Application of this License. This License applies to code to which the Initial Developer has attached the notice... Page 4076 prior to termination shall survive termination. 9. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER... Page 4077 License. 12. RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and... Page 4078 under either the MPL or the [___] License." [NOTE: The text of this Exhibit A may differ slightly from... Page 4094 the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose... Page 4096 Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express... Page 4097 ------------------------- The MPL 2, section 3.3, permits you to combine NSS with code under the GNU General Public License... Page 4098 1.5. "Incompatible With Secondary Licenses" means (a) that the initial Contributor has attached the notice described in Exhibit B... Page 4099 licenses. 1.13. "Source Code Form" means the form of the work preferred for making modifications. 1.14. "You" (or "Your")... Page 4100 or (b) for infringements caused by: (i) Your and any other third party's modifications of Covered Software, or (ii)... Page 4101 attempt to alter or restrict the recipients' rights in the Source Code Form. 3.2. Distribution of Executable Form If... Page 4102 indemnity or liability terms You offer. You may include additional disclaimers of warranty and limitations of liability specific to... Page 4103 * 6. Disclaimer of Warranty * * ------------------------- * * * * Covered Software is provided under this License... Page 4104 cross-claims or counter-claims. 9. Miscellaneous ---------------- This License represents the complete agreement concerning the subject matter hereof. If any... Page 4105 License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one... Page 4106 Mozilla Public License Version 2.0 ================================== 1. Definitions -------------- 1.1. "Contributor" means each individual or legal entity that creates,... Page 4107 all of the rights conveyed by this License. 1.10. "Modifications" means any of the following: (a) any file in... Page 4108 Licensable by such Contributor to use, reproduce, make available, modify, display, perform, distribute, and otherwise exploit its Contributions, either... Page 4109 Contributions are its original creation(s) or it has sufficient rights to grant the rights to its Contributions conveyed by... Page 4110 Covered Software is not Incompatible With Secondary Licenses, this License permits You to additionally distribute such Covered Software under... Page 4111 Contributor explicitly and finally terminates Your grants, and (b) on an ongoing basis, if such Contributor fails to notify... Page 4112 * Contributor, or anyone who distributes Covered Software as * * permitted above, be liable to You for any... Page 4114 http://www.mozilla.org/MPL/ Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either... Page 4115 terms of either of the two licences - either the MPL alone or the GPL alone. However, we discourage... Page 4117 or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership... Page 4119 Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to... Page 4120 the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they... Page 4121 * (not any Contributor) assume the cost of any necessary servicing, * * repair, or correction. This disclaimer of... Page 4122 shall not be used to construe this License against a Contributor. 10. Versions of the License --------------------------- 10.1. New... Page 41241.416.1 Available under license : This file is automatically generated from html/copyright.html Copyright Notice jpg "Clone me," says Dolly sheepishly... Page 4125 9. [10]Piete Brooks <Piete.Brooks@cl.cam.ac.uk> MSF clock driver, Trimble PARSE support 10. [11]Reg Clemens <reg@dwf.com> Oncore driver (Current maintainer) 11.... Page 4126 monitoring/trap scripts, statistics file handling 39. [43]Dirce Richards <dirce@zk3.dec.com> Digital UNIX V4.0 port 40. [44]Wilfredo S"nchez <wsanchez@apple.com> added support... Page 4127 23. mailto:Hans.Lambermont@nl.origin-it.com 24. mailto:H.Lambermont@chello.nl 25. mailto:%20phk@FreeBSD.ORG 26. http://www4.informatik.uni-erlangen.de/%7ekardel 27. mailto:%20kardel(at)ntp(dot)org 28. mailto:%20jones@hermes.chpc.utexas.edu 29. mailto:%20dkatz@cisco.com 30. mailto:%20leres@ee.lbl.gov 31. mailto:%20lindholm@ucs.ubc.ca 32.... Page 4135 # You should have received a copy of the GNU General Public License # along with this program; if... Page 4136 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL,... Page 4147 /* Automated Options is free software. * You may redistribute it and/or modify it under the terms of the... Page 4148 jpg "Clone me," says Dolly sheepishly. Last update: 1-Jan-2011 08:34 UTC _________________________________________________________________ The following copyright notice applies to all... Page 4149 12. [13]Reg Clemens <reg@dwf.com> Oncore driver (Current maintainer) 13. [14]Steve Clift <clift@ml.csiro.au> OMEGA clock driver 14. [15]Casey Crellin <casey@csc.co.za>... Page 4150 42. [46]Rob Neal <neal@ntp.org> Bancomm refclock and config/parse code maintenance 43. [47]Rainer Pruy <Rainer.Pruy@informatik.uni-erlangen.de> monitoring/trap scripts, statistics file handling... Page 4151 20. mailto:%20jhay@icomtek.csir.co.za 21. mailto:%20davehart@davehart.com 22. mailto:%20neoclock4x@linum.com 23. mailto:%20glenn@herald.usask.ca 24. mailto:%20iglesias@uci.edu 25. mailto:%20jagubox.gsfc.nasa.gov 26. mailto:%20jbj@chatham.usdesign.com 27. mailto:Hans.Lambermont@nl.origin-it.com 28. mailto:H.Lambermont@chello.nl 29.... Page 4153 Version". The "Minimal Corresponding Source" for a Combined Work means the Corresponding Source for the Combined Work, excluding any... Page 4154 4. Combined Works. You may convey a Combined Work under terms of your choice that, taken together, effectively do... Page 4155 for conveying Corresponding Source.) 5. Combined Libraries. You may place library facilities that are a work based on the... Page 4169 <one line to give the program's name and a brief idea of what it does.> copyright (c) by Bruce... Page 41771.418 ntp_GPL 4.2.4p8 :2.el6 1.418.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989,... Page 4191 accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an... Page 4195 DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES... Page 4197 users of those programs of all benefit from the free status of the libraries themselves. This Library General Public... Page 4203 such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which... Page 4204 KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A... Page 4205 MA 02110-1301, USA Also add information on how to contact you by electronic and paper mail. You should also... Page 4212 parts of the General Public License. Of course, the commands you use may be called something other than 'show... Page 4213 otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of... Page 4214 worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and... Page 4215 of the NOTICE file are for informational purposes only and do not modify the License. You may add Your... Page 4216 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer,... Page 4217 and resource files are also released under the ASF license above. The exceptions are as follows: =========================== openjpa-kernel -... Page 4218 1.2. Contributor Version. means the combination of the Original Software, prior Modifications used by a Contributor (if any), and... Page 4219 Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer... Page 4220 distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to... Page 4221 the version of the License under which You originally received the Covered Software. If the Initial Developer includes a... Page 4222 NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR... Page 4223 The code released under the CDDL shall be governed by the laws of the State of California (excluding conflict-of-... Page 4224 The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION... Page 4225 every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights... Page 4226 You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not... Page 4227 STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND,... Page 4228 Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type 'show w'. This is free software, and you are welcome... Page 4229 The following copyright notice(s) were affixed to portions of this code with which this file is now or was... Page 4230 "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not... Page 4231 use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent... Page 4232 for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your... Page 4233 incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.... Page 4234 direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or... Page 4235 this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce,... Page 4236 wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do... Page 4237 has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work... Page 4238 order to the software to function. Unless noted below, these jars and resource files are also released under the... Page 4240 (c) The licenses granted in Sections�2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes... Page 4242 a Contributor (the Initial Developer or Contributor against whom You assert such claim is referred to as Participant) alleging... Page 4243 the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation... Page 4244 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Apache OpenJPA binary assembly Copyright 2006-2010 The Apache Software... Page 4250 disclaimer in the documentation and/or other materials provided with the distribution, and 3. Redistributions must contain a verbatim copy... Page 4251 Individual files and/or contributed packages may be copyright by other parties and/or subject to additional restrictions. This work is... Page 4252 from this software without specific prior written permission. This software is provided ''as is'' without express or implied warranty.... Page 4253 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)... Page 4254 advertising or otherwise to promote the sale, use or other dealing in this Software without specific, written prior permission.... Page 4255 Portions Copyright 1999-2008 Howard Y.H. Chu. Portions Copyright 1999-2008 Symas Corporation. Portions Copyright 1998-2003 Hallvard B. Furuseth. Portions Copyright... Page 4256 Copyright 2011-2014 Howard Chu, Symas Corp. All rights reserved. Redistribution and use in source and binary forms, with or... Page 4257 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF... Page 4258 to NeoSoft, Inc. NeoSoft, Inc. may not be used to endorse or promote products derived from this software without... Page 4259 The names of the authors and copyright holders must not be used in advertising or otherwise to promote the... Page 4261 nor may "OpenLDAP" appear in their names without prior written permission of the OpenLDAP Foundation. OpenLDAP is a trademark... Page 4262 Portions Copyright 2001-2006 IBM Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without... Page 4263 Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due... Page 4277 publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3.... Page 4278 notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work,... Page 4279 the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support,... Page 42801.426.1 Available under license : This file is part of the OpenSSH software. The licences which components of this software... Page 4281 The legal status of this program is some combination of all these permissions and restrictions. Use only at your... Page 4282 * Ariel Futoransky <futo@core-sdi.com> * <http://www.core-sdi.com> 3) ssh-keyscan was contributed by David Mazieres under a BSD-style license. * Copyright... Page 4284 Corinna Vinschen Cray Inc. Denis Parker Gert Doering Jakob Schlyter Jason Downs Juha Yrjl Michael Stone Networks Associates Technology,... Page 4285 b) snprintf replacement * Copyright Patrick Powell 1995 * This code is based on code written by Patrick Powell... Page 4286 Internet Software Consortium. Todd C. Miller Reyk Floeter Chad Mynhier * Permission to use, copy, modify, and distribute this... Page 4287 ------ $OpenBSD: LICENCE,v 1.19 2004/08/30 09:18:08 markus Exp $ /* ==================================================================== * Copyright (c) 1998-2001 The OpenSSL Project. All... Page 4288 * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric... Page 4289 * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim... Page 4290 On Debian systems, the complete text of the BSD License can be found in `/usr/share/common-licenses/BSD'. The Debian packaging is... Page 4291 - TSS has been removed - MD5 is now external, in the OpenSSL library - RC4 support has been... Page 4292 * * All rights reserved. Redistribution and use in source and binary * forms, with or without modification, are... Page 4293 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, * EVEN IF ADVISED OF... Page 4294 Per Allansson Nils Nordman Simon Wilkinson Portable OpenSSH additionally includes code from the following copyright holders, also under the... Page 4295 8) Portable OpenSSH contains the following additional licenses: a) md5crypt.c, md5crypt.h * "THE BEER-WARE LICENSE" (Revision 42): * <phk@login.dknet.dk>... Page 4297 * IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, * * DAMAGES OR OTHER... Page 4298 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING,... Page 4299 * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the... Page 4300 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,... Page 4301 * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software... Page 4302 * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary... Page 4303 * * As far as I am concerned, the code I have written for this software * can be... Page 4305 4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the public domain and distributed... Page 4306 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES,... Page 4307 William Jones Darren Tucker Sun Microsystems The SCO Group Daniel Walsh * Redistribution and use in source and binary... Page 4308 Some code is licensed under a 3-term BSD license, to the following copyright holders: Todd C. Miller Theo de... Page 4309 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C. MILLER BE LIABLE * FOR ANY SPECIAL, DIRECT,... Page 4310 License: Redistribution and use in source and binary forms, with or without modification, are permitted under the terms of... Page 4311 [Tatu continues] * However, I am not implying to give any licenses to any patents or * copyrights held... Page 4312 REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT... Page 4313 * @version 3.0 (December 2000) * * Optimised ANSI C code for the Rijndael cipher (now AES) * *... Page 4314 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY... Page 4316 Eric P. Allman The Regents of the University of California Constantin S. Svintsoff * Redistribution and use in source... Page 4317 Some code is licensed under a MIT-style license to the following copyright holders: Free Software Foundation, Inc. * Permission... Page 4318 the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts.... Page 4319 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS... Page 4320 * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.com)" * The word 'cryptographic' can be left... Page 4321 must display the following acknowledgement: This product includes software developed by Eric Young (eay@cryptsoft.com) THIS SOFTWARE IS PROVIDED BY... Page 4322 documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software... Page 4324 are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following... Page 4325 * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code... Page 4326 */ Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This... Page 4327 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF... Page 4328 * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features... Page 4329 * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so... Page 4330 * The licence and distribution terms for any publically available version or * derivative of this code cannot be... Page 4331 The reason behind this being stated in this direct manner is past experience in code simply being copied and... Page 4332 [including the GNU Public License.] The reason behind this being stated in this direct manner is past experience in... Page 4333 * Such redistributions must allow further use, modification, and * redistribution of the Source Code under substantially the same... Page 4334 OpenSSL License --------------- /* ==================================================================== * Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. * * Redistribution and... Page 4335 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY... Page 4336 * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application... Page 4337 built on Fri Jun 5 12:42:23 EST 1998 options:bn(64,32) md2(char) rc4(idx,int) des(idx,cisc,16,long) idea(int) blowfish(idx) C flags:gcc -DTERMIOS -O3 -fomit-frame-pointer... Page 4338 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes... Page 4341 * */ Original SSLeay License -----------------------
cc/2019-30/en_middle_0012.json.gz/line1438
__label__cc
0.696528
0.303472
Dried Organic Herbs Mariposa Farms Fresh Herbs If you would like pricing for our products, click here to request more information. For immediate pricing, call (641) 236-5740. Retail Pack and Variety Sizes We ship our herb products in various sizes. For more shipping information, click here. Arugula, also called rocket, has a bold peppery tasting flavor and is popular in Italian cuisine. Use this herb in salad mixes, soups, or sandwiches to liven up the flavor. It also works well when added to a pizza near the end of cooking. This way arugula stays freshest. Mariposa Farms is a family operated business located in Grinnell, Iowa. Wash Products soma before use. Browse Recipes >> Baby Dill Baby dill has soft feathery fern-like foliage and a unique savory taste. The mild warm flavor of baby dill is similar to a cucumber or celery but more distinct. Dill complements meat, fish, poultry, vegetable entrees, and salads. Wash Products before use. Basil is an ingredient in all types of dishes, whether it be savory or even sweet. The intense flavor, color and aroma of this herb give it universal appeal. Basil is a primary ingredient in pesto and goes great with tomatoes, mushrooms, spaghetti sauce, pizza, red meat and poultry dishes, eggs and soups. Bay leaves, shiny and smooth in appearance, come from an evergreen tree and is the only form of laurel used in cooking. In ancient times Romans and Greeks used bay to create wreaths that would be worn as crowns. These crowns symbolized great accomplishment by athletes and heroes. This aromatic herb is wonderful in meat dishes, especially fish and red meats. Delicious in soups and stews, and used as a marinade. Add it at the start of cooking to give it time to release its flavor. Chervil is visually similar to and a member of the parsley family. This sweet herb is commonly used in French cuisine. A wonderful ingredient in fish, poultry, herb butters, soups, and salads. Chervil is best fresh, or when added at the end of cooking. Chives have a mild onion garlic-like flavor that is excellent for adding flavor to savory dishes. They have long round hollow blades that makes chopping them a breeze. Great in cream cheese dips, baked potato toppings, soups, spreads, vegetables, vinegars, and butters. This herb is also popularly used as a garnish. This herb has a fresh pungent citrus-like flavor that goes well in marinades, avocado dishes, salsas, pastas, and more. Edible flowers make beautiful garnishes for salads, soups, and beverages. Their taste can vary from the peppery nasturtium to the mild pansy. This variety of parsley boasts a sweet and refreshing flavor on poultry and red meats, in salads, and in vegetable and rice dishes. It is more commonly used in cooking than as a garnish. This boldly fragrant herb adds a delicate flavor to desserts, teas, honeys, beverages, and sauces. It can also be used as an accent in some savory dishes. Lemongrass has a lemony flavor and refreshing aroma that is delicious in Asian cooking. Use lemongrass by finely mincing the more tender inner white part of the stalk or adding whole chopped sections into tea or soup while they steep. Lemongrass is also great in curries, stir fries, and marinades. Marjoram is a member of the mint family and is used in Italian and Greek cooking. The taste of marjoram is similar to oregano but more delicate and slightly floral. It does not have the same peppery undertone that oregano has. When used fresh, marjoram is sweeter and milder than if it is used dried. Use marjoram in tomato sauces, meat dishes, salad dressings, soups, flavored vinegars and oils. Mint is used in teas, jellies, sauces, and chocolates. Mint enlivens meat, fish, poultry dishes, creamy vegetables soups, and steamed mild vegetables with a sweet zesty flavor. Opal Basil A slightly milder basil. Its beautiful purple leaves make it a wonderful garnish. Opal basil can be used in vinegars and oils to infuse them with a unique dark burgundy color. Add to pestos, salads, sauces, bruschetta, or sandwiches to liven color and flavor. This herb has strong flavor that is almost essential in Italian, Greek and Mexican dishes. Used best in tomato sauces, on red meats and poultry. An herb with intense aroma and flavor. It accompanies garlic, oregano, and thyme wonderfully. Used best in red meat dishes, stuffing, and as a marinade. Mariposa Farms is a family operated business viagra located in Grinnell, Iowa. Sage, a sister herb to rosemary, has soft green-gray foliage and a smoky mint flavor. It goes into poultry, vegetables, pâté, and stuffing especially well. Savory is often used in Italian cooking and is especially good with green beans and lentils. Summer savory tastes like peppery thyme and blends well with most flavors, by uniting them. It is also popular in teas, herb butters, vinegars, chicken soups, creamy sauces, and fish. Winter savory is stronger with a piney taste. It is used with poultry, strong game, meats and pâtés. Sorrel tastes a bit like rhubarb. It has a sharp lemony flavor and is said to sharpen the appetite. Raw sorrel is a refreshing addition to salads but can also be cooked in cream sauces and soups. Use sorrel to enliven potatoes, tomatoes, zucchini, eggs, fish, and poultry. Tarragon has an exotic sweet but mild flavor. It is used in French cuisine and to flavor sauces such as bearnaise and tartar sauce. The leaves may also be used in salads and cooked to enhance fish and shellfish, beef, game, and poultry. Tarragon also blends well with onions, mushrooms, and asparagus. This fragrant herb boasts a mild lemon and mint flavor. It is one of the most commonly used herbs. Use it with veal and poultry dishes, vegetables and rice, and in tomato sauce. Watercress is an aquatic leafy green in the mustard family. It is highly nutritious and versatile, which means it makes for a great addition in many recipes. Use this light peppery tasting herb in salad mixes along with mixed greens or on a sandwich. This ventolin superfood can also be cooked and eaten as a vegetable.
cc/2019-30/en_middle_0012.json.gz/line1440
__label__cc
0.742853
0.257147
The Imperative of Proxies Amongst the many things I learned during my latest stay in Ethiopia was that censorship is a real and present danger. The Ethiopian government has, despite its denials, enforced a draconian web censoring policy. Web sites that provide uncensored news and information, that could in any way be deemed regime critical or defend the "unacceptable" are routinely blocked in a growing number of countries. Quite a few of these countries (here is one list, see CitizenLab for more, or view the updated list of arrested cyber dissidents from Reporters without Borders) receive aid in different forms. Donor nations and organizations need to apply pressure on these countries to ensure the free flow of information to their citizens. We know this. They know this. Not a lot happens. Donor countries say that they are talking to officials in each of these countries. Donor organizations say that they are talking to officials in these countries. The mill of diplomacy grinds slowly. The mill of oppression grinds frighteningly fast and is increasingly effective. When a proxy server ( a server at an unblocked URL that allows access through it to blocked sites: eg anonymouse.org) pops up it does not take a lot of time before it too joins the banned sites list. There is however something that could be done immediately. By organizations that perceive themselves as standing for freedom of thought, exchange of ideas and unfettered curiosity. Universities. If every university had a freely available proxy server (particularly universities that have a development or exchange program with countries like China, Vietnam, Syria, Ethiopia, Zimbabwe etc.) it would make it close to impossible to block them all. Students could not access course material, teaching resources or professors web pages at the partner university. Not blocking the Universities web site could (and should) be a prerequisite for signing a contract. We know that commercial companies have no morals other than those dictated by the bottom line. Google, Skype, Murdoch, Yahoo!, Microsoft, Cisco Systems- they all have agreements with China to censor their search-engines to filter out websites overcritical of the authorities. Donor organizations like UNICEF talk the talk but lack the political will/muscle to implement. But Universities - dependent as they are on their reputation as bastions of free and independent thought as well as excellence in teaching - could be in the forefront of a global campaign to free speech. Teacher and student unions - got to it. Journalists with Universities in your area, ask them why not. Alumni -put the pressure on. Start campaigns. Do it now. February 05, 2007 in Current Affairs, Ethiopia, rant, Web/Tech | Permalink | Comments (0) | TrackBack (0) 16th- Early 20th Century Maps of Africa This site features digital copies of 113 antique maps of Africa and accompanying text dating from the mid 16th Century to the early 20th Century. All scanned maps are authentic and originally collected by the Melville J. Herskovits Library of African Studies (or the Africana Library) at Northwestern University. Searchable, or browse by title, cartographer, date, country or African region, or place of publication. February 01, 2007 in database, Ethiopia, Re/search tips, usefull resources | Permalink | Comments (0) | TrackBack (1) WikiLeaks- helping anonomize whistle-blowers At the campaigns by various governments (Ethiopia, China, Zimbabwe etc) to block internet access to sites deemed "unacceptable" ramps up, any and all ways to help whistle-blowers and users locate and access each other are welcome. Here is one initiative reported on by the New Scientist mag: http://www.newscientisttech.com/article.ns?id=mg19325865.500> How to leak a secret and not get caught By Paul Marks Leaking a sensitive government document can mean risking a jail sentence -- but not for much longer if an online service called WikiLeaks <http://www.wikileaks.org/index.html> goes ahead. WikiLeaks is designed to allow anyone to post documents on the web without fear of being traced. Normally an email or a document posted to a website can be traced back to its source because each data packet carries the IP address of the last server that it passed through. To prevent this, WikiLeaks will exploit an anonymising protocol known as The Onion Router (Tor), which routes data through a network of servers that use cryptography to hide the path that the packets took. There are however, fears that whistle-blowers might still be at risk. "I would not trust my life or even my liberty to Tor," says Ben Laurie, a London-based computer security expert. In the past, determined cryptographers have breached Tor's security, and though each breach has led to improvements to Tor there is always a risk others will be discovered. WikiLeaks will provide a forum for the entire global community to examine any document relentlessly for credibility," the site claims. January 15, 2007 in Current Affairs, Ethiopia, usefull resources, Web/Tech | Permalink | Comments (0) | TrackBack (0) IRINnews.org: Horn of Africa News reports on events in Djibouti, Eritrea, Ethiopia, Somalia, and the Horn of Africa region in general. Covers conflicts (such as the Ethiopia-Somalia conflict), food security, weather events, disease outbreaks, humanitarian aid, and related topics. From the Integrated Regional Information Networks (IRIN) of the United Nations (UN) Office for the Coordination of Humanitarian Affairs. Unfortunately there is no RSS-feed. January 04, 2007 in Current Affairs, Ethiopia, usefull resources | Permalink | Comments (0) | TrackBack (0) The Horn of Africa Driving (or in my case being driven) in Africa is an amazing experience. The styles are very different as is the attitude. Even the dominant car colors are different. In Addis it is white, in Nairobi silver. In South Africa the style is manic, aggressive and often violent. The Bus Wars are a symptom. When I asked what side of the road one should drive on the answer was "the opposite side to the guy coming at you". Sage advice indeed. In Kenya (Nairobi at least) the style is less aggressive but in some ways more daunting. If the lane is blocked, and during the rush hours (yes hours! Between 07.00 to 0900 and 17.00 to 19.00) they always are, then you just take the lane on the opposite side, or the footpath, or any way that is available. And there are lots of push bikes. Old school, with steel rods instead of cables, makes them look like bikes with a severe polio problem. In Addis the style is aurally more aggressive but in actual driving terms much more laid back. There is a lot of jostling, lanes are more an abstract concept than an actual reality and zebra crossings seem to be a way to arrange ferengi (foreigners) as targets. No Addis dweller would use a crossing when there are acres of car filled space to weave in and out of. The way to get through a crossing is to be the most fearless. Inching your way into the crossing, seeing to it that someone blinks, steps lightly on the brake, shows any sign of weakness, then power through. Right of way is for whom ever takes it. But in spite of this there is no real feeling of aggression. No blood vessel bursting outpourings of venom. It is pushy and edgy but the main vibe is still friendly. Just like Addis in fact. But the true signifier of Addis driving is the horn. It is as integral and important a part of the car as the steering wheel. It is used for everything and there seems to be a highly developed horn language. Soft tiny beeps for warning pedestrians who look like they might think of walking closer to the edge of the trafic, harder beeps to warn taxis about to pull out in front of you, loooong harsh ones for any car that has not anticipated the changing of the trafic lights and is not moving a micro milliseccond before the lights change. There is a beep to remind the traffic cop that you have been waiting for more than 20 seconds and isn't it about time he let you through? Then there is the beep that is the equivalent of the finger. Impossible to describe but equally impossible to miss. Truly the horn of Africa. December 17, 2006 in Ethiopia | Permalink | Comments (0) | TrackBack (0) sucky headline It sucks to be sacked recovering in Addis, reading about trials I am just recovering from a huge hit of food poisoning. It was vicious. I can´t recall being this sick since my appendix burst when I was 15. I was totally, utterly, absolutely wrecked. The various liquids continuously spewing forth from all available orifices gave a totally new meaning to streaming media. And the cramps, man they killed. After a day of this my flat mates called in the Norwegian nurse who was great. Or to be honest, the drugs she brought were great. Mega pain-killers and anti-biotics. It took them about a day to kick in but I am begining to feel human again and have even eaten some soup. Which stayed down. As I recover I am reading the Ethiopian Papers. My favorite story thus far is from the Sub-Saharan Informer. Reporting on the trial of jailed opposition leaders, journalists and others the paper gives the following insight into how trails proceed: “I was beaten badly with an iron rod by CUD people,” said one witness who added it was because he was from Tigray and was speaking Tigrigna. He then pointed out from the defendants some of the people whom he alleged did the beating. Melaku Bincha, Kassa Tadesse, Eyob Bekele and Fekadu Assefa were some of the defendants the witness pointed out. Given the chance to cross-examine, Fekadu asked the defendant if he exactly remember him beating. “No,” answered the witness. “You didn’t do anything to me. I was beaten hard and I wasn’t in a position to know who beat me.” Asked by the judge how he was then able to identify the defendants, the witness replied frankly “I was told by the prosecutor.” Well, I suppose that could be called transparency. Supper with a super blogger Just back from a great evening with Andrew Heavens, the blogger behind Meskel Square. Amongst other things he told us about his launch of the The Big Issue Ethiopia. The first printing of 2000 sold out in a day and the second printing of 3000 sold out at the Great Ethiopian Run. Being there was fun, getting there was a nightmare (though fun in its own warped way). Addis is the original town "where the streets have no name". Our instructions were to drive to Siddis Kilo then turn left, straight along till the road starts to curve the take a left just before the curve gets very curvy, up the hill and look for the big white wall. Then take a left just before the wall. We got lost. Way lost. Way way lost. As we passed the Kenyan embassy and the 15 minute mark a certain nervousness set in. No street names, no street lights, shit - no actual street at one stage. So we stop and ask someone. A scaly dude says he is just on his way there and can show us. OK. He hops in. We set off. He points we drive. And yea! we are back where we started. After giving our benefactor money "for my sick mother" ( she must have taken ill as we drove, but he was worth every birr) we tried again. This time we made it, but the van almost didn´t. The lane to Andrews house is just a number of connected mine shafts masquerading as potholes. Horn was honked, gate was opened and there he was smiling on his porch. So thanks Andrew for the good lasagna, great company (and adorable baby) but lousy directions. November 28, 2006 in Ethiopia | Permalink | Comments (0) | TrackBack (0) Originally uploaded by markmedia. Back from lunch. Three Four people had burgers, club sandwiches, eight (yes eight) maciato coffees and coke and fanta. And cake. All for 63 birr (about the same in Swedish kronor). Getting a sim card Off to the Hilton Hotel to get a sim card. They now have an ATM which takes Visa and is one of several new ATM;s in the city. Anyway, to get your sim card you have to first make a copy of your passport. So, off to the business center. The guy there says that the copying machine is not working but id we come back in half an hour then his boss can copy it in another room. No, he can not do it, he hasn´t the authority. OK, to the bar for a beer. Its the Hilton so a beer cost about 20 birr (20 skr) which is about three times the cost anywhere else. Rich prices for rich guests I guess. Back to the copying place. A copy of your passport? No problem she says and makes one. Right there. On the "broken" machine. Well, no biggie. To the sim card shop. Again no problem. After filling out a number of forms, depositing the copy of my passport and paying the 370 birr the card cost, I put the card in my pocket anf off home. Bad move. Card in cell phone, switch on, see network! Great. Try to ring. Get long message telling me (I assumed) what to do. In Amharic. WTF! How stupidly arrogant do you have to be not to realise that the messages will be in the working language of the country you are in! However much that is, I am. So, I ask the gate guard. -No money on the card, he says. Back to the Hilton. The very helpful lady looks at me with a mixture of pity and exasperation. Takes the phone and does some magic things with nimble fingers and gives me back the phone. Working. Loaded. Ready to be rung. So please, someone ring me!
cc/2019-30/en_middle_0012.json.gz/line1443
__label__wiki
0.871982
0.871982
Skip the Navigation Links | Home Page | All Pages | Latest Revisions | Discuss this page | Feeds | The basis of it all first-order logic type theory, homotopy type theory material set theory ZFC ZFA structural set theory Foundational axioms foundational axiom basic constructions: axiom of cartesian products axiom of disjoint unions axiom of the empty set axiom of fullness axiom of function sets axiom of power sets axiom of quotient sets material axioms: axiom of extensionality axiom of foundation axiom of anti-foundation Mostowski's axiom axiom of pairing axiom of transitive closure axiom of union structural axioms: axiom of materialization axioms of choice: axiom of choice axiom of countable choice axiom of dependent choice axiom of excluded middle axiom of existence axiom of multiple choice Markov's axiom presentation axiom small cardinality selection axiom axiom of small violations of choice axiom of weakly initial sets of covers Whitehead's principle large cardinal axioms: axiom of infinity axiom of universes regular extension axiom inaccessible cardinal measurable cardinal elementary embedding supercompact cardinal Vopěnka's principle strong axioms axiom of separation axiom of replacement reflection principle Removing axioms constructive mathematics predicative mathematics Edit this sidebar Structural Foundations internal language classical mathematics category:foundational axiom Categories and Sheaves topos theory Sheaves in Geometry and Logic higher category theory higher topos theory (∞,1)-topos theory models for ∞-stack (∞,1)-toposes cohomology homotopy theory stable homotopy theory rational homotopy theory Topology and Geometry geometry (general list), topology (general list) general topology differential topology differential geometry synthetic differential geometry symplectic geometry noncommutative algebraic geometry noncommutative geometry (general flavour) higher geometry universal algebra higher algebra homological algebra group theory, ring theory representation theory algebraic approaches to differential calculus counterexamples in algebra nonstandard analysis Fourier transform Lie theory higher Lie theory probability theory Naïve vs axiomatic set theory Foundational vs definitional set theory Material vs structural set theory Category theory on set theory In homotopy type theory A set theory is a theory of sets. Naïve set theory is the basic algebra of the subsets of any given set U, together with a few levels of power sets, say up to 𝒫𝒫𝒫U and possibly no further. Often students see this first for the set of real numbers as U (although in fact one could start with the set of natural numbers and go one level further for an equivalent theory). One could also use function sets instead of power sets as the basic set-forming operation (especially for a weakly predicative theory in constructive mathematics). Once you start thinking very much about the nature of sets in general (rather than merely using naïve set theory), it quickly becomes clear that one must be careful about how one can and cannot form sets. Georg Cantor is credited with being the first to think about sets this deeply; although he did not propose a system of general rules for valid set-making operations, he recognised that some sets were ‘inconsistent’. An axiomatic set theory is a set theory which carefully states the rules (or ‘axioms’) which sets are assumed to obey. Gottlob Frege has perhaps the first axiomatic set theory, but it was found (by Bertrand Russell) to be logically trivial; see Russell's paradox. Ernst Zermelo is credited with the first consistent axiomatic set theory. There are two ways to go about doing axiomatic set theory. The more ambitious is to develop a foundational set theory: set theory as foundations for all of mathematics. This is what Frege proposed (although he failed through inconsistency) and which Zermelo achieved. A variation of Zermelo's system (developed by Fraenkel and Skolem and called Zermelo–Fraenkel set theory or ZFC) is the orthodox foundations today, although it needs to be supplemented by Grothendieck universes (or something along those lines) to handle modern category theory, and set theorists often consider further strengthenings of it through large cardinal axioms (of which the existence of Grothendieck universes is an example, just the tip of the iceberg). It is also possible to make a definitional set theory, in which one defines sets in terms of some more primitive concept. For example, Bill Lawvere proposed a foundation ETCC based on the category of categories; then a set may be defined as a discrete category. This is also the case in homotopy type theory, where sets are defined as those types which are h-sets. In constructive mathematics, a foundation based on type theory is popular, with types interpreted as presets (sets without equality); then a set may be defined as a preset equipped with an equivalence relation (the term setoid is also used for such a gadget). In computer science, a foundation based on the lambda-calculus is sometimes seen; in these terms, the concept of list is more natural than set, with the difference being that sets have a coarser notion of equality. On the nLab we like to distinguish between two types of set theory, especially in foundations: In a material set theory (also called a membership-based set theory), the elements of a set exist independently of that set. As such, it makes sense to take two completely unrelated sets and ask if two of their members are equal, and sometimes the answer will be Yes. Frequently in material set theory one takes everything to be a pure set, so that elements of sets are themselves sets. Therefore, any two sets may be meaningfully compared to ask if they are equal or if one is a member of the other. A structural set theory, on the other hand, looks more like type theory. Here, the elements of a set have no existence or structure apart from their identity as elements of that set. In particular, they are not themselves sets, and cannot be elements of any other set, at least not without invoking some explicit type-casting? operator (which here could simply be a function from one set to the other). Similarly, elements of different sets cannot be compared to each other (without type-casting them to become elements of the same set). Among category theorists, it's popular to state the axioms of a structural set theory by specifying elementary properties of the category of sets; the orthodoxy here (to the extent that there is one) is probably Bill Lawvere's ETCS, which suffices for most everyday uses but must be supplemented to handle some esoteric parts of modern mathematics. Another structural set theory, which is stronger than ETCS and less closely tied to category theory, is SEAR. In contrast, ZFC is an example of a material set theory. From a model of either kind of set theory we can construct a model of the other, so the two are, broadly speaking, equivalent; for example, SEARC (SEAR with the axiom of choice) is equivalent in this way to ZFC, while ETCS is equivalent to a weak (‘bounded’) variation of ZFC. A more precise statement is that the two kinds of theories form categories related by the material-structural adjunction. Category theory can provide a common model theory to compare various set theories. Although only structural set theories like ETCS treat the elementary properties of the category Set of sets as fundamental, one can ask for any set theory what properties Set satisfies and compare them in those terms. At the very least, Set should be a pretopos. There is also algebraic set theory, in which a material set theory is interpreted in the internal logic of some ambient category, often called a “category of classes”. See also stack semantics. type theory constructive set theory algebraic set theory descriptive set theory set-theoretic multiverse Kenneth Kunen, Set theory,an introduction to independence proofs, North-Holland. William Lawvere, Robert Rosebrugh, Sets for Mathematics , Cambridge UP 2003. (web) Formalization of set theory in homotopy type theory (via h-sets) is discussed in Egbert Rijke, Bas Spitters, Sets in homotopy type theory (arXiv:1305.3835) Univalent Foundations Project, section 3 of Homotopy Type Theory – Univalent Foundations of Mathematics Jérémy Ledent, Modeling set theory in homotopy type theory (2014) (pdf) See also at homotopy type theory FAQ What is HoTT? – For set theorists. Last revised on April 10, 2019 at 11:59:41. See the history of this page for a list of all contributions to it. EditBack in time (54 revisions)See changesHistory Cite Print TeX Source
cc/2019-30/en_middle_0012.json.gz/line1447
__label__wiki
0.720612
0.720612
Menuisier hoping for a Vintager performance at Newbury on Worthington’s Armed Forces Raceday Newbury’s 2017 Flat season concludes on Saturday, October 28 with Worthington’s Armed Forces Raceday. The eight-race card runs from 1.10pm to 5.05pm. A field of 11 goes to post in the richest race of the day, the £60,000 G3 Worthington’s ‘Indigo Leisure’ Stakes (2.15pm) over a mile and a half. The top-rated performer in the Worthington’s ‘Indigo Leisure’ Stakes is Godolphin’s Frontiersman (Charlie Appleby/James Doyle), who was runner-up in the G1 Coronation Cup at Epsom back in June. Also lining up in the famous blue silks is Best Solution (Saeed bin Suroor/Pat Cosgrave), second in the G1 Grosser Dallmayr-Preis at Munich, Germany, on his penultimate appearance. Danehill Kodiac (Richard Hannon/Sean Levey) is bidding to follow up in G3 company, having landed the Cumberland Lodge Stakes at Ascot on October 7 while Mountain Bell (Ralph Beckett/Martin Harley) is set to make her first racecourse appearance since finishing second in this race a year ago, when she went down by half a length to Duretto. Other runners of note include G3 Bahrain Trophy scorer Raheen House (Brian Meehan/Jamie Spencer), last season’s G1 Epsom Oaks runner-up Architecture (Hugo Palmer/Josephine Gordon) and Western Hymn (John Gosden/Frankie Dettori), successful four times at G3 level. Seven go to post in the other G3 contest on Saturday’s programme, the £40,000 Bathwick Tyres Stakes (2.50pm) for two-year-olds, which takes place over seven furlongs. Nebo (Charlie Hills/Frankie Dettori) sets the standard having been placed four times in G2 company, including when a close third in the six-furlong G2 Dubai Duty Free Mill Reef Stakes at Newbury on September 23. Dream Today (Mark Johnston/P J McDonald) was runner-up in the G3 Autumn Stakes at Newmarket a fortnight ago, while the consistent Tangled (Richard Hannon/Sean Levey) scored the biggest win of his career in the valuable Goffs Premier Yearling Stakes at York in August. An interesting contender is Vintager (David Menuisier/Kieran Shoemark). The Mastercraftsman colt was a surprise 33/1 winner on debut at Newmarket over seven furlongs in August and then ran a good race when a close fourth to Masar, who was subsequently third at G1 level, in the G3 Solario Stakes over the same distance at Sandown on September 2. Menuisier, who is based at Pulborough in Sussex, said today: “Vintager seems to be in good shape and the track at Newbury should suit. I think that the soft ground should suit as well because he won nicely on similar ground on his debut at Newmarket. “He was meant to run the other day at Newmarket in the G3 Somerville Stakes but his scope wasn’t great, so we decided to give him a bit more time and he seems fine now. “He was very green when he ran in the Solario Stakes and he switched off a little bit too much at the back. Sandown is not an easy track for two-year-olds and, when you win first time out, you need to learn a great deal quickly in order to compete at G3 level. Despite his greenness, it was still a good run. “He should be a bit cleverer on his third run and we will see how he gets on – he will either prove me right or prove me wrong!” The eight-race programme on Worthington’s Armed Forces Raceday also includes the £30,000 Listed Bathwick Tyres Stakes (3.55pm, 14 runners) for two-year-old fillies. Two Irish-trained raiders line up in this contest – recent Naas nursery winner Moonlight Bay (Ger Lyons/Jamie Spencer) and Sunday Smart (Patrick Prendergast/Ted Durcan), who landed a Limerick maiden last time out. Worthington’s Armed Forces Raceday comes to a close with the Worthington’s ‘Victoria Club’ Lady Jockeys’ Handicap (5.05pm, 10 runners). To mark the 10th anniversary of Worthington’s Armed Forces Raceday on Saturday, all runners carrying the Number 10 will wear specially designed number cloths for the eight-race card to mark the occasion. Once again, Newbury Racecourse will welcome current serving members of the Armed Forces and members of the Royal British Legion for its final Flat meeting of the season, which also plays host to the launch before racing of the 2017 Poppy Appeal for Berkshire and Vale of White Horse. It will be marked the Royal British Legion’s Parachute Display team. Newbury also races tomorrow, Friday, October 27, which offers an eight-race programme running from 1.10pm to 5.10pm. An intriguing runner tomorrow is Royal Line (John Gosden/Frankie Dettori) who goes to post in the British Stallion Studs EBF Conditions Stakes over an extended mile and five furlongs. The three-year-old Dubawi colt, who is out of G1 Oaks third Melikah (herself a daughter of the outstanding Urban Sea), runs in the maroon and white silks made famous by so many of Sheikh Mohammed’s star performers and which now represent his daughter, Her Highness Sheikha Al Jalila. The going at Newbury is currently Soft. Jump racing returns to Newbury on Thursday, November 9, with the highlight of Newbury’s Jump season, the Ladbrokes Winter Carnival, following on Friday and Saturday, December 1 and 2.
cc/2019-30/en_middle_0012.json.gz/line1448
__label__wiki
0.720326
0.720326
Home » Kerala » Dr. T.N. Seema Dr. T.N. Seema Dr. T.N. Seema is 56 years old elected from Kerala as Rajyasabha member. He is a member of . Was Teacher of Malayalam language and literature in Government Colleges from 1991 to 2008 Kerala State President and National Vice- President, All India Democratic Women's Association Father's Name Shri P. Narayanan Nair Mother's Name Shrimati Manasi Nair Education B.A., M.A. (Malayalam), Ph.D. in Malayalam Literature from University of Kerala Diploma in Tamil from Central Institute of Indian Languages, Mysore Diploma in Universalising Social Security from Institute of Social Science, Hague, the Netherlands Permanent Address TC 42/366(1), Shreevaraham, Vallakadavu P.O., Thiruvananthapuram, Kerala. Telephone : {0471} 2303555, 2453388, Mobile: 09447077556 Communication Address 90, North Avenue, New Delhi. Telephone : 23752426, Mobile: 9013181556 Authored, (i) Women and Local Planning (in Malayalam), 1997 and (ii) Globalisation and Women (in Malayalam), 2000 Edited, (i) Equality in Development, 2000, (ii) Gender Status Study, 2000, (iii) Neighbourhood Collective, 1999 and (iv) People's Plan Campaign and Women's Advancement, 2000
cc/2019-30/en_middle_0012.json.gz/line1452
__label__wiki
0.957419
0.957419
Europeans likely to grudgingly agree to delay Brexit: sources Cédric SIMON AFP April 8, 2019 European Council president Donald Tusk has personally proposed a "flextension" to Brexit, which could delay the UK's departure for up to a year, or shorter if British lawmakers manage to approve a deal (AFP Photo/FREDERICK FLORIN) Brussels (AFP) - European capitals are increasingly worried that ongoing Brexit chaos will carry a political and economic cost to the continent, but despite warnings from Paris, most seem ready to accept a lengthy postponement to Britain's departure. British Prime Minister Theresa May still has meetings with the leaders of France and Germany before Wednesday's EU summit, the last before the next notional Brexit deadline at midnight on Friday. May has said she will ask for Brexit to be delayed only until June 30, but officials and observers here expect the other 27 EU leaders to study the idea of a longer "flexible" extension into 2020. As floated by EU Council president Donald Tusk's office last week, the delay could last up to a year but be cut short if May manages to get an orderly withdrawal deal past UK lawmakers. Tusk's Council represents EU member governments in Brussels, and he will host Wednesday's emergency Brexit summit -- but officials were clear he was proposing the "flextension" on a personal basis. "It's Mr Tusk's position, not the position of the council," one diplomatic source told AFP, after the former Polish leader's leaked initiative caught the other 27 EU capitals by surprise. In Paris, a diplomatic source dismissed Tusk's suggestion as a "clumsy trial balloon", as French President Emmanuel Macron's government continued to insist May must present a "credible plan" for orderly divorce. In public at least, France has struck a more strident tone in demanding British commitments in return for further extensions to a Brexit process that was due to have come to an end on March 29. Most of the 27 insist, for example, that Britain must be ready to take part in the European Parliament elections that start on May 23 if it is still a member, and May has reluctantly begun contingency planning for a vote. But other countries such as Germany and, most notably Ireland, are pushing for London to be given space to come up with a solution to avert a cliff-edge no-deal Brexit they fear would cause economic and legal chaos. "We'd need a strong political reason to delay," insisted a diplomat from the hardline camp, suggesting that London undertake to hold a general election or a second Brexit referendum to break the political logjam. "Otherwise, why would the European Union itself take on such a responsibility?", the source demanded, pointing to the risks posed by indefinite Brexit uncertainty or British eurosceptic mischief-making. Many EU capitals share the concern that an endless series of inconclusive postponements could undermine the election, the formation of a new European Commission after the vote or decision-making within EU institutions. - Veto 'extremely unlikely' - Nevertheless, "no-one is really opposed to Mr. Tusk's flextension," another diplomat who has attended high-level talks in Brussels between the 27 non-British representative delegations told AFP. "This option could be useful for May," she said, arguing that a flexible delay would allow the British premier to tell her own hardline eurosceptics that they can leave Europe any time they like, just by approving the deal. Ireland's Prime Minister Leo Varadkar, who was meeting EU negotiator Michel Barnier on Monday ahead of the summit, said at the weekend he thought it "extremely unlikely" that any member state would veto a Brexit delay. And thus far in the lengthening negotiations, Brussels has stood in strong solidarity with the position of Ireland, a continuing member that stands to lose out greatly in the event of its neighbour crashing out without a deal. Diplomats here, however, admit that they're following the news from London "three times a day" and that trust in May's ability to deliver on her undertakings is slipping. "The next few days or hours are going to be critical," Spanish Foreign Minister Josep Borrell said Monday. Boris Johnson condemns Trump's 'totally unacceptable' tweets telling congresswomen to 'go back' where they came from U.K. Guarantees Jaguar Loans After Pledge to Make Electric Cars Gulf escalation is not in anyone's interests: UK PM May's spokesman Stocks slip to near session lows after Trump says ‘a long way to go’ on trade Boris Johnson rejects EU compromise and pushes Britain towards the no-deal Brexit cliff edge Kellyanne Conway asks reporter his ethnicity when asked about Trump tweets
cc/2019-30/en_middle_0012.json.gz/line1455
__label__wiki
0.92106
0.92106
Home / Entertainment / Conan avenges Kumail Nanjiani's short-term rejection by eliminating Nanjiani's competition Conan avenges Kumail Nanjiani's short-term rejection by eliminating Nanjiani's competition July 12, 2019 Entertainment 5 Views Andy Richter, Conan O'Brien Screenshot: Conan Conan O'Brien gave a small overview of his new at the beginning of his Thursday show only Conan format and pointing out that, should the unthinkable happen and that a guest, say, half an hour before the show calls to cancel: "You're really crazy." in fact, Kumail Nanjiani was caught (or so he says) when he was working overtime in Silicon Valley at Marina Del Rey. Conan appealed to his audience (which was like Conan in Burbank) after the sidekick, announcer and partner Andy Richter had announced the promised performance of Stuber star at the head of the show damned damn. So, what can a 25-year-old late-night veteran do when his only guest makes a no-show just before he's absolutely contracted to make a show that night? Well, if you're Conan, you're a vampire. They educate a shaggy guy named Francisco from the studio audience to hang out while accusing him of being the last person to try and sell illegal weeds in a state that has legalized marijuana. They interview their longtime real assistant Sona Movsesian for a complete segment, something that Conan's Podcast listens to. Conan O'Brien Needs A Friend knows it will be a truly entertaining fight of passive-aggressive parts and shelves. Andy is going to get involved in a couple of slams and compare Kumail with Liza Minnelli (the only guest who ever drank a last-minute powder in 1996) as an "annoying diva" and nail him down with a sick "Kumail Non-Showy" -Uppy (A respectful handshake from Conan.) You play a quick, ten-second mobile video emailed to you in the middle of the show in Nanjiani's Silicon Valley co-star Thomas Middleditch takes the blame and says he did not, I do not know his lines. But most of the time, you're pulling some old Conan O'Brien's revenge on the little comedy when Conan discovered that Nanjiani was in the Show, to promote his new buddy-action comedy Stuber with the requisite promotional clip, he set up the studio ad in his improvised monologue before he set off …. A clip from The Lion King which will be opened this weekend against Stuber . "You have to show up to get the cookie," said Andy's harsh love assessment of the situation, while Conan once again flipped the clip Lion King during his interview with Movsesian just to be mean / funny. As for abruptly repeated clip gags, it may not have been Mac And Me or Walker, Texas Ranger level, but for a last-minute improvisation it was a solid Conan. Tags avenges competition Conan eliminating Kumail Nanjiani39s rejection shortterm Millie Bobby Brown's first & # 39; Stranger Things & # 39; kiss was actually her first kiss ever Sara Bareilles & # 39; Broadway Hit & # 39; s; Waitress & # 39; finished four-year run (exclusive)
cc/2019-30/en_middle_0012.json.gz/line1456
__label__wiki
0.577666
0.577666
You Can Be Political in Your Discussions; Not Partisan-1st Deputy Speaker Advises Students The First Deputy Speaker of Parliament, Hon. Joseph Osei-Owusu has sounded word of caution to the students Parliament of the Koforidua Technical University to be political only in their discussions, and not partisan since the students Parliament is not an elected Parliament and does represent any constituency. He, however, urged them to strive and be loyal to their country, but should ensure that integrity precedes everything they do. “Strive to be loyal to your country, be smart, intelligence, and above all, you need integrity, let your integrity be your guide, let me also sound a caution; you are allowed to be political in your discussions and not partisan, since this is not an elected Parliament, you don’t represent anybody, you have voluntarily offered to participate in the process, you don’t represent any halls, houses or constituencies. “Yes, you can be political which means looking at things from different sides, but not to be TESCON, TAIN or any other. You are just students who desire to debate national issues or offer solutions from the students point of view”. He advised. The 1st Deputy Speaker made this passionate appeal during the inauguration ceremony of the Koforidua Technical University Parliament on Saturday. Speaker Joseph Osei-Owusu also advised the students to find the formation of the Students’ Parliament, as a call for them to get on board and join the various efforts in national development. “All of us have a responsibility to protect our Parliamentary democracy and we owe it to posterity to discharge this duty faithfully and conscientiously”. He indicated. He also encouraged the students to take their education seriously as they prepare to assume the mantle of leadership. According to him, it is important for the students to adequately prepare themselves in readiness for future roles. He urged the student Parliamentarians to master their mock on Parliament process which is a preparation ground for greater responsibilities in future, adding that, Twenty five (25) years of uninterrupted Parliamentary democracy, Ghana’s democracy has come of age. Mr. Kwame Ansah, the Principal Public Relations Officer of the Parliament of Ghana, also indicated that, the establishment of these students parliament will help influence governance in these universities. He also explained that, views that are expressed out of these students’ parliamentary sittings can be put together in a memorandum that can be submitted to Parliament or the Committee of Education, which can also form part of legislation. Mr. Ansah also encouraged the students to support the initiative and join the association in their numbers for it to be vibrant. The Parliament of Ghana has over the years established Students’ Parliament in the various tertiary institutions, both public and private across the country to strengthen Parliamentary process, as well as deepen democratic processes. Following the launch of the Students’ Parliament, there was a mock Parliament displayed by the students who debated on the theme; ‘National Insecurity in the country’. Story: Richmond Adu Dwamena TagsAdvise • Bekwai Constituency • Ghana Journalist Association • Government of ghana • Graduate Students Association • Joseph Osei-Owusu • Koforidua Technical University • ministry of Communication • Ministry of Information • National Democratic Congress • New Patriotic Party • newslinegh • newslinegh.com • Parliament of Ghana • Political • Student Parliament • Students 0 comments on “You Can Be Political in Your Discussions; Not Partisan-1st Deputy Speaker Advises Students”
cc/2019-30/en_middle_0012.json.gz/line1459
__label__wiki
0.788959
0.788959
Newsroom / News Releases DOT Rankings February 02, 2006 Hawaiian Airlines Leads Nation's Service Rankings for 2005 #1 for On-Time Performance, #1 for Baggage Handling and #1 for Fewest Cancellations HONOLULU, Feb. 3 /PRNewswire/ -- "Our employees have made Hawaiian the best airline in America." That was the response of Mark Dunkerley, president and CEO of Hawaiian Airlines, upon learning that Hawaii's hometown airline had led the nation's carriers in service performance for 2005 (see chart below), based on year-end data issued in the Air Travel Consumer Report by the U.S. Department of Transportation (DOT). Rank On-Time Service Fewest Cancellations Baggage Handling Fewest Oversales 1 HAWAIIAN HAWAIIAN HAWAIIAN JetBlue 2 SkyWest JetBlue AirTran Independence 3 ATA Frontier Independence HAWAIIAN 4 America West Continental JetBlue SkyWest 5 Southwest Southwest ATA AirTran This marked the second consecutive year that Hawaiian earned the DOT's top overall scores for excellence with its service. Dunkerley noted, "The DOT reports have confirmed once again that Hawaiian is indeed the nation's preeminent airline when it comes to customer service and reliability." As has become its trademark, Hawaiian was the nation's top airline for punctuality in 2005, with 95.1 percent of its flights arriving on schedule. Hawaiian exceeded the industry average of 77.4 percent by an impressive 17.7 percentage points. To meet DOT standards, a flight must arrive within 15 minutes of schedule to be considered on time. In addition, Hawaiian has now led the airline industry in on-time performance for a remarkable 26 consecutive months. Hawaiian also finished 2005 as the nation's best airline for handling customers' luggage, averaging an industry-low 2.95 mishandled baggage reports for every 1,000 passengers. Moreover, the DOT report data shows that Hawaiian led the industry in fewest cancelled flights during the year, with only 0.1 percent cancellations out of more than 48,000 total flights. Hawaiian also recorded the industry's third-best record for fewest oversales, with only 38 involuntary denied boardings from the more than 5.8 million passengers carried in 2005. The DOT report covers 20 airlines, including eight carriers providing service to Hawaii. The full report is available online at http://airconsumer.ost.dot.gov/reports/atcr06.htm. Hawaiian Airlines, the nation's number one on-time carrier, is recognized as one of the best airlines in America. Consumer travel surveys conducted by Conde Nast Traveler, Travel + Leisure, and Zagat all rank Hawaiian as the top domestic airline serving Hawaii. Now in its 77th year of continuous service in Hawaii, Hawaiian is the state's biggest and longest-serving airline, and the second largest provider of passenger air service between Hawaii and the U.S. mainland. Hawaiian offers nonstop service to Hawaii from more U.S. gateway cities than any other airline (nine), as well as service to Australia, American Samoa and Tahiti. Hawaiian also provides approximately 100 daily jet flights among the Hawaiian Islands. Hawaiian Airlines, Inc. is a subsidiary of Hawaiian Holdings, Inc. (Amex: HA; PCX). Additional information is available online at HawaiianAirlines.com. (Logo: http://www.newscom.com/cgi-bin/prnh/20040827/LAF044LOGO) Hawaiian Airlines, Inc. Keoni Wagner of Hawaiian Airlines, Inc., 1-808-838-6778, Keoni.Wagner@hawaiianair.com
cc/2019-30/en_middle_0012.json.gz/line1460
__label__cc
0.723099
0.276901
Training Coordinator’s Report [69] Posted on December 24, 2007 by smeyn By the time you read this report we will have posted our training program for the remainder of the Club year on the Calender. We have set ourselves many objectives, all determined by what we see as being the needs of the Club and its members. The training program covers a broad scope – from teaching basic skills to those novices through to developing and accrediting highly skilled Sea Instructors. Already we have begun a three-day basic skills session in Sydney with 15 members attending (and already giving us some very positive feedback). A similar session is scheduled for early December in Lake Macquarie (with indications of good numbers attending) and a weekend session is planned for Jervis Bay early in February 2008. Thanks to our Flatwater Instructors Liz Thomson, David Hipsley, Henry van der Kolk and Mike Eggleton for putting on these sessions. A pool rolling session was conducted at the Enmore pool early in October. Ten aspiring rollers attended with tuition being provided by Sea Instructors Harry Havu, Keith Oakford and Mark Sundin (thanks guys). No one rolled on the night but one participant, Alan Thurman, pulled off his first (and second) roll in ‘real’ conditions soon after. Another pool rolling session in Sydney is scheduled for late November with others out of Sydney planned for early next year (check the calendar). Late in October two Club members, Daniel Hilly and Katrina Keane, were successful in obtaining their Sea Skills accreditation when assessed in Botany Bay by Sea Instructor Stuart Trueman. Congratulations Daniel and Katrina (and thanks Stuart). An important event is scheduled for mid November and that is the Instructor ‘Development’ Day. Apart from finalising the training program for the year, the Club’s instructors are meeting to swap training tips and to ensure that the Club is delivering a consistent standard of tuition (in cliché terms ‘we are all singing from the same song sheet’). Please remember that all of our instructors give freely of their own time. It is greatly appreciated if they can get feedback on the quality of the instruction and training they are providing to members. Please don’t be shy if you have some constructive criticism to make (although getting positive comments is much nicer). Also, it would be great if you could let me know if you have any suggestions on where our training program can be improved. Another thing we ask those being given tuition, please don’t assume that being shown a skill and performing it under the watchful eye of your instructor makes you competent. Practice, practice and more practice is the key to developing your skills (and confidence). Life member Dave Winkworth puts it this way ‘There’s no better way to improve your skills and confidence than spending time in your boat’. Finally, the Club needs to graduate more Sea Leaders and Sea Instructors as soon as we can (without detracting from the standard) and would like any aspiring members to put their hands up. If you would like to know what the path is towards achieving these qualifications please speak to one of our instructors or drop me an email at: training2007-8@nswseakayaker.asn.au. Survivor Weekend [69] By Matt Bezzina Participants: Stuart Trueman (Leader), Paul Loker (2 IC), Mark Schroeder, Mark Anderson, Roger Boardman, David Page, Terry Walsh, Stephan Meyn, Matt Bezzina. ‘A weekend of tests to challenge individuals’ was how Stuart Trueman described and conducted this year’s Survivor Weekend. Saturday morning saw us unloading boats and gear early as our brief included the line: ‘At 0859 you will be standing by your kayaks, cars locked, keys packed with nothing to do before getting on the water. Those running the weekend are not expecting to have to motivate participants.’ Not surprisingly everyone was ready early. We were soon heading out of Shoal Bay towards Cabbage Tree Island. On arrival we zigzagged over to Boondelbah Island and from there turned towards our day’s destination, Broughton Island. Stuart quizzed the group as to our ETA and as it was about 12km the estimates ranged from one-and-a-half to two-and-a-half hours. The conservatives got it because half way there Stuart had us tie bungee cords around the hulls of the boats to simulate a heavier load. This, on top of the sea water ballast we were carrying, really did make a difference. It wasn’t long before a couple of litres of sea water were poured into everyone’s front hatch as a test to make sure that everything was properly waterproofed. Once we arrived at the island we all went through the obligatory Cons Cleft — and all got through without incident. It was the breakers over the reef across from Esmeralda Cove which gave one member a swim. Following this we had to demonstrate our off-side roll which resulted in a couple more swimmers. As we approached the beach around the other side we were ordered to bail out and swim the boats into the beach. This resulted in mass swimmers! On landing we were given ten minutes to be changed into dry clothes and have a hot cup of tea in hand. After a written test we were free to find somewhere to set up our tents — easier said then done seeing we were on a beach that gets submerged at high tide and the top of the banks were infested with prickly pear. On Sunday we were to be ready to go by 6am! This had us up in the dark packing away tents and trying to fuel up on breakfast. Stuart and Paul paddled around from their civilized camp spot on the other side and came up to the weary-eyed group. As he looked out at the dead calm and peaceful lee side of the island towards Myall Beach Stuart said ‘look at those huge dumpers — there’s no way we can launch from here. We’ll have to do a portage over the island’. And that was our morning, lugging all our gear and seven boats up the rough track over the top of the island and down to Esmeralda Cove on the other side where Stuart and Paul sat having breakfast and coffee. Once over there we made a call to the coast guard via the radio on the island and then headed off. The swell was up a bit from the previous day and Cons Cleft was looking quite hilly. Mark Schroeder was first through with me following. A year ago when I first went through it was a scary experience as I copped a big wave while in there and got smashed into the side. I managed to stay upright but my boat took a bit of a beating and lost a lot of gel coat. This time it was probably just as rough but a year’s worth of experience made all the difference and I took time to look around and take in a bit of this spectacular feature. I came out and turned quickly to get a few photos of the others as they came out — all grinning from ear to ear. As Terry Walsh came through so did a big wave. It reared up behind him and knocked him over. As I was thinking how best to conduct a rescue, as I’m sure were Paul and Stuart who were holding position inside the cleft waiting for the wave to pass, Terry rolled up beautifully and powered past — the happiest face imaginable! After that we did a navigation exercise before landing just next to Dark Point on Myall Beach where we had lunch. After a surf launch we headed back. Once out past the breakers progress was good, a slight head wind but way short of the predicted 20 knots, a bit of rain and a nice swell. We were cruising along nicely when Stuarts dreaded whistle blew. We gathered round as he suggested we follow him in to the surf. Mark Schroeder, myself and Mark Anderson blindly followed. As he approached the surf zone Stuart did a roll which I think he does as some kind of preparation for battle. The swell suddenly got much steeper and as Stuart and Mark Schroeder turned to seaward to avoid a big wave Mark Anderson and I found ourselves side on to a big breaker. At this point I decided to roll under it so as to avoid being pummelled into the beach but, as I leaned hard into it, I found myself in a perfect broach position, the lean became an edge into a high brace and I enjoyed the best broach ride I’ve ever had, all the way to the beach where I landed quite nicely. Mark didn’t have quite as nice a landing and ended up being pounded, eventually landing about thirty metres down the beach from where I was. We both turned our boats around and stood there on the beach staring at the quite solid surf in front of us. The feeling of jubilation I had from making it in unscathed was quickly replaced by feelings of anxiety as I wondered how the hell we were going to get back out! Mark and I met for a discussion but there wasn’t much to say. We were in the best spot with a light rip going out in front of us but still there were breaking waves right across and they didn’t seem to be getting any smaller. I went back to my boat and sensed a lull. I quickly got in and knuckled into the surf. As soon as I was afloat I paddled like hell — through the first small breaker and then through the next more sizable wall of white water. I saw a clear run and paddled with all I had. I thought I’d made it and tried to catch my breath as another wave appeared before me — a bloody big one. I paddled with all I was worth and just managed to get my blade over the crest to make it over. Next thing I experienced the biggest free fall I’d ever had as I dropped over the back of a now crashing wave, the laden boat adding to the impact. I paddled over to the group who were waiting patiently out the back. Mark hadn’t been so lucky on that last wave and had been collected and washed back to shore. As the group had now been waiting for some time Paul Loker went in to give Mark a hand. He was in and out in no time and made my whole experience a little anti-climatic! A short time later Roger Boardman had his boat lifted out of the water by something big enough to lift his boat out of the water. He had teeth marks on his now bent metal rudder and Paul noted a large swirl. I had seen a shark the day before but it was too far away to make a positive identification. That sighting helped with motivation during the swim landing and after Roger’s experience no more rolling was done — except by Mark Anderson who’s obviously not afraid of sharks. That was to be our last adrenalin dose for the weekend as we paddled back to Shoal Bay. Not so for Stuart who snuck between a rock and a lot of whitewater. On rounding North Head we were greeted by some dolphins. This was a trip with a difference and one of the best things I’ve done with the NSWSKC club. I think the objectives of the weekend were well and truly met — that is to test yourself (and your buddies) in an expedition environment. It was a good bunch of blokes who worked well together and made it a truly enjoyable weekend despite (or because of) the Trueman-induced hardships. If you’re thinking of doing a serious trip I would recommend you take this challenge on with anyone your planning to go away with — as someone once said you can learn more about a man by paddling with him for an hour then you can from a year of conversation. Overview to Safe Paddling on Sydney Harbour [69] By Lee Killingworth This article can be found in the Club website’s ‘Key Documents and Forms’ section. From the President’s Deck [69] By Michael Steinfeld A Sunday tale of kayaks, crazy coincidences and clubs I was cycling down my street on the way to the Newtown festival, when two brand new sea kayaks, strung up in a garage, caught my eye. I shouted to the owner, ‘Nice kayaks you’ve got in there!’ She replied, ‘We just bought these a couple of weeks ago. We thought we could paddle safely but we tipped near Wedding Cake Island, Coogee. Luckily we were rescued by the lifesavers. It was on their first day of the season.’ ‘Dangerous stuff!’ I commented. ‘Now we are about to get some lessons. We didn’t appreciate how risky kayaking could be,’ she said. After introducing myself as the president of this august Club, I spritely pedalled off. Twenty minutes into my trip, I noticed that the bungee cord, which was holding my pack, containing my wallet and phone, had broken. My pack had disappeared. I pedalled home at break neck speed, scouring the street without success. My son received a call at home. Our new kayaking neighbour, who was cycling herself, found my pack in the middle of the road some two km from home. She recognised the pack from the morning meeting. I was lucky and I was thankful that our interest in kayaking had caused my good fortune. At the Newtown fair, Hugh MacKay, social commentator, told us that humans like to be part of a herd and clubs like ours, allow people to come together and ‘graze’ (over kayaking). I thought that the best parts of being in the club are the friendships that I have formed and the social interactions between members while paddling on trips, mixed in with the challenge and excitement of kayaking in the open sea. So that was my Sunday tale. This edition of the magazine has a centrefold with a map of Sydney Harbour and tips for safe paddling. You have to thank Paul Loker, Rob Mercer and the committee headed by Lee for bringing this to fruition. At least now when you are caught napping in a shipping lane, you have been warned. Trying to make the Club ‘go green’ is a worthy goal even though kayaking must be one of the most environmentally friendly recreational sports. After a consultation with the Club’s green social commentator, Professor Guinevere Anne Lachlan, her ten imperatives for reducing our carbon footprint are: If you have a great big automobile then don’t use it unless you are sharing it with at least two others and all their gear. This is particularly true on long mileage holiday trips. Of course any true kayaker would disdain the use of a car and just paddle there. Eat well! Fresh, seasonal, local food and a healthy diet are likely to enhance your beauty, health, wealth and place you on the fast track to carbon neutrality. It could also save a remarkable amount of CO2-e. Take great care of your paddling clothes and equipment. The manufacture of clothing produces a surprising amount of greenhouse gas. Quality, durability and long life are important attributes for any kayaker and even more so for their clothes! Buy beautiful, costly and intricately carved wooden kayaks. By spending the wealth you have acquired through healthy eating on human services rather than material goods you reduce the greenhouse gas associated with their manufacture. Massages and personal training are other options for all that wealth! Or you could pay someone to write you a poem, or paint a perfect picture of a breaking wave. That sort of thing. Recycle or compost garbage. If recycling bins aren’t available at the site, take the garbage home. Think of it this way; after a month’s paddling three-week-old garlic and onion peelings, stuffed into an old tin can, will help to cover up the smell of your wetsuit. It’s a good idea not to break your boat — making it may typically have produced 1.5 tonnes of CO2-e. Rescue services use heaps of greenhouse gas Hospitals are also a source of greenhouse gas and best avoided — Take care out there. Lastly a spare plastic bag is handy to collect noxious bits of rubbish in the water in the middle of nowhere and could turn out to be an essential tool for impressing the local constabulary in the event of an unforeseen and accidental misdemeanour. Thanks Anne for those tips. Going Green is a topic, which will be, explored in future articles. Rock and Roll ‘08 is nearly upon us. There are lots of events planned, including last year’s successful kayak surfing, so fill in the entry form early and save. By the time you read this, the summer holidays will be almost upon us. This is a good time to practise rolling and surfing and remember to wear your helmet. Just a reminder, our Club’s training sessions and trips rely on the voluntary time and effort provided by the trainers, guides and leaders. If you believe that you can assist the effort contact Adrian, our training officer. The club does not guarantee training. It is a social not a service club, so if you want to fast track training, the Club can point you in the right direction. Finally, I would also like to introduce a segment into the magazine called the President’s Kayaking Tips. Being no expert and with no other entries for this issue I present my own tip which is: ‘If you need to change out of wet swimming togs and you are without a towel, try putting on your spray skirt, and hey presto you are saved from embarrassment.’ Your tip must be better than that: Another tip I remember is: When heading to the shore in a dumpy surf, untie your paddle leash so that you can quickly exit the boat, throw the paddle on the beach and concentrate on getting the kayak to shore without getting tangled in the leash. Michael Steinfeld No Rules Down Here [69] By Laurie Geoghegan “I don’t want to die, I don’t want to die.” These were the words I was yelling, convincing myself to stay alive in a 60-70 knot katabatic wind that attacked us on our first day’s paddle along the Antarctic Peninsula in early 2006. Three days earlier, myself, together with Stuart Trueman and Andrew Mcauley were attempting to paddle unsupported along the entire length of the Antarctic Peninsula. We were attempting to honour an early Australian Antarctic explorer John Rymill, an explorer credited with charting the Peninsula between 1934 and 1937. We had just been dropped off at our start point at the old British base of Hope Bay at the very northern tip of the Peninsula and had packed our kayaks ready to start our trip. However, we spent the next few days frustrated from bad weather and unable to paddle. Finally, after three days of strong winds we awoke on 9 February 2006 to calm seas and fair winds and off we paddled to what would be an eventful first day but also a gruelling 30-day paddle along one of the harshest coastlines in the world. We left Hope Bay and paddled off south around the corner, excited about finally starting. Five km into the first day, we had our first of many close calls. We were straight lining from headland to headland due to the load of the kayaks (weighing in at approximately 200kgs each without paddlers), we were one third of the way across a big bay that was surrounded by high ice cliffs when we first noticed a light head wind. Slowly at first the wind strengthened and then it increased within half an hour to a full gale force wind of at least 70 knots. A good size sea was hitting us, dangerously blowing Andrew’s and my kayaks uncontrollably beam on to the wind. This left us fighting individually for our lives as we had become separated in these winds, independently deciding to turn and run back to Hope Bay. Stuart who was in the only skeg-operated kayak — a Nadgee Expedition — simply put his skeg down and surfed back to safety behind the last headland, but strangely it was Andrew and I in ruddered boats who had the handling problems. I was fighting for my life screaming, “I don’t want to die, I don’t want to die”, fighting off large chunks of icebergs that were being tossed around on the three metre seas that the winds had unleashed. I began to cramp from the cold and the exertion of having to high brace into the beam on waves in the energy-zapping cold water. I was beginning to struggle in the elements. Finally after a lengthy battle, I made enough ground to be in the lee of the ice cliffs offering protection from the winds. As I paddled on wondering what had become of my mates, I rounded a small headland to see Stuart Trueman in his Nadgee Expedition excitedly waving his hands, glad to see some one else alive. We rafted for a few minutes but quickly decided that if we were to survive we had to keep paddling to keep warm. After a few hours we crossed Hope Bay safely making it back to the Argentine Base quickly deciding we would give Andrew 30 minutes before notifying the authorities of his no-show. Just as we notified the authorities we spied Andrew coming around the corner heading back to where we were – thankfully. After fighting the last of the winds across Hope Bay we were reunited as a team again and from what we caught on film we were pumped with adrenalin from the experience – all this on the first day of our expedition! In hindsight this was a blessing as we learnt that Antarctica was the master and we were at his peril. We quickly had learned that there are NO RULES in Antarctica, something we would see many more times over in the coming weeks Understandably we took the rest of the day off and the next to recuperate and get our heads together after coming so close to tragedy the day before. Days two to eight From the experience of the first day, we all had the jitters badly and it was with trepidation that we again headed off into the unknown, but this time we saw no Katabatic winds letting let us relax and finally start enjoying the spectacular scenery as we paddled past 30 metre ice cliffs that were collapsing (calving) into the ocean before our eyes. We showed respect by keeping a fair distance from these big chunks of ice. We spent the next week or so slowly jumping from camp to camp in between gales. This was made more frustrating as I had taken an unknown kayak on the expedition, finding out the hard way that it didn’t handle well in headwinds and was slowing down considerably; extra punishment that I just didn’t need at this early stage of the expedition. Our first camp was on a small rock outcrop that held us down for two days. We landed on the rock at high tide and found out that the tide receded so far out that the next morning, although fair conditions for paddling, the drop-off from the rock needed an abseil down the side. This also had to be done with an 18-foot 200kg plus sea kayak. We took the soft option and waited and waited and waited for the tide to rise. The wait was for nearly 24 hours before it came in again, allowing us to quickly slide off our rock and resume our paddle We were quickly getting into good team work in an orderly fashion for the communal duties of cooking and so on. As everywhere in the world, the washing up was the worst job, although in the Antarctic this was complicated by our hands freezing in the water to scrub the pots, resulting in having to hold our hands under our armpits for the next five minutes to get feeling back in the hands. Our fingers remained numb for quite some time on our arrival back home. This initial first third of the trip was always going to be the hardest as it had more exposed coast line and bigger crossings with one bay being a seven hour crossing and being notorious for Katabatic winds. After our first day’s paddle fresh in our minds we tentatively started the crossing, quickly finding ourselves engulfed in a mist that had visibility down to about 10 meters. We had to navigate by compass for the rest of the crossing. Try staring at your compass for hours and hours – it is bloody boring so we quickly got into a 20 minute routine of playing follow the leader, jokingly soaking up the hours until we again had land in sight. We finally rounded Cape Rockmoral finding ourselves stuck in a giant field of brash and pancake ice that looked impenetrable. For the next three hours, we struggled slowly, weaving and bashing our way through the ice trying to find a way through, finally breaking into a clear path that allowed us clear passage round the Cape line. Rounding the majestic Cape was inspiring as we now were heading into a more protected part of the trip with the possibility of human contact from the scientific bases stationed in the area — something we were looking forward to. Days nine to nineteen Leaving what we thought was the more dangerous part of the trip behind, we were all smiles as we were now entering a more sheltered area of the peninsula that would allow greater daily mileage as well as the chance for some R&R along the way – or so we thought! We had just enjoyed a rare sunny day that had allowed us to paddle alongside Minke whales as they glided along beautifully-shaped bergs with crystal-clear water. The water was so clear that it allowed us to watch these gentle giants swimming along while we paddled with them in their own surroundings. We left the whales and chanced upon a rookery of penguins that allowed us uninterrupted views of them swimming up to us under the water, quickly darting left and right. We only had a short paddle to our next destination at Spring Pt and we arrived that early afternoon to a sheltered bay that had an endlessly calving glacier thundering away at one end and an old disused Chilean Army hut on the west side hut that hadn’t seen any people in it for quite awhile. What a joy not to have to pitch a tent that night! After an enjoyable sunset that lasted for hours in clear skies, we tramped off to our hut for the night, only to awaken in the morning to a bay totally covered in brash ice, in our immediate vicinity! Just three km away was clear ocean, so it was a great day for paddling and this had Andrew frustrated as he wasn’t one to sit still for too long. So we pushed off and attempted to paddle through the thick ice only to find that after only less than 50 metres offshore we were stuck hard in the ice. As the ice slowed us down considerably we were unable to turn our kayaks and this was frustrating Stu as he only had a skeg in his kayak. Even though Andrew and I were not much better off in our ruddered boats, we could slowly turn and I mean slowly! We spent the next two hours stuck in this thick soupy ice mix that slowed us to a crawl and had us fighting to turn our boats. Finally Andrew and I managed to turn our boats to point to shore and as we pulled ourselves through we bumped our bow onto Stu’s stern and shoved his boat the right way so he could also make it safely to shore. After another half hour we finally reached our little cove that only had room for one kayak at a time so we slowly emptied each kayak then dragged each boat up a steep bit of ice cliff only to find we had made only 100 metres distance for about four hours work! While climbing our kayaks out, I slipped and managed to chip a bone in my elbow that became swollen and would see me miss three days of the trip although I didn’t know this at the time. We were quite frustrated with the day and decided to pack it in and walk the 300 metres back to the hut for another night. We awoke the next morning to again find ourselves iced in, deciding to carry all of our gear around the next small headland, trying to get closer to clear seas. To achieve this we had to carry our gear first up a 500m steep rocky hill, then along a jagged ice cliff, then down a crampon-assisted climb down onto large bouldering moraines. Finally, we climbed along to a sheltered cove that gave us a fair chance out of there. Eventually after eight hours of humping, climbing and pulling we were carrying the last of the gear down into the cove when an unexpected off shore breeze quickly pushed all of the pack ice in our little bay out to sea in about 20 minutes, to say we were frustrated was an understatement! We spent the next five days plugging our way down the coast exploring uncharted bays and camping in some pretty wild places. On a small uncharted island after a long day in the boats, we found ourselves on the only bit of flat rock that allowed us any chance of a landing. We could only sleep outside as there wasn’t room for tents. We spent the next eight hours watching the tide creep up onto our little bit of rock, going to sleep finally about two am having seen the last of the flood tide. At this stage our kayaks had been taking a battering with Andrew’s Mirage and my Sea quest sustaining damage that had required a few repairs along the way, however Stuarts Kevlar Nadgee Expedition had held up well. It’s amazing the little damage they all sustained from the hard rock landings and the constant battering into icebergs we gave them. Stuart had the best idea, running a strip of Kevlar along the keel line of his boat as a wear strip resulting in hardly any damage to his keel at all Days twenty to thirty three After arriving at the Ukrainian scientific base, Vernadsky, we finally caught up with our yacht that was planning to pick us up soon. Luckily they were there as my elbow was quite swollen, desperately needing rest, and requiring no other choice but to sit out a few days paddling, hoping we could meet up maybe in a few days. It was devastating to admit defeat to something that had taken three years of planning and cost thousands of dollars to get there and I was quite depressed by being beaten by something I had no control over, despondently watching the fellas paddle off the next day. At least I had the chance to have a famous round (or ten) of home-made vodka with the scientists at the base. Resting the next few days, my elbow quickly mended and I was biting at the bit to again catch up and paddle with my mates. That same day I rejoined the fellas, we were again hammered by strong winds but this time the winds were coming from three directions having been forced up and over gullies and valleys to hit us at about fifty knots. This time we weren’t pushed out to sea like our first day. We tried to paddle into this wind but soon gave up when we could see ourselves being blown backwards. We ended up paddling back to a sheltered spot enjoying the moment by filming ourselves in a small cave having a laugh at what we had just attempted. Later that night we were to see the winds change direction by 180 degrees and increase in speed to the point that one of the tents was ripped and torn leaving Andrew and I to sleep with our backs to the poles trying to hold the last of the tent together. We were now very close to the Gullet, the main crux of the whole trip; an area of the coast known for ice to pack even in summer, not allowing access to any vessel. We had knowledge of a Chilean Navy ice breaker that had attempted to push through but had failed so we were sure our little fibreglass and Kevlar boats didn’t stand a chance. We only had another two days of paddling left, having been forced to abandon our trip on the Kidd Islands. After paddling south one final time to ensure we paddled over that imaginary line called the Antarctic Circle, sadly our trip was over. We had paddled over 850 km over a total of 33 days, camping out on the Antarctic coastline — a once in a life time adventure. Andrew McAuley It’s now four months since Andrew was tragically lost at sea, possibly on the last night of his major expedition paddling a sea kayak from Tasmania Australia to Milford Sound in New Zealand. This was always an ambitious project but if anyone had a chance of pulling it off I was confident he was the man for the job. I’m sure whatever happened it was a major accident that just couldn’t possibly be avoided. Coincidently the day Andrew went missing was exactly a year to the day when we had our very close experience on our first days paddle in Antarctica…spooky. I had the pleasure of paddling with Andrew many times over the years, around the wild west coast of Tasmania where we found ourselves in 50 knots plus of wind and seven metre swell, paddling to an outlying coastal island 20 km off the coast, and many numerous weekly trips, but most importantly we held an annual trip with a bunch of mates the first week in October where paddling become second to the socialising side of kayaking. Andrew was an extreme sea kayaker who pushed boundaries in all of his pursuits but his first priority was to look at the safety aspects of his challenges; if these met his high standard he then would move onto the next stage of his meticulous planning. He had boundless energy, a trait that constantly amazed and annoyed me, especially long into a trip when feeling tired and sore this leaping bean pole would jokingly urge me on to the next headland. He was always so far in front that you had no choice but to push on cursing his name on every stroke, but amazed when after a physically-draining 50 km paddle he would jump up grab his camera heading off on a three hour mountain climb to get the best position for a good sunset photo. If he was sharing a tent he would not only pitch your tent, but brew a hot drink ready when you arrived. Andrew was one of the best sea kayakers I know and a good mate and he will be sorely missed by all. Hawkesbury Classic Results [69] This year’s Hawkesbury Canoe Classic was run over the night of the 27 and 28 October. The Classic is an annual canoe and kayak race starting at Windsor and finishing 111km down river at Brooklyn. Over two million dollars has been raised by the event for The Arrow Foundation. There was a small showing of NSWSKC members among the approximately 500 starters. Cathy Miller & Ian Vale (Mirage Double) — 11:38 (Handicap Time 11:46) Roger Boardman & Robert (Mirage Double) — 11:52 Mark Anderson (Mirage 580) — 12:07 (Handicap Time 11:48) Matt Bezzina (Mirage 530) — 12:22 Murray Town (Mirage 580) — 13:42 Lee Killingworth (Tasman 19) — 13:45 Katrina Keane (Mirage 580) — 14:11 (Handicap Time 12:04) Andrew Kucype — 14:40 Terry Renford (Mirage 580) — 15:54 (Handicap Time 15:00) David Fisher (Mirage 580) — 17:16 Island Hopping Greek-style [69] Inspired by the words of Kazantzakis, the music of Theodorakis and the spirit of Zorba, I set off last September for the eastern Aegean and the islands of the Dodacanese group for an 8-day commercial sea kayak trip. I had booked the trip with Crossing Latitudes who promoted it on their website as being “for folks with previous paddling experience who’d like to further improve their paddling skills and maybe challenge themselves among rock gardens and in surf”. Taking the trip was a party of 6: Lena Conlon, co-owner of Crossing Latitudes; Rotem Ron, our guide and a BCU 5-star instructor (and the first person to circumnavigate Iceland solo in a kayak!) and 4 customers including myself. I had been given the impression when booking that our guide would be the legendary Hadas Feldman — something I dined out on with my kayaking mates in the weeks leading up to my departure for the island of Kos (which is only a stone’s throw from the western shoreline of Turkey). This wasn’t to be but my initial disappointment that Hadas wasn’t guiding us didn’t last long as Rotem proved to be a more than adequate substitute. My expectation that I could be one of the weaker members of the group was quickly dashed. The meet-and-greet session on the first day at our hotel in Kos revealed that my fellow paddlers were far less experienced than me. The big challenge facing Lena and Rotem would be to satisfy the kayaking objectives of each of the punters — something I think they were able to do reasonably well. Our boats were Nigel Dennis Kayaks — all fibreglass and showing signs of being well used. They are owned by an Israeli company, Terra Santa Expeditions, (Rotem’s employer) and are permanently stored in Kos. Our pod was made up of 4 singles and a double — from memory most with skegs and all without rudders. Everybody had a stint in the double during the trip, however, I was mostly in an Explorer HV — a nicely behaved boat, comfortable and fast enough. We each carried our own clothes and other personal items plus some of the communal cargo such as food, utensils, water, etc. Our accommodation was generally in guest houses and small holiday units. Meals were all supplied as part of the tour package with breakfasts and lunches mostly self-catered and evening meals taken in local tavernas. We all ate well. We set out on our adventure proper on Day 2, catching an inter-island ferry out of Kos and heading north to the island of Leros passing Pserimos and Kalymnos (famous for the exploits of its sponge divers) enroute. On Leros (heavily bombed by the RAF during WW2) we based ourselves in the pretty seaside village of Pandeli. Here we stayed for 3 days, one more day than intended due to very strong winds. We did a little bit of paddling each day and included some sessions developing basic skills. The rest of the time we relaxed, visited the nearby townships and climbed a hill behind Pandeli on which a formidable fortress built in the middle ages (and once occupied by the Knights of St John) still stood in excellent condition. Departing Pandeli on Day 5, we headed towards the southern end of Leros to another seaside village, Xirokambos, for an overnight stay before paddling further south, across a channel and down the western side of Kalymnos, staying overnight on nearby car-less Telendos. Day 7 had us arriving in the busy port of Pothea, the main town of Kalymnos. On the final day Rotem and I paddled back to Kos, a distance of approximately 33km, while the rest of the group took the ferry, arriving not long after us. Although from different parts of the world, the group members got on extremely well (the mix of nationalities was 3 Americans, and one each Swede, Israeli and Australian). Apart from Lena and Rotem, we were all either retired or getting close to it. Lean and fit, a little irascible at times, Earl, a 77-year-old New Yorker, was the senior member and an inspiration as he tried valiantly to crack an Eskimo roll for the first time. Although the trip didn’t provide the challenge I’d hoped for (maybe a 150kms paddled over the 8 days, no surf encounters and only the gentlest of rock gardens), the paddling was leisurely and very pleasant. The spectacular blue, so hard to describe, and clarity of the Aegean was amazing. Paddling very close alongside the rugged, steep cliffs of Kalymnos with the sea gently lapping against them was special. The abundance of islands in close proximity all with craggy coastlines and barren hills rising high behind always made for a dramatic vista. And occasionally we would round a point to find the perfect beach — sometimes sandy, sometimes cobblestoned — for a picnic lunch. The villages dotted along our route with clusters of squat whitewashed buildings (including some old windmills converted into dwellings) added to the visual attraction. However, the cultural experience was the highlight for me and travelling by kayak was a great way to absorb it. The islands are saturated with so much history — a sort of history we don’t experience here — with well-preserved relics, some dating back before Christ was born, abounding. Away from the tourist haven of Kos, the people on the islands were always friendly and pleasant. Their lives seemingly simpler, more carefree and less cluttered than the lives of their city brethren (and ours, too). Images of a more leisurely life are easy to recall: a calamari fisherman at waters edge sorting his catch while his grandson plays happily with a toy tractor nearby; menfolk sitting at streetside tables drinking coffee and earnestly discussing politics (our visit to Pandeli coincided with the Greek national elections) playing cards or checkers; two elderly women taking in their regular early evening dip in the Aegean, chatting and laughing together. I have lots more to remind me of a very appealing lifestyle. The group experienced some great hospitality as we journeyed along. Most memorable was when our hostess at the Villa Maria in Xirokambos enhanced our breakfast with delectable green figs and grapes freshly picked from her nearby garden of which she was justly proud. And more about food: our journey was not a great gastronomic experience but we did eat tomatoes that tasted the way tomatoes should, not like the cardboard variety served up in our supermarkets. Greek salads were standard fare for dinner — always served with a generous slab of local fetta (the taste of which we don’t seem to be able to capture in Oz). And I grew particularly fond of the local Mythos beer only opting for ouzo on the last night. An interesting aspect was the location of some of the chapels we paddled past. Isolated and built in what seemed to be the most inaccessible parts, sometimes precariously propped on the side of a steep slope, they would have proved a real test of faith to those who chose to worship in them. Also of interest was the number of Greeks we met who had once lived in Australia. My landlady at the Yiorgos Hotel in Kos had run a convenience store during the 1970s in Mosman at the same time that I was living there. George, our host at On the Rocks restaurant in Telendos had typical Greek looks but an accent that was undeniably Australian which he’d gained from his many years living in Sydney’s Paddington. And the restaurateur in Pothia who proudly recounted his career as a dogman on numerous Sydney building projects including the Sydney Opera House (producing photos as proof). There were others and although all had fond recollections of their time in Australia the lure of their island had been too strong for them to resist. This Crossing Latitudes trip would be well within the capabilities of a NSWSKC Grade 2 paddler. Particularly so given the duty of care exercised by the operator. For more details visit www.crossinglatitudes.com. For something more challenging in the same region visit the Terra Santa Kayak Expedition site at http://www.seakayak.co.il
cc/2019-30/en_middle_0012.json.gz/line1471
__label__cc
0.713033
0.286967
Journal of Bioinformatics and Diabetes The Pharmacist Knowledge and Computer Skills Towards E-Health. Results of A Survey among Italian Community Pharmacists Iolanda Grappasonni 1 Seyed Khosrow Tayebati 1 Fabio Petrelli 1 Francesco Amenta 1 1University of Camerino. School of Pharmacy. Via Madonna delle Carceri, Health practitioners of different disciplines (physicians, paramedic personnel, pharmacists) should possess adequate ICT (Information and Communication Technology) skills and practical competence on these technologies. Pharmacy practice requires a relevant flow of information, collection and handling of which could be facilitated by ICT. The correct use of ICT requires a proper knowledge by professionals offering a public service. The purpose of this paper was to assess basic informatics background and computer uses in pharmacists practicing in Italy, with the aim to identify educational interventions for increasing their informatics abilities. A questionnaire was proposed to pharmacists working in Italian community pharmacies. The survey was articulated into 35 questions concerning computer basic knowledge, ICT facilities, computer skills, habits, and uses in pharmacy practice. The questionnaire was completed by ~45% (No. 224) of responders, the 96.9% of which used computer. Only 7.8% of interviewed people employed e-mail to communicate with health authorities and less than 2% used it to be in contact with physicians or other health professionals. Less than 40% used ICT for training courses. The results revealed a relevant percentage (90.8%) of self-learners to computer use, while only 9.2% was trained by specific courses. Basic knowledge of community pharmacists on ICT technological infrastructure is quite low. Although pharmacists play an essential role in health services, they have apparently limited computer skills. This suggests the need of educational and training efforts for enlarging computer and ICT resources competent use in daily pharmacy practice. Received 25 Oct 2013; Accepted 13 May 2014; Published 04 Jun 2014; Academic Editor:Lijun Zhang, Information Analyst III, Department of Biostatistics & Bioinformatics, Emory University Copyright© 2014 lolanda Grappasonni, et al. The authors disclose any financial and personal relationships with other people or organization that could inappropriately influence this work. Iolanda Grappasonni, Seyed Khosrow Tayebati, Fabio Petrelli, Francesco Amenta (2014) The Pharmacist Knowledge and Computer Skills Towards E-Health. Results of A Survey among Italian Community Pharmacists. Journal Of Bioinformatics And Diabetes - 1(1):50-60. DOI10.14302/issn.2374-9431.jbd-13-330 Informatics, and more in general information and communication technologies (ICT), are becoming pillars of health activities. National Health Services encourage the development and use of ICT for improving the quality of services for citizens possibly at reduced costs1, 2, 3, 4, 5. Relevant ongoing European experiences in the field are those of United Kingdom (National Strategic Programme for 21st century), and of Italy (e-Gov 2010 programme, and consecutive updating)6, 7, 8. Health practitioners (physicians, paramedic personnel, pharmacists) should possess adequate ICT skills and practical competence on these technologies. Pharmacy practice requires a relevant flow of information, whose collection and handling may be facilitated by ICT. Pharmacy is a relevant user of ICT to support administrative and operative activities. Today, it is impossible to envision the pharmacy of future without reliance on informatics. It consists in the use and integration of data, information, knowledge, and technology which are involved in drug use processes9, 10, 11. This integration often improves outcomes and services. In general, on entering a pharmacy, the presence of a PC and its common use by pharmacists could be observed. A more advantageous use of ICT facilities/technology requires a proper basic knowledge by professionals offering a public service. In view of this, it is desirable that adequate computer courses become part of university curricula to educate health professionals about computer science and ICT11. In the US, Pharmacy courses programs certified by the Accreditation Council for Pharmacy Education (ACPE) are required to meet ACPE’s Standards and Guidelines for Curriculum12. Guidelines specifically state that pharmacy graduates must be able to “demonstrate expertise in informatics” 11, 12. The main studies on how pharmacists gained their computer skills and abilities include an investigation promoted by the Royal Pharmaceutical Society of Great Britain assessing the provision of Internet access and medical databases to community pharmacists working in London area and Essex13. More recent studies were conducted in Nigeria and India among health professionals, including pharmacists and revealed an overall good computing knowledge, mainly between doctors and nurses14, 15, 16. Another recent work was based on a survey of computer literacy skills profile of pharmacists in two counties of England, and the results showed that the majority of responding pharmacists used computers both at work and home, where confident in operating computer systems, but identified a training need for particular software applications17. Computer use habits and skills were also investigated in Canada and Greece18, 19. In the first study18 that involved Canadian hospital pharmacists, most pharmacists believed they needed to upgrade their computer skills. Medical database and Internet searching skills were identified as those more critical for improving practice effectiveness. The second study19 was conducted between 92 community pharmacists who are increasingly utilizing information services in their everyday practice. Other surveys focused on different categories of health professionals including pharmacists analyzed the use of PDAs (Personal Digital Assistants), and IBMI (Internet-Based Medicines Information)20, 21. In the US pharmacy, informatics education is assessed analyzing accredited pharmacy programs11. In Italy data concerning this topic are sparse and limited to the analysis of computer literacy of physicians and nurses. In general, it could be affirmed that the level of ICT skills of health professionals is relatively low22, 23, 24, 25, 26. The present study was designed to evaluate, through a self-administered survey, basic computer skills and abilities of pharmacists working in Italian community pharmacies with the aim to identify the competencies in informatics education useful to the pharmacists for their own working activities. In Italy there are 30 Schools of Pharmacy graduating approximately 3,000 professionals per year27. The analysis was performed in collaboration with Registries of Pharmacists operating in the Marche region. An anonymous questionnaire to assess community pharmacists’ computer knowledge and skills was designed. It was divided into six sections: a) Demographic data; b) Sources of computer basic knowledge; c) Availability of computer and ICT facilities; d) Computer skills; e) General computer use habits; f) Computer and ICT uses in pharmacy practice. The draft questionnaire was given to a sample of professionals (10 community pharmacists and 5 members of Pharmacists Board of Marche region) to assess the face validity, and participants were asked to fill-in the questionnaire noting any questions unclear or ambiguous, and to provide any suggestions for improvement (ease of completion, legibility, time to fill-in, etc.). The suggestions helped us to review the questionnaire and improve it28, 29. The final questionnaire was articulated into 35 questions. Survey organization included the distribution of 493 questionnaires, delivering one questionnaire per pharmacy. The time required to fill the questionnaire was evaluated in simulations with the 5 Board Members of Registries of Pharmacists, and 10 community pharmacists involved in questionnaire validity. It was averaged approximately 45 min. In view of the required time and to avoid an excessive loss of time by people interviewed, questionnaire was left to one professional for the pharmacies employing more than one pharmacist. The questionnaire had to be filled-in only by selected professional, without possibility to be replaced. This to avoid that only some ages classes could answer (usually young people are more interested in this topic than older one). This was also one of the reasons why the responder was chosen by a computer-assisted programme starting from the list of people employed in each pharmacy (directors +professional pharmacists). The selected pharmacists did receive a letter with the questionnaire. The cover letter explained the rationale of the survey and provided instructions on how to return the completed questionnaire. Questionnaire answers were received, collected and transferred in Microsoft Excel sheets. This software was used for data storing and processing. Statistical analysis was performed by the X-Lstat software30. For analysis of the qualitative (gender) and quantitative (age) variables the chi-square test was used and statistical significance was established at p<0.05. a) Demographic Data The questionnaire was completed by 224 pharmacists (66. 5% female and 33.5% male), with a response rate of 45.4%. The mean age of the responders was 43.5±11.3 years (range: 25-76). This mean age is consistent with the average age of pharmacists operating in public pharmacies in Italy (data obtained from Italian Federation of Pharmacists Register). In terms of high school graduation of the Marches pharmacists, they mainly followed scientific courses. A small part of them attended humanistic courses. A number of pharmacists taking part to this survey was graduated in pharmacy (85.7 %), whereas 14.3% of them were graduated in Pharmaceutical Chemistry and Technology (Table 1). Although this last degree is designed for training researchers for Pharmaceutical industry, professionals with this degree can also work as pharmacist after one year of internship in a community pharmacy. The 65.6% of responders were graduated in the two universities of Marche region (Camerino and Urbino). The 98.7% of responders had one degree only, whereas the 1.3% of them had 2 degrees. The 9.4% of responders obtained a post-graduate qualification/specialization such as PhD, diplomas of herbalists, cosmetics, homeopathy or nutrition. Table 1. Demographic data of the participants to the survey n. % Male 75 33.5 Female 149 66.5 Age classes < 30 23 10.3 30-39 72 32.1 60-69 16 7.1 ≥ 70 2 0.9 Pharmacy 192 85.7 CTF* 32 14.3 * (Pharmaceutical Chemistry and Technology) b) Sources of Computer Basic Knowledge. The survey showed that the 96.9% of responders commonly used computer. Computer use knowledge was getting by the sources described in Figure 1. Only 9.2% of responders were trained by specific courses followed in high schools or at the university (Figure 1). Figure 1. Computer basic knowledge source in participants to the survey c) Availability of Computer and ICT Facilities ADSL Internet connection was used by the majority of responders familiar with computer use. Although Internet connection mode was apparently well known, concepts such as hardware and software features were not clearly perceived. Awareness of processor features and RAM/REM memories were known by 26.3% and 20.3% of interviewed pharmacists respectively. In terms of other available facilities such as, audio board, speakers and webcam, 58.5% of responders confirmed to have audio board, while 55.8% and 23.5% claimed to have speakers and webcam respectively. d) Computer Skills Knowledge of computer terminology was evaluated using multiple choice questions. Despite claims of being aware about the meaning of words such as browser, operative system and HTML, some confusion on the significance of these terms was seen in the majority of questionnaires. Among 104 responders who claimed to know the meaning of browser, only 67.3% of them provided the right answer, 15.4% considered it as a search engine, and for 17.3% pharmacists it was just a network. The 60.7% of responders knew the meaning of an operating system. A lower percentage of responders (~40%) were aware of the HTML meaning. Males were more informed than females about the meaning of the main computer-related terms (e.g. “browser”) (p <0.05; 40.3% vs 26.5%). Analysis of the responses by age revealed that younger professionals (up to 40 years) had, in general, a better knowledge of terms such as "browser" (p <0.05; 40.0% vs 24.8%),"operative system" (p <0.05; 76,7% vs 44.8%) and "HTML" (p <0.05; 55.6% vs 24.8%) in comparison to older people. Internet Explorer, Microsoft Word and Outlook Express were, in order, the most used applications. Less than 10% of responders used specific programs for pharmacy management. e) General Computer use Habits Many of computer users surfed the web and used e-mail applications. Both Internet surfing and e-mail were primarily used by pharmacists under 40 (p<0.05; 93.8% vs 72.3%, and 89.7% vs 62.2% respectively), with no significant gender differences. Over the 60% of responders used these applications for private purposes. Less than 30% of responders used Internet to find something and/or someone, to communicate (e-mail, chat, etc) or to consult databases for obtaining technical information. f) Computer and IT uses in Pharmacy Practice In general, computers are primarily used in pharmacies for pharmacy management. Notwithstanding this data, only 42.4% of responders claimed to use it for this purpose. A software, specifically designed for accounting and organizational purposes, such as Excel, was mainly used by younger pharmacists (less than 40 years) than by older colleagues (p<0.05; 38.2% vs 15.1%). No significant gender-related difference was observed. The e-mail was apparently more used for personal purposes (64.1%) than for pharmacy business. Only 7.8% of responders used e-mail to communicate with health authorities and less than 2% used it to be in contact with physicians or other health professionals. E-mail was the most used system for placing orders of drugs or other items available in the pharmacy (22.6%). In general, medicinal products were ordered using specific programs provided by wholesalers. ICT was used for training courses by less than 40% of responders. Among this group, only the 30.6% were satisfied with these educational resources. In terms of recognition of ICT applications relevance in pharmacy practice, Internet was considered to be most important (29.9%) or a quite important (33%) resource. Less popular software packages include statistics applications, web pages construction and electronic data presentation resources. Text entry and basic calculations were in a middle position (Figure 2). Figure 2. Relevance assigned by respondents to various informatics applications Data on knowledge of different computer's applications reflected the same trend above reported for recognition of relevance of ICT applications in pharmacy practice, being text entry and use of Internet applications the better known procedures (data not shown). Table 2 summarizes data on knowledge and relevance of different computer applications, based on the rank of importance given by responders. Internet and text entry were considered the most important applications. Table 2. Importance and knowledge of different computer applications Importance Knowledge Fairly or very important (n.) % Base or nothing (n.) % Text entry 103 46.0 29 28.2 Archives and calculation 63 28.1 33 52.4 Preparation of slides 41 18.3 21 51.2 Use of statistical applications 43 19.2 31 72.1 Web page construction 25 11.1 19 76.0 Use of Internet applications 141 62.9 37 26.2 Since 1988 Internet has generally changed habits and working organization with special reference to health professionals. For instance, until the 80's, search and collection of health/medical information and/or scientific data were a complex and time consuming work. Today thanks to Internet and other on-line databases we can update in real-time information and knowledge on a given topic. In the pharmacy, computers are used for handling nearly all activities including drug dispensing, service quality improvement and collection of information for patients/customers. This study represents the first survey on informatics skills and literacy of pharmacists in Italy and gives an overview of the levels of computer science and ICT knowledge by community pharmacists working in central Italy (the Marche). The approximate number of pharmacists working full time in public pharmacies in the Marche region at the time of questionnaire delivery was 2,500. Despite the relatively small size of the sample of professionals who answered the questionnaire (45.4%) (although this percentage is in line with the results of other studies on computer skills/literacy of pharmacists13, 17, 18) this study, could provide, at least, a contribution on the level of computer skills and ICT applications capabilities of a part of Italian pharmacists in their practice. Analysis of collected data revealed a relevant percentage of self-learners to the use of computer. Moreover, it evidenced that Internet was the most used application. Most of responders who claimed to use Internet and other applications were up to 40, as shown by our results. This is in line with other similar researches conduced in Nigeria and India, where the knowledge and positive attitude towards computing were significantly influenced by respondent’s age14, 15, 16. A good orientation of responders towards Internet is important to update their knowledge and to be the target of appropriate educational activities (e.g. life-long learning programs or other post-graduate educational activities). Moreover, apart from the reduced costs, the main advantage of Internet use, in this area, may be the potential flexibility of educational programs for professionals, avoiding the loss of working hours. Among Internet involved applications, WEB pages construction was less popular. Responders had little experience/ knowledge about this kind of software that if better known, could be useful to promote services or offers to customers (i.e. to provide commercial electronic services through the website19). E-mail for its effectiveness (rapidity and low cost) represents the main communication system in institutional and professional interactions. In spite of these advantages, in pharmacy practice, this facility is primarily used for placing drug orders. The limited use of e-mail, mainly among pharmacists over 40, may be an example of inadequate use of ICT in pharmacy practice. These data should stimulate a reflection about needs of educational efforts that could lead to a larger/more correct use of ICT resources in daily pharmacy practice. A comparison of our results with those of other studies assessing computer and informatics skills of pharmacists, and already mentioned in the introduction14, 15, 17, 18, 19, 20, reveals the differences discussed below. The Canadian and Greek studies involved a small number of pharmacists (106 and 88 respectively)18, 19. In general the results of these studies were consistent with our data (e.g. statistical software use). A British investigation that similarly to the present study was proposed to community pharmacies, involved a larger number of professionals (747) than our survey17. The same study had a higher percentage of responders (n =386, 52%)17. A lower percentage of responders (20.6%) than our survey were reported in the Pharmacist online information literacy study, which involved 208 professionals20. The British study and our survey revealed a quite low percentage of pharmacists properly trained with specific courses for computer skills (24% and 9.2% respectively). This observation indicates the need of educational and professional measures for providing appropriate education on computer science among pharmacists. These measures should include the introduction of appropriate university courses in the pharmacist's curriculum to improve informatics knowledge. The US experience highlights the importance of academic education about informatics knowledge and skills that all graduating pharmacy students should possess31. A good computer literacy background was reported by two investigations performed in Nigeria14, 15. These studies assessed computing knowledge, attitude, skills and utilization pattern of information technology among health care professionals and medical students. These investigations revealed also a quite high percentage of responders (90.5% and 82% respectively)14, 15. Most healthcare professionals (88.4%) had positive attitude toward computing and this was significantly influenced by responder’s age and previous computer training14. These data, if confirmed by other studies, could bring to the conclusion of a higher sensitivity of emerging economies than industrialized countries, to ICT education. In terms of technological infrastructure, the widespread broadband availability was quite satisfactory in the Marche territory, but basic knowledge of end-users was not enough for guaranteeing the most profitable use of this facility. Lack of basic knowledge on ICT technological infrastructure was probably due to the self-learning of interviewed pharmacists. In sum up, Italian community pharmacists are primary health unit. They are also widespread health centers in the Nation. In addition, they are involved in the modernization of the relationships between patients and health system (e.g. by reservation of specialist visits, by home pharmaceutical care for disabled patients, etc). Therefore, it may be affirm that, although pharmacists play a relevant role in national health services, their computer skills and literacy are limited and probably not satisfactory. The modernization of national health services, including the Italian one, will move towards the replacement of pharmaceutical prescriptions, from paper to digital. This will result in advantages in terms of saving in economic resources and of safety bringing to a reduced number of prescription mistakes. This evolution requires better ICT knowledge and computer skills. Educational efforts (appropriate university courses about informatics knowledge and skills in the pharmacist’s curriculum) should be encouraged for enlarging competencies in ICT of the community pharmacists of the future. Actually, the use of ICT will be useful to support community pharmacists for getting a better coordination with physicians/other health professionals and to help to provide up-to-date information and advice to patients. These professionals should be culturally more advanced for the benefit of patients and other customers of community pharmacy services. The support and collaboration of the Registries of Pharmacists of the Marches and of their presidents at the time in which the study was made (Drs P.M. Calcatelli, G.C. Cuccù, L. Diomedi and R. Salvi) are gratefully acknowledged. 1.it e-government. (2012) Status of implementation of e-gov plan. [UpdatedApril,2013] http://www.funzionepubblica.gov.it/media/872560/aggiornamento%20piano%20e-gov.pdf 2.Italian Legislative Decree of October 3, 2009, No 153. Identification of new services provided by pharmacies under the National Health Service, as well as provisions on residence allowances for holders of rural pharmacies. in accordance with Article 11 of Law June18,2009,No69.(Published in the Italian Official Journal,November4,2009,n.257) . 3.DecreeoftheItalian Ministry of Economy, November2,2011. (2011)Dematerialization of on paper medical prescriptions. , (Published in the Official Journal of Italian Republic204,November12,2011) 4.Charpiat B, Bedouch P, Conort O, F X Rose, Juste M. (2012) Opportunities for medication errors and pharmacist’s interventions in the context of computerized prescription order entry: a review of data published by French hospital pharmacists. , Ann Pharm Fr 70(2), 62-74. Scopus·ScienceDirect·Search at Google Scholar 5.Lupiáñez-Villanueva F, Hardey M, Lluch M. (2014) The integration of information and communication technology into community pharmacists practice in Barcelona. Health Promot Int. 29(1), 47-59. 6.RoyalPharmaceuticalSocietyofGreatBritain. (2003) Competencies of the Future of the Pharmacy Workforce. , London, Royal Pharmaceutical Society of Great Britain 7.Programmicomunitari it European. (2013) Programmes Funded directly from European Commission. Available from: [Updated January,2013] http://programmicomunitari.formez.it/content 8.Italian Legislative Decree of October 18, 2012, n. 179, " Further urgent measures for the Country’s growth" (Published in the Italian Official Journal,October19,2012,n.194). 9. (2007) American Society of Health-System Pharmacists. ASHP statement on the pharmacist’s role in informatics. , Am J Health-Syst Pharm 64(2), 200-203. 10.B D Franklin, Reynolds M, Sadler S, Hibberd R, Avery A J et al. (2014) The effect of the electronic transmission of prescriptions on dispensing errors and prescription enhancements made in English community pharmacies: a naturalistic stepped wedge study. BMJ Qual Saf. Apr 17. [Epub ahead of print]. 10-1136. Scopus·View article·Search at Google Scholar 11.B I Fox, R B Karcher, Flynn A, Mitchell S. (2008) Pharmacy informatics syllabi in doctor of pharmacy programs in the US. , Am J Pharm Educ. Aug15; 72(4), 89. 12. (2006) Accreditation Council for Pharmacy Education. Accreditation Standards and Guidelines For The Professional Program in Pharmacy Leading to the Doctor of Pharmacy Degree (ACPE Standards2007) , Chicago, IL . 13.Royal Pharmaceutical Society of Great Britain. Millennium Project. London:Royal Pharmaceutical Society of Great Britain (1998) . 14.Iliyasu Z, I S Abubakar, Kabir M, S M Abbas. (2005) Computing knowledge, attitude and skills among healthcare professionals in Aminu Kano Teaching Hospital. , Nigeria. NigerJMed 14(2), 200-5. 15.I S Bello, F A Arugundade, Sanusi A A, I T Ezeoma, E A Abioye-Kuteyi. (2004) Knowledge and utilization of Information Technology among health care professionals and students in Ile-Ife, Nigeria: a case study of a university teaching hospital. , J Med Internet Res 6(4), 45. 16.Gour N, Srivastava D. (2010) Knowledge of computer among healthcare professionals of India: a key toward e-health. , Telemed J E Health 16(9), 957-62. 17.Thomas P, P M Rutter. (2008) A computer literacy skills profile of pharmacists residing in two counties of England. , Health Info Libr J 25, 288-294. 18.R M Balen, P J Jewesson. (2004) Pharmacist computer skills and needs assessment survey. , J Med Internet Res 6(1), 11. 19.Kostagiolas P, V A Aggelopoulou, Niakas D. (2011) A study of the information seeking behaviour of hospital pharmacists: empirical evidence from Greece. Health Info Libr. , J 28, 302-12. 20.Peterson-Clark G, Aslani P, K A Williams. (2010) Pharmacists online information literacy: an assessment of their use of Internet-based medicines information. , Health Info Libr J, Sep; 27(3), 208-16. 21.Dasgupta A, Sansgiry S S, J T Sherert, Wallace D, Sikri S. (2009) Pharmacist utilization and interest in usage of personal digital assistants in their professional responsibilities. , Health Info Libr J 27, 37-45. Scopus·PubMed·View article·Search at Google Scholar 22.Gensini G F, Conti A A, Conti A. (2006) Medical education: why and how to innovate it. , Recenti Prog Med 97(10), 540-7. 23.Buccoliero L, Sala F. (2008) Health in Italy. Collaboration and the Knowledge Economy; issues, Applications, Case Studies.Cunningham P,Cunningham M,Amsterdam,IOSPress. 89-99. 24.Kumar A, Smith B, D M Pisanelli, Gangemi A, Stefanelli M. (2004) An ontological framework for the implementation of clinical guidelines in health care organizations. , Stud Health Technol Inform 102, 95-107. 25.Stefanelli M. (2004) Knowledge and process management in health care organizations. , Methods Inf Med 43(5), 525-35. 26.Rossi Mori A, Consorti F, Ricci F L. (2002) Sharing clinical information. principles and task-oriented solutions. , Stud Health Technol Inform 87, 102-14. 27.it Federfarma.Italian Federation of Pharmacy Owners [Updated April,2013]. http://www.federfarma.it/Documenti/farmacia_mondo/laureati.aspx 28.Smith F. (1997) Survey research: (2) Survey instruments, reliability and validity. , Int J of Pharm Practice 5, 216-226. 29.Vaus D A De. (2002) . Surveys in Social Research. 5th Ed. Allen & Unwin. Crows , Nest, NSW . 30.Addinsoft SARL XLstat. (2006) Loading Data Analysis and Statistical Solution for Microsoft Excel. Addinsoft SRL. 31.B I Fox, A J Flynn, C R Fortier, K A Clauson. (2011) Knowledge, skills, and resources for pharmacy informatics education. , Am J Pharm Educ,10; 75(5), 93. Journal Name : Journal Of Bioinformatics And Diabetes Journal Code : JBD DOI : 10.14302/issn.2374-9431.jbd-13-330 MZ id : JBD-13-330 View us here International Journal of Aquaculture Research and Development Drug Resistant Pathogen Research
cc/2019-30/en_middle_0012.json.gz/line1480
__label__cc
0.534199
0.465801
Europe, Global Meltdown, United Kingdom Will The Brits Muddle Through? Written by Eric MARGOLIS on 08/12/2018 More in Europe: The European Union Approves The Nomination Of Four Senior Civil Servants 10/07/2019 War, Empire And Racism In The Anthropocene 04/07/2019 Facebook, Funny Money And Libra 03/07/2019 Two of the most perilous military operations are crossing rivers while under enemy fire, and retreat while engaged with enemy forces. Britain’s embattled Prime Minister, Theresa May, must accomplish both maneuvers if she is to extract her very confused nation from the horrid Brexit mess and save her job. We wish her lots of luck. On December 11th, British members of parliament must vote to accept some sort of Brexit deal; a negotiated withdrawal and/or trade association. But there is bitter opposition within May’s Conservative Party and rival Labour Party to Britain’s withdrawal from the European Union. The rump Northern Irish Unionist Party, which shores up May’s Tories in parliament, is making everyone crazy. Increasing numbers of British voters now think that the original referendum to withdraw Britain from the European Union after four decades of grudging membership was a catastrophic mistake. Britain was one of Europe’s big three members; without with EU, Britain will be marooned somewhere off the coast of northern Europe and forced to become totally responsive to US demands and policies. Equally vexing, the proud Brits, who a century ago ruled a quarter of the globe’s surface, will be forced to see old rivals Germany and France become the undisputed kingpins of Europe while no one pays attention to the toothless old British lion. British supporters of Brexit don’t care. They tend to dislike foreigners…aka ‘bloody wogs’…, chafe at regulations imposed by faceless bureaucrats in remote Brussels, fret over a rising tide of EU immigrants, fulminate over the steep costs imposed by the EU, and deeply resent being compelled to accept working in the EU collective instead of trumpeting imperial demands. But times and economic realities have changed. Britain is no longer the manufacturing powerhouse it was before World War II. Its industries are rusting, the quality of its manufactured products questioned (Dyson excepted) and the once mighty financial power of the City of London diminished. Europe’s money lenders and their ilk are slinking off to Frankfurt and Paris; the City of London is no longer the wild, anything goes casino where all sorts of financial chicanery was quietly tolerated. London is slowly losing its charmed existence as a tax refuge – or to quote Somerset Maugham’s great quip about Monaco, ‘a sunny place for shady people’. As Britain’s economy deflates under Brexit, its working class will have refuge against the snobs and toffs who sneered at them for generations and perpetuated the class system. But ditching the EU will be like Britain shooting itself in the foot. All economic signs show that Britain will be impoverished if Brexit happens. Everything – the stock markets, industry, trade, housing – are pointed downhill. Divorcing Britain from the EU will be nightmarishly complex and fraught. The Bank of England warns that Brexit will plunge the country into a serious recession. All this for the sake of national ego and a chance to stick it to the ‘bloody foreigners’. Certainly not worth the expense or national anguish, say many sensible Brits and the Labour Party. The Tories are split over the issue and locked in bitter infighting. The leading Conservative MP’s remind one of all the things we didn’t like about snobby, imperial Britain. The way out of this nasty mess is for Parliament to do its job and mandate another referendum. Many pro-Brexit voters misunderstood the real issues and regret their hastiness. Divorce is always ugly and painful. After all the shouting and name-calling, Britain will be left with a cup of cold flat tea, not the golden chalice it hoped for. Source: the author’s blog Award-winning, internationally syndicated columnist, writing and commenting for the top media outlets of the United States, Canada UK, France, Gulf states, Turkey, Malaysia and Pakistan.
cc/2019-30/en_middle_0012.json.gz/line1484
__label__cc
0.674405
0.325595
Why two Auckland townies have gone country by Michele Hewitson / 18 June, 2017 ArticleGalleryModule - Auckland townies The good life: Greg Dixon and Michele Hewitson's new place in the country. Photo/Greg Dixon Photo/Greg Dixon Photo/Kingsmeade Cheese Michele Hewitson. Photo/Greg Dixon Greg Dixon. Photo/Greg Dixon Fleeing Auckland for the gentle, green pastures of rural New Zealand was always the dream for Michele Hewitson. Now it’s reality. In a preview for a new weekly Listener column, she explains why. The day we came to look at what would become home sweet home, there was a dead sheep in the front paddock. There were maggots. I held my nose. I may have gagged. I was wearing a Karen Walker T-shirt and Country Road trousers and red paisley-patterned gumboots. “We’re from Auckland,” I said, unnecessarily, to Miles, the sheep farmer. He said he thought we might be. He is a very polite man. There were lambs. They were doing something that I believe to be gambolling. Some of the sheep had black faces. They all had very strange little tails that my friend The Gardener calls their tassels. That is a top country observation: their tails look just like the tassels on a fez. We were in a land as foreign as Turkey. The lambs were cute. Stompy is not cute. I am a bit frightened of Stompy, which is not her real name – it’s probably 207 or something like that. Miles says it’s easier to send 207 off to the works (watch out, Stompy!) than it is to send Dolly off to the works. Stompy does not seem to like me. She stomps in an angry way when she sees me. My partner, Greg, says this is mad and how could I possibly know that it is the same sheep doing the stomping? I said: “Because it has a yellow bum.” Greg pointed out that about half of the sheep have yellow bums; the others have green or blue bums. Some are a very rare breed of sheep, bred by Miles and known as Kingsmeade sheep, after Miles and wife Janet’s award-winning cheese company of the same name. But that is not the reason they have yellow or green or blue bums. We went round the road to have a glass of wine and a fine selection of said cheeses with Miles and Janet, and I put to Miles the idea that Stompy had taken a dislike to me because of my hair, which looks rather sheepy, in an urgently-in-need-of-a-shear way. He looked at me in a measured way and said that he was sure he could arrange for me to be slotted in when the sheep were next shorn. These sheep live in our paddocks. This is amazing to me – and perhaps to Stompy. And perhaps to Miles. Miles also has the most beautiful brown sheep. I said: “Could we have some of those beautiful brown sheep in our paddocks? They’re so decorative.” We’re from Auckland. Some things about country life, and sheep, I have learnt: being called a dag is a compliment. I think. Also, the sheep have coloured bums because they have been tupped. A visitor from Auckland (but born and bred, like the sheep, in Masterton) pointed out that there was a sheep in the paddock with a harness thingy. This is the ram. He is, it turned out, the loser ram, which gets to have his way only with the sheep that have not already been impregnated by the alpha rams. The way you know a sheep has been mated and by whom is by the colours, which rub off from a dye on the harness thingy: yellow, green or blue. The loser ram didn’t have much luck. Poor ram. I liked him. He was friendly. Well, said Carolyn, who runs the sheep milking side of things, “you are a girl”. Escape to the country I am not often speechless, but I’m quite often speechless in the country. It is, after all, pretty much why I wanted to move to the country: I was sick of talking to people who only ever talked about Auckland house prices. But what, I ask, every day, are we doing here? That is the great existential question, obviously, and the endlessly angsty one. I have spent too many years asking it. Which is the short answer to why we are here. I have also spent too many years watching Escape to the Country on the telly. Escape to the Country is charming English stone cottages and hideous barn conversions and old stone walls and hollyhocks in the garden. Every gardener knows that in real life, hollyhocks are always rust-ridden. I have never seen rust on a hollyhock or a dead maggoty sheep in a paddock on Escape to the Country. I have long held an entirely fictional idea of myself, which is that I grew up in the country. I am actually one of those rare breeds of Aucklanders who was born in Auckland. My first home was above a steak restaurant on Dominion Rd, which for some reason my parents, neither of whom could cook a boiled spud without burning it, decided to take over. That went bust – surprise, surprise – and so we set off across, up and, later, down the island and lived in little towns: Edgecumbe, Ohope, Whakatane, Kaitaia and, much later, Greymouth. We were on the fringes of country. We never saw a sheep. So where did this hankering come from? I don’t know how I became a gardener. My father’s idea of gardening was peeing on the rhubarb. My mother’s idea of gardening was to refuse to cook the rhubarb; this seems quite reasonable and I still cannot eat rhubarb. But I love dirt. I got to know people who love dirt, and it turns out that it is contagious. Because then I got a house. A dear little house in Balmoral and a bit of land, 550sq m, most of which was a dog run, with a few daisy bushes and a gnarly old plum tree. But there was dirt, and I was going to make a garden. I made the usual mistakes: a mini Sissinghurst. In Balmoral! Then the subtropical thing, which was all the rage and which in my heart I knew I hated: all those spikes, ridiculous palms and ugly bromeliads. And don’t you regret those hideous, elephantine yuccas and boring, fat day lilies now? We were there 22 years. I pottered, and we waited until the departure of our dear old cat – which had arrived as a kitten and was put to sleep in my arms there, 18 years later, and laid out in his old wicker laundry basket under the gnarly old plum tree he loved to climb. Then we bought a much bigger garden: a lovely space in Mt Albert, with a winding path and garden rooms made by hedges, and set about making the garden of our dreams. It was intimidating, not just because it was a lot more dirt but because I wanted a proper garden, without any real idea of what that meant. We got the delightful garden designer Xanthe White in to help us and we made a properly lovely garden, a bit wild and full of flowers: delphiniums and sweet peas and poppies and Aquilegia and Euphorbia and irises. My all-time favourite gardening book is by the late English writer Mirabel Osler. It has no pictures and is called A Gentle Plea for Chaos. I did the chaotic bit and Greg contained it all within his perfectly clipped hedges. We were very happy and we were going to stay there forever. We had a big old pretty white bungalow, high up on the side of the mountain. We were living the Auckland dream! In reality, we hardly ever went out. We stayed home and gardened. We were sick of talking to people. That was what we did for a living. Almost a year to the day after we were both made redundant by the New Zealand Herald, in October 2015, we asked our friends, The Artist and The Gardener, to go and look at a place 10 minutes’ drive from Masterton. We had made up our minds to move to Masterton. Masterton! We used to take the piss out of Masterton. Nobody lives in Masterton! The property was 12 acres, nine in sheep and the rest in three acres of glorious gardens. The Artist – whom I had known but not seen for 25 odd years – and The Gardener lived 20 minutes from Masterton. We had met again via email and become gardening email pals. We swapped seeds and plants by snail mail. We emailed most days, about gardens and successes and failures and inspirations and cookery (another sort of alchemy we shared a keen interest in). I went down for The Artist’s 65th birthday. I fell in love with them both and with where they lived. They had the loveliest house I’d ever been in, with a river at the bottom of the most magical garden I’d ever visited. Have you ever grown a clematis? They climb, if happy, with deceptive fragility and get you in their grip. Masterton wove a clematis-like spell. Later, back in Auckland, our lives were about to be taken to with a slow-swinging mallet. It was spring. I had 200 plants to get in. I had to go into the Herald office for a meeting. I have spent most of my journalistic life not going into the office, especially not to meetings. Having been a union delegate, I know an invitation to be given the bum’s rush when I am issued one. I knew I was going to be made redundant – but we didn’t then know that Greg was also going to be made redundant, thus wiping out our entire household income in one charming fell swoop. I went to one meeting with an editor and some woman from human relations – or human remains, as we have always called it – and was supposed to go through some series of ever more insultingly boring crap. Sod that. I said, after 21 years, “I’ll see myself out.” I did. I never went back. As anyone who has been made redundant knows, it’s not nice. I did a bit of reading about the grief process and it was mostly dull – in that self-helpy way. The only thing that I appreciated was this: being made redundant doesn’t mean that you have failed; it means that the company has failed. That cheered me up no end. Also, I had 200 plants to get in. I like more than anything in the world to have plants to get in. This was (almost; a garden is never done) the last and biggest bit of our Mt Albert garden to be redesigned: the front garden. The borders had been laid – in Xanthe White’s lady-like, gracious, generous, winding curves – to mimic the old winding path. We’d had the trees planted: weeping white mulberries, Robinia mop tops, buxus mounds for punctuation. I’d grown 100 delphiniums from seed, we had dozens of Euphorbia and 100 Iris sibirica “Caesar’s Brother” and a lovely lot of hen and chicken ferns. I had bearded irises in shades of almost black to deep purple. I don’t want to show off – a complete lie; showing off is the whole point of a town garden – but people walking their town dogs would stop and say how beautiful it all was and how much they liked to watch it develop. Oh, I’d say, mock modestly: it’s only a year old. All gardeners say this. It really means it’s only a year old and look how amazing it is, already. I like showing off as much as the next gardener. I feel a faint sadness about not seeing my Mt Albert garden grow up. Private life drama I said to Greg, let’s move to the country. We had discovered how much we loved being together all day. We had no income, but we really were now perfectly happy except that we could no longer afford to live in Auckland – and we no longer wanted to. And I wanted a private garden. I wanted a garden where only people I invited to see the garden could see the garden. We didn’t want to be able to see or hear our neighbours, as lovely as neighbours can be and have been. We miss our wonderful Mt Albert neighbours, and our country neighbours have all been welcoming and have saved us from many a townie disaster already. But nobody needs to see me chase the cat around the acres of lawn in my disgraceful pyjamas. Our letter box is 700m from the house. It takes 20 minutes to walk there and back to get the paper. My father-in-law said, “What are you going to do in the country?” “Hide,” I said. I was joking, but only a bit. Also, I really don’t want to die not having grown peonies. I’m not joking. All of which is by way of an introduction to a weekly column about what we are going to do in the country – beyond hiding and growing peonies – if we ever work that out. I don’t care if we never work it out. I go outside – in my fetching puffer jacket – every morning, into the early frost, and look at the hills and the sheep and the hundreds of trees in their fetching autumn jackets, and if I could yodel, I would, with joy. Nobody could hear me. And I have 200 plants to get in. This article is an excerpt from 'The Great Escape', cover story of the June 10, 2017 issue of the New Zealand Listener, on sale June 12-18. Get the Listener delivered to your inbox
cc/2019-30/en_middle_0012.json.gz/line1485
__label__wiki
0.521329
0.521329
Winter fiction By Rachel Hennessy 219.5 Winter fiction I go to a store to try on coats. Slipping on one after another, I look at my reflection. What does this coat transform me into? Am I flashy, realistic, prosaic, magic or speculative? Is it a perfect fit or slightly too big? Are the sleeves a little too long? Are the seams showing just a bit too much? I am confused, and leave the store. Australian crawl By Shannon Burns ‘Even the rain is drowning,’ he mutters. If Thomas could only recover, or genuinely imagine, what it was to be. Instead his feet move damply and his mind glitches. Over and over, the same thoughts, the same corrections, the same aimless abstractions. If he woke up By Kalia Forde ‘The Sleep Walkers are coming,’ he whispered once in the dark, ‘and we have to be prepared.’ This has gone on for months now, him talking in his sleep, usually babbling incomprehensibly. It’s only on occasion, like that night, where he will say complete sentences. Sentences containing words I didn’t even realise he knew. By Joshua Kemp He sauntered under the marri trees, feeling her absence. Ashley usually accompanied him on these mindless sojourns, but she couldn’t come out today. Her dad said she needed to help out at the bakery. He told his mum about this and she baulked. She said a child shouldn’t be expected to work. It was a form of slavery. Ford froth is infinite By Emma Rayward NO BREAKS rings in her ears when she goes to bed at night and if it is a good dream, she takes a break, and uses the toilet. She is resentful towards her boss, who doesn’t know she has IBS, nor can he ever, because he might fire her and say, YES BREAKS, as in, bye bye, see ya, you’re done. No breaks, IBS, and RSI in one hand, left or right, it doesn’t matter which, she can’t tell.
cc/2019-30/en_middle_0012.json.gz/line1489
__label__wiki
0.562279
0.562279
What Happen If You Give Everything Away Re-code Shakespeare "Claudius' Hand" Ophelia's Skull MBC TV series 'Ma-Ui 마의' Poster Design MBC TV Series 'Ma-Ui 마의' Calligraphic Logo BLM Project Bioelectro-magnetism, Electro-magneticpulse Architectural Communication: The Granary Old & New Communication Traffic Dictionary Seoul International Book Fair 2011 Indiestory Brochure for Pusan Int'l Film Festival 2010 Indiestory 2010 Promotion Postcard MCM F/W Collection VIP Invitation Card MADSOULCHILD Identity + Showcase + Album Jacket Design 'Sister’s Barbershop' 5th Album Jacket Seoul Int’l Book Fair 2009 Identity, Application Design Calligraphy & Posters TV Series ‘동이 Dong-yi’ Seoul Int’l Book Art Fair 2009 Poster, Brochure & Type Lyu Chunwha Fashion Illustration Book Indiestory Catalogue for PIFF 2008 Indiestory for Amsterdam Documentary Film Market 2008 MBC 50-episode TV series posters in Korea. Following the calligraphic logo design, 3 kinds of posters were designed. One is for a main poster and the other 2 are teaser posters. 9 main characters are arranged on the landscape frame. The title of the historical drama, Ma-Ui, means a surgeon of a horse, who was an existing figure, Kwanghyun Baek(白光玹), one of the three most famous doctors for traditional herbal medication and acupuncture in ‘Chosun Dynasty(1392-1910)’, in Korean history. The main character, who started his career as a vet and ended up becoming a royal court doctor, is well known for trying surgical operation for the first time in Korean history. The program is now on air in Channel 11, MBC and expected to finish next Summer. Client | Kimjonghak Production Photography | An, Ji-sup (ab studio - www.ab-studio.co.kr) Art Direction, Design & Retouching | Owen W. Lee MBC 50-episode TV series posters in Korea. Following the calligraphic logo design, 3 kinds of posters were designed. One is for a main poster and the other 2 are teaser posters. The title of the historical drama, Ma-Ui, means a surgeon of a horse, who was an existing figure, Kwanghyun Baek(白光玹), one of the three most famous doctors for traditional herbal medication and acupuncture in ‘Chosun Dynasty(1392-1910)’, in Korean history. The main character, who started his career as a vet and ended up becoming a royal court doctor, is well known for trying surgical operation for the first time in Korean history. The program is now on air in Channel 11, MBC and expected to finish next Summer. Main Poster 9 main characters are arranged on the landscape frame and this is a very commercial piece for the purpose of promotion and sponsor distribution. Each character is located according to the relationship of the characters in a plot. Left-hand side of the frame is the day and right-hand side is night. This two divided spaces represents the conflict structure of the characters in the series. Teaser Poster #2 2nd teaser poster is conceived in traditional Korean herbal medicine and acupuncture treatment. Two main characters were brought up in reversed destiny as they were changed as soon as born. The shape of drawers comes from the chest of drawers of Korean traditional herbal medicine. The rectangular drawers, on which there are the name of herbs, are arranged on a dense grid system as a background image. It implies the crossed destinies of the two characters. The drawers of destiny, and it also symbolises the chaotic feelings in their hearts. The surrealistic space minimally delivers the space of emotions. The drawers are modeled and rendered in Autodesk Maya and combined in Adobe Photoshop. The headline copy was written by Kyungsin Lee, Korean traditional calligrapher, so that it feels more natural and emotionally strong. Korean Calligraphy, Jin Heullim, by Kyungsin Lee 3D modeling and rendering The 3rd teaser poster is shot in a film studio with a horse and a main actor, Seung-woo Joe. It was originally planned to be taken in daylight, but there were a lot of variables such as the weather, the wind and the sunshine. Hence it was carried out in a huge film studio. Photography flash light frightens a horse and it hinders the natural acting of the horse and the actor, sometime it makes an actor in danger: a horse is one of the most sensitive animals, so constant lights, HMI, was used as a key light and a couple of halogen lamps with blue gelatine filters were used as a fill and a limb light. Horse Shooting 2016 All Rights Reserverd | Contact 311-602, 435 Olympic-ro, Songpa-gu, Seoul 05507 Korea | Phone +82-10-9335-4192 | mtsugarcandy@me.com
cc/2019-30/en_middle_0012.json.gz/line1491
__label__wiki
0.789773
0.789773
<Opinion: What I’m Observing as the Ghost of Civil Rights Past Haunts Ferguson Philly pastors marching in Missouri hit with tear gas> Philadelphia Incident Decades Ago Echoes Unrest In Ferguson – CBS Philly Kenneth Lippon August 19, 2014 /0 comments File Photo of John Edgar Hoover, Director of the Federal Bureau of Investigation (FBI) of the United States. (Credit: BOB MULLIGAN/AFP/Getty Images) By Mark Abrams (CBS/KYW Newsradio) It’s a piece of the past that echoes today, given the current situation in Ferguson, Missouri. A 1963 memo from then-FBI director J. Edgar Hoover about a racial incident in Philadelphia written to then Attorney General Robert Kennedy was forwarded to and seen by President John Kennedy. The memo, part of a collection of JFK memorabilia now being sold by the Raab Collection, was written by Hoover to RFK in October 1963. Nathan Raab, president of the Philadelphia-based historical document firm, says it recounted an incident which touched off rioting. Raab says the memo discussed the questioning of an African-American man stopped by Philadelphia police on Oct. 23, 1963 in connection with a robbery: “Police claim he drew a knife and he was shot and killed by the police officer. A mob formed which claimed that actually he had been walking away from the police officer when he had been shot and it became a rallying point for the African-American community in Philadelphia.” Read the rest at CBS Philly Tagged: Federal Bureau of Investigation Ferguson J Edgar Hoover Raab Collection About Kenneth Lipp Kenneth is a writer and researcher. He’s from Alabama, and will not apologize for it. He moved to Pennsylvania in 2012, but has been in love with Philadelphia since a late-night stroll down Ben Franklin Parkway to the Art Museum in July of 2011 with the love of his life. He is interested in telling Philadelphia’s dynamic and absolutely unique stories with the zeal of a constantly enamored newcomer. Kenneth is also passionate about government transparency and protection of whistleblowers, most notably PFC Chelsea Manning. His research and reporting on law enforcement and surveillance have been featured in various publications, including Rolling Stone (Meet the Private Companies Helping Cops Spy on Protesters) and Popular Science (Boston Tested Crowd-Watching Software That Catalogues People's Skin Color). His training is in both genetics and history and he likes the joke about being a helicase and unzipping your “genes.” He’s driven to know, and thinks you can handle, the truth. Follow him on Twitter @kennethlipp. View all posts by Kenneth Lipp →
cc/2019-30/en_middle_0012.json.gz/line1495
__label__cc
0.591606
0.408394
How does philosophy advance despite irreconcilable background assumptions (“positions”) on every topic? In philosophy there are always, and on almost everything, many "positions", many different possibilities to choose from, and there isn't mainly some decisive conclusion between positions as to what's "true" or what's "right" to choose between all those positions. I have many questions regarding this fact, but mainly I'd like to ask, especially those of you here that are familiar with the academia, how do professional philosophers work that way? How can a discussion happen between two philosophers with conflicting positions, on a topic that relates to their different opinions? And more than a discussion - how can a logical enquiry be made in a certain field where there are so many different positions to choose from to make the enquiry? Such enquiry will be relevant only to the philosophers who maintain the same position as the researcher - so how can a healthy (and I might say "scientific") discussion be made in the field? And if I'm going to a more concrete direction, how can philosophy "progress" (loaded term, but I'm not sure how else to express this) with everyone coming with different premises to the topics it needs to attack? In so many discussions I had and have heard the endpoint of the arguments always reaches the most basic premise the debaters have about the subject where they disagree. And that's simply a common issue with day-to-day argumentation, in philosophy there are pillars of premises where the two debaters disagree. How can a discussion be made? logic metaphilosophy debate Yechiam Weiss Yechiam WeissYechiam Weiss I can see where the question comes from. Courtesy of classical maximalism of the textbooks and pop-postmodernism of the blogs the idea of philosophical pluralism is alien to the public mind. Pace Feyerabend, pluralism means neither that anything goes, nor that what goes goes a la carte. One can choose between mental substance or none, but each comes with a host of baggage that does not mix and match. Figuring out what goes with what and fashioning defensible positions, which are few and far between plural though they are, is what philosophical "progress" is about. – Conifold Aug 8 '18 at 4:30 @Conifold so you're saying, similarly to the answers below, that the answer to this question is really a big part of what philosophy does? That makes sense. But I would like to ask then (as CriglCragl point to in the comments to his answer), how, practically, a "good productive discussion" is being made? And you've started to answer this in our discussion, but I'd love to hear more. And more precisely contextual to this question, how a good productive discussion of opposite background assumptions is being made. – Yechiam Weiss Aug 8 '18 at 8:13 In an ordinary debate, the goal is (theoretically) functional --to reach a single, objective, best conclusion, proceeding from shared premises, via the route of eliminating falsehoods, confusions, and logical errors. A philosophical debate may appear superficially similar, but its actual goal is to illuminate and elaborate the shape and the implications of the incompatible premises of the debaters. (Philosophers being exactly the people who are not inclined to accept standard premises.) It may not be clear which type of argument is being engaged in until you observe whether the argument is called off or not after it becomes clear that the premises are incompatible. This perhaps explains why philosophical debate is so frustrating for non-philosophers (and why it never concludes). So basically, a philosophical debate only begins when the incompatible premises are found, while in an ordinary debate the opposite is true. And according to this view, philosophy can't have an end-goal, because it only thrives when a conflict is found. This seems like one point of view, but what about a sort of positivistic, or perhaps Hegelian point of view, that'd state that philosophy should "work like a science", i.e. a point of view that wouldn't like an endless discussion of illuminating implications but rather get concrete, "objective, best conclusion"? – Yechiam Weiss Aug 1 '18 at 17:14 @YechiamWeiss This is descriptive, not prescriptive. It describes my experience of how philosophical debates actually work, not my opinions on how they should work. You are correct that it is not compatible with the viewpoint that philosophy is a science. – Chris Sunami Aug 1 '18 at 18:26 Don't say 'scientific'. That is a terrible model, because objective verifiable experiences are the arbiter, rather than internal ones. Philosophy clusters, around key problems. What is consciousness? How do we create a just and stable society? What is the relationship between minds and ideas, and the world? People pick their areas of interest and research, and read up. It is a mistake to think philosophy is, or is aimed at, a set of truths - just the same as it would be to view science like that. What is important is the practice, the culture, the tools you yourself can take up and go to work with. Science never 'concludes' either. But you get really good models, that account for a lot of things, are powerful and flexible without being clunky and intractable - but tentative, based on caveats, subject always to review. That's just like philosophy. The idea of philosophical practice as just unfolding premises, like imagining maths is like that, mistakes a pedagogical device and a systemising mode that generally comes late in an subjects development, for the creative practice. Wittgenstein started with premises. But the work he his really respected for and are lastingly influential, is the Philosophical Investigations where he employs a clearly ad hoc evolving method of direct enquiry, only later systemised by others into for instan e what we now call the Private Language argument. Nietzsche too used such an approach, frequently contradicting himself, seeming to go in circles, or go on tangents - and stumbling on his best ideas. Yes define terms, yes find common ground. But, atheists didn't and are never going to win Christians over - they just got on with having more interesting discussions that more people wanted to hear, and now the theological debates once at the core of philosophy are almost forgotten. If someone says they won the argument because of their premises, but they have nothing interesting to say - who cares about them? It is the joint endeavour to collectively understand thaf creates great debates and philosophy, not some ridiculous notion of 'winning'. We all win, in so far as we become better able to understand our lives and the world. CriglCraglCriglCragl Edit : 'would' replaces 'woukd' : 'k' and 'l' - letters next to each other on the keyboard. Btw : +1 for answer. – Geoffrey Thomas♦ Aug 1 '18 at 18:42 I might be able to emphasis where I'm coming from, using your example of the theological debate. Sure, one may state that the theological debate is endless without any hope (nor should it have, according to this view) to reach a final answer to one of the most famous questions throughout history "is there a God?". But contra to this view, many will and does ask for a definite answer, and (some) philosophers do try to answer it, and bring a conclusion that they consider to be the truth. – Yechiam Weiss Aug 2 '18 at 16:04 And this creates a situation where one philosopher takes stand in one side of the debate, and another in a different side. From here, these two philosophers can't actually talk, and continue this debate in a healthy way, because they've taken a stance that they won't really budge from, bringing forth a situation Buber called the "I-it" relationship. This is the kind of discussions I see being made by a lot of philosophers that I object to, and I present in this answer. I ask - how can we continue from reaching such standpoint? – Yechiam Weiss Aug 2 '18 at 16:05 In conclusion, I'd be happy to see philosophy (or more precisely, philosophers) work the way you present, but I just fail to see it way many times, and much more in the way I present. – Yechiam Weiss Aug 2 '18 at 16:06 We can try using things like rationalwiki.org/wiki/Rapoport%27s_Rules And try to remain open and curious ourselves, and value win-win debates rather than valueing 'victory' in conflicts of ideas.. How to have good productive discussions is an interesting topic – CriglCragl Aug 6 '18 at 13:09 The question is fair but it may be confused about the purpose of arguing about theories and the premises on which they are founded. It is important that we knock-down our premises at every opportunity. Over time we discover that certain premises cannot be knocked-down and then we know we are making progress. Lack of progress is usually the result of a reluctance to abandon premises that can be knocked-down and a preference for a form of philosophy that is tolerant of bad ideas and non-threatening to our belief system, whatever it happens to be. The first purpose of our theories is to test the plausibility of our premises. We need to know the theory does not reduce the premises to absurdity. In philosophy our theories nearly always render our premises absurd since most premises are wrong, but every time we reduce a premise to absurdity this is progress. Regrettably progress usually ends where our favourite premises come under threat. Thus whole traditions of philosophy can be seen to make no progress. PeterJPeterJ I think that my question really starts in your last paragraph. – Yechiam Weiss Aug 8 '18 at 15:28 Not the answer you're looking for? Browse other questions tagged logic metaphilosophy debate or ask your own question. Does philosophy shed any light on how parties can fruitfully debate without an agreed source of truth? Are human moralities morally objective or subjective or morally skeptic (always ask critical questions)? When does the philosophy of a newly created (academic) discipline typically arise? What does “non-philosophy” mean in the works of Laruelle (and scholars of Laruelle)? What standards exist for developing a philosophical model? Does following logic necessarily require one to conclude that they are objective and have no bias? Is it there any trivialist model in physics (like in quantum mechanics)?
cc/2019-30/en_middle_0012.json.gz/line1496
__label__wiki
0.56319
0.56319
Claude Mathis named Athletic Director/Head Football Coach MARSHALL, Texas – Marshall ISD’s Board of Trustees has approved the recommendation of Superintendent Dr. Jerry Gibson to hire Claude Mathis as the district’s new Athletic Director and Head Football Coach. The unanimous vote took place during a Special Called Meeting Thursday afternoon. A press conference to officially introduce Mathis took place following the board Morain wins NAIA and Red River Athletic Conference Track Athlete of the Week Moriba Morain makes history as he is the first Wiley College Track Athlete to win both the NAIA and Red River Athletic Conference Track Athlete of the Week Wednesday. Morain ran the fastest 200-meter dash time in the NAIA this season at 20.94 at the Bobby Lane Invitational in Arlington, Texas, Saturday – competing Poleon wins NAIA and Red River Athletic Conference Track Athlete of the Week Natasha Poleon becomes the first Wiley College women’s track athlete to win NAIA and Red River Athletic Conference Track Athlete of the Week Wednesday. At University of Texas-Arlington Bobby Lane Invitational Saturday, Poleon ran the fastest 200-meter dash time in the NAIA this season at 24.23. She ran the second-fastest 100-meter dash time in the US 80 TO BE RESURFACED IN MARSHALL ATLANTA – A section of US 80 in Marshall will receive a new riding surface during this summer according to plans approved in March by the Texas Department of Transportation (TxDOT). “We will be resurfacing a 3.8-mile section of the highway making up Victory Drive between US 59 and Loop 390 East,” said Paul Wong, South Marshall STEM Academy earns designation as Reward School MARSHALL, Texas – South Marshall STEM Academy has been recognized as a Reward School by the Texas Education Agency in an announcement and special presentation during the March regular meeting of the Marshall ISD Board of Trustees. Carmen Delgado, Region 7 Education Service Center Coordinator, presented the award to South Marshall Principal Jerry Hancock and Winterguard reschedules performance, raffle MARSHALL, Texas – The Marshall ISD Winterguard has rescheduled its performance from last Friday’s “Dinner and a Show” which was cut short due to rough weather which roared through the area during their first performance. Winterguard director Crystal Walker said that the groups will schedule a “redemption performance” for Friday, March 31, at 5:30 p.m. MJHS boys track wins Lindale meet MARSHALL, Texas – The Marshall Junior High School 8th grade boys track team brought home first place at the Lindale Junior High Relays Tuesday night in Lindale, setting four meet records in the process. The 7th grade boys finished in second place. In the 8th grade division, Marshall’s James Thomas set a meet record in Edgar wins 800-meter run at Bobby Lane Invitational ARLINGTON, Texas – Wiley College men’s track and field athlete Marbeq Edgar continued where he left off in the 800-meter run as he topped the field full of NCAA Division I athletes at the University of Texas-Arlington Bobby Lane Invitational. Edgar finished the race in 1:51.77 to secure a bid to repeat his NAIA Championship. MISD students take two awards at state PTA Reflections contest MARSHALL, Texas – Two Marshall ISD students have been recognized at the state level for their entries to this year’s State PTA Reflections contest. Emma Kate McIntosh, of South Marshall STEM Academy, received an Award of Excellence, Literature, in the 3rd-5th grade arts division. Mallory Maxwell, of Marshall High School, received Honorable Mention for her Three Lady Wildcats set personal bests at Bobby Lane Invitational ARLINGTON, Texas – Three Wiley College women’s track and field athletes raised the bar on their times as they set personal bests at University of Texas-Arlington’s Bobby Lane Invitational Saturday. Renae Dennie and Taishia Pryce broke their previous personal records and ran the fastest times in Lady Wildcat history since 2008 in the 100-meter and
cc/2019-30/en_middle_0012.json.gz/line1500
__label__cc
0.598107
0.401893
The Next Five Years and Beyond Pittsburgh Quarterly Contributors PQ Staff Questions or corrections? Contact us at . Black & White Gala Raises $165,000 for Family House Family House hosted its annual Black & White Gala on Saturday, April 6 at J. Verno Studios. 250 of Pittsburgh’s top community and industry leaders attended in their best black and white attire. Massaro, Weiss, Fralic, Coleman, Hughes, Grunbaum, Hickey, Rich Carol Massaro, 79: A mother of four, she raised nearly $1 million for Alzheimer’s research after the disease took her late husband, contractor Joseph A. Massaro Jr. She was a woman of tremendous energy and generosity, serving as an indefatigable volunteer for organizations across the city. Pittsburgh Opera Hosts “Bohemian Nights” Fashion Show Pittsburgh Opera’s “Bohemian Nights” fashion show dazzled guests gathered at Pittsburgh Opera Headquarters in the Strip District on Monday, March 18. Mardi Gras Gala Raises More Than $511,000 On Fat Tuesday, March 5, more than 700 Mardi Gras revelers came to the Westin Convention Center to support the Epilepsy Association of Western and Central PA and honor Deb Rice-​Johnson, President of Highmark, Inc., as the King of the Mardi Gras. Annual B*tches Ball Spreads Spaying and Neutering Awareness Humane Animal Rescue’s 9th Annual B*tches Ball hosted nearly 300 attendees and brought down the house at Nova Place on March 2nd. The Pittsburgh Heart Ball Celebrates Its 30th Anniversary The Pittsburgh Heart Ball celebrated its 30th Anniversary and its commitment to be a relentless force for a world of longer, healthier lives, on Saturday, March 2nd at the Wyndham Grand. ACMSF Awards Gala Salutes Physician Heroism More than 300 guests gathered for the Allegheny County Medical Society Foundation (ACMSF) Celebration of Excellence Awards Gala at the Westin Convention Center Hotel, downtown Pittsburgh, on March 2. CONTEST: Have an Idea to Improve Pittsburgh? The submission period for the Pittsburgh Tomorrow contest is now closed. We will notify the finalists once chosen. Thank you to all who participated! What’s the Big Idea? As the kickoff to a region-​wide competition, we asked a group of regional leaders to submit an idea, in 50 words or less, that, if enacted, would make Pittsburgh a better place to live. It could be something that wouldn’t cost a dime or it could be a multimillion-​dollar public works campaign. Below… Pittsburghers Walk the Red Carpet at “Lights! Glamour! Action!” Party goers dressed to the nines walked the red carpet under The Pennsylvanian’s iconic rotunda on Saturday, February 23 for “Lights! Glamour! Action!” benefitting the Pittsburgh Film Office.
cc/2019-30/en_middle_0012.json.gz/line1501
__label__wiki
0.751457
0.751457
June 16, 1999 - New Yorkers Give CUNY University Passing Grade, Quinnipiac College Poll Finds; Biggest Problem Is Seen In Public School Failures Despite the negative publicity surrounding the City University of New York (CUNY), 18 percent of New York City voters say it's a "very good" educational institution, while 47 percent say CUNY is "fairly good," according to a Quinnipiac College Poll released today. A total of 18 percent of New Yorkers say CUNY is "fairly bad" or "very bad." While 32 percent of New Yorkers say they or a family member are CUNY graduates, 59 percent of voters say they would recommend CUNY to a friend or relative, while 30 percent say they would not. Asked what factor is most to blame for problems at CUNY: 54 percent point to the public schools' failure to prepare students for college; 22 percent point to lack of funding for CUNY; 15 percent point to low standards at CUNY. "CUNY gets mediocre grades, something like a C+, but that's a lot better than Gov. George Pataki and Mayor Rudolph Giuliani who both get failing grades for the way they're handling CUNY," said Maurice Carroll, director of the Quinnipiac College Polling Institute. "Most New Yorkers think the biggest problem is not with CUNY, but with the public schools. New Yorkers want CUNY to do a better job. But most of them still would recommend CUNY, and think it should get more government money." Gov. Pataki gets a negative 18 - 45 approval rating for the way he's handling CUNY, while Mayor Giuliani gets a negative 20 - 45 percent. By an 18 - 13 percent margin, New Yorkers have a favorable opinion of newly appointed CUNY Chairman Herman Badillo, while 14 percent have a mixed opinion and 54 percent say they don't know enough to form an opinion. Despite dissatisfaction with public schools, Chancellor Rudolph Crew's favorability is 38 - 10 percent, with 29 percent mixed and 21 percent having no opinion. Asked how they rate different steps to improve CUNY: 65 percent say it is very important and 21 percent say it is somewhat important to increase city and state funding; 68 percent say it is very important and 21 percent say it is somewhat important to improve standards at CUNY; 96 percent say it is very important to improve New York City's public schools. By a 60 - 36 percent margin, New Yorkers support open enrollment, where every high school graduate is guaranteed acceptance at a CUNY community college. By a 71 - 24 percent margin, New Yorkers want to continue remedial programs, or high school level programs, for students unprepared for college level work, in CUNY community colleges. By a 72 - 23 percent margin, New Yorkers say it's a good idea to raise admission standards at some of CUNY's four-year colleges. "New Yorkers say it's important to increase funding for CUNY and they feel just as strongly that it's important to raise standards at the school," Carroll said. "And in the closest thing to unanimous that we've ever seen in a Quinnipiac College Poll, New York City voters say, `Fix the public schools.' "As long as we were talking education, we asked New Yorkers if they would want to take a political science course taught by Mayor Giuliani. By a 38 - 59 percent margin, they declined." From June 8 - 14, Quinnipiac College surveyed 1,019 New York City residents who say they are registered voters. The poll has a margin of error of +/- 3.1 percent. The Quinnipiac College Poll, directed by Douglas Schwartz, conducts public opinion surveys in New York, New Jersey and Connecticut as a public service and for research. 2. Is your opinion of Schools Chancellor Rudolph Crew favorable, unfavorable, mixed, or haven't you heard enough about him? Favorable 38% 37% 41% 37% 41% Unfavorable 10 11 9 6 7 Mixed 29 30 30 24 24 Hvn't hrd engh 21 20 19 32 27 REFUSED(VOL) 1 2 - 1 1 5. Is your opinion of Chairman of the CUNY Board of Trustees Herman Badillo favorable, unfavorable, mixed, or haven't you heard enough about him? Tot Wht Blk His Favorable 18% 23% 13% 18% Unfavorable 13 8 20 11 Mixed 14 11 17 17 Hvn't hrd engh 54 56 50 52 REFUSED(VOL) 1 1 - 1 7. Do you approve or disapprove of the way Mayor Giuliani is handling education? Approve 30% 39% 15% 27% 31% Disapprove 59 47 78 65 59 DK/NA 11 14 8 8 11 8. Do you approve or disapprove of the way Mayor Giuliani is handling CUNY, the City University of New York? Approve 20% 26% 11% 14% Disapprove 45 28 66 58 DK/NA 35 46 23 27 9. Do you approve or disapprove of the way Governor George Pataki is handling CUNY, the City University of New York? 22. Now I would like your views on the City University of New York, known as CUNY. How much have you heard or read about CUNY? A lot, some, only a little, or none at all? A lot 21% 20% 22% 20% 30% Some 27 26 26 29 28 A little 35 38 34 26 23 None at all 17 15 18 24 18 DK/NA - 1 - - 1 23. How would you rate CUNY as an educational institution? Very good, fairly good, fairly bad, or very bad? Very good 18% 12% 24% 25% 18% Fairly good 47 46 50 49 47 Fairly bad 12 15 6 7 8 Very bad 6 8 5 5 3 DK/NA 17 20 15 13 24 24. Would you recommend CUNY to a relative or friend or not? Yes 59% 50% 70% 70% 56% No 30 38 22 22 28 25. How important do you think it is that that the state and city government increase funding for CUNY? Very important, somewhat important, not too important, or not important at all? Very important 65% 55% 78% 74% Somewhat important 21 28 13 13 Not too important 5 7 2 5 Not important at all 4 5 3 2 DK/NA 5 6 4 7 26. How important do you think it is to raise the standards at CUNY? Very important, somewhat important, not too important, or not important at all? 27. How important do you think it is to improve New York City's public schools? Very important, somewhat important, not too important, or not important at all? Somewhat important 3 4 1 2 Not too important - - - - Not important at all - - - - DK/NA - 1 - 2 28. Which do you think is most to blame for problems at CUNY:.(A) The city's public schools failing to prepare students for college, (B) Low standards at CUNY, or (C) Lack of funding for CUNY. A) The city's public schools failing to prepare students for college. 54% 55% 56% 53% B) Low standards at CUNY. 15 19 7 12 C) Lack of funding for CUNY. 22 15 31 29 DK/NA 9 11 6 6 29. As you may know, every New York City high school graduate is automatically guaranteed admission to a CUNY community college. Do you favor or oppose this policy? * Question wording was "As you may know, every New York City high school graduate is automatically guaranteed admission to a CUNY community college. Do you favor or oppose this open admissions policy?" Feb 12* Favor 60% 48% 78% 76% 65% Oppose 36 50 19 20 31 DK/NA 4 3 4 4 4 30. Currently, CUNY community colleges offer remedial programs - which are high school level courses - for students unprepared to do college work. Do you think these remedial programs should be continued or eliminated? Continued 71% 60% 83% 86% Eliminated 24 34 14 11 31. There is a proposal to raise admission standards at some of CUNY's four year colleges. Do you think this is a good idea or a bad idea? Good idea 72% 81% 58% 72% Bad idea 23 13 40 27 32. Would you want to take a Political Science course from Mayor Rudolph Giuliani or not? Yes 38% 53% 21% 24% No 59 43 75 75 36. Have you or any member of your immediate family graduated from CUNY? Yes 32 32 33 36 DK/NA 1 1 - 1
cc/2019-30/en_middle_0012.json.gz/line1507
__label__wiki
0.703638
0.703638
Review: The Knife - Shaking The Habitual Clocking in at over an hour and a half, certainly does what its title sets out to achieve, but at what cost? PMA Writers byJEAN-LUC MARSH The Knife occupies a space on a plane lying far above the terrestrial acts down on the ground. Hailed as the demigods of alternative dance music, it is clear that Karin Dreijer Andersson and Olof Dreijer can do whatever the hell they please, and the result will be labeled as the clarion call of a new era. A large part of this stems from the mystique cultivated in the seven years since the now legendary Silent Shout. Possessing an iron grip over their image, The Knife has appeared in quasi-anonymous masks and outfits for the greater part of a decade. This tactic of anonymity, by no means exclusive or original, has been emulated by everyone from The Weekend to Rhye. A deeper look into Shaking The Habitual, however deconstructs this quintessence, and reveals what lies behind the stark, didactic curtains that shroud The Knife in a captivating cloak of mystery. The enchanting, organic, tribal rhythms of “A Tooth For An Eye” beckon the listener inward, deeper into labyrinth of Shaking The Habitual. Behind the swelling instrumentals of bells and flutes, lies the true enchantress of this magical landscape. The rasping, howling voice of Andersson, distorted beyond recognition into something foreign yet unsettlingly familiar, contrasts against the twinkling, festive melody, delivering caustic criticisms of capitalist greed (“look at what we’ve got, and those who haven’t: bad luck") and conservative ignorance (“rewrite history to suit our needs”), among other things, under the cover of an infectious tune. “Full of Fire” dispels any of the recognizable, human sounds found on the album opener, transitioning from folkloric to industrial. It is a severe world, saturated with noises alternately terrifying enough to be repurposed to score a horror film, or so absurd that they seem incongruous amidst the leaden soundscape. Anchoring this harsh, metallic world to the previous, is Andersson’s voice, colder and less human than before, propelling the melody through levels on industrial grunge while spouting more messages of political dissatisfaction. “Let’s talk about gender baby,” she growls in a masculine tone, before trailing off into the void. In fact, Andersson’s voice is the thread and the solder that binds and connects the disparate pieces of the robotic Frankenstein that is Shaking The Habitual, bridging the gap between the immediacy of the first disc and the more sluggish, saturnine second disc. The tracks in which she is absent fall apart, containing nothing to connect them with the already dissimilar sounds populating each of the self-contained universes that is a song by The Knife. This absence is especially acute on “Old Dreams Waiting To Be Realized,” which is essentially the edited end result of a long exposure listen to the sounds produced by a boiler room. In its nineteen minute span, nothing concrete is accomplished, and the listener is left disoriented and dazed. “Fracking Fluid Injection,” a wordless ode to the perils of pollution with a title so current and begging for attention that it hurts, ambles in a murky haze for the majority of ten minutes. It is a free-fall through a land of creaking doors and reverberated ululations, with no end in sight. Interludes “Crake” and “Oryx,” fall in much the same category, but are saved by virtue of their short duration, serving more as palate cleansers than interminable torture tracks. “Networking” is the exception to this trend. Its fidgety, hyper-techno rhythm, the masterful work of Dreijer, has enough content in its sharp twists and turns to engage the listener, leaving them a willful captive to the buzzing, whining, and guttural noises that fade in and out of earshot. The remaining tracks on Shaking The Habitual are all exquisite; ranging from the exotic, carnival-like “Without You My Life Would Be Boring,” to the dichotomous “Raging Lung” with its anthemic chorus (“What a difference, a little difference would make”) in the first half and sinister whispers in the second (“Dig a hole in the backyard and drain the blood”). Clocking in at over an hour and a half, Shaking The Habitual certainly does what its title sets out to achieve, but at what cost? Shaking The Habitual, while ambitious, is anachronistic, built for a time in which attention spans can survive a nineteen minute interlude and come out unscathed. Judicious use of the skip button to find the tracks on which Andersson’s transfixing voice is front and center, results in a much more rewarding, immediate experience. The nihilistic messages and political warnings will still be there, and so will your sanity. [B+] Find it at: Amazon | InSound | eMusic Stream Shaking The Habitualat Pitchfork Advance. FeaturedFavorite AlbumsThe KnifeJean-Luc Marsh Review: Young Galaxy - Ultramarine By PMA Writers Review: The Weeknd - Kiss Land Review: CHVRCHES - The Bones of What You Believe Review: Austra - Olympia The Knife - Shaking The Habitual Tracklist Album Stream: The Knife - Shaking The Habitual The Knife announce new album, Shaking the Habitual Review: !!! - THR!!!ER Review: Laura Marling - Once I Was An Eagle Review: MØ - No Mythologies To Follow Review: Johnny Jewel - After Dark 2
cc/2019-30/en_middle_0012.json.gz/line1517
__label__cc
0.645203
0.354797
Adopting New Medical Technologies in Russian Public Hospitals: What Causes Inefficiency? Higher School of Economics Research Paper No. WP BRP 07/PA/2013 31 Pages Posted: 25 Nov 2013 See all articles by Liudmila Zasimova Liudmila Zasimova Sergey Shishkin Date Written: November 25, 2013 The adoption of new medical technologies in Russian public hospitals is an important part of healthcare modernization and thus is a subject for public finance and regulation. Here we examine the decision-making process on adoption of new technologies in Russian hospitals, and the institutional environment in which they are made. We find that public hospitals operate within a strategic-institutional model of decision making and tend to adopt technologies that bring indirect benefits to their heads/physicians. Unlike Western clinics, the interests of Russian hospital heads and physicians are driven by the possibilities to obtain income from a part of hospital activities: the provision of chargeable medical services to the population, as well as receiving informal payments from patients. The specifically Russian feature of the decision-making process is that hospitals are strongly dependent on health authorities’ decisions about new equipment acquisition. The inefficiency problems arise from the contradiction between hospitals’ and authorities’ financial motivation for acquiring new technologies: hospitals tend to adopt technologies that bring benefits to their heads/physicians and minimize maintenance and servicing costs, while authorities’ main concern is initial cost of technology. The main reason for inefficiency of medical technology adoption arises from centralization of procurement of medical equipment for hospitals that creates the preconditions for rent-seeking behaviour of persons making such decisions. Keywords: medical technology, adoption, public hospital, Russia, causes of inefficiency JEL Classification: I10 Zasimova, Liudmila and Shishkin, Sergey, Adopting New Medical Technologies in Russian Public Hospitals: What Causes Inefficiency? (November 25, 2013). Higher School of Economics Research Paper No. WP BRP 07/PA/2013. Available at SSRN: https://ssrn.com/abstract=2359340 or http://dx.doi.org/10.2139/ssrn.2359340 National Research University Higher School of Economics ( email ) Myasnitskaya street, 20 Moscow, Moscow 119017 Sergey Shishkin (Contact Author)
cc/2019-30/en_middle_0012.json.gz/line1521
__label__cc
0.731698
0.268302
Infestation 11.1 Posted on May 19, 2012 by wildbow I stared down at the metal walkway as I caught my breath. I had one gash at the side of my head, and another trickle ran from beneath the armor of my shoulder, down my arm and to my fingertip, where it dripped almost in sync with the head wound. It should have hurt, but it didn’t. Maybe it would when the shock wore off. If so, I didn’t look forward to it. Trickster, Ballistic and Circus lay in front of me. Another cape had fallen over the railing and lay on the concrete floor below, unmoving. They were all either unconscious or hurting badly enough that I didn’t need to worry about them. I swallowed hard. My heart had climbed up so far into my throat that I almost couldn’t breathe, and my heartbeat felt oddly distant and faint for how terrified I was. Coil’s base was deserted. I knew his men were out on patrols, that the only people in here were a handful of the capes that were working for him. He’d left it almost undefended. If I was going to act, I’d have to do it now. My costume’s feet lacked hard soles, so I should have been nearly silent, but the interior of Coil’s base was deathly silent and my feet were slamming down on the metal walkway as I ran. The noise of singing metal filled the dark space, echoing, seemingly louder with each step I took. The thrum of the metal rang through the air even after I came to a stop. I’d reached my target; a reinforced door, identical to so many others in the complex. With the labyrinthine mess of metal walkways and the dozens of doors, I might have missed it. The only thing telling me I was in the right place was the smudge of ash left behind from when the soldier had put out his cigarette on the wall. I opened the door, and it was far too loud, creaking, then banging into the wall with a crash despite my last-second attempts to stop its momentum. The room looked like a prison cell. It had concrete walls and floor, a cot and a metal sink and toilet. Coil and Dinah were both there. I couldn’t say whose presence left me more devastated. I could say Coil’s presence was the worst thing, because it meant my info was bad. His power meant I was probably fucked on a lot of levels, that the odds were suddenly astronomically against me. I was caught. My gut told me that I wouldn’t make it out of the compound in one piece, now. He was washing his hands in the sink, he turned to look at me, apparently unconcerned by my presence. But no. As I stared at Dinah and registered what I was seeing, I realized the image would be burned into my mind’s eye forever. She lay on the cot on her side, her eyes open, staring at me, through me. A bloody froth was drying at one side of her mouth and at the edges of one nostril. I didn’t consider myself a religious person, but I prayed for her to blink, to breathe, to give me some relief from that cold horror that was gripping me. I was too late. My vision practically turned red as I charged Coil, drawing my knife as I ran. I felt him use his power, and suddenly there were two of him, two of me, two cells with two dead girls named Dinah Alcott. In one of those rooms, I stabbed Coil in the chest. There was no satisfaction in doing it, no relief. I’d lost, I’d failed in every way that counted. The fact that I’d put him down barely mattered. In the other room, he stepped back out of reach of my first lunge, raised one hand and blew a handful of pale dust into my face. While I was blindly slashing in his direction, he grabbed the wrist of my knife hand and held it firm in his bony hand. That room where I’d succeeded in stabbing him faded away. The only me that existed, now, was coughing violently. My knees buckled as I coughed hard enough to bring up my lungs, unable to get the powder out of my nose and mouth. I pulled at my hand, trying to free it from his grip. Futile. “Stop,” he ordered me, and my struggles stilled, though I was still finishing my coughing fit. “Diluted scopolamine,” he spoke, his voice calm, sonorous. He let go of my wrist, and pushed at the knife in my hand. I let it drop. “Also known as Devil’s Breath. The vodou sorcerers, the Bokor, were said to use this along with the venoms of the puffer fish and other poisons. With these substances, they could create the ‘zombies’ they were so famous for. These zombies of theirs were not raised from the dead, but were men and women who were forced to till fields and perform crude labor for the Bokor. The uneducated thought it magic, but it was simple chemistry.” I waited patiently for him to continue. The notion of fighting or responding didn’t even occur to me. “It strips imbibers of volition and renders them eminently suggestible. As you can see, I attempted to use it on my pet, and the results were… tragic. The price of hubris, I suppose.” “Take off your mask,” he instructed me. I did. My hair fell across my face as I let my mask fall to the ground. My cheeks were wet with tears. Was that from before, from when I’d first seen Dinah? Or was I able to cry about my present circumstance, even if I was helpless to do anything about it? He touched my cheek, brushed a tear away with his thumb. He stroked my hair, and the gesture felt strangely familiar. The way his hand settled on the back of my neck and gripped me there didn’t. It felt… possessive. “Pet,” he intoned, and fresh terror shook me to my core. “You couldn’t have succeeded. This was terribly unwise.” “Okay,” I murmured. No, no, no, NO. I didn’t deserve this. My eyes fell on Dinah. She still stared at me, eyes wide and unblinking, and I couldn’t help but see the look as accusing. I did deserve this. It was thanks to me that she’d been kidnapped. Thanks to me that she’d been made into Coil’s slave. Karma, perhaps, that I’d take her place. The strength went out of me. My head hung, and I stared at my feet. Tears streamed down my face. I didn’t wipe them away. I wasn’t sure I could. “Look at me, pet,” Coil instructed, and I did. I was glad to, like a compliant, eager to please child. A part of me wanted more orders. In that drug induced haze, I wanted to lose myself in obeying, wanted to serve. That way, at the very least, I wasn’t to blame for my own actions or the tragic consequences that followed from them. Coil removed his mask, and I stared. I recognized him. He was someone I knew all too well. They were both tall, thin. How hadn’t I seen it? Coil’s costume could must have been designed to highlight his skeletal structure, make him look thinner and more bony. All it had taken, beyond that, would be an affected change to his voice and different mannerisms. I’d been unable to see it. So dumb, so stupid. I could understand it, too. He’d been struggling to fix things, watching people failing to find work, knowing it was the city government that was to blame. I could remember him telling me how he’d make the city work again, how he had all the answers. I knew how hungry he was to do it. He’d gotten powers. He’d started to put plans into motion so he could do just that. “Welcome home, pet,” he spoke, and he didn’t speak in Coil’s voice. The voice I heard was my father’s. I woke up, and for a long moment I stared up at the ceiling of my room and reassured myself that it was all a fabrication of my own scumbag mind. It had been a nightmare or a terror dream; I wasn’t positive on the differences between the two. It was my brain drawing together all my guilt about what we’d done to Shadow Stalker, the role I’d played in Dinah being kidnapped and leaving my dad; knitting it all into some convincing, disturbing scenario. Not the worst I’d had, but there was at least some repetition and familiarity with the usual ones. It had felt way too real, and it had sucked. My shirt stuck to me with the damp of my sweat, the room was warm, but I still shivered. My alarm clock sat on the ground by my inflatable mattress. I picked it up and turned it around so the I could see the green numbers of the digital display. Five forty in the morning. Time to wake up, I supposed. There was no way I was going to be able to fall asleep again in the next few hours. It wasn’t just the idea of having another nightmare. The dream had left me with a feeling of an impending deadline. How long could Dinah be expected to hold on? I doubted Coil was taking bad care of her, so she wouldn’t die of malnutrition or overdose on whatever drugs Coil was giving her. Still, there was a limit to what the human mind could handle. How long until Coil pushed her abilities too far? If she was getting headaches from the use of her power, there was a chance she could suffer more severe issues if pushed to use it more often. Pain generally signified something was wrong. I was also worried I wouldn’t earn Coil’s trust and respect. Until this was resolved, I wouldn’t be able to rest, take it easy, or have a day to myself. Not in good conscience. Depending on what happened, it might be a long, long time before I could relax again. What worried me more than anything was the idea that I might save Dinah, only to find that Coil had broken her spirit or her will to the point that she couldn’t go back to her old life. I worried that, like in my nightmare, I would be too late. With this in mind, I sat up and tossed the sheet aside. I reached for my glasses, by the alarm clock, then stopped. Instead of putting on my glasses, I stood and made my way to the bathroom adjacent to my room. Alongside fresh supplies of toothbrush, toothpaste, soap, tweezers, shampoo, conditioner and all that, I had a small box with packages of disposable contact lenses, daily use. I hated contacts so, so much. I’d tried them in middle school, at Emma’s recommendation, and they had never felt comfortable. That, and I had never figured out how to put them in properly. It seemed like ninety-nine out of a hundred times, they flipped inside out to cling to my fingertip instead of sticking to my eye. True to form, it took me four minutes to get the contacts in, and I found myself blinking every two seconds after I did have them in. At least I could see. I walked through my new base of operations wearing an oversized t-shirt and a pair of underwear. Not exactly fitting attire for a supervillain. My new abode was three stories tall, which made it taller than Grue or Bitch’s places, which were the only ones I’d seen thus far, but it was narrow. A cafe had stood here, before, but it had been flattened by one of the first waves to hit the city. Coil owned at least one of the companies that was managing the restoration and reconstruction efforts, and over the past two and a half weeks, as his crews had started clearing and rebuilding on the Boardwalk, he’d had them set up some buildings, all squashed together. When the Boardwalk was fixed up, these same buildings would be at the westmost edge of the same block that had the stores, restaurants and coffee shops. If the Boardwalk ever got going again, they would be prime real estate. Ostensibly to protect these new buildings until people started buying up the properties, each had been set up with heavy metal shutters to seal the windows and wall off the front. It made the building dark, with only faint streams of light filtering in through the slats at the top of each shutter. The topmost floor was mine and mine alone. Taylor’s. It was living space, with a bedroom, bathroom and kitchen. The bedroom was spacious enough to serve as a living room as well as a sleeping area. The first things I’d done after Coil’s men had unloaded the furniture and supplies was to hook up an internet connection and computer and get my television mounted on a wall and connected to a satellite. The second floor, as I liked to think of it, was Skitter’s. It was for my costumed self. It still needed more than a few things to complete it. I flipped a switch in the stairwell, and tinted flourescent lights lit up on the undersides of the shelves that ran along two adjacent walls, floor to ceiling. Each shelf was lined with terrariums and backed by strategically positioned mirrors so that the light filtered through the front of the terrariums and into the room. Only a few were occupied, but they each had the same general contents – a layer of dirt and pieces of irregularly shaped wood. I hit the second switch, and chambers in the lid of each occupied case opened to release their inhabitants. As they crawled through the case, the spiders were lit up by the lighting so that their shadows and the strange shapes of the wood were cast against the panes of hard plastic, distorted and larger than life. I’d seen a picture on the web of the same thing, done on a far smaller scale. I had hopes that the effect would be suitably impressive and intimidating once all of the terrariums were full. It would be doubly impressive once Coil’s special effects technician stopped by and outfitted a case with a series of switches that a large bug could move – a beetle or something. If I could direct the beetle to release the bugs, turn the lights on or off or even open the lids of the terrariums, all while appearing to sit motionless in my chair, it would be that much more effective for any audience I happened to have in the room. Terrariums aside, the room was sparse. Six empty pedestals sat just beneath the shuttered window, each standing just a little beneath knee height. After touring the place yesterday morning and spending some time browsing the web to see what was available, I’d gotten in contact with Coil and named every possible thing I could think of that I could use for the space. The current contents of the rooms on this floor and upstairs had been delivered last night. The stuff I was waiting on was harder to come by, and it would be unreasonable to expect it to be available and in place within this short span of time. I did have a chair, here, way too large for me. It was positioned in one corner, so that it was framed by the two walls of terrariums. It was black leather, and broad enough that I could comfortably sit cross-legged on it. I’d loved the idea since I’d seen one like it in Brian’s apartment. It was the one concession I was making in regards to atmosphere and appearances. A series of smaller seats were positioned so they faced the larger chair and the terrariums. A large abstract painting hung above the stairs on the right side of the room. I’d seen a similar one online and had liked it, so I had found the artist’s gallery and stumbled onto this. It was the first thing I had asked Coil for, and he’d delivered a large framed print far faster than I might have expected. I liked how it tied into the room and echoed the shapes cast against the front panes of the terrariums. The black lines were painted on the background of reds and yellows in a way that seemed spidery. I stared at the painting for a minute, seriously worried that I would see the abstract image from a different angle and realize I’d had Coil get me a eight-foot by five-foot painting of a hairy wang or a headless chicken or something. Making my way down the stairs, I found the ground floor surprisingly cool. The weather was warming up, and with the shutters closed, I’d found my room warm, sticky in the humid air. I’d foregone pajama bottoms, had slept with just a single sheet, and had slept with my feet uncovered. Goosebumps prickled my bare legs as I stepped on the cool hardwood floor. The ground floor here wasn’t much different from the one at Grue’s place. There was an area with bunk beds, albeit fewer than Grue’d had, a bathroom, a small kitchen and an open area that didn’t yet serve a purpose, stacked with boxes. All this was mine. My lair. It felt so empty. I knew that would change as it filled with furniture and necessities. The place was already something of a luxury. More than half of Brockton Bay was currently lacking plumbing or electricity, with more than a few unfortunate individuals having neither. In the process of setting up these buildings, Coil had ensured I was provided with both. Trucks would be coming and going through this area as clearing and construction continued, and Coil had informed me that these trucks would be discreetly resupplying me with water, ensuring my water heater had propane, emptying the aboveground septic tank and refueling the generator. As the city was rebuilt and standard utilities were put back in order, these special measures would be set aside, I’d get hooked up to those, and my lair would be lost in the surge of urban growth. Ideal world. It was nice to be able to enjoy those luxuries, but the Dinah situation took all of the joy out of it. I had hot showers and the ability to wash my dishes because Coil had provided them. I grabbed a cell phone from the kitchen counter and dialed Coil. I didn’t give a fuck about the fact that it was 5:45 in the morning. It bothered me, calling him, relying on him. It made me feel complicit. Inconveniencing him, even a little, felt good. “Yes?” His question was curt. “It’s Skitter.” “What is it, Skitter?” “I need a loan of some guys.” I looked around the living room, “Eight? A truck would be a good idea, if you can get one here.” “I can. These men you require, are you needing gunmen or-” “Just regular guys, anyone up for some exercise.” “I assume there’s no rush?” He was being more curt than usual. Maybe I’d woken him up. I didn’t really care. He could deal, if I was working on something that helped him. “No rush.” “Then I’ll have them there in an hour.” “An hour, then.” He hung up. It was a lot of time to kill. Free time sucked when you didn’t want to be alone with your thoughts. I wanted to run, but it was awkward. The fenced off areas, construction zones and flooded streets of the Boardwalk didn’t really make a sprint around the neighborhood that doable. Besides, it was dangerous enough I might stand out. In the end, I went against my better judgement and decided to go for a run. I dressed in a pair of shorts and a tank top, donned my running shoes and ensured I had both my pepper spray and my knife. I unstrapped the knife’s sheath from the back of my costume, then threaded a belt through it so I could strap it around my waist. I put the sheath itself under my waistband and the handle of the knife under my top. I stood in front of the full length mirror in my bedroom to check how visible the weapon was. It wasn’t exactly hidden, but it wasn’t conspicuous either. I adjusted it slightly, then called a small collection of bugs to me. It was a little creepy, having them crawl on my skin, beneath my clothes into my hair, but that stopped when they reached their destinations – above my socks, in my hair and between my bra and my top. I was cool with it so long as they weren’t directly on my skin. Did I look different? My skin had a light tan, now. I’d spent more time outdoors in the past few weeks. In the week and a half I’d spent in the shelter, I hadn’t exactly had books or TV, so I’d walked during the day, making my way across the city to check on the loft and to see the state of my dad’s house. I’d walked at night, too, when I’d been unable to sleep, but people hardly tanned doing that. I couldn’t pin down exactly how or why, but the definition in my face and body had changed. It was possible I’d had a growth spurt. Some of it was perhaps the tan giving more accent to the features of my body or face. Maybe it was that I’d been eating a pretty lean diet when I was staying at the shelter, coupled with the fact that I’d been so active over the past two months. I hadn’t spent six hours every day sitting around in school, I’d been in fights, I’d been running, and I’d ridden the dogs. I had some muscle definition in my arms, now, and I thought maybe I was standing straighter. Or maybe it was all those minor things helped by the simple fact that I was dressing differently, that my hair hadn’t been cut in a while, and that I wasn’t wearing my glasses. To say I barely recognized myself was.. how could I put it? It was true, but I could also remember myself months ago, when I’d look at my reflection and I would be so focused on the flaws and the things I didn’t like about myself that I never felt familiar with the person I was seeing in the mirror. It was as though it was always a stranger I was looking at, and I would be left vaguely surprised at the combination of features across from me. This was not recognizing myself in a very different way. There were still things I didn’t like, like my wide mouth, my small chest and the lack of curves or any real femininity. My scars stood out with my slight tan, a teardrop shaped mark on my forearm where Bitch’s dog had bitten me, a wavy mark on my cheek where Sophia had dug her fingernails in,and a line by my earlobe where she’d tried to tear my ear off. But my physical flaws no longer consumed my attention when I looked at myself. I felt comfortable with my body, like I’d somehow earned it, the way it was, and it was mine now. I wasn’t sure if that made any sense, even to myself. If there was anything about myself that I didn’t like, it was primarily psychological. Guilt was a big one. The idea that my dad might dislike me if he got to know me, now? That was another. That my mom, were she alive and showing up at the door, might be disappointed in me? Sobering. As he’d done with his own underground base, Coil had set my lair up with a discreet entrance and exit. Leaving through the front door would be conspicuous, if I started working with anyone beyond my teammates. Skinny teenage girl with black curly hair entering and leaving the same building that the skinny teenage villain with black curly hair was operating out of? No. I made my way to the building’s cellar, opened a hatch and entered the adjacent storm drain. The same builders that had put the building together had blocked off the drain so the water flow wouldn’t make it impassable, and I was left with a clear route down to the section of beach where the storm drains emptied. I wasn’t sure if Coil had plans to keep the city’s workers from trying to unblock the drain, but I supposed that was the sort of thing we could rely on him to handle. In the meantime, a third of the storm drains were too clogged with rubble and detritus to drain, and another third didn’t connect to anything anymore. Add the fact that most of the storm drains were a little out of the way of regular foot traffic, and it wasn’t too conspicuous. I started running the moment I reached the beach, glad for the chance to resume my routine. It was a strange environment, eerie. The wooden pathway, the literal boardwalk that had run in front of the stores, was now a skeletal ruin that loomed above the piles of trash that the bulldozers had all pushed to one side, twice as tall as I was. The beach had been cleared, which was a feat unto itself. The work of the bulldozers and the crews with rakes had revealed the packed, dirt-like layer from beneath the loose sand. Opposite the trash piles, by the water, there were mounds of irregularly shaped pieces of concrete, set to break up the waves and prevent the highest tides from dragging the trash, debris and machinery into the ocean. Two mounds looming on either side, with a space cleared in the middle for the trucks and any foot traffic. A scene up ahead caught my attention. Two pieces of machinery lay in a heap just below the lip of the boardwalk above. A bulldozer and an eighteen wheeler with a crane-mounted claw attached had both been driven or pushed over the edge of the boardwalk and onto the beach. The cab of the truck with the claw had been partially crushed by the bulldozer. Though it was barely past six in the morning, a group of laborers were already there, some on the ledge above, others down on the beach, all gathered around the trucks. Spray paint had been used to draw the same crude symbol on both the side of the eighteen wheeler and the concrete wall separating the beach from the Boardwalk above. A capital ‘M’, with two taller lines drawn vertically through it much the same as you’d do with a dollar sign. The Merchants. It fit their modus operandi. They had been bums, drunks and addicts, looked down on others, before Leviathan came. In the wake of what Leviathan had done to the city, leaving everything in shambles, with social services gone or in chaos and even basic utilities in short supply, everyone else had been brought down to their level. The Merchants were even, I suspected, thriving. With strength in numbers and virtually nothing holding them back, they had become like pack animals. They roamed the city in bands of three to twenty, robbing, raping, pillaging and stealing. They were settling in some of the better areas, the neighborhoods that still had power or water, and forcing the existing residents out. Or, worse, I could imagine that some were moving in and keeping the residents around for their own amusement. It was not a pleasant thought. The kind of people who had gravitated towards the Merchants tended to have a lot of resentment. Specifically, they had resentment towards people who had what they didn’t. If they happened upon a family with Kate the soccer mom, Tommy, the kid with more video games than teeth, and Joe the blue-collar worker with a steady job? If they weren’t letting them go? I was guessing that hypothetical family would be in for a hell of a rough time. It might have sounded silly, that line of speculation, but I’d spent time in the shelters. I’d heard about how vicious and depraved the Merchants were getting. Anyways, this? This whole situation? They liked it. They wanted to keep things this way, and that meant they were going to stop anyone else from fixing it. They would intercept supplies, attack rescue workers and they would push construction vehicles into a heap on the beach. I’d have to deal with these guys. It wasn’t just intercepting any groups that made their way into my territory. That was easy, all things considered. No, I also had to deal with the small army that would come marching through here wanting retaliation over my having kicked the asses of any groups that had made their way into my territory. I could call on the others, if such a situation arose, and I expected them to call on me if the same thing happened. But people would take time to get here, and the Merchants, the Chosen or whoever else was making trouble could keep making trouble until the reinforcements arrived. It was tricky, and I didn’t know for sure how I’d handle things if- “Taylor.” My reaction wasn’t much different than if someone had stabbed me in the stomach with an icicle. I’d thought of that mental image in particular because of the cold, horrible feeling in my midsection; fear, guilt. My thoughts immediately went back to my nightmare from earlier. I turned to look. “It’s you,” my dad spoke, “Wow.” He stood on the ledge above me. He was more tanned than I was. He wore a short-sleeved button-up shirt and khakis and held a clipboard. It set him apart from the other laborers, and the man who stood just behind him, wearing a gray t-shirt and jeans. I knew in an instant, my dad was in charge around here. Looking at him, I couldn’t imagine how I might have thought he was Coil. Even in a dream. “Just out for my regular run.” Surprise etched his face, “You’re running during this…?!” He made a visible effort to close his mouth. It made me feel uneasy. What thought process or concern was keeping my dad from opening his mouth about my running? He’d been worried about it when the streets were relatively safe. Was he that spooked at the idea of scaring me off again? He looked at the man who was standing near him, murmured something. The man walked over to join the others in observing the damage around the damaged vehicles. We were left more or less alone. “You got my messages?” I asked. “I’ve listened to that answering machine so many times-” he stopped. He was a good distance away, but I could see the lines in his forehead, “I miss you.” “I miss you too.” “I… I don’t know how to ask. I’m afraid to ask you to come home, because I’m not sure I can stand to hear you tell me you won’t.” He paused, for a long moment. Waiting for me to jump at the opportunity. I stayed silent and hated myself for it. “Well,” he said, so quiet I could barely hear him, “You can always come home. Any time, any reason.” “Okay,” I told him. “What are you doing with yourself these days?” I struggled to find an answer, and was saved by the bell. One of the men by the wreck shouted, “Danny!” and my dad turned. My dad ran his fingers through his hair, “I need to go handle this. Can I… How do I contact you?” “I’ll leave you a message on your answering machine,” I said, “With my cell phone number, and my email in case I’m in an area where cell service is down.” “Email?” he asked. “Where are you that you have access to a computer?” A few blocks from here. “Just outside the city limits,” I lied, “Not far from the Market.” “So you’re out of the way of any trouble,” My dad noted, with a touch of relief. There was a noise as someone began prying one of the truck doors open, and my dad turned his head, frowning. “But what are you doing here this morning?” “I was going to stop by the house, see if it was in okay shape,” I lied again. Was this the extent of my interactions with my dad? Always lies? “Keeping up with my running.” “I see. Look, I have to go, but I do want to talk again, soon. Lunch, maybe?” “Maybe,” I offered. He offered me a sad smile, then turned to go. I moved my hand to adjust my glasses, and wound up waving at my face. I was wearing my lenses. “Dad!” I called out. He stopped. “Um. I’d heard the Slaughterhouse Nine were around. Be careful, warn others.” I pointed at my face. His eyes widened. I could see the thought process, the realization. He took off his glasses and hung them from his shirt’s front pocket. I wasn’t positive that was much better. “Thank you,” he said, squinting slightly at me. He raised a hand in an awkward half-wave, and I returned it with one of my own. As if by mutual agreement, we turned to leave at the same time, both of us going in separate directions. He hurried to where he was needed, and I turned to run back to my place. My lair. I hadn’t run nearly as far as I’d wanted, but I wasn’t up to continuing. I checked the kitchen clock as I entered from the cellar. I had thirty minutes. I took the time to shower and don my costume – my sleeve was still crusty and stained yellow-white where it had come in contact with the foam, but at least it wasn’t sticky anymore. My mask wasn’t wearable with the contacts. I’d taken lenses out of an old pair of glasses and set them into the construction of my mask. I debated it for a few moments, then I decided to use the remaining time to fix it. With my knife’s point, I set about undoing that particular piece of work, prying the lenses out. I finished with enough time left over to grab and eat a breakfast bar. Coil’s people were punctual, rapping on the metal shutter at six forty-five. Alright. This was it. I pulled on my mask. Time to claim my territory. This entry was posted in 11.01 and tagged Coil, Dinah, Taylor, Taylor's Dad by wildbow. Bookmark the permalink. 79 thoughts on “Infestation 11.1” afifakhan2001 on May 19, 2012 at 00:27 said: ‘The idea that my dad might dislike me if they got to know me, now?’ The idea that my dad might dislike me if he got to know me, now? I thought maybe the beginning was a dream because of the way it started but then I thought..who knows… and that bit with coil morphing into dad!! I was shouting ‘NO WAY’. And of course it was a dream. The disturbing nightmare sequence is a thing that has been done in many a movie and book and sometimes gets a bit boring…but you did yours very well..like I said we might think it is a dream at first but you wrote it in a way that made us doubt ourselves. Very well done on that. wildbow on May 19, 2012 at 00:34 said: I know the dream sequence is sort of a tired bit, but it struck me that I’ve mentioned a few times that Taylor has nightmares, earlier in the story, and there’s the stress over Dinah, her dad and Sophia, and I wanted to sort of touch on that without getting into pure exposition. Showing rather than telling. So I went with the dream. All in all? I’m ok with how that part turned out, personally. Though I welcome any complaints/criticisms/praise to let me know if I hit the mark & should leave that option open for another story/book in another year. AS Khan on May 19, 2012 at 00:52 said: maybe i should have said it WOULD have been boring…but it was done so well… like i said I get very into your stories so my housemates are often asking me why I am shouting ‘NO WAY’ or ‘HOORAY’ in the middle of the night! So I wouldn’t change a thing either. On the other hand it would be fun to somehow make the reader believe it is a dream sequence and then in the end it is actually reality… a spin on the dream sequence, a mockery of the cliche and a good way to get back at the readers who think they have the whole plot figured out. I got your meaning, no worries. And that reversal of the dream sequence sounds fun. I should do that someday. Gee Squee Meinhoff on July 1, 2015 at 17:35 said: Heya, should : “They had been bums, drunks and addicts, looked down on others, before Leviathan came.” Be: “They had been bums, drunks and addicts, looked down on by others, before Leviathan came.” toafan on February 4, 2016 at 13:29 said: Well, I’ll tell you this: My heart was in my throat right up until Coil removed his mask. You really made that work, mate. Top job. Dread Pirate on January 15, 2018 at 21:11 said: Even on a second read-through, knowing it’s a dream the whole time, it’s still pretty engrossing. Sandy on July 13, 2018 at 12:22 said: I wonder, can Tattletale read Dragon’s mind or thoughts? CartonCrunch on January 8, 2018 at 12:47 said: I really thought it was going to be one of Coil’s alternate realities, at first, and that it’d disappear once she had killed him or something. CraftySyndicate on March 16, 2018 at 12:44 said: my response was a general “holy shit!” Bobby on May 19, 2012 at 00:55 said: “…to use the remaining time minutes to fix it.” the remaining time to fix it. “…enough time left over to grab and a breakfast bar.” to grab a breakfast bar It’s nice to confirm she took the time to tell her dad that she’s, yanno, alive. It’s something I’d wondered about more than once. Pinkhair on May 19, 2012 at 02:10 said: So I guess we know what Shattercrow does. frozen chicken on May 19, 2012 at 02:24 said: Break all the glass? I guess that would make sense, but the way Taylor said ‘I wasn’t sure if that was much better’ when her dad hung the glasses on his shirt makes me wonder if it’s more than that. Silica-kinesis? Pahan on May 19, 2012 at 16:59 said: I’d suspect that it would be more than that, though not full silica-kinesis. I think that it was mentioned that she is often the one who “announces” the 9’s arrival in a city. Perhaps she can shatter glass on a massive scale and send the shards flying at a dangerously high speed in random directions? Then, having glasses in your breast pocket can send the shards hurtling into one’s chest. Logical Oxymoron on March 1, 2014 at 19:13 said: Ohhh… I had assumed the Slaughterhouse Nine were prejudiced against people with glasses, or something… That makes much more sense. Though I kinda like my idea… estocasticom on May 19, 2012 at 05:34 said: ohhhh, so thats why she is wearing contac lenses and removing the glasses from her googles. I haven’t get it till now. …Oh hey, I just noticed the tiny smiley face at the bottom of this page. Is that normal? Psycho Gecko on May 19, 2012 at 04:41 said: I’ve seen it there for awhile. Watching us. Smiling at us. No indication it’s there. (_______) Curse you, comment box space correcty thingy! Curse you! That’s a thing WordPress uses to track site stats. To see how many times a page is loaded, they put a tiny image on each page and see how often it gets downloaded, when and where. G.S. Williams on May 19, 2012 at 08:51 said: The nightmare thing fits with the overall story, Taylor has a lot of stress and has mentioned it before. However, there was more logical detail in this dream than I would expect from dreams, like the voodoo dust exposition and the cigarette burn on the wall — it seemed like this was something that was actually happening. I half wondered if we were being given some vision of the future, and then Skitter woke up. It would seem weird when she controls bugs, but it’s not weird when you think of that power as a type of latent telepathy and psychic power… Well, I debated some of those points – I’m not sure on the exposition, but the cigarette burn at least – and decided that Taylor’s a very detail focused person, so it would make sense for that to translate to a dream. The cigarette burn also serves a double purpose in that it’s sort of a clue as to what’s going on, before she actually wakes up. In the actual story, 7.8 or 7.9, whichever (where she meets Dinah for the first time), Coil rubs the smudge from the wall while talking. The fact that it’s still there is an intentional inconsistency, that the place is described as ‘labyrinthine’ and that she doesn’t use/have her power are others. On your last point, the ties between powers, memories & one’s dreaming have come up before (Interlude 7) and are liable to come up again, so you’re not wrong. Another clue was that she was aware of Coil’s multiple threads. Were she to try to do this for real she would only perceive the reality in which Coil had avoided her knife. Hexa on May 31, 2016 at 10:45 said: That had me wondering where she’d got extra powers from, how much time had passed since the last chapter, and just how awful Coil’s other thread had got that he kept this one. Once she woke up I briefly considered whether it might be her somehow seeing the other thread with some latent secondary power, but then Coil wouldn’t have been able to split again, regardless of whether Skitter could follow both. Loki-L on May 19, 2012 at 09:24 said: Interesting. I am curious what type of threat makes switching from glasses to contacts a valid defence mechanism. I am sure Taylor will have no problems intimidating the help and her neighbours and building up a reputation. People’s inherent fears of creepy crawlies will do half her work for her if she goes about it right. I am looking forward to finding out what exotic beasties Coil will get her for her menagerie. I think the problem won’t be finding creatures that can easily be weaponized, but finding ones that can be turned into non-lethal weapons. To many insect and arachnid horrors out there would be useful in a fight, with the catch that there was a too great possibility that they would leave an opponent dead. I guess this is one of the problems with having a powerset much better suited to someone who would have no qualms having his enemies stung to death or devoured alive. On the topic of Taylor’s powers, I have to wonder just what exactly her limits are and how set in stone those limits are. We have heard of the manton effect and the possibility of a second breakthrough under the right sort of conditions and already saw the range of her powers increase during stressful situations. There appears to be room for growth in that direction. On the other hand spiders and insects are a strange combination as they seen to have little in common biological speaking outside a person’s mind who just lumps them into the same category. She should do some tests to find out what exactly she can and can’t control as just spiders and insects seems a bit arbitrary. Wasn’t there some mention of centipedes a while back? It would make sense if the powers included all arthropods: insects, spiders, millipedes and centipedes, but also scorpions and crustacea ranging from shrimp and crabs to lobsters. The last one might be useful if she ever had to fight in a seafood restaurant, or maybe Coil can get her a Japanese spider crab. Taylor has already proven that she can sense parasites with Rachel’s dogs. Considering the likely prevailing sanitary conditions in her hometown at the moment she should be able to use her senses to keep track of a large part of the population by their parasites with some training. Just attune her senses to lice for example and she has an instant 3-D map of the unwashed masses around her in her head. Some mention was given to the topic (and crustaceans in particular) early in Arc 3. (3.1, if I remember right?) Yes, there was mention of crabs early on and during the fight against Leviathan there was mention of crustaceans, so I guess as the reader we should already know that much, if we had paid enough attention. It might be nice to have some sort of training montage / exposition scenes where our heroine probes the limits of her powers, a justification could be to avoid the embarrassment of having to give her range as “a few blocks” or maybe seeing her own profile in the data stolen from the wards and giving some thought to the speculations in it. The whole arthropodovoyance and arthropodokinesis given by the PRT would seem to be inaccurate at least. The heartworms she sensed are not arthropods, but nematods (http://en.wikipedia.org/wiki/Dirofilaria_immitis). Her powers probably include all ecdysozoa (http://en.wikipedia.org/wiki/Ecdysozoa) or even all protostome if her powers work on things like snails and slugs. In any case insects and spiders are probably the only ones she can actually use in combat as most of the other stuff is aquatic and/or too small to be useful. Although I guess it would be fun if she figured out how to weaponize krill or something. Loki-L you just blow my mind. I have been like an hour loking biological taxonomies in the wikipedia and my head is spinning. So the “simpliest” theory i have come with is these one: Taylor’s powers increase with time and use, not only in distance and number but also in deep. In these early stage she affect arthropods, that have a neuroloy simple enought for her to control but complex enough to be more or less similar to ours. In the future, when her powers grow, she will affect all the Protostome ( http://en.wikipedia.org/wiki/Protostome) that include Arthropods, nematodes (roundworms.Like the ones in Bitch’s dogs.Parasites.),platyhelminthes(like the Taenia saginata or tapeworm.Parasites), rotifers(too small(0.1-0.5 mm) and simple for be important i think), molluscs and annelids(proper worms). That my theory. All depend in what the Word of God say about. Maybe he already have plans about all these. s on April 5, 2018 at 14:52 said: I wonder if it’s just whatever *she* considers “bugs” After Leviathan attack a PRT officer describe her powers as arthropodovoyance and arthropodokinesis. An arthropod (http://en.wikipedia.org/wiki/Arthropod) is an invertebrate animal having an exoskeleton (external skeleton), a segmented body, and jointed appendages. These include the insects, arachnids, crustaceans, and others. So, yeah, her powers affect all arthropods, or at least that what the PRT believe. Well, Loki, perhaps you’ve never heard of the likes of Mirror Master, one of the members of the infamous Flash’s Rogues. His technology is all related to mirrors, which let him use it on anything that could hold a reflection. Teleporting through them was a big one. The thing had to be big enough for what you wanted to send through it. Glasses aren’t that big unless you want to just put your fingers through and go for an eye or stick a knife in. If they’re contacts, they may not realize they’re there to try it. In the process, whoever it is might be able to stick their eyes up to the glass or other reflective surface from the “other side” and use it to spy. Take a look around. I’m sure there’s plenty large enough mirrors, picture frames, maybe even monitors and tv screens. Mirror Master could do this to other people too, so he could drop an entire team of supervillains in on people unsuspecting. I wouldn’t want to be a hero running over a big puddle of water at them either. That’s my speculation at least. Fun thing about worm is, any power you can think of isprobably possible. Andrew Lynn on October 22, 2016 at 00:03 said: Taratula hawk wasps carrying bullet ants would be an excellent non-lethal weapon, because they both cause excruciating pain and don’t kill eduardo on May 19, 2012 at 13:34 said: Taylor´s power affects everything that have a nervous system, as long as this nervous system is simple enough. This should include most fish also. Depending on how complex is the nervous system that she can control it can get up to sharks and depending on how simple it can get down to lice, acarus and a lot of small parasites. Yeah, if she wanted she could rule a small town (do anything against me and the parasite in your brain will start to eat). The interesting part is that bacteria and virus do not have a nervous system. If they had Taylor would be simply unbeatable by anyone with a close to normal human body. Only machines or something like weld would stand a chance against her. Oh, considering the number of horrible flesh-burrowing things that exist out there, she could totally work out a variation of Bakuda’s implanted bomb thingy. I remember this article about this species of flies that would exclusively lay the eggs of their flesh-eating larvae in humans… Oh, here it is. The 5 Most Horrifying Bugs in the World. http://www.cracked.com/article_15816_the-5-most-horrifying-bugs-in-world.html Come to thing of it, the rest of the article is also nice reading material for Taylor. Aww… Our little child soldier is becoming a captain. Good chapter, as always. Let’s see how she’ll go about taking control of the neighborhood… A few things stood out. One is that, though I talked about wanting to see the kind of lair she builds in one of the previous episodes’ threads, I now wonder what she’d actually do with that lair. She may be an insect-themed supervillain, but she doesn’t actually have any particular affection for insects: she can barely tolerate them crawling on her. So, she has a lot of interestingly lit bugs on the second floor, but whom is the light show for? Anyone trustworthy enough to know where she sleeps doesn’t need to be impressed, and anyone she would need to intimidate with her lair can’t be allowed to know where she sleeps. Is it only for the benefit of keeping the minions in line? Does Coil intend to rule fairly openly, with everybody’s headquarters being public information, so she’s supposed to receive supplicants on the day of her daughter’s wedding? I am not sure how well that could work. In mafia organizations, though the boss’s identity and place of residence may be public, he is insulated from prosecution by his chain of command — no one can prove beyond a reasonable doubt that he is involved in any particular crime. That wouldn’t work for these supervillains, who are expected to be their own enforcers. The other thing is, surely Coil would delegate ordinary personnel and equipment requests to an underling, and insist that his personal number to only be used for emergencies? Mind you, maybe he did, but Taylor didn’t respect his insistence. Isn’t she trying to get on his good side, though? Editorish comments: “a series of switches” — Perhaps “a bank of switches”? “an open area that didn’t yet serve a purpose, stacked with boxes.” — A little awkward, since it isn’t the open area that’s stacked, it’s the boxes. Perhaps “an open area that didn’t yet serve a purpose, which presently held stacks of boxes.” Missing serial commas: “Trickster, Ballistic and Circus” “toothbrush, toothpaste, soap, tweezers, shampoo, conditioner and all that” “bedroom, bathroom and kitchen” “a bathroom, a small kitchen and an open area” “trash, debris and machinery” “bums, drunks and addicts” “robbing, raping, pillaging and stealing” “They would intercept supplies, attack rescue workers and they would push construction vehicles into a heap on the beach.” Also, given that the place is full of boxes, it does serve a purpose- storage… People don’t need to know WHERE the lair is to be brought there, have a hood pulled off their head, and see bugs everywhere. And I’m imagining that much of the space will be used for bug breeding, clothmaking, and other industrial work. Maybe she should get some real costume designers. Time for Uncle Gecko’s rampant criminal organization ass-pull! She’s going to need a front. Something has to be there in that first floor. Right now it doesn’t matter, since the city’s still out of whack. No clue what she’ll go for, but it shouldn’t be anything bug-related. To easy to guess it’s where Skitter is located. I wonder if the breakup of the Undersiders is Coil’s method of insulating himself. Right now, while he’s underestimated or not paid attention to, he can afford to use his accounts to buy things and set them up. Once he’s in public, that’ll change. Just being a supervillain ruling the city won’t exactly work. Any kind of rule means he’ll have to have a public presence of some sort. In this case, he might take power in his civilian identity. You know, as some sort of legitimate businessman. Still, the suspicions will be there. Everyone will be looking to find out where his money is, what it’s used for, and where it’s from, and how they can pin him to this crime or that crime. Instead, there’ll just be the Undersiders who have carved out territory and are taking in money from various sources: drugs, protection, gambling, prostitution, illegal chinchilla ranching. All the dirty money goes to them. The tough part is getting it laundered to Coil. In his public persona, it won’t, can’t go to him, most likely. As Coil, they could hand it over in cash, but that’s difficult when it comes to paying for equipment and such. Everything needs a card tied to a bank account, after all. At the moment, since I’m pulling criminal organization out of my ass, I would go with some sort of fake charity or even a Super PAC. Something where people can donate anonymously and the funds can be fudged. Maybe Coil’s public persona heads up the thing or is otherwise somehow involved so that the money can appear to go to what it was meant to go for, while he diverts it to whatever he intends to do. Even better is if a private military contractor is a business his public persona runs. Makes the acquisition of weapons, ammo, and equipment fit in better. 1st floor exterminator service? Super-soldier drugs instead of poison? Or maybe just offer to “remove the bodies” (ie: recruit them). Well, they already have a supervillain banker, the Number Man, who Coil uses. Good memory. Heck, now THAT would make a good interlude some day- the Number Man, and perhaps how he(she? they?) deal with that stuff. Supervillains and money… Such an interesting part of the puzzle. And very dangerous to write as well! Write it sloppily and get pounded by the plebs, do it too well and you’ll get frisked by the feds. I advice Wildbow not to write a number about the Number Man. By the way: I am unto you Wildbow. We all know that the Number Man is Nasir Jones in a world where Rap stayed looking at the front door and never got paid in full. You see right before Rap’s Genesis, everyone was following the leaders of the New School: the infamous Parahumans. Both the prodigies and those who caused havoc proceeded to steal all the shyne, leaving Nas(ir) to having a traumatic experience with his math home work during half-time (of course the home work was harder than breaking atoms – it was after all given by the large professor). Hydrargentium on May 22, 2012 at 17:42 said: @Pahan, maybe you speak a different variant of English than I. Both of the phrases you cited look fine to me: “a series of switches” is a perfectly valid way to describe a bunch of switches all lined up or connected in some way, and “an area stacked with boxes” is quite alright for describing a space with a bunch of boxes stacked in it — replace “stacked” with “piled high”, which are essentially synonymous, and you’ll probably recognize the grammar pattern. Also, just to put a fine point on it, I much prefer omitting the serial comma. When I was young (early teens), it used to bug me not to have it, because it seemed somehow inconsistent. Having given it some thought as I started writing for myself (as opposed to for school), I feel that the serial comma is both superfluous and cluttering. Hydrargentium, indeed, those comments are inherently subjective, but there is a difference between “valid way to describe something” and the optimal way to do so — not that I claim that my suggestions are the unique, optimal way. In this case a “series” is a very generic collective noun — the sort one might use when one doesn’t have a better word — and, further, connotes the switches being positioned in a straight line or perhaps having some sequential aspect to their arrangement. A “bank [of switches]” is a more specific term with the right connotation of some sort of an assembly made to hold a number of electrical switches to control things. So, I thought it fit better. As for “an area stacked with boxes”, as it was, “area” was the object of “stacked”, even though the objects being stacked were the boxes. Regarding the serial comma, I believe Wildbow has said before that he or she preferred serial commas, so I’ve been pointing out the places where they were missing. Quick typo note: sh’ed Rogue comma: “in,and”. pravin vatsa on March 2, 2013 at 03:06 said: “I stared at the painting for a minute, seriously worried that I would see the abstract image from a different angle and realize I’d had Coil get me a eight-foot by five-foot painting of a hairy wang or a headless chicken or something.” Hahaha, I love the unexpected bits of comic relief that pop up sometimes. Fake Name on March 21, 2013 at 01:40 said: >“Dad!” I called out. He stopped. “Um. I’d heard the Slaughterhouse Nine were around. Be careful, warn others.” I pointed at my face. I remember being VERY confused by this the first time around. I just now went back to re-read it and see if it made any more sense- and of course it does. I would suggest giving more information about Shatterbird in the previous chapters. Like, I remember re-reading that part several times wondering what the fuck was going on. I thought maybe Danny realized Taylor might be a cape if she has access to information about the Nine way ahead of most civilians. Clint Olson on October 11, 2013 at 17:36 said: I’ll concur here. I’m reading through this for the first time, and this statement makes absolutely no sense at this point in the narrative. julesltdr on January 18, 2014 at 01:10 said: draconian139 on February 24, 2014 at 14:09 said: Close to the same thing here. Difference is that I actually thought Taylor was telling her father that she was a cape to try to give him some peace of mind about her watching out for herself. Particularly when he took off his glasses as that’s something that I do on rare occasions when I’m completely thrown for a loop and need to process. I have no problem with it. It’s a hanging mystery, you’re not *meant* to make sense at this point. It’s meant to intrigue you and make you go “Hmm, that was a bit odd” so later you’ll remember it and go “Aha! *That’s what that was about!”. And it does that job nicely IMO. Rob on September 15, 2015 at 04:06 said: I got that some member of the S9 is (even more?) dangerous to people wearing glasses. I have NO CLUE why or why contact lenses and bug mask lenses are exempt from this, but finding out will be interesting. Packbat on August 24, 2013 at 21:56 said: Belated typo note: “To say I barely recognized myself was.. how could I put it?” has only two periods in its ellipsis. EF on September 24, 2013 at 12:06 said: “I flipped a switch in the stairwell, and tinted flourescent lights lit up on the undersides of the shelves that ran along two adjacent walls, floor to ceiling” Should that be fluorescent? Nice work. > I picked it up and turned it around so the I could see the green numbers of the digital display. “So the I” doesn’t parse. I’m guessing it should be just “so I”. > The first things I’d done after Coil’s men had unloaded the furniture and supplies was to hook up an internet connection and computer and get my television mounted on a wall and connected to a satellite. “The first things… was” has mismatched plurality. It should be “the first things… were”. Typo: “Coil’s costume could must have been…” Presumably, either a comma has been omitted or an extra word or two was added. alextfish on November 28, 2013 at 14:44 said: Oh, Taylor. If only you could open up too your dad a little more. She doesn’t have to tell him she’s a supervillain, but she could give him some more reassurance than that. But it is of course very easy to slip back into old habits and flawed relationships, especially with family members. So it’s very realistic, true-to-life… just kinda tragic. The dream sequence was fairly obvious, but still effective for it. It did contain one distracting typo: “Coil’s costume could must have been”. anKLJ on January 31, 2014 at 18:58 said: Wildbow — the whole dream sequence was beautifully done. I was freaked until I began to suspect it was somehow “not real” (the ash thing was a good mis-direct), and you played it well enough that I was still hemming-hawing to the point she woke up. I concur with the commenters who were unclear about the Shattercrow vs. eyeglasses part — more exposition, maybe? As someone seriously myopic/presbyopic who finally gave up the squint/ dust/ tears struggle with contacts and has resigned to bug-eyed glasses for life, I was actually confused (and disappointed — geeks with glasses rule!) back when she put them in and wrecked her goggles. David Burns: “1st floor exterminator service?” (12/27/13 comment) While PG often amuses me, THAT comment made me spew my coffee! Good idea! 🙂 ” … bums, drunks and addicts, looked down on others, before Leviathan … ” {by} others. “They had been bums, drunks and addicts, looked down on others, before Leviathan came.” – I suspect that should be “looked down on BY others”… bundle on May 23, 2014 at 12:22 said: “It was my brain drawing together all my guilt about what we’d done to Shadow Stalker, the role I’d played in Dinah being kidnapped and leaving my dad” i can see other threads there: anger and betrayal towards her father, as well as his last action with her being a possessive one – locking her in the house and trying to force an increase in intimacy. perhaps worry over becoming coil’s slave as part of her attempt to save dinah. very well done, wildbow. you have a knack for the complex. Schrodinger's Hat on May 24, 2014 at 03:21 said: Contrary to what others out here seemed to think, I thought the dream sequence was brilliantly done. It was quite obvious that the whole thing was a dream, right from the start, but it didnt take away the shock that Coil would’ve been Taylor’s father from the start. Not one bit. One (sort of) story problem though. Just because Taylor has access to email, doesnt allow Danny Hebert to actually make any sort of valid deduction about her location. The story does seem to make prominent mentions about smart phones, so as long as she’s getting cell phone reception, I dont see how email would be any different. Ok,I am confused….where did anyone say he didn’t like the dream sequence?I had read nothing but praise in the comments,and I find myself agreeing with it. I love the fact that Taylor has a lair now. That is too cool. The thing with the beetle switch box is epic by the way. It’s a fantastic way to continue to show her incredible ability to come up with incredibly creepy ways to use her comparatively “minor” power. The intimidation factor alone with that is awesome. It was nice getting to see that she still has some contact with her dad. I was worried for a bit there that she had never even let him know she survived the Leviathan attack. I’d recommend just a short line about leaving him a message or something a few chapters back just so we know beforehand that she hasn’t totally abandoned him. That being said this was a sweet if heartbreaking moment here. I am curious about the glass thing. I thought at first it would be someone in the group was out for people with glasses but if she’s prying her lenses out of the mask where noone can see them that gets me thinking that maybe one of them can simply break glass. Seriously sucks for people with glasses. Speaking from one who used to wear them and also hated contact lenses with a passion, did Taylor have to get new contacts or did she keep up with her prescription for them just in case despite hating them? Prescriptions can change quite quickly at that age and if she didn’t keep getting new contacts even a set from six months ago can be pretty far off from her current set of glasses. I know it’s a small thing but…eh, like I said, I was a slave to my glasses for over 10 years so I’m curious. Clownie on January 2, 2015 at 22:22 said: >They had been bums, drunks and addicts, looked down on others, before Leviathan came. Bums, drunks, and addicts look down on others? Dislike Taylor’s staunch moralism. Coil’s doing the city a service. Dislike dream sequence; done to death, and dreams don’t really make that much sense. aahh,you are the guy Schrodinger’s hat refered too,he is clearly a clairvoyant.Well,dreams sometimes do make some sense (though if you paid attention,this one did not make much sense,it just had real characters and fears),Superheroes are also done to death,done to death=/=can’t be good.And,what staunch moralism?she works for him,she tries to resolve it diplomatically,its just that it leaves a bad taste to her mouth,and,honestly,even if you were an well intentioned extremist but a good guy who was forced to do that,it would leave a bad taste to your mouth and guilt too,no matter how well you’d rationalise it or how many people that would save.Yes,you might not hold back or even have second thoughts,but honestly,if you feel no pity for her as you use her,you are the villain here. David DeLaney on December 30, 2016 at 05:40 said: probably meant to be “looked down on by others” –Dave, conjunction junction axle on March 3, 2015 at 12:45 said: Love how you’ve shown how much Taylor has grown, also really liked the dream introduction. This is a great way to start the arc. On a side note: If this were a series of books, this would be the start for book 3 (in my opinion) Squirrelloid on April 5, 2015 at 23:39 said: FWIW, glasses are made out of plastic these days, not glass. I’m not sure you would have even been able to buy real-glass glasses in the last decade that weren’t ‘used’. You actually managed to combine the tired “it was all a dream” and “the bad guy is your DAD guy” cliches and made them work. I was going “no way, I mean it makes sense, but no way!” followed immediately by “YOOOO NO WAY YOU JUST DID THAT!” jmdlugosz on April 7, 2017 at 17:42 said: «“Email?” he asked. “Where are you that you have access to a computer?”» Doesn’t he know about phones, like the (old!) phone Sophia had that Regent forwarded email using? And wouldn’t her reply be “I can read email once I’m back in an area with cell coverage, duh! Get a phone that’s less than ten years old, old man.” ArkhCthuul on August 8, 2017 at 19:43 said: The first part of this.chqpter completely.shocked and awed.me.the first.time around…and the I cursed wildbow 😉 Leave a Reply to Irrevenant Cancel reply
cc/2019-30/en_middle_0012.json.gz/line1526
__label__wiki
0.607749
0.607749
US20040177015A1 - System and method for extracting content for submission to a search engine - Google Patents System and method for extracting content for submission to a search engine Download PDF preferably Yaron Galai Oded Itzhak Advertising com LLC Quigo Technologies LLC 2002-08-14 Application filed by Quigo Technologies LLC filed Critical Quigo Technologies LLC 2002-08-14 Priority to PCT/IL2002/000669 priority patent/WO2003017023A2/en 2004-02-11 Assigned to QUIGO TECHNOLOGIES, INC. reassignment QUIGO TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GALAI, YARON, ITZHAK, ODED 2009-01-06 Assigned to QUIGO TECHNOLOGIES LLC reassignment QUIGO TECHNOLOGIES LLC NAME CHANGE Assignors: QUIGO TECHNOLOGIES, INC. 2009-12-14 Assigned to BANK OF AMERICAN, N.A. AS COLLATERAL AGENT reassignment BANK OF AMERICAN, N.A. AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: AOL ADVERTISING INC., AOL INC., BEBO, INC., GOING, INC., ICQ LLC, LIGHTNINGCAST LLC, MAPQUEST, INC., NETSCAPE COMMUNICATIONS CORPORATION, QUIGO TECHNOLOGIES LLC, SPHERE SOURCE, INC., TACODA LLC, TRUVEO, INC., YEDDA, INC. 2010-11-16 Assigned to SPHERE SOURCE, INC, AOL ADVERTISING INC, YEDDA, INC, TACODA LLC, GOING INC, LIGHTNINGCAST LLC, NETSCAPE COMMUNICATIONS CORPORATION, AOL INC, MAPQUEST, INC, TRUVEO, INC, QUIGO TECHNOLOGIES LLC reassignment SPHERE SOURCE, INC TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS Assignors: BANK OF AMERICA, N A 2012-06-12 Assigned to ADVERTISING.COM LLC reassignment ADVERTISING.COM LLC MERGER (SEE DOCUMENT FOR DETAILS). Assignors: QUIGO TECHNOLOGIES LLC 2012-08-29 Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AOL INC. G06F16/80—Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML G06F16/81—Indexing, e.g. XML tags; Data structures therefor; Storage structures G06F16/95—Retrieval from the web G06F16/951—Indexing; Web crawling techniques G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data G06F16/21—Design, administration or maintenance of databases G06F16/211—Schema design and management G06Q10/00—Administration; Management G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting G06Q10/107—Computer aided management of electronic mail A system and a method for automatically submitting Web pages to a search engine, which is preferably used for submitting dynamic Web pages, but may optionally be used for any type of Web page. The present invention features a gateway server for providing these Web pages to the search engine, either directly or optionally through an autonomous software search program. Optionally and more preferably, the gateway server modifies the Web page before serving it to the autonomous software search program and/or search engine. The present invention relates to a system and a method for extracting content from documents, and in particular, for such a system and method in which the documents are constructed as mark-up language documents, such as Web pages written in HTML (HyperText Mark-up Language), for submission to an autonomous software search program and/or search engine. [0001] The World Wide Web is structured as a “two-party” system, in which a first party, the computer user, receives content from a second party, the Web server. The user typically requests the content in the form of mark-up language documents, such as Web pages written in HTML. In order to retrieve the desired Web page, the user submits a particular URL (uniform resource locator) to the Web server, which retrieves and transmits the desired Web page to the computer of the user. However, the user must know the correct URL, or else the Web page cannot be retrieved. [0002] Since there are many Web pages available through the World Wide Web, search engines have evolved to assist the user in the search for a particular Web page. These search engines index Web pages according to one or more keywords, such that when the user submits the query for a particular Web page. those Web page(s) with the same or similar keywords as for the query are retrieved. Search engines may receive Web pages (or pointers to those Web pages, such as URLs for example) by submission from the author of the page(s), but the search engines also actively search for new Web pages. Typically, such active searches are performed automatically with autonomous software programs called “spiders” or “crawlers”. [0003] These autonomous software programs search through the World Wide Web by extracting links from known Web pages in order to locate new Web pages, to which the links point. As each new Web page is located, it is indexed and added to the database of the search engine, and new links are extracted from that Web page. Search engines use the URL as a unique identifier of the indexed page. Thus, the autonomous software programs depend upon two assumptions. First, the Web pages existing as static entities, to which links remain stable. The second assumption is that web pages have incoming links pointing to them. [0004] However, many Web pages today are provided as dynamic Web pages, which are created in real time or “on the fly” from a plurality of components stored in a database. Dynamic Web pages are created upon submission of a query by a user, which determines the identity of the components to be retrieved and assembled into the Web page. For example, a URL for a dynamic Web page,. if it exists. may appear as follows: http://domain.com/search.asp?p1=v1&p2=v2. The term “search.asp” is a name of an application which should be invoked, followed by a “?” sign, and a list of parameters and their values. Many autonomous software search programs are designed to ignore such links, since automatically following this type of link may cause an infinite recursion which the autonomous software program cannot properly handle. Thus, dynamic Web pages are often not indexed (by using filters to reject such Web pages automatically during the indexing process), or even “un-indexable” due to the fact that the only way to generate this page is by submitting a query through a form and not through a regular hyperlink used by search engines to locate new pages. [0005] Content from Web pages may be extracted for direct submission to a search engine, for example through a direct feed mechanism. Various search engines now receive data through such a direct mechanism, such as AltaVista™ for example. Typically, each such search engine has a specification for determining the format in which the data should be received. Most search engines require the data or “feeds” to be transferred as an XML file, but other formats could also be used. Typically, the feeds include the following information per Web page: information that will be displayed in the search results: title, short description, link URL (the link behind the title) and display URL which appears under the description; and information that will be indexed but not displayed, such as meta keywords and the content of the page. [0006] The background art does not teach or suggest a solution to the problem of enabling dynamic Web pages to be detected and indexed by autonomous software programs. The background art also does not teach or suggest a solution to the inability of such programs to easily analyze, parse and index dynamic Web pages. Also, the background art does not teach or suggest a solution to such problems as infinite recursion, which are detrimental to the operation of the autonomous software program. [0007] The present invention overcomes these problems of the background art by providing a system and a method for automatically extracting content from a document such as a Web page, and for submitting such content to a search engine. The present invention is preferably used for submitting content from dynamic Web pages, but may optionally be used for any type of Web page. The present invention is also useful for any document which can be identified and/or located according to a URI (Unified Resource Identifier), which acts as an address or pointer to that document. [0008] Hereinafter, the term “search engine” includes but is not limited to, any type of autonomous software search program, such as a “spider” for searching for Web pages through the World Wide Web for example, as well as any type of repository and/or database, or other archiving or storage-based software. [0009] Examples of documents for which the URI may optionally be submitted include, but are not limited to, Web pages, any document written in any type of mark-up language, e-mail messages, word processing documents such as those generated by Microsoft Word™ (Microsoft Corp, USA) for example, and documents written in the PDF format (Adobe Systems Inc., USA). [0010] According to a first embodiment of the present invention, a gateway server is optionally and preferably featured for providing the extracted content to the search engine, either directly or optionally through an autonomous software search program. Optionally and more preferably, the extracted content is from a Web page, and the gateway server modifies the Web page and/or the URL of the page before serving it to the autonomous software search program and/or search engine. [0011] According to a second embodiment of the present invention, the content is preferably extracted from the Web page or other document by removing non-essential code information, such as non-essential HTML code for example. By “non-essential”, it is meant that the code information is not related to the content itself. For example, for a dynamic Web page which is created according to a template, the non-essential code information preferably includes HTML code which is not part of the unique content of the page, such as copyright notice, advertisement and promotional text, site navigation links etc. [0012] The removal of such non-essential code is preferably adjusted to a particular structure of Web pages or other type of document. Such a structure may optionally be found on a single Web site or other entity served by a particular Web server and/or dynamic Web page construction process or template. Such adjustment is most preferably performed by initially learning the structure of the Web pages, optionally by automatically scanning a plurality of Web pages produced with the same structure and/or by the same construction process. Such automatic scanning may also optionally include a statistical analysis of the Web pages, in order to infer extraction rules for such non-essential code. These extracting rules are optionally and more preferably based on statistical models, which determine the probability and/or the likelihood of a specific element of the page to be considered essential. As previously described, these Web pages may optionally have the same template, for example. The present invention then preferably detects repeated patterns in the Web page, more preferably by parsing the HTML code. [0013] When this process is complete, a set of instructions is preferably produced to determine how repetitive elements and/or the template (or repeating elements) may be removed from the Web page, in order to extract only the unique information. These instructions are more preferably used for de-templating (removing non-essential code from) all of the Web pages with the same template and/or other similar structure before being indexed by the search engine. [0014] According to another embodiment of the present invention, there is provided a system and a method for automatically extracting specific elements from the Web page, and constructing a structured representation of the information identified from the page. This process is preferably performed before the Web page is indexed by a search engine and/or is provided to an autonomous search software program, which then provides it to the search engine. The present invention identifies and extracts specific fields from the page, and preferably associates these fields with information types or attributes of information types that are defined in an information schema such as taxonomy or a semantic network. This schema optionally defines relations between different information types. [0015] The system preferably assigns attributes to each field. For example an attribute can optionally be a weight factor that is used by the ranking algorithm of the search engine when sorting search results. [0016] As for the previous embodiment, more preferably, the operation of the present invention is adjusted to a particular structure of Web pages, as may optionally be found on a single Web site or other entity served by a particular Web server and/or dynamic Web page construction process or template. Such adjustment is most preferably performed by initially learning the structure of the Web pages, optionally by automatically scanning a plurality of Web pages produced with the same or similar structure. As previously described, these Web pages may optionally have the same originating template and/or generated by the same construction process, for example. The present invention then learns how to detect and extracts specific elements, or fields, from the page, optionally assigning attributes to each field and optionally associating each field with an information object or an attribute of an information object defined in an information schema. Such a learning process may optionally be performed with a statistical analysis on the plurality of Web pages, in order to infer extraction rules for each of the fields. These extraction rules are optionally and more preferably based on statistical models, which determine the probability and/or the likelihood of a specific element of the page to be associated with each of the fields. The attributes of the fields are preferably defined either automatically or manually per set of pages that have the same or similar structure, and preferably derived from the information schema. As previously described, these Web pages may optionally have the same originating template and/or generated by the same construction process, for example. [0017] The system then preferably constructs a structured representation of the fields that are extracted from the page including their attributes and the relations between them, optionally and more preferably in an XML format. [0018] Any of the previous embodiments may optionally be implemented with an optional but preferred method according to the present invention for normalizing the URI of the document, such as the URL of a Web page for example. This exemplary method for normalizing the URL is preferably performed in order to index substantially similar Web pages only once. For each URL, each of the parameters is preferably removed. The term “parameter” refers to any divisible subunit of the URL. The Web page is then retrieved again by using the reduced URL. This Web page is then compared with the original Web page. If the removed parameter(s) are not redundant, such that they are required for the correct retrieval of the original Web page and/or a sufficiently similar Web page, then the retrieved Web page would be completely different from the original Web page. [0019] If the parameter is redundant, the Web pages may be expected to be similar, although perhaps not completely identical. Lack of identity may occur if the Web page includes one or more links with the complete URL, as for a session ID. Alternatively, the Web page could be custom tailored according to user identifying information, for personalization. Other types of dynamic Web pages may also occur, which may optionally produce a plurality of similar but not completely identical Web pages. For that reason, the comparison function of the present invention preferably checks for similarity in content and more preferably produces a similarity level, which is the likelihood of the two Web pages to have the same content. If this value exceeds a certain threshold. then most preferably the removed parameter is considered to be redundant. [0020] According to preferred embodiments of the present invention, the level of similarity is determined according to visual similarity. Visual similarity is preferably determined according to two different types of parameters. A first type of parameter is based upon content of the document, such as text and/or images for example. A second type of parameter is based upon visual layout characteristics of the document, such as the presence of one or more GUI (graphical user interface) gadgets or the location of text and/or images, for example. More preferably, the level of similarity is determined by comparing content-based parameters between documents, rather than by comparing visual layout characteristics. The use of content-based parameters is preferred because similarity is preferably determined according to the actual content or “meaning” of a document, with regard to being submitted to a search engine and/or otherwise stored. [0021] The above process preferably produces instructions on a process for detecting redundant parameters in URLs with the same structure, in order to remove these redundant parameters as the normalization instructions. [0022] The above process is preferably executed once per URL structure, and the normalization instructions are then applied on each URL with the same structure. The term “URL structure” preferably includes the same parameters, repeated for each such structure. The redundant parameters are preferably removed automatically before the Web page is retrieved and indexed by the search engine. [0023] According to the present invention, there is provided a method for providing a Web page to a search engine, comprising: separating non-essential code from essential content of the Web page; extracting the essential content from the Web page; and providing the essential content of the Web page to the search engine. [0024] Preferably, extracting includes modifying the Web page by removing one or more links from the Web page. Additionally or alternatively extracting preferably includes modifying the Web page by changing a URL address by deleting, adding or modifying parameters within this URL. More preferably, the Web page is provided to an autonomous software search program, for being provided to the search engine. [0025] Also more preferably, extracting further comprises: determining a pattern of at least one repetitive element within at least the Web page; and extracting the unique content from the Web page according to the pattern. Most preferably, the pattern is determined by comparing a plurality of Web pages. Optionally and most preferably, the pattern is a template. [0026] Preferably, the unique content is extracted by removing the template. [0027] Optionally and preferably, the separating non-essential code from essential content further comprises: normalizing the URL for the Web page for the search engine. More preferably, normalizing comprises removing at least one redundant parameter from the URL to form a normalized URL. Most preferably, all redundant parameters are removed. Optionally and most preferably, each redundant parameter is removed by: removing a parameter from the URL to form a reduced URL; retrieving a new Web page according to the reduced URL; and comparing the new Web page and the Web page to determine similarity, such that similarity indicates that the parameter is redundant. [0028] Preferably, similarity is determined according to content of the new Web page and the Web page. More preferably, similarity is determined according to a quantitative comparison, such that if similarity is above a threshold, the parameter is redundant. Most preferably, the removal of parameters and the comparison of the content in order to determine redundancy of parameters are done either automatically or manually. [0029] Optionally, separating further comprises: providing at least one attribute for an information type, the at least one attribute being determined according to an information schema; identifying at least one field of the Web page; and associating the at least one field with at least one attribute. [0030] Preferably, the at least one attribute comprises a weight factor for ranking the Web page by the search engine. [0031] Optionally and preferably, separating further comprises: examining a plurality of Web pages to perform a statistical analysis of the plurality of Web pages; and identifying at least one field of the Web page according to the statistical analysis. [0032] According to another embodiment of the present invention, there is provided a system for providing a Web page for indexing, comprising: (a) a gateway Web server for modifying the Web page for enabling indexing to be performed; and (b) a search engine for performing indexing. [0033] Preferably, the system features: (c) an autonomous software search program for requesting the Web page from the gateway Web server and for providing the Web page to the search engine. [0034] More preferably, the system features: (d) a scheduling process for selecting a Web page to be served to the search engine. Optionally, the gateway Web server comprises the scheduling process. [0035] Most preferably, the system further features (e) a plurality of Web servers for serving the Web page, wherein the scheduling process selects one of the plurality of Web servers for serving the Web page. [0036] According to yet another embodiment of the present invention, there is provided a method for extracting unique content from a Web page, comprising: determining a pattern of at least one repetitive element within at least the Web page; and extracting the unique content from the Web page according to the pattern. [0037] Preferably, the pattern is determined by comparing a plurality of Web pages. More preferably, the pattern is a template. Most preferably, the unique content is extracted by removing the template. [0038] Optionally and preferably, the unique content is extracted before the Web page is provided to a search engine. [0039] According to still another embodiment of the present invention there is provided a method for extracting an element from a Web page for serving the element to a search engine, the method comprising: analyzing a structure of the Web page; learning to extract the element from the Web page; producing a set of instructions to extract the element; extracting the element from a plurality of Web pages; and creating a structured representation of the content of the plurality of Web pages for submission to the search engine. [0040] Preferably, analyzing is performed by automatically scanning a plurality of Web pages having at least a similar structure. More preferably, the at least a similar structure is determined according to at least one of an originating template and a construction process. Most preferably, the learning further comprises parsing the HTML code of the Web page. [0041] Optionally, the structured representation is in XML. [0042] According to yet other preferred embodiments of the present invention, there is provided a method for feeding information about a plurality of Web pages to a search engine, comprising: extracting at least one field from the plurality of Web pages; automatically generating feed information for being fed to the search engine from the at least one field; receiving information about a template common to the plurality of Web pages; merging the template with the feed information; and transmitting the feed information to the search engine. [0043] Preferably, the at least one field comprises at least one of information to be displayed in a search result including one of the plurality of Web pages and information to be indexed but not displayed. [0044] More preferably, the automatically generating feed information comprises: selecting an output format for generating the feed information; and constructing a script for generating the feed information according to the template. Most preferably, the output format comprises XML. Hereinafter, the term “computational device” refers to any type of computer hardware system and/or to any type of software operating system, or cellular telephones, as well as to any type of device having a data processor and/or any type of microprocessor, or any type of device which is capable of performing any function of a computer. For the present invention, a software application or program could be written in substantially any suitable programming language, which could easily be selected by one of ordinary skill in the art. The programming language chosen should be compatible with the computational device according to which the software application is executed. Examples of suitable programming languages include, but are not limited to, C, C++ and Java. [0045] Hereinafter, the term “Web browser” refers to any software program which can display text, graphics, or both, from Web pages on World Wide Web sites. Hereinafter, the term “Web page” refers to any document written in a mark-up language including, but not limited to, HTML (hypertext mark-up language) or VRML (virtual reality modeling language), dynamic HTML, XML (extended mark-up language) or related computer languages thereof, as well as to any collection of such documents reachable through one specific Internet address or at one specific World Wide Web site, or any document obtainable through a particular URL (Uniform Resource Locator). Hereinafter, the term “Web site” refers to at least one Web page, and preferably a plurality of Web pages, virtually connected to form a coherent group. Hereinafter, the term “Web server” refers to a computer or other electronic device which is capable of serving files and data according to the HTTP protocol to a Web browser. [0046] Hereinafter, the term “applet” refers to a self-contained software module written in an applet language such as Java or constructed as an ActiveX™ control. Hereinafter, the term “client” refers to any type of software program and/or code and/or other instructions which are operated and/or performed by the computational device of the user. [0047] Hereinafter, the term “network” refers to a connection between any two or more computers which permits the transmission of data. [0048] Hereinafter, the phrase “display a Web page” includes all actions necessary to render at least a portion of the information on the Web page available to the computer user. As such, the phrase includes, but is not limited to, the static visual display of static graphical information, the audible production of audio information, the animated visual display of animation and the visual display of video stream data.[0049] The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein: [0050] FIG. 1 is a schematic block diagram of an exemplary system according to the present invention for serving Web pages through a gateway; [0051] FIG. 2 is a flowchart of an exemplary method according to the present invention for operating the system of FIG. 1; [0052] FIG. 3 shows a flowchart of an exemplary method for extracting the unique content from a Web page according to the present invention; [0053] FIG. 4 shows a flowchart of an exemplary method according to the present invention for extracting elements, or fields, from a Web page and constructing a structured representation of that information; and [0054] FIG. 5 shows a flowchart of an exemplary method for normalizing a URI according to the present invention. [0055] DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention is of a system and a method for automatically extracting content from a document such as a Web page, and for submitting such content to a search engine. The present invention is preferably used for submitting content from dynamic Web pages, but may optionally be used for any type of Web page. The present invention is also useful for any document which can be identified and/or located according to a URI (Unified Resource Identifier), which acts as an address or pointer to that document. [0056] According to preferred embodiments of the present invention, the Web page is modified by removing the template from the Web page. This process extracts the unique content from each Web page, thereby enabling the autonomous software search program and/or search engine to effectively ignore irrelevant content on each page when indexing the page, or preferably at least to not consider this content when indexing the Web page. It should be noted that such extracted content is sufficient for the search engine to index the Web page. [0058] According to another optional but preferred embodiment of the present invention, more preferably all, but preferably at least a portion of, the links in the Web page are removed. Removal of such links may prevent the autonomous software search program from entering other Web pages, which may not be of interest and which may cause the autonomous software search program to enter a recursive loop. Such recursion may even be “infinite”, in the sense that the autonomous software search program might enter a repetitive process and may even be unable to end the process. [0059] According to a second embodiment of the present invention, the content is preferably extracted from the Web page or other document by removing non-essential code information, such as non-essential HTML code for example. By “non-essential”, it is meant that the code information is not related to the content itself. For example, for a dynamic Web page which is created according to a template, the non-essential code information optionally and preferably includes HTML code which is not part of the unique content of the page, such as copyright notice, advertisement and promotional text, site navigation links etc, as well as GUI (graphical user interface) gadgets (portions of the display which are particular to the user interface). [0060] The removal of such non-essential code is preferably adjusted to a particular structure of Web pages or other type of document. Such a structure may optionally be found on a single Web site or other entity served by a particular Web server and/or dynamic Web page construction process or template. Such adjustment is most preferably performed by initially learning the structure of the Web pages, optionally by automatically scanning a plurality of Web pages produced with the same structure. As previously described. these Web pages may optionally have the same template, for example. The present invention then preferably detects repeated patterns in the Web page, more preferably by parsing the HTML code. [0061] According to preferred embodiments of the present invention, the Web page is modified by extracting only the unique content from the Web page, for example by removing the template information. This process extracts the unique content from each Web page, thereby enabling the autonomous software search program and/or search engine to index the most relevant content on each page. It should be noted that such extracted content is sufficient for the search engine to index the Web page. [0063] According to another optional but preferred embodiment of the present invention, more preferably all, but preferably at least a portion of, the links in the Web page are removed. Removal of such links may prevent the autonomous software search program from entering other Web pages. which may not be of interest and which may cause the autonomous software search program to enter a recursive loop. Such recursion may even be “infinite”, in the sense that the autonomous software search program might enter a repetitive process and may even be unable to end the process. [0064] As for the previous embodiment, more preferably, the operation of the present invention is adjusted to a particular structure of Web pages, as may optionally be found on a single Web site or other entity served by a particular Web server and/or dynamic Web page construction process or template. Such adjustment is most preferably performed by initially learning the structure of the Web pages, optionally by automatically scanning a plurality of Web pages produced with the same or similar structure. As previously described, these Web pages may optionally have the same originating template and/or may optionally be generated by the same construction process, for example. The present invention then learns how to detect and extracts specific elements, or fields, from the page, optionally assigning attributes to each field and optionally associating each field with an information object or an attribute of an information object defined in an information schema. The attributes of the fields are preferably defined either automatically or manually per set of pages that have the same or similar structure, and preferably are derived from the information schema. As previously described, these Web pages may optionally have the same originating template, for example. [0067] If the parameter is redundant, the Web pages may be expected to be similar, although perhaps not completely identical. Lack of identity may occur if the Web page includes one or more links with the complete URL as for a session ID. Alternatively, the Web page could be custom tailored according to user identifying information, for personalization. Other types of dynamic Web pages may also occur, which may optionally produce a plurality of similar but not completely identical Web pages. For that reason, the comparison function of the present invention preferably checks for similarity in content and more preferably produces a similarity level, which is the likelihood of the two Web pages to have the same content. If this value exceeds a certain threshold, then most preferably the removed parameter is considered to be redundant. [0070] The above process preferably produces instructions on a process for detecting redundant parameters in URLs with the same structure, in order to remove these redundant parameters as the normalization instructions. The above process is preferably executed once per URL structure, and the normalization instructions are then applied executed for application to each URL with the same structure. The term “URL structure” preferably includes the same parameters. The redundant parameters are preferably removed automatically before the Web page is retrieved and indexed by the search engine. [0072] The principles and operation of the method according to the present invention may be better understood with reference to the drawings and the accompanying description. [0073] Referring now to the drawings, FIG. 1 shows an illustrative system [0074] 10 for providing Web pages to a search engine from a server, directly or through an autonomous software search program. A gateway Web server 14 is connected to a database 22 that contains information about pages stored in Web server 16 or in a multitude of web servers. Such information includes the URL of the pages and optionally additional information about the pages, such as a weight parameter, page impression frequency etc. For example, the weight parameter could optionally be an indication of popularity of each Web page. For each page request submitted by search engine 24, either directly or alternatively through an autonomous software search program 20, gateway server 14 obtains a single web page from a Web server 16 or from database 22. A scheduling process determines which page would be served and from which Web server 16 (if there is more than one). This scheduler (scheduling process) may optionally use the weight parameter, or the page impression parameter to determine which page to serve next. Gateway server 14 then retrieves the page from Web server 16 or from database 22 (optionally from a local cache (not shown)), and serves the Web page to search engine 24 for indexing. This Web page is preferably some type of Web page that search engines cannot normally access using an autonomous software search program 20 without using such a system, such as dynamic pages for example. Web server 16 serves such Web pages according to the HTTP (HyperText Transfer Protocol) protocol. Web server 16 is connected to gateway Web server 14 through a network 18. Network 18 may be the Internet, for example. Gateway Web server [0075] 14 preferably features a database 22 for storing information about these Web pages or a copy of these pages. The Web pages are preferably modified before being placed in database 22 or before being served to the search engine/spider, such as autonomous search software program 20 or search engine 24 for example, by removing template-related problems from the Web page and/or by extracting specific elements from the Web page. This process extracts the unique content from the Web pages, thereby enabling autonomous software search program 20 and/or search engine 24 to access and index only the relevant content. It should be noted that such extracted content is sufficient for search engine 24 to index the Web page. Other page modifications may include adding of special tags in the HTML page for providing additional information about the Web page to search engine 24 (such as category of the page, popularity of the Web page etc.), modifying the title and description of the Web page and also modifying the URL of the page. Gateway server [0076] 14 also filters out error pages and “404” pages in order to prevent search engine 24 from indexing them. According to another optional but preferred embodiment of the present invention, more preferably all, but preferably at least a portion of, the links in the Web page are removed. Removal of such links may prevent autonomous software search program [0077] 20 from entering other Web pages, which may not be of interest or which may cause autonomous software search program 20 to enter a recursive loop. Such recursion may even be “infinite”, in the sense that autonomous software search program 20 might enter a repetitive process and may even be unable to end the process. Optionally and more preferably, autonomous software search program [0078] 20 is able to query gateway Web server 14 in order to obtain one or more additional Web pages for indexing. Most preferably, gateway Web server 14 stores information about Web pages which have already been provided to each specific autonomous software search program 20, in order to be able to provide new Web page(s) upon receiving each query from autonomous software search program 20. FIG. 2 is a flowchart of an exemplary method for providing Web pages to an autonomous software search program and/or search engine. As shown, in stage [0079] 1, the search engine/spider requests a page from the gateway. Next, in stage 2, the scheduler determines which page is next to serve. In stage 3, the Web page is retrieved from web server or local cache. In stage 4, the Web page is analyzed and processed. This process may optionally include any one or more of the following actions: removing the template information, extracting specific textual elements from the Web page, adding information to the Web page, removing links, and optionally modifying Web page or page URL. Next, in stage 5, Web page is served to the spider/search engine over HTTP protocol. In stage 6, the search engine indexes the page. FIG. 3 shows a flowchart of an exemplary method for extracting the unique content from a Web page, for example in order to serve the Web page to a search engine and/or autonomous search software program for indexing. This process is preferably invoked by an autonomous software search program and/or search engine for indexing the Web page, although alternatively the process could optionally be performed before such a request is received. [0080] As shown, in stage [0081] 1, the structure of the Web page is analyzed, optionally by automatically scanning a plurality of Web pages produced with the same structure. As previously described, these Web pages may optionally have the same template and/or generated by the same construction process, for example. The present invention then detects repeated patterns in the Web page, more preferably by parsing the HTML code, in stage 2. When this process is complete, a set of instructions is preferably produced to determine how repetitive elements and/or the template (or repeating elements) may be removed from the Web page, in order to extract only the unique information, in stage [0082] 3. These instructions are more preferably used for de-templating all of the Web pages with the same template and/or other similar structure before being indexed by the search engine, in stage 4. The unique content is preferably extracted automatically before the Web page is retrieved and indexed by the search engine in stage [0083] 5. FIG. 4 shows a flowchart of an exemplary method for extracting elements, or fields, from a Web page and constructing a structured representation of that information, for example in order to serve it to a search engine and/or autonomous search software program for indexing. [0084] As shown, in stage [0085] 1, the structure of the Web page is analyzed, optionally by automatically scanning a plurality of Web pages produced with the same or similar structure. As previously described, these Web pages may optionally have the same originating template, for example. The present invention then learns how to detect and extract specific elements, or fields, from the Web page, more preferably by parsing the HTML code (stage 2). When this process is complete, a set of instructions is preferably produced to determine how specific elements from the Web page can be detected, in order to extract them (stage [0086] 3). These instructions more preferably relate to all of the Web pages originating from the same template and/or have a similar structure. The set of instructions from stage [0087] 3 is used to detect and extract elements automatically in stage 4. These elements are used to create a structured representation of the content of the page, preferably in an XML format, in stage 5. This structure representation is served to a search engine, optionally using an autonomous software program, for indexing in stage 6. FIG. 5 shows a flowchart of an exemplary method for normalizing a URI, such as the URL of a Web page for example. Such normalization is optionally and preferably performed before the Web page or other document is submitted to the search engine and/or autonomous search software program for indexing as previously described. This process is optionally and preferably invoked by the autonomous software search program and/or search engine in order to decide whether, and optionally when, this Web page was previously indexed. The process is also preferably used to help the autonomous software search program and/or search engine to decide whether the Web page should be retrieved, for example for indexing. [0088] As shown, in stage [0089] 1, the Web page is preferably retrieved by using the complete URL to form an original Web page. In stage 2, each of the parameters is preferably removed and the Web page is retrieved again by using the reduced URL. The term “parameter” refers to any divisible subunit of the URL. In stage [0090] 3, this Web page is then compared with the original Web page. If the removed parameter(s) are not redundant, such that they are required for the correct retrieval of the original Web page, then the retrieved Web page would be completely different from the original Web page. If the parameter is redundant, the Web pages may be expected to be similar, although perhaps not completely identical. Lack of identity may occur if the Web page includes one or more links with the complete URL, as for a session ID. Alternatively, the Web page could be custom tailored according to user identifying information, for personalization. For that reason, the comparison function of the present invention preferably checks for similarity in content and more preferably produces a similarity level, which is the likelihood of the two Web pages to have the same content. If this value exceeds a certain threshold, then most preferably the removed parameter is considered to be redundant. [0091] According to preferred embodiments of the present invention, the level of similarity is determined according to visual similarity. Visual similarity is preferably determined according to two different types of parameters. A first type of parameter is based upon content of the document, such as text and/or images for example. A second type of parameter is based upon visual layout characteristics of the document, such as the presence of one or more GUI (graphical user interface) gadgets or the location of text and/or images, for example. More preferably, the level of similarity is determined by comparing content-based parameters between documents, rather than by comparing visual layout characteristics. The use of content-based parameters is preferred because similarity is preferably determined according to the actual content or “meaning” of a document, with regard to being submitted to a search engine and/or otherwise stored. The above process preferably produces instructions on a process for detecting redundant parameters in URLs with the same structure, in order to remove these redundant parameters as the normalization instructions. The above process is preferably executed once per URL structure, and the normalization instructions are then applied to each URL with the same structure. The term “URL structure” preferably includes any part of a URL having the same parameters, repeated for each such structure. Therefore, stages [0092] 1-3 are optionally and preferably repeated for each URL structure. Once a parameter and/or a URL structure has been identified as occurring repeatedly, optionally and preferably, stages 1-3 are not performed again for such repeated parameters and/or URL structures. In stage [0093] 4, these redundant parameters are more preferably removed. The redundant parameters are preferably removed automatically before the Web page is retrieved and indexed by the search engine in stage 5. According to other optional but preferred embodiments of the present invention, one or more methods that are described above can also optionally be used for a “feed” mechanism to a search engine. Each search engine that operates a feed program has a particular specification according to which the information about Web pages is to be transmitted to that search engine for the “feed”. Most search engines require the information to be transmitted as an XML file but optionally other formats could be used. [0094] Preferably, the method is performed as follows. First, preferably one or more fields are extracted from the Web pages such as book title, author, price, and review for example, more preferably according to the methods of FIGS. [0095] 3 or 4. The information which is to be extracted optionally and preferably includes information that is to be displayed in the search results, such as title, short description, link URL (the link behind the title) and display URL, which appears under the description; and/or information that is be indexed but not displayed, such as meta keywords and the content of the page. [0096] Next, the feed information is preferably automatically generated by using the extracted fields from each page. In order for such automatic generation to occur, the user preferably selects that output format, after which the user writes a template script that describes how to generate each feed element. For example, a template script for a page title may look like this: Buy $doc.title by $doc.author for only $doc.price [0097] Next, preferably all of the Web pages which belong to a collection are examined, for merging the template with the actual fields that were extracted from each document. [0098] Next, optionally and preferably the user is able to apply functions on the fields, such as convert to lower case, remove spaces, extract sub strings etc. [0099] Next, the feed information is preferably generated according to the template and is then sent to the search engine for example, through an ftp upload, email, or any other type of transmission mechanism. [0100] While the invention has been described with respect to a limited number of embodiments, it will be appreciated that many variations, modifications and other applications of the invention may be made. [0101] 1. A method for providing a Web page to a search engine, comprising: separating non-essential code from essential content of the Web page; extracting said essential content from the Web page; and providing said essential content of the Web page to the search engine. 2. The method of claim 1, wherein said extracting includes modifying the Web page by removing one or more links from the Web page. 3. The method of claim 1, wherein said extracting includes modifying the Web page by changing a URL address by deleting, adding or modifying parameters within this URL. 4. The method of any of claims 1-3, wherein the Web page is provided to an autonomous software search program, for being provided to the search engine. 5. The method of any of claims 1-4, wherein said extracting further comprises: determining a pattern of at least one repetitive element within at least the Web page; and extracting the unique content from the Web page according to said pattern. 6. The method of claim 5, wherein said pattern is determined by comparing a plurality of Web pages. 7. The method of claim 6, wherein said pattern is a template. 8. The method of claim 7, wherein the unique content is extracted by removing said template. 9. The method of any of claims 1-8, wherein said separating non-essential code from essential content further comprises: normalizing the URL for the Web page for said search engine. 10. The method of claim 9, wherein said normalizing comprises removing at least one redundant parameter from the URL to form a normalized URL. 11. The method of claim 9 or 10, wherein all redundant parameters are removed. 12. The method of claims 9-11, wherein each redundant parameter is removed by: removing a parameter from the URL to form a reduced URL; retrieving a new Web page according to said reduced URL; and comparing said new Web page and the Web page to determine similarity, such that similarity indicates that said parameter is redundant. 13. The method of claim 12, wherein similarity is determined according to content of said new Web page and the Web page. 14. The method of claim 12 or 13, wherein similarity is determined according to a quantitative comparison, such that if similarity is above a threshold, said parameter is redundant. 15. The method of claims 9-14 where the removal of parameters and the comparison of the content in order to determine redundancy of parameters is done either automatically or manually. 16. The method of any of claims 1-15, wherein said separating further comprises: providing at least one attribute for an information type, said at least one attribute being determined according to an information schema; identifying at least one field of the Web page; and associating said at least one field with at least one attribute. 17. The method of claim 16, wherein said at least one attribute comprises a weight factor for ranking the Web page by the search engine. examining a plurality of Web pages to perform a statistical analysis of said plurality of Web pages; and identifying at least one field of the Web page according to said statistical analysis. 19. A system for providing a Web page for indexing, comprising: (a) a gateway Web server for modifying the Web page for enabling indexing to be performed; and (b) a search engine for performing indexing. 20. The system of claim 19, further comprising: (c) an autonomous software search program for requesting the Web page from said gateway Web server and for providing the Web page to said search engine. 21. The system of claim 19 or 20, further comprising: (d) a scheduling process for selecting a Web page to be served to said search engine. 22. The system of claim 21, wherein said gateway Web server comprises said scheduling process. (e) a plurality of Web servers for serving the Web page, wherein said scheduling process selects one of said plurality of Web servers for serving the Web page. 24. A method for extracting unique content from a Web page, comprising: 25. The method of claim 24, wherein said pattern is determined by comparing a plurality of Web pages. 26. The method of claim 25, wherein said pattern is a template. 27. The method of claim 26, wherein the unique content is extracted by removing said template. 28. The method of any of claims 24-27, wherein the unique content is extracted before the Web page is provided to a search engine. 29. A method for extracting an element from a Web page for serving the element to a search engine, the method comprising: analyzing a structure of the Web page; learning to extract the element from the Web page; producing a set of instructions to extract the element; extracting the element from a plurality of Web pages; and creating a structured representation of the content of said plurality of Web pages for submission to the search engine. 30. The method of claim 29, wherein said analyzing is performed by automatically scanning a plurality of Web pages having at least a similar structure. 31. The method of claim 30, wherein said at least a similar structure is determined according to at least one of an originating template and a construction process. 32. The method of any of claims 29-31, wherein said learning further comprises parsing the HTML code of the Web page. 33. The method of any of claims 29-32, wherein said structured representation is in XML. 34. A method for feeding information about a plurality of Web pages to a search engine, comprising: extracting at least one field from the plurality of Web pages; automatically generating feed information for being fed to the search engine from said at least one field; receiving information about a template common to the plurality of Web pages; merging said template with said feed information; and transmitting said feed information to the search engine. 35. The method of claim 34, wherein said at least one field comprises at least one of information to be displayed in a search result including one of the plurality of Web pages and information to be indexed but not displayed. 36. The method of claim 34 or 35, wherein said automatically generating feed information comprises: selecting an output format for generating said feed information; and constructing a script for generating said feed information according to said template. 37. The method of claim 36, wherein said output format comprises XML. US10/486,196 2001-08-14 2002-08-14 System and method for extracting content for submission to a search engine Active 2026-03-04 US7809710B2 (en) US10/486,196 US7809710B2 (en) 2001-08-14 2002-08-14 System and method for extracting content for submission to a search engine PCT/IL2002/000669 WO2003017023A2 (en) 2001-08-14 2002-08-14 System and method for extracting content for submission to a search engine US12/897,437 Continuation US8495049B2 (en) 2001-08-14 2010-10-04 System and method for extracting content for submission to a search engine US10/486,196 Active 2026-03-04 US7809710B2 (en) 2001-08-14 2002-08-14 System and method for extracting content for submission to a search engine US20020103787A1 (en) * 2000-08-08 2002-08-01 Surendra Goel Category searching US20020103788A1 (en) * 2000-08-08 2002-08-01 Donaldson Thomas E. Filtering search results US20020103797A1 (en) * 2000-08-08 2002-08-01 Surendra Goel Displaying search results US20020103786A1 (en) * 2000-08-08 2002-08-01 Surendra Goel Searching content on web pages US20040003343A1 (en) * 2002-06-21 2004-01-01 Microsoft Corporation Method and system for encoding a mark-up language document US20040021682A1 (en) * 2002-07-31 2004-02-05 Pryor Jason A. Intelligent product selector US20040107266A1 (en) * 2002-03-25 2004-06-03 Tdk Corporation URL management system and URL management server US20040107423A1 (en) * 2002-11-27 2004-06-03 Fujitsu Limited Web server, Web server having function of Java servlet, and computer readable medium US20040181525A1 (en) * 2002-07-23 2004-09-16 Ilan Itzhak System and method for automated mapping of keywords and key phrases to documents US20060218143A1 (en) * 2005-03-25 2006-09-28 Microsoft Corporation Systems and methods for inferring uniform resource locator (URL) normalization rules US20060242118A1 (en) * 2004-10-08 2006-10-26 Engel Alan K Classification-expanded indexing and retrieval of classified documents WO2006132793A2 (en) 2005-05-31 2006-12-14 Google Inc. Learning facts from semi-structured text US20070130318A1 (en) * 2005-11-02 2007-06-07 Christopher Roast Graphical support tool for image based material US20070168465A1 (en) * 2005-12-22 2007-07-19 Toppenberg Larry W Web Page Optimization Systems US20070198481A1 (en) * 2006-02-17 2007-08-23 Hogue Andrew W Automatic object reference identification and linking in a browseable fact repository US20070299815A1 (en) * 2006-06-26 2007-12-27 Microsoft Corporation Automatically Displaying Keywords and Other Supplemental Information US20080010291A1 (en) * 2006-07-05 2008-01-10 Krishna Leela Poola Techniques for clustering structurally similar web pages US20080010292A1 (en) * 2006-07-05 2008-01-10 Krishna Leela Poola Techniques for clustering structurally similar webpages based on page features US20080104542A1 (en) * 2006-10-27 2008-05-01 Information Builders, Inc. Apparatus and Method for Conducting Searches with a Search Engine for Unstructured Data to Retrieve Records Enriched with Structured Data and Generate Reports Based Thereon US20080177588A1 (en) * 2007-01-23 2008-07-24 Quigo Technologies, Inc. Systems and methods for selecting aesthetic settings for use in displaying advertisements over a network US20080183870A1 (en) * 2002-03-07 2008-07-31 Man Jit Singh Clickstream analysis methods and systems US20080244681A1 (en) * 2007-03-30 2008-10-02 Gossweiler Richard C Conversion of Portable Program Modules for Constrained Displays US20090125529A1 (en) * 2007-11-12 2009-05-14 Vydiswaran V G Vinod Extracting information based on document structure and characteristics of attributes US20090204485A1 (en) * 2008-02-11 2009-08-13 Anthony Joseph Wills Systems and methods for selling and displaying advertisements over a network US20090259927A1 (en) * 2008-04-11 2009-10-15 Quigo Technologies, Inc. Systems and methods for video content association US20090265342A1 (en) * 2008-04-16 2009-10-22 Gary Stephen Shuster Avoiding masked web page content indexing errors for search engines US7634543B1 (en) * 2006-02-16 2009-12-15 Ironport Systems, Inc. Method of controlling access to network resources referenced in electronic mail messages US20090319484A1 (en) * 2008-06-23 2009-12-24 Nadav Golbandi Using Web Feed Information in Information Retrieval US20100036933A1 (en) * 2008-08-08 2010-02-11 Sprint Communications Company L.P. Dynamic Portal Creation Based on Personal Usage US20100169311A1 (en) * 2008-12-30 2010-07-01 Ashwin Tengli Approaches for the unsupervised creation of structural templates for electronic documents US20100228738A1 (en) * 2009-03-04 2010-09-09 Mehta Rupesh R Adaptive document sampling for information extraction US7809710B2 (en) 2001-08-14 2010-10-05 Quigo Technologies Llc System and method for extracting content for submission to a search engine US7831545B1 (en) 2005-05-31 2010-11-09 Google Inc. Identifying the unifying subject of a set of facts US7886217B1 (en) 2003-09-29 2011-02-08 Google Inc. Identification of web sites that contain session identifiers US7886032B1 (en) * 2003-12-23 2011-02-08 Google Inc. Content retrieval from sites that use session identifiers US7890639B1 (en) * 2002-01-30 2011-02-15 Novell, Inc. Method and apparatus for controlling access to portal content from outside the portal US7904554B1 (en) 2002-12-30 2011-03-08 Aol Inc. Supervising user interaction with online services US7966291B1 (en) 2007-06-26 2011-06-21 Google Inc. Fact-based object merging US7970766B1 (en) 2007-07-23 2011-06-28 Google Inc. Entity type assignment US7987421B1 (en) 2002-01-30 2011-07-26 Boyd H Timothy Method and apparatus to dynamically provide web content resources in a portal US7991797B2 (en) 2006-02-17 2011-08-02 Google Inc. ID persistence through normalization US8099780B2 (en) 2000-12-29 2012-01-17 Aol Inc. Message screening system US8122026B1 (en) 2006-10-20 2012-02-21 Google Inc. Finding and disambiguating references to entities on web pages US8239350B1 (en) 2007-05-08 2012-08-07 Google Inc. Date ambiguity resolution US8244689B2 (en) 2006-02-17 2012-08-14 Google Inc. Attribute entropy as a signal in object normalization US8346953B1 (en) 2007-12-18 2013-01-01 AOL, Inc. Methods and systems for restricting electronic content access based on guardian control decisions US8347202B1 (en) 2007-03-14 2013-01-01 Google Inc. Determining geographic locations for place names in a fact repository US8356097B2 (en) 2002-03-07 2013-01-15 Compete, Inc. Computer program product and method for estimating internet traffic US8548973B1 (en) * 2012-05-15 2013-10-01 International Business Machines Corporation Method and apparatus for filtering search results US8595146B1 (en) 2004-03-15 2013-11-26 Aol Inc. Social networking permissions US8650175B2 (en) 2005-03-31 2014-02-11 Google Inc. User interface for facts query engine with snippets from information sources that include query terms and answer terms US8682913B1 (en) 2005-03-31 2014-03-25 Google Inc. Corroborating facts extracted from multiple sources US8700568B2 (en) 2006-02-17 2014-04-15 Google Inc. Entity normalization via name normalization US8738643B1 (en) 2007-08-02 2014-05-27 Google Inc. Learning synonymous object names from anchor texts US8812435B1 (en) 2007-11-16 2014-08-19 Google Inc. Learning objects and facts from documents US8825856B1 (en) * 2008-07-07 2014-09-02 Sprint Communications Company L.P. Usage-based content filtering for bandwidth optimization US8843483B2 (en) 2012-05-29 2014-09-23 International Business Machines Corporation Method and system for interactive search result filter US8954580B2 (en) 2012-01-27 2015-02-10 Compete, Inc. Hybrid internet traffic measurement using site-centric and panel data US8996470B1 (en) 2005-05-31 2015-03-31 Google Inc. System for ensuring the internal consistency of a fact repository US9208229B2 (en) 2005-03-31 2015-12-08 Google Inc. Anchor text summarization for corroboration US9654575B1 (en) * 2016-05-18 2017-05-16 Crowdly, Inc. Pass-through web traffic systems and methods US9900395B2 (en) 2012-01-27 2018-02-20 Comscore, Inc. Dynamic normalization of internet traffic US10013702B2 (en) 2005-08-10 2018-07-03 Comscore, Inc. Assessing the impact of search results and online advertisements US10296919B2 (en) 2002-03-07 2019-05-21 Comscore, Inc. System and method of a click event data collection platform US20080215394A1 (en) * 2007-02-02 2008-09-04 Mclaughlin Timothy L System and method for qualification and approval of product placement marketing content US9009649B2 (en) * 2007-05-16 2015-04-14 Accenture Global Services Limited Application search tool for rapid prototyping and development of new applications US8099430B2 (en) * 2008-12-18 2012-01-17 International Business Machines Corporation Computer method and apparatus of information management and navigation GB2458005B (en) * 2009-02-12 2010-01-20 Gzero Ltd Removing non-essential programs identified by a server from memory EP2633432A4 (en) * 2010-10-26 2015-10-21 Hewlett Packard Development Co Extraction of content from a web page CN104392002B (en) * 2014-12-15 2017-09-26 中国科学院信息工程研究所 Near duplicate pages Finds a massive collection method US4683202A (en) * 1985-03-28 1987-07-28 Cetus Corporation Process for amplifying nucleic acid sequences US5316931A (en) * 1988-02-26 1994-05-31 Biosource Genetics Corp. Plant viral vectors having heterologous subgenomic promoters for systemic expression of foreign genes US5618699A (en) * 1992-03-31 1997-04-08 Kanebo Limited Plant virus vector, plasmid, process for expression of foreign gene and process for obtaining foreign gene product US5737734A (en) * 1995-09-15 1998-04-07 Infonautics Corporation Query word relevance adjustment in a search of an information retrieval system US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database US5802518A (en) * 1996-06-04 1998-09-01 Multex Systems, Inc. Information delivery system and method US5819271A (en) * 1996-06-04 1998-10-06 Multex Systems, Inc. Corporate information communication and delivery system and method including entitlable hypertext links US5835712A (en) * 1996-05-03 1998-11-10 Webmate Technologies, Inc. Client-server system using embedded hypertext tags for application and database development US5835087A (en) * 1994-11-29 1998-11-10 Herz; Frederick S. M. System for generation of object profiles for a system for customized electronic identification of desirable objects US5849526A (en) * 1996-10-15 1998-12-15 The Regents Of The University Of Michigan Use of linalool synthase in genetic engineering of scent production US5870559A (en) * 1996-10-15 1999-02-09 Mercury Interactive Software system and associated methods for facilitating the analysis and management of web sites US5871988A (en) * 1993-10-28 1999-02-16 Washington State University Research Foundation DNA encoding limonene synthase from Mentha spicata US5891697A (en) * 1997-09-25 1999-04-06 Washington State University Research Foundation Monoterpene synthases from common sage (Salvia officinalis) US5905862A (en) * 1996-09-04 1999-05-18 Intel Corporation Automatic web site registration with multiple search engines US5913214A (en) * 1996-05-30 1999-06-15 Massachusetts Inst Technology Data extraction from world wide web pages US5933822A (en) * 1997-07-22 1999-08-03 Microsoft Corporation Apparatus and methods for an information retrieval system that employs natural language processing of search results to improve overall precision US5948061A (en) * 1996-10-29 1999-09-07 Double Click, Inc. Method of delivery, targeting, and measuring advertising over networks US5958008A (en) * 1996-10-15 1999-09-28 Mercury Interactive Corporation Software system and associated methods for scanning and mapping dynamically-generated web documents US5983237A (en) * 1996-03-29 1999-11-09 Virage, Inc. Visual dictionary US5987457A (en) * 1997-11-25 1999-11-16 Acceleration Software International Corporation Query refinement method for searching documents US6035332A (en) * 1997-10-06 2000-03-07 Ncr Corporation Method for monitoring user interactions with web pages from web server using data and command lists for maintaining information visited and issued by participants US6078866A (en) * 1998-09-14 2000-06-20 Searchup, Inc. Internet site searching and listing service based on monetary ranking of site listings US6078916A (en) * 1997-08-01 2000-06-20 Culliss; Gary Method for organizing information US6169986B1 (en) * 1998-06-15 2001-01-02 Amazon.Com, Inc. System and method for refining search queries US6256633B1 (en) * 1998-06-25 2001-07-03 U.S. Philips Corporation Context-based and user-profile driven information retrieval US6256623B1 (en) * 1998-06-22 2001-07-03 Microsoft Corporation Network search access construct for accessing web-based search services US6269361B1 (en) * 1999-05-28 2001-07-31 Goto.Com System and method for influencing a position on a search result list generated by a computer network search engine US6308202B1 (en) * 1998-09-08 2001-10-23 Webtv Networks, Inc. System for targeting information to specific users on a computer network US20020010625A1 (en) * 1998-09-18 2002-01-24 Smith Brent R. Content personalization based on actions performed during a current browsing session US6356899B1 (en) * 1998-08-29 2002-03-12 International Business Machines Corporation Method for interactively creating an information database including preferred information elements, such as preferred-authority, world wide web pages US6366298B1 (en) * 1999-06-03 2002-04-02 Netzero, Inc. Monitoring of individual internet usage US6370527B1 (en) * 1998-12-29 2002-04-09 At&T Corp. Method and apparatus for searching distributed networks using a plurality of search devices US20020107735A1 (en) * 2000-08-30 2002-08-08 Ezula, Inc. Dynamic document context mark-up technique implemented over a computer network US6434561B1 (en) * 1997-05-09 2002-08-13 Neomedia Technologies, Inc. Method and system for accessing electronic resources via machine-readable data on intelligent documents US20020123912A1 (en) * 2000-10-31 2002-09-05 Contextweb Internet contextual communication system US6453315B1 (en) * 1999-09-22 2002-09-17 Applied Semantics, Inc. Meaning-based information organization and retrieval US6523026B1 (en) * 1999-02-08 2003-02-18 Huntsman International Llc Method for retrieving semantically distant analogies US6526440B1 (en) * 2001-01-30 2003-02-25 Google, Inc. Ranking search results by reranking the results based on local inter-connectivity US20030088554A1 (en) * 1998-03-16 2003-05-08 S.L.I. Systems, Inc. Search engine US6668256B1 (en) * 2000-01-19 2003-12-23 Autonomy Corporation Ltd Algorithm for automatic selection of discriminant term combinations for document categorization US6704727B1 (en) * 2000-01-31 2004-03-09 Overture Services, Inc. Method and system for generating a set of search terms US20040059708A1 (en) * 2002-09-24 2004-03-25 Google, Inc. Methods and apparatus for serving relevant advertisements US6754873B1 (en) * 1999-09-20 2004-06-22 Google Inc. Techniques for finding related hyperlinked documents using link-based analysis US20040172389A1 (en) * 2001-07-27 2004-09-02 Yaron Galai System and method for automated tracking and analysis of document usage US20050022115A1 (en) * 2001-05-31 2005-01-27 Roberts Baumgartner Visual and interactive wrapper generation, automated information extraction from web pages, and translation into xml US20050267872A1 (en) * 2004-06-01 2005-12-01 Yaron Galai System and method for automated mapping of items to documents US7174346B1 (en) * 2003-07-31 2007-02-06 Google, Inc. System and method for searching an extended database US7231399B1 (en) * 2003-11-14 2007-06-12 Google Inc. Ranking documents based on large data sets US7249121B1 (en) * 2000-10-04 2007-07-24 Google Inc. Identification of semantic units from within a search query US7689684B2 (en) * 1998-09-01 2010-03-30 Bigfix, Inc. Method and apparatus for inspecting the properties of a computer US7698427B2 (en) * 2001-07-30 2010-04-13 International Business Machines Corporation Method, system, and program for transferring data from an application engine US5649183A (en) * 1992-12-08 1997-07-15 Microsoft Corporation Method for compressing full text indexes with document identifiers and location offsets US5895470A (en) 1997-04-09 1999-04-20 Xerox Corporation System for categorizing documents in a linked collection of documents US6044376A (en) 1997-04-24 2000-03-28 Imgis, Inc. Content stream analysis US5848410A (en) * 1997-10-08 1998-12-08 Hewlett Packard Company System and method for selective and continuous index generation US6094649A (en) * 1997-12-22 2000-07-25 Partnet, Inc. Keyword searches of structured databases US6151624A (en) * 1998-02-03 2000-11-21 Realnames Corporation Navigating network resources based on metadata US6009431A (en) * 1998-03-31 1999-12-28 Northern Telecom Limited Methods and systems for generating an MIB file US6128655A (en) * 1998-07-10 2000-10-03 International Business Machines Corporation Distribution mechanism for filtering, formatting and reuse of web based content US6189003B1 (en) * 1998-10-23 2001-02-13 Wynwyn.Com Inc. Online business directory with predefined search template for facilitating the matching of buyers to qualified sellers EP2178007A3 (en) 1999-01-26 2010-08-25 Xerox Corporation Multi-modal information access IL134554D0 (en) 1999-02-16 2001-04-30 Quiver Ltd System and method for sharing bookmark information JP2000315173A (en) 1999-04-30 2000-11-14 Matsushita Electric Ind Co Ltd Memory control device US6493702B1 (en) 1999-05-05 2002-12-10 Xerox Corporation System and method for searching and recommending documents in a collection using share bookmarks US6253198B1 (en) 1999-05-11 2001-06-26 Search Mechanics, Inc. Process for maintaining ongoing registration for pages on a given search engine WO2000075814A1 (en) 1999-06-03 2000-12-14 Keylime Software, Inc. System and method for monitoring user interaction with web pages US6816857B1 (en) 1999-11-01 2004-11-09 Applied Semantics, Inc. Meaning-based advertising and document relevance determination US6377984B1 (en) * 1999-11-02 2002-04-23 Alta Vista Company Web crawler system using parallel queues for queing data sets having common address and concurrently downloading data associated with data set in each queue US6263364B1 (en) * 1999-11-02 2001-07-17 Alta Vista Company Web crawler system using plurality of parallel priority level queues having distinct associated download priority levels for prioritizing document downloading and maintaining document freshness US6434548B1 (en) * 1999-12-07 2002-08-13 International Business Machines Corporation Distributed metadata searching system and method AU2748901A (en) 1999-12-15 2001-06-25 Yellowbrix, Inc. Context matching system and method US7020679B2 (en) * 2000-05-12 2006-03-28 Taoofsearch, Inc. Two-level internet search service system US6876997B1 (en) 2000-05-22 2005-04-05 Overture Services, Inc. Method and apparatus for indentifying related searches in a database search system US7047229B2 (en) * 2000-08-08 2006-05-16 America Online, Inc. Searching content on web pages US6959326B1 (en) * 2000-08-24 2005-10-25 International Business Machines Corporation Method, system, and program for gathering indexable metadata on content at a data repository JP2002169834A (en) 2000-11-20 2002-06-14 Hewlett Packard Co <Hp> Computer and method for making vector analysis of document JP2003022376A (en) 2001-07-06 2003-01-24 Hitachi Ltd System and method for information-providing business US7007074B2 (en) 2001-09-10 2006-02-28 Yahoo! Inc. Targeted advertisements using time-dependent key search terms US7054857B2 (en) 2002-05-08 2006-05-30 Overture Services, Inc. Use of extensible markup language in a system and method for influencing a position on a search result list generated by a computer network search engine US8352499B2 (en) 2003-06-02 2013-01-08 Google Inc. Serving advertisements using user request information and user information US8438154B2 (en) 2003-06-30 2013-05-07 Google Inc. Generating information for online advertisements from internet data and traditional media data US7647299B2 (en) 2003-06-30 2010-01-12 Google, Inc. Serving advertisements using a search of advertiser web information US20050149499A1 (en) 2003-12-30 2005-07-07 Google Inc., A Delaware Corporation Systems and methods for improving search quality 2002-08-14 WO PCT/IL2002/000669 patent/WO2003017023A2/en not_active Application Discontinuation 2002-08-14 AU AU2002326118A patent/AU2002326118A1/en not_active Abandoned US4683202B1 (en) * 1985-03-28 1990-11-27 Cetus Corp US7523103B2 (en) 2000-08-08 2009-04-21 Aol Llc Category searching US7359951B2 (en) 2000-08-08 2008-04-15 Aol Llc, A Delaware Limited Liability Company Displaying search results US7970750B2 (en) 2000-08-08 2011-06-28 Aol Inc. Category searching US9116966B2 (en) 2000-08-08 2015-08-25 Microsoft Technology Licensing, Llc Displaying search results US7984061B1 (en) 2000-08-08 2011-07-19 Aol Inc. Displaying search results US7007008B2 (en) 2000-08-08 2006-02-28 America Online, Inc. Category searching US20060184515A1 (en) * 2000-08-08 2006-08-17 America Online, Inc., A Delaware Corporation Category searching US7225180B2 (en) 2000-08-08 2007-05-29 Aol Llc Filtering search results US20090177655A1 (en) * 2000-08-08 2009-07-09 Aol Llc Category searching US7558805B2 (en) 2000-08-08 2009-07-07 Aol Llc Searching content on web pages US8776222B2 (en) 2000-12-29 2014-07-08 Facebook, Inc. Message screening system US9083666B2 (en) 2000-12-29 2015-07-14 Facebook, Inc. Message screening system utilizing supervisory screening and approval US8495049B2 (en) 2001-08-14 2013-07-23 Microsoft Corporation System and method for extracting content for submission to a search engine US8095621B2 (en) * 2002-03-07 2012-01-10 Compete, Inc. Systems and methods for clickstream analysis to modify an off-line business process involving automobile sales US9123056B2 (en) 2002-03-07 2015-09-01 Compete, Inc. Clickstream analysis methods and systems related to modifying an offline promotion for a consumer good US9501781B2 (en) 2002-03-07 2016-11-22 Comscore, Inc. Clickstream analysis methods and systems related to improvements in online stores and media content US8626834B2 (en) * 2002-03-07 2014-01-07 Compete, Inc. Clickstream analysis methods and systems related to modifying an offline promotion for a consumer good US8055709B2 (en) * 2002-03-07 2011-11-08 Compete, Inc. Systems and methods for clickstream analysis to modify an off-line business process involving product pricing US20110015982A1 (en) * 2002-03-07 2011-01-20 Man Jit Singh Clickstream analysis methods and systems related to modifying an offline promotion for a consumer good US7669120B2 (en) * 2002-06-21 2010-02-23 Microsoft Corporation Method and system for encoding a mark-up language document US9946788B2 (en) 2002-07-23 2018-04-17 Oath Inc. System and method for automated mapping of keywords and key phrases to documents US8533587B2 (en) * 2002-11-27 2013-09-10 Fujitsu Limited Web server, web server having function of Java servlet, and computer readable medium USRE45558E1 (en) 2002-12-30 2015-06-09 Facebook, Inc. Supervising user interaction with online services US8051109B2 (en) 2004-10-08 2011-11-01 Paterra, Inc. Classification-expanded indexing and retrieval of classified documents US20100017400A1 (en) * 2004-10-08 2010-01-21 Paterra, Inc. Classification-Expanded Indexing and Retrieval of Classified Documents US7680785B2 (en) * 2005-03-25 2010-03-16 Microsoft Corporation Systems and methods for inferring uniform resource locator (URL) normalization rules US7769579B2 (en) 2005-05-31 2010-08-03 Google Inc. Learning facts from semi-structured text US20060293879A1 (en) * 2005-05-31 2006-12-28 Shubin Zhao Learning facts from semi-structured text WO2006132793A3 (en) * 2005-05-31 2007-02-08 Google Inc Learning facts from semi-structured text US9558186B2 (en) 2005-05-31 2017-01-31 Google Inc. Unsupervised extraction of facts US9092495B2 (en) 2006-01-27 2015-07-28 Google Inc. Automatic object reference identification and linking in a browseable fact repository US10223406B2 (en) 2006-02-17 2019-03-05 Google Llc Entity normalization via name normalization US7664740B2 (en) * 2006-06-26 2010-02-16 Microsoft Corporation Automatically displaying keywords and other supplemental information US8046681B2 (en) 2006-07-05 2011-10-25 Yahoo! Inc. Techniques for inducing high quality structural templates for electronic documents US7680858B2 (en) * 2006-07-05 2010-03-16 Yahoo! Inc. Techniques for clustering structurally similar web pages US7676465B2 (en) 2006-07-05 2010-03-09 Yahoo! Inc. Techniques for clustering structurally similar web pages based on page features US20080072140A1 (en) * 2006-07-05 2008-03-20 Vydiswaran V G V Techniques for inducing high quality structural templates for electronic documents US9892132B2 (en) 2007-03-14 2018-02-13 Google Llc Determining geographic locations for place names in a fact repository US9009589B2 (en) * 2007-03-30 2015-04-14 Google Inc. Conversion of portable program modules for constrained displays US8412571B2 (en) 2008-02-11 2013-04-02 Advertising.Com Llc Systems and methods for selling and displaying advertisements over a network US8726146B2 (en) 2008-04-11 2014-05-13 Advertising.Com Llc Systems and methods for video content association US9405831B2 (en) 2008-04-16 2016-08-02 Gary Stephen Shuster Avoiding masked web page content indexing errors for search engines US8463896B2 (en) 2008-08-08 2013-06-11 Sprint Communications Company L.P. Dynamic portal creation based on personal usage US6928425B2 (en) 2005-08-09 System for propagating enrichment between documents US8135725B2 (en) 2012-03-13 System and method for providing tag-based relevance recommendations of bookmarks in a bookmark and tag database KR101063364B1 (en) 2011-09-07 A system and method for prioritizing Web site for the Web crawl process US7293017B2 (en) 2007-11-06 Presentation-level content filtering for a search result US8825471B2 (en) 2014-09-02 Unsupervised extraction of facts US6910071B2 (en) 2005-06-21 Surveillance monitoring and automated reporting method for detecting data changes US6618717B1 (en) 2003-09-09 Computer method and apparatus for determining content owner of a website US8122026B1 (en) 2012-02-21 Finding and disambiguating references to entities on web pages US6820075B2 (en) 2004-11-16 Document-centric system with auto-completion CN101185074B (en) 2010-06-23 User interface for facts query engine with snippets from information sources that include query terms and answer terms EP2057557B1 (en) 2019-03-20 Joint optimization of wrapper generation and template detection JP5065584B2 (en) 2012-11-07 Application programming interface for text mining and search US6247021B1 (en) 2001-06-12 Searchable bookmark sets as an internet advertising medium US7493322B2 (en) 2009-02-17 System and method for computing a measure of similarity between documents US6401118B1 (en) 2002-06-04 Method and computer program product for an online monitoring search engine US7231381B2 (en) 2007-06-12 Media content search engine incorporating text content and user log mining US8060518B2 (en) 2011-11-15 System and methodology for extraction and aggregation of data from dynamic content CN101031915B (en) 2013-10-23 Method and system for enhancing first document US8204881B2 (en) 2012-06-19 Information search, retrieval and distillation into knowledge objects US6959326B1 (en) 2005-10-25 Method, system, and program for gathering indexable metadata on content at a data repository EP1202187B1 (en) 2007-08-01 Image retrieval system and methods with semantic and feature based relevance feedback JP5705497B2 (en) 2015-04-22 Method and system for mixing into one search result search engine results from different sources US7290061B2 (en) 2007-10-30 System and method for internet content collaboration US7912868B2 (en) 2011-03-22 Advertisement placement method and system using semantic analysis US7505956B2 (en) 2009-03-17 Method for classification Owner name: QUIGO TECHNOLOGIES, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GALAI, YARON;ITZHAK, ODED;REEL/FRAME:015350/0122 Owner name: QUIGO TECHNOLOGIES LLC, NEW YORK Free format text: NAME CHANGE;ASSIGNOR:QUIGO TECHNOLOGIES, INC.;REEL/FRAME:022080/0562 Owner name: BANK OF AMERICAN, N.A. AS COLLATERAL AGENT,TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:AOL INC.;AOL ADVERTISING INC.;BEBO, INC.;AND OTHERS;REEL/FRAME:023649/0061 Owner name: BANK OF AMERICAN, N.A. AS COLLATERAL AGENT, TEXAS Owner name: LIGHTNINGCAST LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Owner name: YEDDA, INC, VIRGINIA Owner name: AOL INC, VIRGINIA Owner name: NETSCAPE COMMUNICATIONS CORPORATION, VIRGINIA Owner name: SPHERE SOURCE, INC, VIRGINIA Owner name: MAPQUEST, INC, COLORADO Owner name: TRUVEO, INC, CALIFORNIA Owner name: GOING INC, MASSACHUSETTS Owner name: AOL ADVERTISING INC, NEW YORK Owner name: TACODA LLC, NEW YORK Owner name: ADVERTISING.COM LLC, VIRGINIA Free format text: MERGER;ASSIGNOR:QUIGO TECHNOLOGIES LLC;REEL/FRAME:028362/0422 Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AOL INC.;REEL/FRAME:028869/0017
cc/2019-30/en_middle_0012.json.gz/line1528
__label__cc
0.626389
0.373611
How Robert Mueller’s Democrats are attacking Trump’s kids will make you sick Robert Mueller’s done it. This time he’s gone too far. His gang of angry Democrats scary attack on Donald Trump’s kids has everyone on edge. Word just leaked that rogue prosecutor Robert Mueller is investigating Donald Trump, Jr. and Ivanka Trump for their work on a failed 2013 deal to build a Trump Tower in Moscow. Former Trump fixer Michael Cohen pleaded guilty to lying to Congress about when a proposed Trump Tower deal in Moscow fell apart during the 2016 campaign. Donald Trump, Jr. previously testified he was aware of this deal. So Mueller is going back even further to investigate legitimate business deals to frame the Trump family for being in league with the Russians. Yahoo News Reports: Mueller’s interest in the Trump family real estate company’s plans for a skyscraper in Russia was confirmed on Thursday when Michael Cohen, the president’s former attorney and fixer, pleaded guilty to lying to Congress about the proposed deal. In charging documents, Mueller said Cohen falsely claimed that the effort to build a Trump Tower Moscow “ended in January 2016” in an attempt to “minimize” links between Trump and the project and to “give the false impression” the effort ended before the Republican primaries in 2016. Yahoo News first reported in May that congressional investigators had obtained text messages and emails showing Cohen’s work on Trump Tower Moscow continued for longer than he admitted under oath. But Cohen wasn’t the only person at the Trump Organization who was pursuing deals to build a skyscraper in the Russian capital. Multiple sources have confirmed to Yahoo News that the president’s elder daughter, Ivanka, who is now a top White House adviser, and his eldest son, Don Jr., were also working to make Trump Tower Moscow a reality. The sources said those efforts were independent of Cohen’s work on the project. One of the sources said Ivanka was also involved in Cohen’s efforts. And a separate source familiar with the investigation told Yahoo News that Mueller has asked questions about Ivanka and Don Jr.’s work on Trump Tower Moscow. Mueller digging around Trump’s legitimate business dealings proves this investigation is a witch hunt. If he had the goods on collusion he would have produced them. Instead he is reduced to terrorizing a man’s children because he won an election everyone thought belonged to Hillary Clinton. PULSE POLL: Did Robert Mueller cross the line investigating Trump’s kids?* Tags: Donald TrumpDonald Trump Jr.Ivanka TrumpRobert MuellerRussia CollusionTrump Tower This federal court just handed a decision that took Nancy Pelosi completely by surprise by Federalist · Published May 8, 2019 This poll just unraveled Barack Obama’s entire presidency by Jeffersonian · Published June 5, 2018 Robert Mueller just flipped a whistleblower that is bad news for Trump by Federalist · Published January 29, 2019 Wanda Weaver Carter says: They should all crawl back in the hole they came out of and let PresTrump do his job thst he was voted to do. Take Mueller and all the democrats with him that are so agianst him and flag too. EaglesFly. says: To: Betty, &&& To Whom Are you “spawn’” ??? Please Respect Your Mother & Father. Would they be ‘proud’ of you now ??? Philip Simon says: Robert Mueller is a anti-family, marriage human wasted dirt bag. ROBERTINO M. Destroy all America. He is Try tray Make the war in US. Does Mueller have any children or family? Maybe it is time to take a page from Maxine Waters strategy book and start confronting them in public, at restaurants, on the street, at church, the grocery store or wherever. Or maybe not, because then we would be just like them! It is utterly insane that Democrats and their whacky Lefties embrace the hypocritical fallacy that good is evil and anything bad is good. Actions and subsequent events that are perfectly legal for the common folk to engage in is somehow illegal and a crime if a politician does it! When this is pointed out, rather than say, “sorry, we were mistaken”, they double down to manufacture falsehood and then try to justify it into being good and “the law”. The insane are trying to govern the normal but they are desperate to convince the normal that insanity is normal! Eric Granberg says: Donald Trump Jr is 40. Ivanka Trump is 37. Yes they act like spoiled children. But, while they certainly are spoiled, they are NOT children., and they deserve what is coming. BTW, here is the first line of a song I am writing. It is written from the point of view of America, and is called the 12 Days of Trumpmas: On the First Day of Trumpmas the Fake POTUS took from me, a billion Rubles for a Ruskie. Here is the second line. On the Second Day of Trumpmas the Fake POTUS took from me, two years of honor, and a billion rubles for a Ruskie. Third line is: On the third Day of Trumpmas the Fake POTUS took from me, three sacred goals, two years of honor, and a billion Rubles for a Ruskie. Fourth line. On the Fourth Day of Trumpmas the Fake POTUS took from me, four trillion dollars, three sacred goals, two years of honor, and a billion Rubles for a Ruskie. Fifth line. On the Fifth Day of Trumpmas the Fake POTUS took from me, five tons of gold, four trillion dollars, three sacred goals, two years of honor, and a billion Rubles for a Ruskie . Sixth line. On the Sixth Day of Trumpmas the Fake POTUS took from me, six years of safety, five tons of gold, four trillion dollars, three sacred goals, two years of honor, and a billion Rubles for a Ruskie. Last six lines coming. Once I finish writing them I will create a video and post it on YouTube. Ernst says: I am extremely grateful to President Trump for keeping the vicious, brutal, nasty, lawless Hillary Clinton out of the US Presidency! Thank you, Donald Trump! Lola Collins says: Sorry, but your ”song” is the most ridiculous song EVER! Do NOT waste your time putting it out for more people to CRINGE over! Lola Collins, I agree, Eric Granberg and his song are stupid culls. He should not give up his job or welfare benefits, which ever applies, togo into the song writing business! Daev says: Hey all! Don’t respond to this troll. It only makes them feel important. scooch the pooch* says: Hey Granberg, MUST Correct The 1st 6 days of Trumpmas, BEFORE.the next days. What the heck Areyou 0n??? Whatever ‘it’ IS, Got you ‘lost’ for a Continuance. lol ] > ‘milkbone lapdogs’ are ‘comfy’ neath the tree. Tuck up. eric, fold your paws. You Safe. Mark H Giles says: Fake POTUS hmm you mean like obama who couldn’t legally have the job? And talking about Rubles all I’ll say there is Hillary and uranium. Finally, when you were born, did you shot out of your mother and hit a wall head first, get picked up by the doctor who then dropped you on the floor then get beaten around the head and shoulders by an full enema bag? I can see that you are angry but I can assure you to get an average length of a pe&&& there has to be an equal amount of mean like you that wear strings so they can find it for play time. You are liberal moron, you should enjoy your freedom because the right party is in power Ron, Eric Granberg is a troll, probably being paid everytime “we” hit the reply button and respond to him. I am done replying to the idiot! If we “can” ignore him, he will become a lonely liberal and find another hobby. Eric Branberg, You are a total piece of cow manure. without a brain in your head. You make the Democrats proud because all of you are full of the same thing! Worthless cow manure!! Margo Sommerfeld says: To all the Betty’s in our country, do you have any idea what the Clintons have been involved in? Obviously not. She and the hubby have made their fortune off this country and that is just the mild part. She is the Devil’s handmaiden and God saved America by giving us Donald Trump. Why him you say? God knew that he would never give up. Think about it. Trump has faced nothing but opposition since before he was elected and he continues to fight on. He is bringing America back to prosperity and goodness, but most of all. back to God. In other words, he is saving us. The truth is starting to come out about what has been going on in this country for years and years. It will be shocking, but try to be open-minded. Though you don’t believe it now, Trump is actually the good one, leading us to a better, safer, more successful and more just America. Have faith in God’s plan! AMEN , and thank you! JackHandy says: Merry Christmas *** Happy New Year. ~j~ Carl Smith says: After 40,000,000.00 I offer that Mueller will find a Crime to prosecute no matter how many good people he has to ruin to get his objective. If he was really interested in Russian Collusion the evidence has been in front of him for over 20 months. Remember his task now is to supply the NEW House with enough paper to keep them busy seeking Impeachment or anything to destroy the Trump name including his family. 90% of the people on the planet can be very sophisticated, creative composers of any tale that appeases the oppressor, when their livelihood is at stake. I could weave a story even the ONE could buy and the ONE was an expert liar. trapperwv1 says: When are old school democrats , republicans, independents, and all non affiliated elected officials and voters demand a stop to the only agenda of sitting democrats to take down the sitting POTUS is put to a stop and get on with representing the majority of Americans and fix the problems their obstruction has caused. I want Trump to declassify all the information on Mueller,Obama,Hillary,Comey, Holder, and the rest of Obama’s administration thugs. Navy PO2 says: Robert Mueller is just another toady for the Demoncrats! Robert Mueller identifies as a Republican. Deadbeat Trump’s kids at their ages can or should be able to take care of themselves. Still waiting for my Trump Steaks. Donald Trump’s kids work. Trump’s father put him to work in the building trade business, and put him out there with the actual workers, so he could learn what it is like to WORK, and Trump relates to the workers as much as he does with business people. Now he works long hours, and is determined to fix what obama had broken. The only difference is the amount of money involved. How much money have you earned in your life? Lucy More says: The american people are sick and tired of this witch hunt. The story is now overly exhausted beyond repair. Let this Monster Mueller end his charade. Got to pasture…retire with your fat pension…Creep.! I’m not Deadbeat Trump is a punk. Braindead Americans who are sheeple will sell their souls for whatever is being offered . The truth is hard to swallow . A nation that preys on its most innocent of us all is set to be destroyed . Our country and our people are under attack from within by our very own people . The democrats push abortions so they can sell the baby parts . Ask yourself why the Food and drug agency needs to buy those parts . They claim it’s research . Thank Gid Trump stopped that . They are not about research . What they did was allow PepsiCo ( which was in court to do so) put baby parts in all their products .And yet people still vote for every stupid democrat to be put back in . Wake up people your body is being arranged from the inside . Thank God for the business man who takes the crap they dish out . When he takes no salary and he stands before us . What they are doing is not just against our President but to us . This is for all the Jacks, Richards & Bettys out there. I found this extremely enlightening especially because it was written by a real, accomplished journalist…not fake. Trump Does The Unthinkable – Liz Crokin Journalist Liz Crokin shares her perspective on Trump. This is a perspective a lot of people don’t want published; it certainly draws fire on the main stream media for the language used by Democrats — which they are perpetuating Donald Trump is a racist, bigot, sexist, xenophobe, anti-Semitic and Islamophobe — did I miss anything? The left and the media launch these hideous kinds of attacks at Trump everyday; yet, nothing could be further from the truth about the real estate mogul. As an entertainment journalist, I’ve had the opportunity to cover Trump for over a decade, and in all my years covering him I’ve never heard anything negative about the man until he announced he was running for president. Keep in mind, I got paid a lot of money to dig up dirt on celebrities like Trump for a living so a scandalous story on the famous billionaire could’ve potentially sold a lot of magazines and would’ve been a “Huge” feather in my cap. Instead, I found that he doesn’t drink alcohol or do drugs, he’s a hardworking businessman and totally devoted to his beloved wife and children. On top of that, he’s one of the most generous celebrities in the world with a heart filled with more gold than his $100 million New York penthouse. In 2004, the first season of “The Apprentice” aired and at that time I worked as an entertainment columnist for the “Red Eye Edition of the Chicago Tribune” and as a freelancer for “Us Weekly”. I had a gut feeling that Chicago contestant, Bill Rancic, was going to win the reality show. So I contacted him and covered the hit show the entire season. I managed to score an invite to New York for the show’s grand finale and after-party. This is where I first met Trump and got to ask him a few questions. That year, Rancic did win “The Apprentice”. I attended “The Apprentice” finale the next two years in a row. Between that and the frequent visits Trump and his family made to Chicago during the construction of their Trump International Hotel & Tower,….. I got a chance to meet most of his family too and I’ve had nothing but positive experiences with them. Since the media has failed so miserably at reporting the truth about Trump, I decided to put together some of the acts of kindness he’s committed over three decades which has gone virtually unnoticed or fallen on deaf ears. In 1986, Trump prevented the foreclosure of Annabell Hill’s family farm after her husband committed suicide. Trump personally phoned down to the auction to stop the sale of her home and offered the widow money. Trump decided to take action after he saw Hill’s pleas for help in news reports. In 1988, a commercial airline refused to fly Andrew Ten, a sick Orthodox Jewish child with a rare illness, across the country to get medical care because he had to travel with an elaborate life-support system. His grief stricken parents contacted Trump for help and he didn’t hesitate to send his own plane to take the child from Los Angeles to New York so he could get his treatment. In 1991, 200 Marines who served in Operation Desert Storm spent time at Camp Lejeune in North Carolina before they were scheduled to return home to their families. However, the Marines were told that a mistake had been made and an aircraft would not be able to take them home on their scheduled departure date. When Trump got wind of this, he sent his plane to make two trips from North Carolina to Miami to safely return the Gulf War Marines to their loved ones. In 1995, a motorist stopped to help Trump after the limo he was traveling in got a flat tire. Trump asked the Good Samaritan how he could repay him for his help. All the man asked for was a bouquet of flowers for his wife. A few weeks later Trump sent the flowers with a note that read: “We’ve paid off your mortgage.” In 1996, Trump filed a lawsuit against the city of Palm Beach, Florida accusing the town of discriminating against his Mar-a-Lago resort club because it allowed Jews and blacks. Abraham Foxman, who was the Anti-Defamation League Director at the time, said Trump “put the light on Palm Beach – not on the beauty and the glitter, but on its seamier side of discrimination. Foxman also noted that Trump’s charge had a trickle-down effect because other clubs followed his lead and began admitting Jews and blacks. In 2000, Maury Povich featured a little girl named Megan who struggled with Brittle Bone Disease on his show and Trump happened to be watching. Trump said the little girl’s story and positive attitude touched his heart. So he contacted Maury and gifted the little girl and her family with a very generous check. In 2008, after Jennifer Hudson’s family members were tragically murdered in Chicago, Trump put the Oscar-winning actress and her family up at his Windy City hotel for free. In addition to that, Trump’s security took extra measures to ensure Hudson and her family members were safe during such a difficult time. In 2013, New York bus driver Darnell Barton spotted a woman close to the edge of a bridge staring at traffic below as he drove by. He stopped the bus, got out and put his arm around the woman and saved her life by convincing her to not jump. When Trump heard about this story, he sent the hero bus driver a check simply because he believed his good deed deserved to be rewarded. In 2014, Trump gave $25,000 to Sgt. Andrew Tamoressi after he spent seven months in a Mexican jail for accidentally crossing the US-Mexico border. President Barack Obama couldn’t even be bothered to make one phone call to assist with the United States Marine’s release; however, Trump opened his pocketbook to help this serviceman get back on his feet. In 2016, Melissa Consin Young attended a Trump rally and tearfully thanked Trump for changing her life. She said she proudly stood on stage with Trump as Miss Wisconsin USA in 2005. However, years later she found herself struggling with an incurable illness and during her darkest days she explained that she received a handwritten letter from Trump telling her she’s the “bravest woman, I know.” She said the opportunities that she got from Trump and his organizations ultimately provided her Mexican-American son with a full-ride to college. Lynne Patton, a black female executive for the Trump Organization, released a statement in 2016 defending her boss against accusations that he’s a racist and a bigot. She tearfully revealed how she’s struggled with substance abuse and addiction for years. Instead of kicking her to the curb, she said the Trump Organization and his entire family loyally stood by her through “immensely difficult times.” Donald Trump’s kindness knows no bounds and his generosity has and continues to touch the lives of people from every sex, race and religion. When Trump sees someone in need, he wants to help. Two decades ago, Oprah asked Trump in a TV interview if he’d run for president. He said: “If it got so bad, I would never want to rule it out totally, because I really am tired of seeing what’s happening with this country.” That day has come. Trump sees that America is in need and he wants to help – how unthinkable! Lunchladie says: For an investigation that was set up to investigate Russian collusion by Trump Mueller sure has gotten extremely side tracked. Maybe he forgot what he was suppose to be doing!? He has investigate everyone and their brother and HAS NOT come up with collusion!!! He comes up with alleged tax issues, money laundering. And a dozen other charges. He badgers people he questions to get plea deals – to the point he wants them to lie. He has a vendetta against Trump he is bias and has absolutely NO business in this investigation. He was a participant in the uranium deal and is buddy buddy with the Clintons and the Obamas. Time for this farce to be DONE!!! Julie Renee Patterson says: Thank you for sharing these good deeds. People need to know these things Thank you for putting this information out! I have posted some of these stories every since Trump started his campaign. I have heard about him for decades, since there was an extensive article about him in one of the older magazines. How sad that so many have not bothered to find the truth. I’ve defended him on many websites, only to not be believed. BUT, I still persevere, determined not to give up! The cruel media has caused many viewers to be non-believers in a caring man. He is not perfect, but he is perfect as or president. Dorothy says: Betty! Classy Hillary? Really? Falling down drunk/drug addict? This is what you want for our president? I thank God we escaped the leadership of this she devil. He is part of the deep state. We need to investigate him. All Democrats. Against tTrump. Not a fair investigation ruining America MReeves says: Mueller has found nothing and this is the only tact he knows to use. Nothing fair or balanced in this investigation. A waste of taxpayer money but the Democrats don’t care as they are use to using and wasting other people’s money and blaming Republicans for it. Mueller go to hell and stay; and take hellary with you. Anything bad that happens to d. trump’s kids cannot be all bad. After after, they’re the Spawn Of That Sick Minded Pile Of Walking Talking Gutter Trash & they certainly benefit the most from All Of His Two Faced Lying! . Randall M says: Betty, You are one warped individual. What world do you live in? Agree 100% Randall Betty, You are evil and will be destroyed! Stupid broad!! You If you are the future of America—GOD help us all. MReeves, BETTY IS CRAZY LIBERAL TROLL, PROBABLY A PAID TROLL! DSC says: Yeah well at least he never got head in the oval office. Yeah, that’s something to be proud of. You are one hateful person. All you do is name calling. You need to start praying. Betty, &&& To Whom Are you the ‘spawn’ ??? This so-called investigation does not even resemble an investigation. It is the Mueller Persecution Probe. It is simply for the persecution of anyone who supported President Trump for president. They have one goal, destroy the Republican Party, justice be damned! There has never been a special investigation like this one. Mueller is wanting to destroy as many lives as possible. He is looking to persecute anyone for anything, a man who was FBI director when Russia was allowed to purchase a lot of our uranium resources and never lifted a finger to investigate the deal. It does not take a genius to figure out where this man’s loyalty lies. He is a man who believes in the maxim, ‘the ends justify the means.;’ Lawyers do not investigate! And it shows with this crew of Mueller’s. There is a time for living and then there is a time to die. MY2Cents says: President Trump ,declassify now and send this out of control Hil LIAR ry protectinggroup of thugs to prison where they belong. Better Yet, send CRAZY DONALD & D for DUMB trump right where he belongs, In A Padded Cell in a Maxium Security Mental Hospital For The Criminally Insane! Betty bitch, You just keep on, you got it coming! The only thing you are doing is digging a deeper hole …….for yourself! Monday and Dec5th, Boom! You would know from first hand experience what those cells are like I am sure. Our country is under attack from our boarders and from with-in from the promoted gang violence and Deep State threat. The left’s agenda is to tear down what our forefathers fought and died for to preserve and protect. The United States it’s Constitution, The Honorable American People and our rights and heritage along with our laws. It has been so obvious with the graft,lies, broken law and simply total disrespect for the Freedom and will of The American People. As an American Citizen and proud of my country it’s Flag and our National Anthem and my freedom. I would support and defend my family and neighbors and beloved country with any means necessary. Americans I think it’s time we asked our President Donald Trump to declare Martial Law to protect our freedom and rights and finally clean up this mess once and for all. I feel like most of other Americans that we have a Patriotic, Honorable American as our President that can do the job we so desperatly need and he truely represents the will of the American People. We The People Are Still Here Craig, I Agee on the martial law. If martial law were declared a military tribunal would handle the trials for the lawless and the corrupt judges would be bypassed, at which point those guilty would be put behind bars where they belong (Gitmo would be great). Martial law is not to be called for lightly. I would say it is a last and final resort to prevent total takeover by a hostile domestic enemy. Martial law can get out of hand very quickly. Research the Kent State Massacre. Harmon Wheeler says: why don’t he check out the real reason for t he conclusion . it’s known fact that the Clinton’s paid for the Russian conclusion . example fbi director comey was trial lawyer, judge, jury, he was all that. no telling how much money was passed in his favor. to me he is a traitor and should be punished. this is my personal feelings. as freedom of speech. Stubby says: BTW, Richard I agree with James, you’re an idiot. So true. Let’s not forget Betty! But you can’t talk to these types of people. They just like to call people bad names and have little to no intelligence! A witch hunt, Mueller is trying to convolute and twist anything he can to make it appear there was any kind of illicit activity going on. Amazing how he has been searching for nearly two years and hasn’t uncovered a shred of evidence tying Trump to any collusion with Russia? That’s because it doesn’t exist! Please stop spending my hard earned tax dollars on this nonsense. If the Demonrats want to keep searching maybe all these rich left wing idiots like Bloomberg and the Hilldebeast can throw their own money down the poilet. James P Hutchins says: By the way Richard you are a moron. mueller is a liberal pinhead clown like all liberals are fakes and liers release the Fisa warrants for the democrats and the obama administration and the clintons lock them up. Anthony Manzo says: Mueller and his team are the example of complete EVIL. It is time for JUSTICE. It is time to start INVESTIGATING the INVESTIGATORS. I’m sure there are BARRELS and BARRELS of crimes they committed to be brought out into the LIGHT??? The dirtbag dirty cop has crossed every line in our justice system and if the repubs had any guts at all — they would have put a fkning stop to it months ago. This farce is an embarrassment to this country. mueller and his gang of scumbag clinton butt kissers should be prosecuted and made to pay back every cent of the $30 million they have bilked from the American taxpayers for absolutely producing ZERO evidence. Gerry I agree and also I hope that the devil has plans to torment him in the after life I agree with you and don’t know why he hasn’t been fired a long time ago. I can’t stand to even look at him. He looks like a shady character and probably is. Mike H says: Richard is just one of many idiots ,don’t pay them any concern he’s not worth it.Richard communism is not gonna fly here so maybe you need to go to another country.My generation went to war to keep your kind out of this country. Barbara Cook says: Muller and his Angry Democrat lawyers needs to be put on a leash now for sure. Muller investigating President Trump’s kids is diffidently crossing the line. If Muller can’t find any collusion between candidate Trump and now President Trump, then, Muller needs to go ahead and write up his report and close this so called investigation, which, on the other hand, it is nothing more than a ” WITCH HUNT” to do everything in his powers to ruin President Trump and his whole administration. Whatever President Trump’s kids did before, has NO barrens on this investigation, or better yet, a hoax of a ” WITCH HUNT.” Muller is doing everything that he can to ruin peoples lives, that is his main goal. Put a stop to Muller NOW!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Randall Clark says: sfengr says: Mueller is a shyster lawyer of the old school that will fabricate anything to get someone lying or attempting to clarifying their story. The only good place fro this creature is at the bottom of a snake pit – creatures of the same nature. Richard M Crooks says: DICTATOR TRUMP AND HIS GESTAPO ALL have to be taken down and out. Richard M Crooks, Go back to hell where you came from, you liberal freak! You and a lot of other liberal un-American, unpatriotic creeps are breathing good air that decent people need. Richard M Crooks, you’ve got it backwards. Wrong is not right and right is not wrong. russell remmert says: Richard M Crooks I hope you enjoy playing the village idiot miller says: He’s not playing, he IS !!! Jack Adler says: Mueller is doing a great job. He’s doing it for our nation. Donald Trump, should be returned where he’s qualified to be, on the access Hollywood BUS. He belongs in a whore house, not in our White House!!! Jack 0ffer, There’s all kinds of proof that Mueller was/is a crooked cop. Do some research before you expose your ignorance and stupidity again. Jack Adler , You got a filthy mouth, I suppose you’re so perfect, you’ve never done a wrong thing in your life…. May God for give you…. It’s people like you that makes this country dirty…. At least President Trump is trying to keep his promises… You may not like the way he’s going about it, but at least he’s trying, I would just love to go back into your high school days, and see just what i can find… mmmmmm mmmmm jack — are you kidding — the dirtbag dirty cop is bilking the American taxpayers to the tune of $30 million so far and has ZERO evidence of any Russian collusion except for obozo,clinton and himself which is carefully being covered up. This nation can do very well without scumbags like him and his gang of clinton butt kissers. Go do some real research before sound as ignorant as pelosi and waters. Hey, Jack, Hip, Hip, Horay for You! Finally, someone else who recognizes that White House WORTHLESS WORM & his latest Legalized, Dime A Dozen Whore for what they both really are! A perfect example of the filthy lies anti-Trumpers are spewing, Jack Adler and Betty. “Destruction is certain for those that say evil is good and good is evil.” Isaiah 5:20 Hahaha! You are a moron! If Mueller had anything on any of them, it would have been front page news for months by now. He is a dirty cop who got people convicted while he had proof of their innocence in his files. Think for a minute if you can about the collusion between Hitlery and Mueller in the Russia uranium deal, and again with the Russian fake dossier? How about Barry Osama telling Putin to wait until after the 2012 election when he got re-elected? Want to talk collusion? Open your eyes, if you can. Thomas Ruwan says: CROOK you are an idiot. You probably voted for Hilary .. a serial liar, thief, and killer just like her molester/rapist impeached husband. Hey Thomas, Anyone who voted for CLASSY Hilary instead of CRAZY donald at least could tell the difference between The LADY & The LUNATIC, Unlike the Republican Asshole Kissers Of That Manic Presently Living In The White House. jim dandy says: you are one demented person. I hope your mother doesn’t come out from under the porch and bites you. jim dandy, Betty is a liberal lying deranged troll! TROLL ALERT, TROLL ALERT! We are going to miss that sewer maggot when the devil claims one of his own! Crawl back under your rock with the rest of the scum like obama, clinton,holder,rice,lynch,biden,comey,clapper,resenstein,brennan and mueller — sounds like you would fit right in. Declassifie the fisa warrants for the democrats and the obama administration and take them all down. James P Hutchins that is a good plan
cc/2019-30/en_middle_0012.json.gz/line1529
__label__cc
0.684952
0.315048
Where were the LTTE & JVP strongest in 1988? Posted on August 2, 2016 August 2, 2016 by pstaniland I’m in the process of trying to recreate the two JVP rebellions in Sri Lanka. One admittedly rough measure I’m using of armed group strength is a group’s ability to drive down turnout when they call for elections to be boycotted (caveats abound – many things drive turnout, but less then 30% turnout is not normal for a Sri Lankan election). The 1988 Presidential election provides one way to get a sense of the geographic patterns of armed group strength (the all-Sri Lanka turnout average was 55.32% in 1988). Neither the LTTE nor the JVP wanted voters involved in these elections; the JVP in particular was unleashing a total war against UNP politicians and supporters during this period (only mid-way through the war did they go after the security forces). Here’s a map of Sri Lankan electoral districts, courtesy of Wikipedia: In Tamil/partly-Tamil areas, we see Vanni electoral district down at 13.79% and Jaffna at 21.72%, with Trincomalee and Batticaloa districts coming in at 58.48% and 53.81%. The IPKF and EPRLF would be able to drive up those numbers for the 1989 parliamentary elections, but Jaffna and Vanni were clearly “abnormal” in 1988 and comparatively in 1989 as well. The more ethnically mixed composition of Trinco and Batti, the greater presence of Indian-linked Tamil paramilitaries in those areas, and initial northern social core of the LTTE are all reflected in these differences. The Sinhalese areas are quite interesting. Hambantota, Matale, Matara, Moneragala, and Polonnaruwa are all below 30% turnout, while Colombo, Kandy/Mahanuwara, Kegalle, Ratnapura, Puttalam, Ampara/Digamadulla, Nuwara-Eliya, and Gampaha are all over 68%. The JVP’s impact on the Sinhalese heartland was spatially very heterogeneous: Kandy neighbors Matale and Ratnapura neighbors both Matara and Hambantota. We need to understand how seemingly-similar rural Sinhalese districts ended up taking such radically different political/military trajectories. There is much more I will do with these (and other) elections to try to understand this divergence. But for now, this gives a crude but useful overview of where these two conflicts were likely the most intense in 1988 Sri Lanka’s cauldron of violence. ← Lenin’s Sealed Train: Sri Lanka edition Press Sources on the Kashmir Valley → One thought on “Where were the LTTE & JVP strongest in 1988?” Pingback: Map: The JVP in 1971 | Paul Staniland
cc/2019-30/en_middle_0012.json.gz/line1533
__label__wiki
0.978056
0.978056
Actor | Writer | Producer Freddie Prinze, Jr. was born on March 8, 1976, in Los Angeles, California, to Kathy Prinze (née Kathy Elaine Barber) and comedian/actor Freddie Prinze. He is of Puerto Rican, German, English, and ... read full biography Known for She's All That (1999), Scooby-Doo (2002), I Know What You Did Last Summer (1997), Scooby-Doo 2: Monsters Unleashed (2004) 8 wins & 15 nominations I Mom So Hard (TV Movie) - Hale Hale See fewer Killer Skin (2019) (Short) - Masked Killer Masked Killer See fewer Mass Effect: Paragon Lost (2012) (Video) - Lieutenant James Vega (voice) Lieutenant James Vega (voice) See fewer Delgo (2008) Delgo (voice) Delgo (voice) See fewer Jack and Jill vs. the World (2008) New York City Serenade (2007) Owen Owen See fewer Brooklyn Rules (2007) Michael Turner Michael Turner See fewer The Reef (2006) Pi (voice) Pi (voice) See fewer Happily N'Ever After (2006) Rick (voice) Rick (voice) See fewer Shooting Gallery (2005) (Video) - Jericho Hudson, Producer Jericho Hudson, Producer See fewer Scooby-Doo 2: Monsters Unleashed (2004) Summer Catch (2001) Ryan Dunne Ryan Dunne See fewer Head Over Heels (2001) Jim Winston Jim Winston See fewer Boys and Girls (2000) Ryan Walker Ryan Walker See fewer Down to You (2000) Al Connelly Al Connelly See fewer Wing Commander (1999) Lt. Christopher Blair Lt. Christopher Blair See fewer Sixpence None the Richer: Kiss Me (She's All That Version) (1999) (Video) - Guest Guest See fewer Zack Siler Zack Siler See fewer Ray Bronson Ray Bronson See fewer Brad Brad See fewer I Know What You Did Last Summer (1997) The House of Yes (1997) Anthony Anthony See fewer To Gillian on Her 37th Birthday (1996) Joey Bost Joey Bost See fewer Star Wars: Rebels (2014–2018) (TV Series) - Kanan Jarrus / Phoenix Five 'Duke' / Death Trooper #2 / Stormtrooper #2 / Lead Viszla Warrior / … (66 episodes, 2014) See more Kanan Jarrus / Phoenix Five 'Duke' / Death Trooper #2 / Stormtrooper #2 / Lead Viszla Warrior / TIE Fighter Pilot / Stormtrooper Guard / Supercommando #2 / Imperial Technician / TIE Cadet #1 / Stormtrooper / Stormtrooper #4 / Protocol Droid #1 / Stormtrooper #1 (66 episodes, 2014) See fewer Family Reunion - and Farewell (Mar 5, 2018) Season 4, Episode 15 - Kanan Jarrus (voice) (credit only) Kanan Jarrus (voice) (credit only) See fewer Robot Chicken (2005–2018) (TV Series) - Fred Jones / Father / Handy Manny / Brian O'Conner / Diego Marquez / Announcer (5 episodes, 2005) Fred Jones / Father / Handy Manny / Brian O'Conner / Diego Marquez / Announcer (5 episodes, 2005) See fewer Scoot to the Gute (Jan 7, 2018) Season 9, Episode 3 - Fred Jones / Father (voice) Fred Jones / Father (voice) See fewer Movie Trivia Schmoedown (2016–2017) (TV Series) - The Master / Commentator (4 episodes, 2016) The Master / Commentator (4 episodes, 2016) See fewer Star Wars - Five Way (Apr 15, 2017) Season 4, Episode 28 - The Master The Master See fewer Bordertown (2016) The Engagement (Jan 3, 2016) Season 1, Episode 1 - Actor (voice) Actor (voice) See fewer Bones (2013–2014) (TV Series) - Danny Beck (2 episodes, 2013) Danny Beck (2 episodes, 2013) See fewer The Source in the Sludge (Mar 10, 2014) Season 9, Episode 16 - Danny Beck Danny Beck See fewer The Secrets in the Proposal (Sep 16, 2013) Season 9, Episode 1 - Danny Beck Danny Beck See fewer Witches of East End (2013) (TV Series) - Leo Wingate (2 episodes, 2013) Leo Wingate (2 episodes, 2013) See fewer Unburied (Nov 17, 2013) Season 1, Episode 7 - Leo Wingate Leo Wingate See fewer A Few Good Talismen (Oct 27, 2013) Season 1, Episode 4 - Leo Wingate Leo Wingate See fewer Happy Valley (2012) (TV Movie) - Noah Noah See fewer Psych (2010) (TV Series) - Dennis Gogolack (1 episode, 2010) Dennis Gogolack (1 episode, 2010) See fewer Not Even Close... Encounters (Jul 28, 2010) Season 5, Episode 3 - Dennis Gogolack Dennis Gogolack See fewer (TV Series) - Cole Ortiz (24 episodes, 2010) Cole Ortiz (24 episodes, 2010) See fewer Day 8: 3:00 p.m.-4:00 p.m. (May 24, 2010) Season 8, Episode 24 - Cole Ortiz Cole Ortiz See fewer WWF SmackDown! (2008–2009) (TV Series) - Writer (26 episodes, 2008) Writer (26 episodes, 2008) See fewer Episode #10.18 (Jan 23, 2009) Season 10, Episode 18 - Writer Writer See fewer No Heroics (2009) (TV Movie) - Bradley / Ultimatum Bradley / Ultimatum See fewer WWE Saturday Night's Main Event (2008) (TV Series) - Writer (1 episode, 2008) Writer (1 episode, 2008) See fewer Episode dated 2 August 2008 (Aug 2, 2008) Writer Writer See fewer (TV Movie) - Eric Eric See fewer Freddie (2005–2006) (TV Series) - Freddie Moreno (22 episodes, 2005), Writer (created by) (22 episodes, 2005), Executive Producer (22 episodes, 2005), Writer (1 episode, 2006) Freddie Moreno (22 episodes, 2005), Writer (created by) (22 episodes, 2005), Executive Producer (22 episodes, 2005), Writer (1 episode, 2006) See fewer Pilot (May 31, 2006) Season 1, Episode 22 - Freddie Moreno, Executive Producer, Writer (created by), Writer Freddie Moreno, Executive Producer, Writer (created by), Writer See fewer Boston Legal (2004–2006) (TV Series) - Donny Crane (3 episodes, 2004) Donny Crane (3 episodes, 2004) See fewer Squid Pro Quo (May 9, 2006) Season 2, Episode 25 - Donny Crane Donny Crane See fewer George Lopez (2006) (TV Series) - Freddie Moreno (1 episode, 2006) Freddie Moreno (1 episode, 2006) See fewer George Gets Cross Over Freddie (Mar 22, 2006) Season 5, Episode 19 - Freddie Moreno Freddie Moreno See fewer Kim Possible: A Sitch in Time (2003) (TV Movie) - Future Jim / Future Tim (voice) Future Jim / Future Tim (voice) See fewer Mutant X (2003) One Step Closer (Apr 21, 2003) Season 2, Episode 19 - Writer Writer See fewer (TV Series) - Sandy (1 episode, 2002), Performer ("Greensleeves", "Hot Cross Buns") (1 episode, 2002) Sandy (1 episode, 2002), Performer ("Greensleeves", "Hot Cross Buns") (1 episode, 2002) See fewer The One with the Male Nanny (Nov 7, 2002) Season 9, Episode 6 - Sandy, Performer ("Greensleeves", "Hot Cross Buns") (uncredited) Sandy, Performer ("Greensleeves", "Hot Cross Buns") (uncredited) See fewer (TV Series) - Mike (1 episode, 2002) Mike (1 episode, 2002) See fewer Juvenilia (Jan 22, 2002) Season 9, Episode 14 - Mike (voice) Mike (voice) See fewer Vig (1998) (TV Movie) - Tony Tony See fewer Detention: The Siege at Johnson High (1997) (TV Movie) - Aaron Sullivan Aaron Sullivan See fewer (TV Series) - Jeff (1 episode, 1996) Jeff (1 episode, 1996) See fewer Too Soon for Jeff (Sep 12, 1996) Season 25, Episode 1 - Jeff Jeff See fewer Family Matters (1995) (TV Series) - Tough Guy (1 episode, 1995) Tough Guy (1 episode, 1995) See fewer The Gun (Feb 10, 1995) Season 6, Episode 15 - Tough Guy Tough Guy See fewer ToeJam & Earl's Super Funky Telethon (2019) (Video) - Himself - Host Himself - Host See fewer Entertainment Tonight (2004–2019) (TV Series) - Himself / Himself - Author, Back to the Kitchen (3 episodes, 2004) Himself / Himself - Author, Back to the Kitchen (3 episodes, 2004) See fewer ET's Super Night of Stars! (Jan 29, 2019) Season 38, Episode 122 - Himself Himself See fewer 1 on 1 with Kristian Harloff (2018) Freddie Prinze Jr. (May 31, 2018) Season 1, Episode 11 - Himself Himself See fewer Rebels Recon (2015–2018) (TV Series) - Herself - Voice of 'Kanan' / Himself - Voice of 'Kanan' (14 episodes, 2015) Herself - Voice of 'Kanan' / Himself - Voice of 'Kanan' (14 episodes, 2015) See fewer Inside "Jedi Night" & "DUME" (Feb 19, 2018) Season 4, Episode 6 - Herself - Voice of 'Kanan' Herself - Voice of 'Kanan' See fewer The Star Wars Show LIVE! Celebration Orlando 2017 (2017) (TV Mini-series) - Himself - Special Guest (1 episode, 2017) Himself - Special Guest (1 episode, 2017) See fewer Day 3 (Apr 15, 2017) Season 1, Episode 3 - Himself - Special Guest Himself - Special Guest See fewer Freddie Prinze Jr./Ally Mali (Jun 13, 2016) Season 4, Episode 191 - Himself Himself See fewer (TV Series) - Himself / Himself - Guest (2 episodes, 2016) Himself / Himself - Guest (2 episodes, 2016) See fewer Labor Day Blowout (Sep 5, 2016) Season 5, Episode 207 - Himself Himself See fewer Hittin' the Coals (Jun 7, 2016) Season 5, Episode 179 - Himself - Guest Himself - Guest See fewer (TV Series) - Himself - Guest (1 episode, 2016) Himself - Guest (1 episode, 2016) See fewer Roseanne Barr/Freddie Prinze Jr./The Lumineers (Jun 16, 2016) Season 6, Episode 96 - Himself - Guest Himself - Guest See fewer The Talk (2016) (TV Series) - Himself - Author, Back to the Kitchen (1 episode, 2016) Himself - Author, Back to the Kitchen (1 episode, 2016) See fewer Guest Co-Hostesses Rachel Bloom & Retta/Taye Diggs/Freddie Prinze Jr./Jessica Radloff (Jun 15, 2016) Season 6, Episode 183 - Himself - Author, Back to the Kitchen Himself - Author, Back to the Kitchen See fewer First Impressions with Dana Carvey (2016) (TV Series) - Himself - Host (6 episodes, 2016) Himself - Host (6 episodes, 2016) See fewer Tom Arnold (Jun 14, 2016) Season 1, Episode 6 - Himself - Host Himself - Host See fewer Hollywood Today Live (2016) Episode dated 9 June 2016 (Jun 9, 2016) Himself - Author, Back to the Kitchen Himself - Author, Back to the Kitchen See fewer Today (2016) Episode dated 8 June 2016 (Jun 8, 2016) Himself Himself See fewer The Tonight Show Starring Jimmy Fallon (2016) Ethan Hawke/Freddie Prinze Jr./Ingrid Michaelson (Jun 7, 2016) Season 3, Episode 160 - Himself Himself See fewer Live with Regis and Kathie Lee (2005–2016) (TV Series) - Himself (4 episodes, 2005) Himself (4 episodes, 2005) See fewer Guest Co-Host D.L. Hughley/Eric Dane/Freddie Prinze Jr. (Jun 6, 2016) Season 28, Episode 194 - Himself Himself See fewer WWE Monday Night RAW (2009–2016) Episode #24.35 (May 9, 2016) Season 24, Episode 35 - Himself Himself See fewer AMC Jedi Council (2015–2016) Rogue One Teaser Trailer Review with Freddie Prinze Jr & Sam Witwer (Apr 7, 2016) Season 2, Episode 14 - Himself Himself See fewer Freddie Prinze Jr aka Kanan Live in Studio!! (Oct 29, 2015) Season 1, Episode 34 - Himself Himself See fewer Misery Loves Comedy (2015) Himself - Interviewee Himself - Interviewee See fewer The Queen Latifah Show (2014) Country Music Superstars Big & Rich! Plus, the Moment That Changed Comedian Tom Arnold's Life. And, Freddie Prinze Jr. (Oct 2, 2014) Season 2, Episode 14 - Himself Himself See fewer Rachael Ray (2010) Episode #4.90 (Jan 18, 2010) Season 4, Episode 90 - Himself Himself See fewer Episode dated 6 April 2010 (Apr 6, 2010) Himself Himself See fewer Jimmy Kimmel Live! (2005–2010) Episode #8.95 (Feb 18, 2010) Season 8, Episode 95 - Himself Himself See fewer Late Night with Jimmy Fallon (2010) Episode dated 13 January 2010 (Jan 13, 2010) Himself Himself See fewer East L.A. Marine: The Untold True Story of Guy Gabaldon (2008) (Video) - Narrator (voice) Narrator (voice) See fewer WrestleMania XXIV (2008) (TV Special) - Himself (uncredited) Himself (uncredited) See fewer WWE Hall of Fame 2008 (2008) (TV Special) - Himself Himself See fewer On Set, on Edge (2007– ) (TV Mini-series) - Himself Himself See fewer Episode #3.126 (Mar 21, 2006) Season 3, Episode 126 - Himself Himself See fewer The Tony Danza Show (2005–2006) Episode #2.100 (Feb 8, 2006) Season 2, Episode 100 - Himself Himself See fewer Episode #2.23 (Oct 12, 2005) Season 2, Episode 23 - Himself Himself See fewer Episode dated 7 February 2006 (Feb 7, 2006) Himself Himself See fewer Last Call with Carson Daly (2002–2005) Episode dated 8 December 2005 (Dec 8, 2005) Himself Himself See fewer Episode dated 20 June 2002 (Jun 20, 2002) Himself - Guest Himself - Guest See fewer Late Night with Conan O'Brien (1999–2005) Episode #13.17 (Oct 4, 2005) Season 13, Episode 17 - Himself Himself See fewer Late Show with David Letterman (2002–2005) Freddie Prinze, Jr., Alicia Keys (Jun 12, 2002) Season 9, Episode 167 - Himself Himself See fewer Episode dated 3 October 2005 (Oct 3, 2005) Himself Himself See fewer NFL Opening Kickoff 2005 (2005) (TV Special) - Himself - Host Himself - Host See fewer Who's Playing the Game? (Apr 24, 2005) Season 1, Episode 11 - Himself (uncredited) Himself (uncredited) See fewer Reading Rainbow (2005) Beegu (Jan 24, 2005) Season 15, Episode 4 - Himself (voice) Himself (voice) See fewer Scooby-Doo's Triple Threat Featurette (2004) (Video) - Himself / Fred Himself / Fred See fewer GMTV (2004) Ministry of Mayhem (2004) Episode dated 27 March 2004 (Mar 27, 2004) Himself Himself See fewer Cartoon Cartoon Fridays (2004) Fred Jones Visits the Set of Scooby Doo 2 (Mar 26, 2004) Season 1, Episode 26 - Himself Himself See fewer HBO First Look (2002–2004) (TV Series) - Himself / Fred Jones (2 episodes, 2002) Himself / Fred Jones (2 episodes, 2002) See fewer Inside 'Scooby Doo 2: Monsters Unleashed' (Mar 19, 2004) Season 11, Episode 5 - Himself / Fred Jones Himself / Fred Jones See fewer Scooby-Doo (Jun 1, 2002) Season 9, Episode 6 - Himself Himself See fewer The 2nd Annual TV Land Awards (2004) Extra (2002–2003) Episode dated 8 August 2003 (Aug 8, 2003) Himself (uncredited) Himself (uncredited) See fewer Episode dated 4 June 2002 (Jun 4, 2002) Himself (uncredited) Himself (uncredited) See fewer The Jamie Kennedy Experiment (2002–2003) Episode #2.22 (Apr 24, 2003) Season 2, Episode 22 - Himself (as Freddy Prinze Jr.) Himself (as Freddy Prinze Jr.) See fewer Episode #2.1 (Sep 19, 2002) Season 2, Episode 1 - Himself Himself See fewer The Tonight Show with Jay Leno (1998–2003) Episode #11.60 (Apr 7, 2003) Season 11, Episode 60 - Himself Himself See fewer V Graham Norton (2003) Episode #3.9 (Jan 22, 2003) Season 3, Episode 9 - Himself Himself See fewer Access Hollywood (2002–2003) Born Sloppy (2003) Episode dated 3 January 2003 (Jan 3, 2003) Himself Himself See fewer E! News Daily (2002) Episode dated 28 December 2002 (Dec 28, 2002) Himself Himself See fewer Episode dated 29 October 2002 (Oct 29, 2002) Himself Himself See fewer Scooby Doo: Unmasking the Mystery (2002) The Daily Show (2000–2002) Freddie Prinze Jr. (Jun 17, 2002) Season 6, Episode 151 - Himself Himself See fewer E! Entertainment Special: Who Let the Dog Out? (2002) (TV Special) - Himself / Fred Himself / Fred See fewer Revealed with Jules Asner (2002) Sarah Michelle Gellar (Jun 12, 2002) Himself Himself See fewer (TV Special) - Himself - Presenter Himself - Presenter See fewer 2002 ABC World Stunt Awards (2002) (TV Special) - Himself - Presenter (uncredited) Himself - Presenter (uncredited) See fewer The Rosie O'Donnell Show (1999–2002) Episode dated 15 May 2002 (May 15, 2002) Himself Himself See fewer Nickelodeon Kids' Choice Awards '02 (2002) Cancun Capers (2002) (TV Short) - Himself Himself See fewer 25 Sexiest Men in Entertainment (Oct 21, 2001) Season 1, Episode 1 - Himself Himself See fewer The Late Late Show with Craig Kilborn (2001) Episode dated 23 August 2001 (Aug 23, 2001) Himself Himself See fewer The Teen Choice Awards 2001 (2001) Brak Presents the Brak Show Starring Brak (2000) Episode #1.1 (Feb 20, 2000) Season 1, Episode 1 - Himself Himself See fewer (TV Series) - Himself - Host (1 episode, 2000) Himself - Host (1 episode, 2000) See fewer Freddie Prinze, Jr./Macy Gray (Jan 15, 2000) Season 25, Episode 10 - Himself - Host Himself - Host See fewer Howard Stern (1999) Episode dated 29 September 1999 (Sep 29, 1999) Himself Himself See fewer Total Request Live (1999) Episode dated 5 February 1999 (Feb 5, 1999) Himself - Guest Himself - Guest See fewer The 56th Annual Golden Globe Awards (1999) (TV Special) - Himself - Presenter: Best Original Song Himself - Presenter: Best Original Song See fewer The 26th Annual American Music Awards (1999) Celebrity Profile (1998) Jennifer Love Hewitt (Dec 2, 1998) Himself Himself See fewer Seventeen: The Faces for Fall (1998) (TV Movie) - Himself Himself See fewer The 53rd Annual Golden Globe Awards (1996) (TV Special) - Himself - Mr. Golden Globe Himself - Mr. Golden Globe See fewer Episode #38.192 (Apr 20, 2019) Season 38, Episode 192 - Himself (archive footage) Himself (archive footage) See fewer Star Wars: Rebels (2018) (TV Series) - Kanan Jarrus (1 episode, 2018) Kanan Jarrus (1 episode, 2018) See fewer Wolves and a Door (Feb 26, 2018) Season 4, Episode 12 - Kanan Jarrus (archive sound) (archive footage) Kanan Jarrus (archive sound) (archive footage) See fewer Six Sides of Katharine Hepburn (2018) (Short) - Himself (archive footage) Himself (archive footage) See fewer Best of "Home & Family" Cooking (Sep 6, 2016) Season 4, Episode 251 - Himself (archive footage) Himself (archive footage) See fewer Episode dated 11 June 2016 (Jun 11, 2016) Himself - Author, Back to the Kitchen (archive footage) Himself - Author, Back to the Kitchen (archive footage) See fewer WWE: The Best of RAW 2009 (2010) (Video) - Himself (archive footage) Himself (archive footage) See fewer Nature Boy Ric Flair: The Definitive Collection (2008) Going to Pieces: The Rise and Fall of the Slasher Film (2006) Himself (archive footage) Himself (archive footage) See fewer Other (5 titles) Dragon Age: Inquisition - Trespasser (2015) (Video Game) - The Iron Bull (voice) The Iron Bull (voice) See fewer Disney Infinity 3.0 (2015) (Video Game) - Kanan Jarrus (voice) Kanan Jarrus (voice) See fewer Star Wars: Rebels - Recon Missions (2015) Dragon Age: Inquisition (2014) Mass Effect 3 (2012) (Video Game) - Lt. James Vega (voice) Lt. James Vega (voice) See fewer Jodi Lyn O'Keefe
cc/2019-30/en_middle_0012.json.gz/line1534
__label__wiki
0.995036
0.995036
Clifford David (1928–2017) Actor | Director Known for Bill & Ted's Excellent Adventure (1989), Signs (2002), Kinsey (2004), The Last Mile (1959) Jun 30, 1928 (died Nov 30, 2017) The Exorcist III: Legion (2016) Dr. Bruno Dr. Bruno See fewer Professor Smithson Professor Smithson See fewer Signs (2002) Columbia University Professor Columbia University Professor See fewer Pharaoh's Heart (2002) (Short) - Truman Hollowell Truman Hollowell See fewer Jewel of the Sahara (2001) (Video) - Old Francois Renard Old Francois Renard See fewer Changes of Distance (1996) (Short) - Charles Manning, Director Charles Manning, Director See fewer Pyrates (1991) Advisor Advisor See fewer The Exorcist III (1990) Beethoven Beethoven See fewer Agent on Ice (1986) Kirkpatrick Kirkpatrick See fewer Fort Apache the Bronx (1981) Dacey Dacey See fewer Resurrection (1980) George George See fewer The Betsy (1978) Joe / Manager-Loren II's gay lover Joe / Manager-Loren II's gay lover See fewer Riot (1969) Mary Sheldon Mary Sheldon See fewer The Party's Over (1965) Carson Carson See fewer Invitation to a Gunfighter (1964) Crane Adams Crane Adams See fewer Laertes Laertes See fewer The Last Mile (1959) Richard Walters Richard Walters See fewer Street of Sinners (1957) (TV Series) - Oswald Jackson (1 episode, 2005) Oswald Jackson (1 episode, 2005) See fewer Sects (Mar 30, 2005) Season 15, Episode 19 - Oswald Jackson Oswald Jackson See fewer (TV Series) - Hotel Manager (1 episode, 2003) Hotel Manager (1 episode, 2003) See fewer Heart Like a Wheelchair (Nov 6, 2003) Season 6, Episode 6 - Hotel Manager Hotel Manager See fewer (TV Series) - Ralph Kozinski (1 episode, 2001) Ralph Kozinski (1 episode, 2001) See fewer Art (Oct 7, 2001) Season 1, Episode 2 - Ralph Kozinski Ralph Kozinski See fewer It's Like, You Know... (1999) (TV Series) - Televangelist (1 episode, 1999) Televangelist (1 episode, 1999) See fewer The Getaway (Mar 31, 1999) Season 1, Episode 3 - Televangelist Televangelist See fewer (TV Series) - Man (1 episode, 1998) Man (1 episode, 1998) See fewer A Man and a Woman (Apr 27, 1998) Season 10, Episode 19 - Man Man See fewer (TV Series) - Mr. Olmstead (1 episode, 1996) Mr. Olmstead (1 episode, 1996) See fewer Close to You (Nov 20, 1996) Season 3, Episode 10 - Mr. Olmstead Mr. Olmstead See fewer Murder, She Wrote (1995) (TV Series) - Claude Faragere (1 episode, 1995) Claude Faragere (1 episode, 1995) See fewer Murder a la Mode (Feb 26, 1995) Season 11, Episode 17 - Claude Faragere Claude Faragere See fewer Matters of the Heart (1990) (TV Movie) - John Norman John Norman See fewer (TV Series) - Webber (1 episode, 1986) Webber (1 episode, 1986) See fewer Unpunished Crimes (Apr 1, 1986) Season 1, Episode 21 - Webber Webber See fewer Ryan's Hope (1981) (TV Series) - Rod Hirst (4 episodes, 1981) Rod Hirst (4 episodes, 1981) See fewer Episode #1.1677 (Dec 14, 1981) Season 1, Episode 1,677 - Rod Hirst Rod Hirst See fewer The Edge of Night (1979–1980) (TV Series) - Dr. Corwin / Dr. Lennox (9 episodes, 1979) Dr. Corwin / Dr. Lennox (9 episodes, 1979) See fewer Episode #1.6202 (Feb 21, 1980) Season 1, Episode 6,202 - Dr. Corwin (credit only) Dr. Corwin (credit only) See fewer Ebony, Ivory and Jade (1979) (TV Movie) - Grady Grady See fewer Blind Ambition (1979) (TV Mini-series) - Fielding / Fred Fielding (4 episodes, 1979) Fielding / Fred Fielding (4 episodes, 1979) See fewer Part IV (May 23, 1979) Season 1, Episode 4 - Fielding Fielding See fewer A Woman Called Moses (1978) (TV Series) - Doc Thompson (2 episodes, 1978) Doc Thompson (2 episodes, 1978) See fewer Episode #1.2 (1978) Season 1, Episode 2 - Doc Thompson Doc Thompson See fewer Episode #1.1 (Dec 11, 1978) Season 1, Episode 1 - Doc Thompson Doc Thompson See fewer Insight (1978) (TV Series) - Greek (1 episode, 1978) Greek (1 episode, 1978) See fewer The Flawed Magi (Jun 16, 1978) Greek Greek See fewer Charlie's Angels (1978) (TV Series) - Gordon Roclair (1 episode, 1978) Gordon Roclair (1 episode, 1978) See fewer Mother Goose Is Running for His Life (Feb 15, 1978) Season 2, Episode 20 - Gordon Roclair Gordon Roclair See fewer (TV Series) - McCann / Denis Ross (2 episodes, 1976) McCann / Denis Ross (2 episodes, 1976) See fewer The Death of a Dream (Dec 14, 1976) Season 3, Episode 10 - McCann McCann See fewer Mother Love (Feb 24, 1976) Season 2, Episode 22 - Denis Ross Denis Ross See fewer Bert D'Angelo/Superstar (1976) Serpent's Tooth (Jul 10, 1976) Season 1, Episode 11 - Actor Actor See fewer Matt Helm (1975) (TV Series) - Ed Glenn (1 episode, 1975) Ed Glenn (1 episode, 1975) See fewer Double Jeopardy (Nov 22, 1975) Season 1, Episode 9 - Ed Glenn Ed Glenn See fewer Joe Forrester (1975) Powder Blue (Oct 21, 1975) Season 1, Episode 7 - Actor Actor See fewer Fear on Trial (1975) (TV Movie) - Hall Hall See fewer Harry O (1975) (TV Series) - Paul Levesque / Jeff (2 episodes, 1975) Paul Levesque / Jeff (2 episodes, 1975) See fewer Lester Two (Sep 25, 1975) Season 2, Episode 3 - Paul Levesque Paul Levesque See fewer The Last Heir (Jan 9, 1975) Season 1, Episode 14 - Jeff Jeff See fewer Baretta (1975) (TV Series) - Roger Simon (1 episode, 1975) Roger Simon (1 episode, 1975) See fewer Walk Like You Talk (Mar 14, 1975) Season 1, Episode 8 - Roger Simon Roger Simon See fewer (TV Series) - Carl Egan (1 episode, 1975) Carl Egan (1 episode, 1975) See fewer The Vanished Man (Mar 6, 1975) Season 1, Episode 5 - Carl Egan Carl Egan See fewer The Missiles of October (1974) (TV Movie) - Theodore Sorensen, Special Counsel Theodore Sorensen, Special Counsel See fewer Mary Tyler Moore (1974) (TV Series) - David Boyd (1 episode, 1974) David Boyd (1 episode, 1974) See fewer Neighbors (Dec 7, 1974) Season 5, Episode 13 - David Boyd David Boyd See fewer Bonanza (1972) The Hidden Enemy (Nov 28, 1972) Season 14, Episode 9 - Actor Actor See fewer The Mod Squad (1972) (TV Series) - McCleary (1 episode, 1972) McCleary (1 episode, 1972) See fewer Good Times Are Just Memories (Oct 26, 1972) Season 5, Episode 7 - McCleary McCleary See fewer McMillan & Wife (1972) (TV Series) - Edmond Lake (1 episode, 1972) Edmond Lake (1 episode, 1972) See fewer The Face of Murder (Jan 5, 1972) Season 1, Episode 5 - Edmond Lake Edmond Lake See fewer Nichols (1971) (TV Series) - Billings (1 episode, 1971) Billings (1 episode, 1971) See fewer Ketcham Power (Nov 11, 1971) Season 1, Episode 9 - Billings Billings See fewer Ironside (1971) (TV Series) - Joe Julian (1 episode, 1971) Joe Julian (1 episode, 1971) See fewer The Gambling Game (Oct 5, 1971) Season 5, Episode 4 - Joe Julian Joe Julian See fewer The Bold Ones: The Lawyers (1971) (TV Series) - Rabindranath (1 episode, 1971) Rabindranath (1 episode, 1971) See fewer The Hyland Confession (Jan 31, 1971) Season 2, Episode 7 - Rabindranath Rabindranath See fewer The Bold Ones: The Protectors (1970) (TV Series) - Dominic Bruno (1 episode, 1970) Dominic Bruno (1 episode, 1970) See fewer The Carrier (Jan 11, 1970) Season 1, Episode 4 - Dominic Bruno Dominic Bruno See fewer The Big Valley (1969) (TV Series) - Ritch Stokely / Billy Stokely (1 episode, 1969) Ritch Stokely / Billy Stokely (1 episode, 1969) See fewer Point and Counterpoint (May 19, 1969) Season 4, Episode 26 - Ritch Stokely / Billy Stokely Ritch Stokely / Billy Stokely See fewer Androcles and the Lion (1967) (TV Movie) - Metellus Metellus See fewer Camera Three (1964) (TV Series) - Professor Trixie / Dauber (1 episode, 1964) Professor Trixie / Dauber (1 episode, 1964) See fewer The Cradle Will Rock (Nov 29, 1964) Season 10, Episode 13 - Professor Trixie / Dauber Professor Trixie / Dauber See fewer Armstrong Circle Theatre (1956–1963) (TV Series) - Dick Flink / Lou Decker / Jim (3 episodes, 1956) Dick Flink / Lou Decker / Jim (3 episodes, 1956) See fewer Invitation to Treason (Jan 2, 1963) Season 13, Episode 8 - Dick Flink Dick Flink See fewer Great Ghost Tales (1961) A Phantom of Delight (Aug 31, 1961) Season 1, Episode 9 - Actor Actor See fewer Decoy (1958) (TV Series) - Joe (1 episode, 1958) Joe (1 episode, 1958) See fewer Night of Fire (Mar 17, 1958) Season 1, Episode 23 - Joe Joe See fewer The DuPont Show of the Month (1958) The Bridge of San Luis Rey (Jan 21, 1958) Season 1, Episode 5 - Actor Actor See fewer The Big Story (1957) (TV Series) - Jim Barrett (1 episode, 1957) Jim Barrett (1 episode, 1957) See fewer Lineup (Mar 15, 1957) Season 8, Episode 16 - Jim Barrett Jim Barrett See fewer Kraft Television Theatre (1956) (TV Series) - First Class Passenger (1 episode, 1956) First Class Passenger (1 episode, 1956) See fewer A Night to Remember (Mar 28, 1956) Season 9, Episode 26 - First Class Passenger First Class Passenger See fewer Star Tonight (1955) Night, Be Quiet (Nov 3, 1955) Season 2, Episode 10 - Actor Actor See fewer Douglas Fairbanks, Jr., Presents (1953) The Journey (Jun 17, 1953) Season 1, Episode 24 - Actor Actor See fewer Terry Camilleri Dan Shor Jane Wiedlin Tony Steedman
cc/2019-30/en_middle_0012.json.gz/line1535
__label__wiki
0.996617
0.996617
Jarrett Lennon Jarrett started off early in his acting career at the age of 4 after his mother was encouraged by Ed Asner that he'd be a natural. He quickly booked the first two jobs he auditioned for and kept up ... read full biography Known for Short Cuts (1993), She's All That (1999), Casual Sex? (1988), Freaks and Geeks (1999-2000) Feb 1, 1982 (age 37) | 5' 9" (1.75m) 1 official web site & 1 more link 3 wins & 1 nomination LA Traffic (Short) - Louis Callaway Louis Callaway See fewer Not Another Teen Movie (2001) Partygoer (uncredited) Partygoer (uncredited) See fewer Boys Klub (2001) Ernie Ernie See fewer Winning London (2001) (Video) - Randall Randall See fewer Naylon Naylon See fewer Journey Beneath the Sea (1997) (Video) - Sacho (voice) Sacho (voice) See fewer Amityville Dollhouse (1996) (Video) - Jimmy Martin Jimmy Martin See fewer Toto Lost in New York (1996) (Video) - Munchkin #1 / Munchkin #3 (voice) Munchkin #1 / Munchkin #3 (voice) See fewer The Great White Hype (1996) Jarrett Kane (uncredited) Jarrett Kane (uncredited) See fewer The Surgeon (1995) Young Matar - 1958 Young Matar - 1958 See fewer CAD 10MM The Force (1994) (Video) - Kyle Flynn Kyle Flynn See fewer Short Cuts (1993) Chad Weathers Chad Weathers See fewer Lorenzo's Oil (1992) Lorenzo Odone (voice) (uncredited) Lorenzo Odone (voice) (uncredited) See fewer Highway to Hell (1991) Servants of Twilight (1991) Joey Scavello Joey Scavello See fewer For Parents Only (1991) Simon Simon See fewer Casual Sex? (1988) Jason Jason See fewer Mr. Deity (2010–2011) (TV Series) - Timmy (7 episodes, 2010) Timmy (7 episodes, 2010) See fewer Mr. Deity and the Bang (Nov 22, 2011) Season 4, Episode 20 - Timmy Timmy See fewer (TV Series) - Clerk #2 (1 episode, 2005) Clerk #2 (1 episode, 2005) See fewer Exodus (Aug 28, 2005) Season 2, Episode 13 - Clerk #2 Clerk #2 See fewer Grounded for Life (2004) (TV Series) - Croyce (4 episodes, 2004) Croyce (4 episodes, 2004) See fewer Do Ya Think I'm Sexy? (Nov 19, 2004) Season 5, Episode 9 - Croyce Croyce See fewer (TV Series) - Chester Fleet (1 episode, 2004) Chester Fleet (1 episode, 2004) See fewer Last Week Fights, This Week Tights (May 11, 2004) Season 4, Episode 21 - Chester Fleet Chester Fleet See fewer (TV Series) - Martin Wilder (1 episode, 2002) Martin Wilder (1 episode, 2002) See fewer Help (Oct 15, 2002) Season 7, Episode 4 - Martin Wilder Martin Wilder See fewer Maybe It's Me (2001–2002) (TV Series) - Tim (3 episodes, 2001) Tim (3 episodes, 2001) See fewer The Video Episode (Mar 15, 2002) Season 1, Episode 15 - Tim Tim See fewer Judging Amy (2002) (TV Series) - Theodore Plunket (1 episode, 2002) Theodore Plunket (1 episode, 2002) See fewer Not Stumbling, But Dancing (Mar 5, 2002) Season 3, Episode 17 - Theodore Plunket Theodore Plunket See fewer Hey Arnold! (1996–2001) (TV Series) - Eugene Horowitz / Eugene Horrwitz (4 episodes, 1996) Eugene Horowitz / Eugene Horrwitz (4 episodes, 1996) See fewer Stuck in a Tree/Rhonda Goes Broke (Jan 5, 2001) Season 5, Episode 10 - Eugene Horowitz (voice) Eugene Horowitz (voice) See fewer City Guys (1999–2000) (TV Series) - Martin (4 episodes, 1999) Martin (4 episodes, 1999) See fewer El-Brain (Dec 16, 2000) Season 4, Episode 24 - Martin Martin See fewer (TV Series) - Andy (1 episode, 2000) Andy (1 episode, 2000) See fewer Joe Loves Mary Cherry (Oct 20, 2000) Season 2, Episode 5 - Andy Andy See fewer Freaks and Geeks (1999–2000) (TV Series) - Colin (3 episodes, 1999) Colin (3 episodes, 1999) See fewer We've Got Spirit (Jan 24, 2000) Season 1, Episode 9 - Colin Colin See fewer Odd Man Out (1999) (TV Series) - Scott (1 episode, 1999) Scott (1 episode, 1999) See fewer You've Got Female (Oct 22, 1999) Season 1, Episode 5 - Scott Scott See fewer Promised Land (1999) (TV Series) - Mouse (3 episodes, 1999) Mouse (3 episodes, 1999) See fewer Finale (May 20, 1999) Season 3, Episode 22 - Mouse Mouse See fewer Smart Guy (1998) (TV Series) - Student (1 episode, 1998) Student (1 episode, 1998) See fewer T.A. or Not T.A. (Nov 1, 1998) Season 3, Episode 7 - Student Student See fewer Boy Meets World (1998) (TV Series) - Howie (1 episode, 1998) Howie (1 episode, 1998) See fewer Prom-ises, Prom-ises (May 1, 1998) Season 5, Episode 22 - Howie Howie See fewer (TV Series) - Toby (1 episode, 1998) Toby (1 episode, 1998) See fewer Here and Now (Jan 28, 1998) Season 4, Episode 15 - Toby Toby See fewer Recess (1997) The Great Jungle Gym Stand Off (Dec 13, 1997) Season 1, Episode 21 - Actor (voice) Actor (voice) See fewer Social Studies (1997– ) (TV Series) - Edgar Edgar See fewer The Secret World of Alex Mack (1996) (TV Series) - Buddy (1 episode, 1996) Buddy (1 episode, 1996) See fewer Chemistry (Nov 21, 1996) Season 3, Episode 14 - Buddy Buddy See fewer (TV Series) - Elliot Spellman (1 episode, 1996) Elliot Spellman (1 episode, 1996) See fewer Caroline and the Bridesmaids (May 9, 1996) Season 1, Episode 22 - Elliot Spellman Elliot Spellman See fewer Just Like Dad (1995) (TV Movie) - Sherwood Sherwood See fewer California Dreams (1995) (TV Series) - Snake (1 episode, 1995) Snake (1 episode, 1995) See fewer Woo-ops (Dec 30, 1995) Season 4, Episode 12 - Snake Snake See fewer (TV Series) - P.J. / McDumpster Kid (2 episodes, 1995) P.J. / McDumpster Kid (2 episodes, 1995) See fewer Episode #1.4 (Nov 4, 1995) Season 1, Episode 4 - P.J. P.J. See fewer Episode #1.1 (Oct 14, 1995) Season 1, Episode 1 - McDumpster Kid McDumpster Kid See fewer The O.J. Simpson Story (1995) (TV Movie) - Kevin Kevin See fewer Capitol Critters (1995) The Bug House (1995) Season 1, Episode 11 - Actor (voice) Actor (voice) See fewer Aaahh!!! Real Monsters (1994) (TV Series) - Kid 1 (1 episode, 1994) Kid 1 (1 episode, 1994) See fewer The Switching Hour (Oct 29, 1994) Season 1, Episode 1 - Kid 1 (voice) Kid 1 (voice) See fewer (TV Series) - Billy Logan (1 episode, 1994) Billy Logan (1 episode, 1994) See fewer 24 Hours (Sep 19, 1994) Season 1, Episode 1 - Billy Logan Billy Logan See fewer Untamed Love (1994) (TV Movie) - Jordan Jordan See fewer The George Carlin Show (1994) (TV Series) - Kid (1 episode, 1994) Kid (1 episode, 1994) See fewer George Gets Some Money (Mar 6, 1994) Season 1, Episode 7 - Kid Kid See fewer (TV Series) - Nicky Collins (1 episode, 1994) Nicky Collins (1 episode, 1994) See fewer Illusions of Grandeur (Jan 23, 1994) Season 1, Episode 14 - Nicky Collins Nicky Collins See fewer Edith Ann: A Few Pieces of the Puzzle (1994) (TV Short) - Torky Alden (voice) Torky Alden (voice) See fewer Aliens for Breakfast (1994) (TV Movie) - Henry Henry See fewer 2 Stupid Dogs (1993) (TV Series) - Kenny Fowler (3 episodes, 1993) Kenny Fowler (3 episodes, 1993) See fewer Cat!/Voodoo Goat/Love Doctors (Nov 28, 1993) Season 1, Episode 13 - Kenny Fowler (voice) Kenny Fowler (voice) See fewer Cheers (1989–1992) (TV Series) - Ludlow Tortelli (3 episodes, 1989) Ludlow Tortelli (3 episodes, 1989) See fewer Rich Man, Wood Man (Feb 20, 1992) Season 10, Episode 19 - Ludlow Tortelli Ludlow Tortelli See fewer Dinosaurs (1992) The Clip Show (Jan 22, 1992) Season 2, Episode 16 - Kid Kid See fewer (TV Series) - Little Ely King (1 episode, 1991) Little Ely King (1 episode, 1991) See fewer Lose the Boss (Dec 12, 1991) Season 6, Episode 7 - Little Ely King Little Ely King See fewer Valerie (1991) (TV Series) - Benjamin Umstead (1 episode, 1991) Benjamin Umstead (1 episode, 1991) See fewer Ho, Ho, Hogans (Jul 20, 1991) Season 6, Episode 13 - Benjamin Umstead Benjamin Umstead See fewer The Letters from Moab (1991) (TV Short) - Billy Logan Billy Logan See fewer WIOU (1990) (TV Series) - Zachary Newman (1 episode, 1990) Zachary Newman (1 episode, 1990) See fewer Mother Nature's Son (Dec 26, 1990) Season 1, Episode 8 - Zachary Newman Zachary Newman See fewer (TV Series) - Tiny Boy (1 episode, 1990) Tiny Boy (1 episode, 1990) See fewer A Little Miracle - December 24, 1962 (Dec 21, 1990) Season 3, Episode 10 - Tiny Boy Tiny Boy See fewer Doogie Howser, M.D. (1989) (TV Series) - Brandon Tartikoff (1 episode, 1989) Brandon Tartikoff (1 episode, 1989) See fewer Simply Irresistible (Oct 18, 1989) Season 1, Episode 6 - Brandon Tartikoff Brandon Tartikoff See fewer My Boyfriend's Back (1989) (TV Movie) - Adam Henry Adam Henry See fewer Hardball (1989) (TV Series) - Billy Villanova (1 episode, 1989) Billy Villanova (1 episode, 1989) See fewer Till Death Do Us Part (Sep 21, 1989) Season 1, Episode 1 - Billy Villanova Billy Villanova See fewer Empty Nest (1989) (TV Series) - Little Boy (1 episode, 1989) Little Boy (1 episode, 1989) See fewer The First Time - Again (Jan 7, 1989) Season 1, Episode 11 - Little Boy Little Boy See fewer The Completely Mental Misadventures of Ed Grimley (1988) (TV Series) - Young Ed Grimley (1 episode, 1988) Young Ed Grimley (1 episode, 1988) See fewer The Irving Who Came to Dinner (Dec 3, 1988) Season 1, Episode 13 - Young Ed Grimley (voice) Young Ed Grimley (voice) See fewer Coming of Age (1988) (TV Series) - Scott Krainik / Scott (2 episodes, 1988) Scott Krainik / Scott (2 episodes, 1988) See fewer Cindy Flies the Coop (Nov 21, 1988) Season 2, Episode 4 - Scott Krainik Scott Krainik See fewer The Kids Are Coming, the Kids Are Coming (Mar 29, 1988) Season 1, Episode 3 - Scott Scott See fewer Growing Pains (1988) (TV Series) - Little Boner (1 episode, 1988) Little Boner (1 episode, 1988) See fewer Graduation Day (May 4, 1988) Season 3, Episode 26 - Little Boner Little Boner See fewer Life on the Flipside (1988) (TV Movie) - Shea Day Shea Day See fewer Dennis the Menace (1987) (TV Movie) - Joey Joey See fewer Nutcracker: Money, Madness & Murder (1987) (TV Mini-series) - Lorenzo Bradshaw (Age 5) (3 episodes, 1987) Lorenzo Bradshaw (Age 5) (3 episodes, 1987) See fewer Episode #1.3 (Mar 24, 1987) Season 1, Episode 3 - Lorenzo Bradshaw (Age 5) Lorenzo Bradshaw (Age 5) See fewer The Diceman Cometh (1989) (TV Special) - Young Dice Young Dice See fewer Other (1 title) What's My Story? (1995) (Video Game) - Arthur Arthur See fewer Adam Storke Pamela Gidley Amy Stiller
cc/2019-30/en_middle_0012.json.gz/line1536
__label__wiki
0.861084
0.861084
Play Mon & Wed Lotto Mon & Wed Lotto Results Mon & Wed Lotto Information Mon & Wed Lotto News Play Mon & Wed Lotto Mon & Wed Lotto Results Mon & Wed Lotto Information Mon & Wed Lotto News About Mon & Wed Lotto The Monday and Wednesday lotto is one of several lotteries played in Australia. Its early beginning started at new South Wales where it was its only game and was administered by the new South Wales lotteries. It had its first draw on the 5th of November 1979. Up until 1994 it was the only lotto game played in the state before the introduction of the OZ lotto. The lotto has undergone several changes since it’s inception in 1979, but presently the Mon & Wed lotto as it is now known as is played all across Australia. The Monday and Wednesday lotto can be played both online and by getting the tickets at designated stores around Australia. Just as the name implies, the Mon & Wed lotto is played every Monday and Wednesday. The draw is done at about 7:30pm AEST. To play in the lottery, you have to pick a minimum of 6 main numbers out of 45. During the draw 8 numbers are drawn at random, the first 6 numbers will form the winning numbers while the remaining 2 numbers are known as supplementary numbers and are used in determining the lesser winnings. Hitting the jackpot requires that your 6 numbers matches the 6 numbers drawn during the draw. There are also prizes for tickets in which not all the numbers matches the 6 main numbers drawn. The Mon & Wed lottery offers a jackpot of about AUD$1 million which can be shared among a maximum of 4 winners. The probability of hitting the jackpot in this lottery is about 1 in 8 million. Country Australia Schedule Monday 10:30 AM UTC Lottery Local Time: Monday 8:30 PM GMT+10 Wednesday 10:30 AM UTC Lottery Local Time: Wednesday 8:30 PM GMT+10 Guess Range 6/45 : 6 Prize : Jackpot Chance to win : 1 in 8,145,060 : 5 Prize : 7.00% shared : 4 Prize : 19.00% shared
cc/2019-30/en_middle_0012.json.gz/line1545
__label__wiki
0.865874
0.865874
HAYDEN READY TO PUT HIS VERY BEST FOOT FORWARD THERE’S little doubt Hayden Bertoli-Simmonds has grown into his role as leader of the Redland Bombers. It’s just that last season he wasn’t afforded the opportunity to shine with that growth as much as he would have liked when injury robbed him of too much game time limiting his number of appearances for the 2018 season to just nine. And in two of those his troublesome ankles forced early exits meaning he missed more than half the season. So, to say Hayden is looking forward to this Saturday’s opening clash with defending premier Southport is (as they say in the classics) an understatement. The good news for Bombers’ fans is that the 24-year-old club captain is now back and fully fit after a particularly solid pre-season and says with hand across the heart (metaphorically speaking) it’s good to be “feeling back to normal” “It’s a relief to be able to say that I’m finally clear of the ankle problems,” he said. “I’m really optimistic about the coming season – and excited.” Hayden recalls seeing a powerful video involving the path to the AFL grand final and the excitement following West Coast Eagles 2018 premiership win in which Jeremy McGovern, dwelling on the journey, said: “There’s a little bit of beauty about footy – you just never know.” That small quote – one of many – in an inspirational “Don’t Believe in Never” brilliantly concocted AFL-produced series has stuck with him. It has served as a propellant for his own assault on season 2019 as well as for the fortunes of the Redland Bombers. “That’s the way I feel about this season,” Hayden says. “You never know – you just never know. “I guess all teams will be saying they’re a bit better this time of the year than they were last year “But you never know.” What he does know is that Redland fills the bill regarding an eye to improvement with key players back, including himself, and an influx of bigger-bodied midfielders from where the Bombers will be generating much of their drive. Among the major difficulties last season was the propensity for the Bombers to unintentionally take their foot off the pedal just as momentum started swinging their way. That and untimely injuries – particularly at the onset of the season – hit the club hard and confidence deteriorated, albeit subconsciously, impacting on the ability to maintain momentum. Hayden thought that with a clean bill of health the Bombers were primed to make a better fist of things in 2019. That aside, Soul Cormick’s return will prove hugely beneficial as will having Clay Cameron back for the full season and Hayden himself will slip back into his leadership role with the aplomb to which we have all become accustomed. Not that he sees the captaincy title as the be all and end all. “I’m not big on it being all about me,” he said. “It’s more about everyone stepping up and helping to build confidence within each other. “We can all adopt leadership and take it on. “It’s about helping each other and supporting each other.” Hayden will get plenty of support let there be no doubt about that. With Adrian Williams and Clay Cameron his able deputies, Tom Salter in the mix and Jack Rolls continuing to shine there is personnel aplenty to guide the on-field fortunes. And dare we forget Phil Carse. “Phil’s presence is enormous,” Hayden said. “The experience is there, we’re confident and we’re a relatively young group. “We’ve got plenty of new faces in the mix and the group as one is excited about the season ahead. “You know, you’ve just got to look at the season Canberra had last year (the Demons took the competition by surprise winning eight games in succession at one stage). “That’s momentum and that’s the sort of momentum we’ll be trying to build.” GO BOMBERS
cc/2019-30/en_middle_0012.json.gz/line1547
__label__wiki
0.515869
0.515869
Peterson is the second new Redskins running back this year to endear himself to fans in a big way after Derrius Guice did similar things this offseason. The veteran Peterson is now the focal point of the rushing attack and this great gesture is hard to ignore. Adrian Peterson hopes to one day crush Cris Carter's hand Adrian Peterson's ultimate goal is to be the best RB of all-time With Trey Quinn injured, Jamison Crowder is Redskins' punt returner via text message https://redskinswire.usatoday.com/2018/09/14/adrian-peterson-charity-auction-100th-touchdown/ Sign up for the Redskins Wire newsletter to get our top stories in your inbox every morning Jay Gruden ranks as the No. 22 best coach in the NFL Zachary Neel Jay Gruden recently quipped this spring that he would likely be out of a job soon if his Washington Redskins were unable to string a few wins together and have a respectable season in 2019. Now it seems that that sentiment is largely agreed upon, with Gruden being ranked as just the 22nd best head coach in the NFL. While it's fair to criticize Gruden a bit for his lack of success — .444 win percentage in five years with Washington —it should also be acknowledged that circumstances surrounding the team have been less than ideal over the past... From The Web Ads by Zergnet Ryan Kerrigan is one of the most underpaid stars in the NFL We've mentioned before that Ryan Kerrigan is arguably the most important player that the Washington Redskins have, but it is time to show him some love once again. As training camp inches closer and the sporting world as a whole begins its transition into football season, we can look at some of the best contracts in the league (meaning team-friendly) and show some appreciation for the athletes who have a big hand in helping their city to success. One of those players is DE Ryan Kerrigan, and his impact on the Redskins is nearly unmatched. In 2015, Kerrigan signed... Dwayne Haskins has impressed offensive coordinator Kevin O'Connell As the last couple of weeks of the NFL offseason finally start to pass by, it is as good of a time as ever for football fans to delve into coverage of their favorite teams and learn as much as they can about the upcoming season, as well as the new players they will be cheering for. For the Washington Redskins, all of the hype has been surrounding rookie quarterback and the 15th overall draft pick, Dwayne Haskins. After an impressive minicamp and OTAs session, even Washington's offensive coordinator, Kevin O'Connell, is singing high praises of the future franchise QB. Following... Madden 20 Ratings: See where the Redskins players are rated Alex Smith is out of his leg brace after eight months Redskins boast new menu items and upgrades for FedExField ESPN isn't impressed with Redskins offense heading into 2019 Derrius Guice tweets about reported hamstring injury © Copyright Redskins Wire 2019 Privacy Notice / Your California Privacy Rights
cc/2019-30/en_middle_0012.json.gz/line1548
__label__wiki
0.964527
0.964527
The Best Video Games Movies on Hulu Finding a good Video Games movie to watch can be hard, so we've ranked the best ones and included where to watch them. Check out our list of the best Video Games movies of all time streaming on Hulu. 1. WarGames Thriller, Science-Fiction What it's about: High School student David Lightman (Matthew Broderick) has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Defense Department's war computer and initiates a confrontation of global proportions! Together with his girlfriend (Ally Sheedy) and a wizardly computer genius (John Wood), David must race against time to outwit his opponent...and prevent a nuclear Armageddon. 2. Dirty Rotten Scoundrels Comedy, Crime What it's about: Two con men try to settle their rivalry by betting on who can be the first to swindle a young American heiress out of $50,000. Where to Watch: Available to stream on a popular subscription service (Prime Video & Hulu), stream on a popular TV everywhere service (Epix) & rent or buy from $3.99 on 3 services (iTunes, Prime Video & Vudu). 3. Rounders What it's about: A young man is a reformed gambler who must return to playing big stakes poker to help a friend pay off loan sharks. Where to Watch: Available to stream on a popular subscription service (Showtime & Hulu), stream on a popular TV everywhere service (Showtime) & rent or buy from $1.99 on 7 services (iTunes, Google Play & 5 others). 4. Major League Comedy, Sport What it's about: When Rachel Phelps inherits the Cleveland Indians from her deceased husband, she's determined to move the team to a warmer climate—but only a losing season will make that possible, which should be easy given the misfits she's hired. Rachel is sure her dream will come true, but she underestimates their will to succeed. 5. eXistenZ Horror, Science-Fiction What it's about: A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged. 6. The Aura Crime, Independent What it's about: In neo-noir fashion El Aura narrates in the first person the hallucinating voyage of Espinoza, a quiet, cynical taxidermist, who suffers epilepsy attacks, and is obsessed with committing the perfect crime. Where to Watch: Available to stream on a popular subscription service (Hulu) & rent or buy from $3.99 on 1 service (Prime Video). 7. Rollerball Science-Fiction, Action & Adventure What it's about: In a corporate-controlled future, an ultra-violent sport known as Rollerball represents the world, and one of its powerful athletes is out to defy those who want him out of the game. Where to Watch: Available to stream on a popular subscription service (Prime Video & Hulu), stream on a popular TV everywhere service (Epix) & rent or buy from $2.99 on 5 services (iTunes, Prime Video & 3 others). 8. Hitman Action & Adventure, Crime What it's about: The best-selling videogame, Hitman, roars to life with both barrels blazing in this hardcore action-thriller starring Timothy Olyphant. A genetically engineered assassin with deadly aim, known only as "Agent 47" eliminates strategic targets for a top-secret organization. But when he's double-crossed, the hunter becomes the prey as 47 finds himself in a life-or-death game of international intrigue. 9. Joshy What it's about: After his engagement ends badly, Josh decides to take advantage of his bachelor-party plans in Ojai, California, with the few friends still willing to join him. Focused on drugs and their own hangups, his self-absorbed friends refuse to confront the elephant in the room and ask Josh how he’s feeling. As welcome and unwelcome guests stop by, Josh will attempt to find some closure over this weekend with the guys. 10. Beyond the Gates Action & Adventure, Horror What it's about: Two estranged brothers reunite at their missing father's video store to liquidate the property and sell off his assets. As they dig through the store, they find a VCR board game dubbed 'Beyond The Gates' that holds a connection to their father's disappearance and deadly consequences for anyone who plays it. 11. Halo 4: Forward Unto Dawn Action & Adventure, Science-Fiction What it's about: Set against the backdrop of a UNSC military academy, a group of highborn cadets are training to be the next generation of soldiers in the UNSC’s ongoing war with insurrectionists in the outer colonial planets. Among these cadets, Thomas Lasky struggles with his doubts about this war, and with the burden of expectations he may not be able to carry. As Lasky comes to terms with his potential as a military leader, the terrifying alien alliance known as the Covenant arrives and turns his world upside down. Inspired by the Master Chief, he must decide what it means to be a hero. Where to Watch: Available to watch free online (Tubi TV), stream on a popular subscription service (Prime Video & Hulu) & rent or buy from $0.99 on 6 services (iTunes, Google Play & 4 others). 12. Reindeer Games What it's about: After assuming his dead cellmate's identity to get with his girlfriend, an ex-con finds himself the reluctant participant in a casino heist. 13. Resident Evil: Vendetta What it's about: BSAA Chris Redfield enlists the help of government agent Leon S. Kennedy and Professor Rebecca Chambers from Alexander Institute of Biotechnology to stop a death merchant with a vengeance from spreading a deadly virus in New York. 14. Perfect Bid: The Contestant Who Knew Too Much Documentary, Game Show What it's about: Maths teacher Ted Slauson became adept at recording and memorizing prices of products featured on the iconic game show The Price is Right, an obsession dating back to the show's inception in 1972. This passion and dedication for the show culminated in him helping a contestant place a perfect bid during a 2008 showcase, an innocent act that would create one of the biggest controversies in television industry history. Where to Watch: Available to watch free online (Tubi TV), stream on a popular subscription service (Netflix & Hulu) & rent or buy from $2.99 on 7 services (iTunes, Google Play, Prime Video & 5 others). 15. Best Player What it's about: Chris Sanders and Quincy are both involved in a video game called "Black Hole", and they both want to win the tournament with a $175,500 prize. Quincy then tries to sabotage Chris, but it all goes wrong, because Chris' mom Tracy thinks that Quincy is her Internet date. Quincy lies to Tracy on their first date saying that he is a Home Ec. teacher at Chris' school. Right before the tournament, Chris figures out that Quincy was lying about everything. So, Chris decides that she will "destroy" him at the tournament. Quincy ends up forfeiting the tournament to show that he is sincerely sorry. Tracy takes him back, and they go to Chris' prom. Chris decides to go with her love interest in the movie, Ash. Where to Watch: Available to stream on a popular subscription service (Hulu) & rent or buy from $3.99 on 3 services (Prime Video, Vudu & PlayStation Store). 16. Mortal Kombat: Annihilation Action & Adventure, Fantasy What it's about: A group of heroic warriors has only six days to save the planet in "Mortal Kombat Annihilation." To succeed they must survive the most spectacular series of challenges any human, or god, has ever encountered as they battle an evil warlord bent on taking control of Earth. Sequel to the film "Mortal Kombat," and based on the popular video game. 17. Yu-Gi-Oh! The Movie What it's about: After the conclusion of the Battle City Tournament, deep below the sands of Egypt, an ancient evil has awakened. Anubis, who was defeated centuries ago by Yugi’s mysterious alter ego – the ancient Pharaoh – has returned for revenge. Wielding the power of the Eighth Millennium Item, Anubis is determined to destroy Yugi and take over the world. Where to Watch: Available to watch free online (Yahoo View) & stream on a popular subscription service (Hulu). 18. It Came from the Desert Horror, Action & Adventure What it's about: New Mexico, present day. Brian and Lukas are off to the desert to join a kegger party and to celebrate Lukas’ victory in a motocross competition. His winning prize includes meeting The Deathinator, the biggest action star in the world. The party gets started under the hot desert sun, but Brian isn’t in the mood, so he wanders off and is soon joined by his friend, Lukas. They discover something strange in the desert which leads them into a secret military laboratory, where they discover the disturbing truth of what the government has been doing. Secret experiments on ants and spiders using DNA found in a meteorite which fell to Earth in 1951 has given birth to mutated giant ants which have overrun the facility. Now, it's up to Brian and Lukas to save the world from a giant ant invasion! Where to Watch: Available to stream on a popular subscription service (Prime Video & Hulu) & rent or buy from $2.99 on 6 services (iTunes, Google Play & 4 others). 19. Minecraft: Through the Nether Portal What it's about: Minecraft: Through the Nether Portal takes you on a journey through the ever-evolving, epic game of Minecraft. Its popularity is opening up a whole new world for this generation, with millions of new players signing up each week. With exclusive interviews from industry experts and Minecraft’s biggest YouTube players, Dan TDM and Ali-A, we look at how the game is now being used as a tool for education and teaching while digging deeper into the creativity behind the game.
cc/2019-30/en_middle_0012.json.gz/line1549
__label__cc
0.566858
0.433142
3300 CAUSATION AND FORSEEABILITY Encyclopedia of Law & Economics - 3300 CAUSATION AND FORSEEABILITY CAUSATION AND FORSEEABILITY Omri Ben-Shahar © Copyright 1997 Omri Ben-Shahar 2. Causation in Early Economic Analysis of Law 3. Prospective Causation 4. Causation and Socially Optimal Care 5. Causation Under Strict Liability 6. Causation Under the Negligence Rule 7. Uncertainty over Causation 8. The Case for Threshold Probability Rules 9. The Case for the Proportional Liability Rule 10. Risk-Based Liability and Safety Regulation 11. Causal Apportionment among Joint Tortfeasors 12. Unforeseeability 13. Causation and Litigation Costs Bibliography on Causation and Foreseeability (3300) This essay begins with a survey of the implicit role of causation in thewritings of the early, pathbreaking economic analysts of tort law. It thenclarifies the basic distinction between retrospective (ex post) causation andprospective (ex ante) causation, a distinction that forms the core of manysubsequent economic discussions of causation. Next, the explicit role ofcausation doctrines in inducing optimal care and activity levels is examinedunder the strict liability and the negligence regimes. The analysis is thenextended to cover several complications often plaguing the determination ofcausation: uncertainty over causation, joint actions among tortfeasors, andunforeseeability of harm. Keywords: Foreseeability, Retrospective and Prospective Causation, OptimalCare, Strict Liability, Joint Actions. The contribution of economic analysis to the clearer understanding of thefunction of law is particularly evident in the law of causation. The vast juristicliterature deliberating the proper meaning of causation has left a trail of doubtand uncertainty. Prominent traditional tort scholars have conceded that "thereis perhaps nothing in the entire field of law which has called for moredisagreement, or upon which the opinions are in such a welter of confusion"(Keeton et al. (1984, p. 263)), and that "...both courts and textbook writers still fallback when deciding issues in causal terminology" (Hart and Honoré (1985, p. 1)).Economic analysis helps distinguish the different problems that are involved andoffers a unified approach to their resolution. The attempts of traditional tort scholarship to make sense of the law ofcausation have led to the classification of the debates into two separatedoctrines, cause-in-fact and proximate cause. The cause-in-fact doctrineincorporates the law's endeavor to define and to conceptualize the criteria thatwould determine when an act is part of a causal chain that ends with the injury.Here, the but-for test is the most common intuitive criterion for inferring such afactual causality relation. Of all the acts that pass any of the cause-in-fact tests,the law narrows down the responsibility to those satisfying additional, "legal"tests, which are mostly embodied in the proximate cause doctrine. Liability isimposed only upon a sub-set of the acts that are causally linked to the injury,those that survive the scrutiny of a variety of normative judgments regardingtheir proximity to the harmful event. As Cooter (1987) nicely labeled it, theproximity doctrine portrays causation as a "decaying transitive relation": as thechain of causal inference extends ("a caused b, b caused c, ..."), the relationshipbetween removed links weakens without being destroyed. The economic analysis of the law of causation illuminates both thecause-in-fact and the proximate cause doctrines. Economic analysis appliespositive tools from decision theory and statistics to clarify the definition of acause-in-fact, and to resolve some of the confusion regarding the relativecontribution of a given factor to the harmful consequence. Under the normativeeconomic analysis, the proximate cause doctrine's designated role is to expandor shrink the scope of liability, in order to achieve efficient deterrence. This essay is structured as follows: It begins with a survey of the implicitrole of causation in the writings of the early, pathbreaking economic analysts oftort law. It then clarifies the basic distinction between retrospective (ex post)causation and prospective (ex ante) causation, a distinction that forms the coreof many subsequent economic discussions of causation. Next, the explicit roleof causation doctrines in inducing optimal care and activity levels is examinedunder the strict liability and the negligence regimes. The analysis is thenextended to cover several complications often plaguing the determination ofcausation: uncertainty over causation, joint actions among tortfeasors, andunforeseeability of harm. The original economic theory of tort law deliberately rejected an explicit role fora causation doctrine in determining liability. Coase's (1960) view was particularlyresolute in its exclusion of a formal causation element. Coase describes an injuryas a result of mutual and symmetric interaction among parties. Like particles thatrandomly collide with each other in space, actions of individuals may conflictand cause one-sided or mutual harm. Thus, the phrase "the injurer acted and,when coming across the victim, caused an injury" is interchangeable with thephrase "the victim acted and, when coming across the injurer, caused an injury".Both passive and active factors are equally necessary in making the harm occur. Since liability cannot be placed solely on the basis of causation, as both theinjurer and the victim are necessary causes, it ought to be decided according toa cost-benefit analysis, which will determine the identity of the party that canalter its actions more cheaply and avoid the injury. As Calabresi (1970) explained,for instrumental reasons the least-cost avoider should be singled out as thecause of an injury. The forward looking social objective -- minimization ofaccidents' costs -- will be furthered if a party that can prevent an accident witha lower cost than the harm arising from the accident will be regarded as the solelegal cause of the accident and be held liable. Hence, under this view, causationis not a preliminary condition for evaluating liability, but it is the conclusion ofthe evaluation. (See Cooter (1987)). Posner and Landes (1983, 1987, p. 228-255) have reinforced this view andargued explicitly that causation has no role in determining liability. Inasmuch asthe purpose of tort law is to promote economic efficiency, the injurer should beregarded as the cause of an injury when he is the lower-cost avoider of it, andnot otherwise. Therefore, they claimed, "the idea of causation can largely bedispensed with in an economic analysis of torts". When efficiency analysis isconducted to determine liability, it can be fully pursued without reference tocausation. Inefficient behavior is synonymous with causing an expected harm. The symmetry among the roles of the injurer and the victim, as well as theabsence of any independent requirement of causation, became well evidentwhen Brown (1973) formulated his rigorous model of accidents. This model -- thebenchmark for subsequent economic analysis of tort law -- assigned symmetricroles to the injurer and the victim, by making the expected harm a function ofcare levels taken by both. A party's action can raise the probability of harm and,thus, can only be a cause of an expected harm. Thus, in early economic analysis of tort law, cause is reduced to efficientprevention: the assignment of legal cause is dependent solely upon thejudgment about the economic efficiency of preventive measures. The inquiryinto causation carries no additional message once a cost-benefit analysis of thecare choices has been completed. This characterization of causation, whichprominent scholars have labeled 'causal minimalism' (see Hart and Honoré (1985,p. lxvii-lxxvii)), has led authors to argue that causation serves goals other thanefficiency (Epstein (1973, 1979, 1987); Borgo (1979); Cooter (1987)) or that itmerely represents an older method of conducting efficiency analysis (Grady(1989); Miceli (1996)). Building on the analytical framework of Calabresi (1970) and Brown (1973),subsequent treatments of causation distinguished among two concepts offactual linkage between acts and harms. Calabresi (1975) classified the empiricaltests of causality into two types, which he labeled causal link and but-forcause. Both describe effects of actions on outcomes. An act is a but-for causeif, without it, the injury would not have taken place. In contrast, an act has acausal link to an injury if it increases the probability of its occurrence. As Shavell(1980) later rephrased the distinction, causation can be either retrospective orprospective. Retrospective causation exists if, all else held fixed, but-for theaction the harmful consequence would not have occurred. Prospective causationexists when an action raises the probability of the harmful consequence. Thus,the distinguishing factor between the two types of causation is thetime-perspective of the evaluation. Retrospective causation is backward-looking,answering the counter-factual inquiry of whether the action was a necessarycondition for the outcome. Prospective causation, in contrast, isforward-looking, answering the ex ante inquiry of whether the action increasedthe likelihood of injury (See also Rizzo (1981); Miceli (1996)). This distinction, and in particular the development of analytical tools tofocus on prospective-probabilistic causation, has helped the economic literatureadvance both in its normative and positive study of the law. In the normativedimension, probabilistic causation became a building block of economic modelsof tort law. As Shavell (1980, p. 475) has explicitly phrased it, "the first-best levelof care is determined by the cost of taking care and the degree to which lack ofcare is a cause of expected losses". For an action ("low care") to raise theprobability of a consequence ("harm") relative to another action ("high care"),there must be states of the world in which harm occurs only if that action istaken, and not if the other action is taken. The prospective causation concept has also advanced the positive analysisof tort law. Perhaps the sharpest example of the contrast between retrospectiveand prospective causation theories, and the clearest application of prospectivecausation analysis, arises within the family of "coincidental" accidents cases. Inthe famous case of Berry v. Borough of Sugar Notch, 43 A. 240 (1899), anexcessively speeding streetcar happened to arrive at a point along its route justwhen a tree fell above that point, and struck it. A strict retrospective causationinquiry would have identified the action of speeding as a but-for cause, since theaccident would not have occurred had the streetcar travelled more slowly.Applying the traditional retrospective approach, the court sensed the illogic ofassigning liability for such an arbitrary episode, thus had to resort to elusiveconcepts such as "coincidental harm" or "abnormal risk" in order to screen suchresults and derive a general principle that will restrict the scope of liability. Incontrast, under prospective causation inquiry the action of speeding isrecognized to have not affected the likelihood of harm of the type that occurred.Ex ante, a tree can fall at any point along the route, and the speed at which thevehicle is moving does not increase its probability of being hit. The result thatthe court reached can be easily aligned with the logic of prospective causation.(See Honoré (1983, p. 50-55) for early applications of the prospective causationconcept.) The causation requirement, although not an explicit element in the ordinaryeconomic model of tort law, can be isolated and characterized in economic terms.The basic proposition made by Shavell (1980, 1987, p.105-126), and reiterated byRizzo (1981), Landes and Posner (1983, 1987), and Cooter (1987), claims that thedesirability of any precautionary action should be determined only withreference to states of the world in which failure to take the action would lead togreater expected losses. In determining the level of care that is optimal, thebenefits of care should be balanced against its costs. But whereas the costs ofcare accrue before the ensuing state of the world materializes and regardless ofthe actual state of the world that will materialize, the benefits of care arise onlyin those states in which taking care reduces harm. For example, in the case ofCity of Piqua v. Morris, 120 N.E. 300 (1918) the defendant failed to take sufficientmeasures against floods. However, a particularly severe flood occurred, one thateven appropriate precautions would not have withstood. Thus, in evaluating thedesirability of anti-flood measures, only the chance for moderate floods shouldbe counted. The idea that care can be cost-justified only with reference to states of theworld in which it can reduce the harmful consequence was formulated by Shavell(1987, p. 118-121) in causation terminology. Shavell defined care (or lack thereof)to be a necessary cause of harm if, given some state of the world, a different levelof care would have led to a different level of expected harm. He then proceededto show that the socially optimal level of care depends only on states of theworld in which the injurer's care would be the necessary cause of any losses thatoccur. In order to examine the extent to which liability rules can implement optimalcare, a causation restriction was formally introduced to the structure of liabilityrules. Shavell's (1980) concept of the scope of liability incorporates thecausation restriction. The scope of liability is defined as the set of states of theworld under which liability can be applied. The scope of liability is said to berestricted if, given a harmful consequence, there are some states of the world inwhich the injurer is not held liable. The scope of liability will be unrestricted if,anytime there is a harmful consequence, and no matter what state of the worldsurrounded it, the injurer will be held liable. The design of a liability regimeincludes, in addition to the determination of due care (in negligence) and themagnitude of liability (both in strict liability and in negligence), the determinationof the scope of liability. If an act is not a necessary cause of the injury, the injurymay be left outside the actor's scope of liability. Adding the determination of a scope of liability into the analysis nicelyextends the early economic models, by capturing the effects of conditionsbeyond the control of the human actors. When the probability or magnitude ofinjuries depend upon external conditions, analyzing such conditions within theformal structure of liability rules is necessary. Under strict liability, courts have to determine the magnitude of liability and itsscope. Assuming the magnitude of liability equals the victim's actual harm, whatremains to be determined is whether the accident is to be included within thescope of liability. Two principal propositions can be made regarding theincentive effects of the determination of the scope of liability: (1) The Effect of the Scope of Liability on the Level of Care - The injurer willhave optimal incentives to take care as long as the scope of liability includes atleast all the states of the world in which the injurer's care is a necessary causeof the harm. If the scope of liability is too restricted, and does not include all thestates in which the injurer could alter the harmful consequence with its care, thenthe injurer will have insufficient incentives to take care. In this case, the injurerwill ignore some of the social benefits of its care -- the reduction in expectedharm occurring in states of the world outside the scope of liability -- and willunderinvest in care. If, in contrast, the scope of liability is optimally restricted,and includes only states of the world in which the injurer's care is a necessarycause, the injurer will bear only the increment in expected losses due to itsactions, and will have optimal incentives to take care. Similarly, if the scope ofliability is unrestricted, so that whenever harm occurs, and regardless of thestate of the world, the injurer is held liable, the injurer will engage in optimal care.Notice that an unrestricted scope of liability does not, in itself, distort theinjurer's incentives to take care. Even if the injurer is liable for harms which itscare could not have prevented, it will not exercise excessive care. Taking morecare will not prevent the harm in the states of the world in which care is not anecessary cause, and thus will not reduce its expected liability. Hence, theinjurer's incentives to take care can be distorted only by an overly-restrictedscope of liability, not by an unrestricted one. (See Shavell (1980, 1987, p.105-110); Landes and Posner (1987, p. 236).) (2) The Effect of the Scope of Liability on the Level of Activity - If the scope ofliability is too restricted, and does not include all the states in which the injurer'scare is a necessary cause, it was already established above that underinvestmentin care will arise. This underinvestment can also lead to excessive incentives toengage in the activity, as the injurer will not bear the full "externality" of itsactivity. The cost of engaging in the activity is reduced by the incrementalreduction in the investment in care and by the incremental reduction in theexpected liability and, thus, an injurer may engage in an activity even when it isundesirable from a social point of view. Similarly, if the scope of liability is toobroad or unrestricted, it may discourage an injurer from engaging in a sociallydesirable activity. Although the injurer who faces an unrestricted scope ofliability will not take excessive care, the injurer will face an inflated expectedliability. As Shavell (1980, 1987, p. 108) has termed it, the injurer may find theunrestricted scope of liability to be "crushing". An activity that is worthwhilemay be deterred by imposing upon the actor costs of losses that would havebeen occasioned regardless of this activity. For example, if a car manufacturer isheld liable for accidents arising from bad conditions of roads, such that cannotbe avoided by extra prevention devices in the car's design, it may be led toreduce the volume of production. Hence, for injurers to engage in optimal levelsof activity, courts have to restrict the scope of liability appropriately, which,according to some (e.g., Burrows (1984)), may demand too much sophisticationfrom the legal system, and, according to others (e.g., Wright (1985)) does notreflect prevalent causation doctrines. Under the negligence rule, courts have to determine the level of due care, themagnitude of liability and the scope of liability. Assuming that the magnitude ofliability equals the victim's actual harm, what remains to be determined is whichharms should be factored into the determination of the standard of due care, andunder what states of the world the accident is to be included within the scopeof liability. Shavell (1980, 1987, p. 105-121) has made the following propositionsconcerning the incentive effects of causal determinations: (1) The Determination of the Optimal Standard of Care - The due level of careshould equal the optimal level of care, as determined by considering the effectof care only in circumstances in which care is a necessary cause -- that is, onlyin states of the world in which taking care would reduce harm. Care that has nobearing on the occurrence of harm should be excluded from the negligencestandard. (2) The Effect of the Scope of Liability on the Actual Level of Care - Once astandard of due care is set, the scope of liability has only limited incentiveeffects. Whether the scope of liability is optimally restricted (to include onlystates of the world in which the injurer is the necessary cause), or whether thescope of liability is too broad or unrestricted, the injurer will take the due levelof care (assumed to be set optimally). Further, unlike the activity-crushing effectof strict liability, under the negligence rule an unrestricted scope of liability doesnot necessarily deter the injurer from engaging in the activity. The injurer isinduced to take due care and thereby avoid liability, and thus becomesindifferent as to the actual scope of liability (Landes and Posner (1983, 1987,p.236)). As long as the exaggerated scope of liability does not boost the level ofdue care, it has no adverse incentive effects per se. In contrast, if the scope ofliability is too restricted, and does not include all the states in which the injurer'scare could have reduced harm, the injurer may (but not necessarily) be led totake too little care. The injurer will compare the cost of due care to the cost ofliability in its inefficiently restricted scope. If the cost of liability is smaller, theinjurer's incentives to take due care will be distorted. (3) The Scope of Liability in an Imperfectly Operating Negligence System -Inasmuch as the application of the negligence rule is plagued with error anduncertainties, it contains an element of strict liability (the injurer may bearliability even if he were not negligent.) In this case, the unrestricted scope ofliability can have the crushing effect that is associated with the operation of astrict liability rule (Shavell (1980, 1987, p. 108), Landes and Posner (1983, 1987,p. 236)). Even after Shavell's (1980) analysis of the optimal scope of liability, showingthat liability should be restricted only to accidents that would not have occurredhad the injurer employed due care, most economic models of negligence,including part of Shavell's (1987) book, continued to implicitly assume that thescope of liability is unrestricted, and that liability turns solely upon the injurer'snegligence. That is, if the injurer were negligent, no matter how slight itsdeviation from due care, it is liable for any accident that arises, includingaccidents that additional care would not have prevented. Grady (1983,1984,1989), Kahan (1989) and Marks (1994) have shown that the analytical frameworkwhich assumes unrestricted scope of liability is not in line with either tortdoctrine or optimal incentive design. To adhere to Shavell's analysis and restrictthe scope of liability so that it includes only accidents that were caused by theinjurer's negligence, would imply that an injurer who takes less than due care isnot liable for every harm that arises, but only for those harms which would nothave arisen had the injurer taken due care. Thus, if the injurer takes slightly lessthan due care, the proper scope of its liability would include only the (slight)incremental harm that occurred due to this deviation, and will not include allharms that would have occurred anyway. In the ordinary case in which carereduces the probability of an accident but not its magnitude, if the accidentoccurs the negligent injurer will have to pay damages with a probability lessthan one. Using Kahan's (1989) illustration, suppose the proper height of a fencesurrounding a stadium is 10 feet, and the field owner erects a fence of 9 feet. Ifa ball flies over the fence and causes harm, the scope of liability should be (and,as a matter of common law, is) restricted to those accidents caused by ballsflying over the fence at heights between 9 and 10 feet. Only those accidents arecaused by the field owner's negligence. Making the field owner liable for allharms caused by flying balls, including those that fly at heights exceeding 10feet, would mean imposing an unrestricted scope of liability. Until Kahan (1989) exposed it, most economic models managed to concealtheir incorrect characterization of the scope of liability. The reason these modelssuccessfully overlooked this restriction relates to the discussion above, whichsuggested that in the case of a perfectly operating negligence system anexaggerated scope of liability does not have a distorting effect. Since theperfect-information models of negligence find that the injurer will have theproper incentives to take optimal care under even the exaggerated scope ofliability regimes, and since there is no crushing of activity effect, they suppressthe significance of the exaggerated scope of liability. But, as Kahan clearlydemonstrated, an unrestricted scope of liability will have different incentiveeffects from an optimally restricted scope of liability in cases in which theapplication of the negligence rule is plagued with information imperfections. Grady and Kahan's analyses also suggest that the proper characterizationof causation should eliminate what is otherwise considered a prominent featureof the negligence rule: the discontinuity of the injurer's cost function at the pointof due care. This feature of discontinuity plays an important role in modelsanalyzing injurers' behavior under uncertainty (see, e.g., Craswell and Calfee(1986); Shavell (1992); Ben-Shahar (1995)). If the injurer' cost function iscontinuous, as Grady, Kahan, and Cooter (1989) have demonstrated it to be, theincentive to deliberately engage in excessive care, to ensure compliance with theuncertain legal standard, is significantly diminished. When an injury occurs, its origin may be ambiguous. Several reasons mayaccount for the uncertainty. First, it may be that separate factors created similarrisks simultaneously, and the actual injury cannot be clearly traced to any oneof them. Second, it may be that the injury manifested itself a long period after therisk was created or the accident occurred, in which case the cause is difficult toidentify. The principal question that needs to be addressed in the face of causaluncertainty is under what conditions should a party be liable for injuries thatare uncertain to have been caused by its actions? Two basic approaches to liability in the face of uncertainty over causationcan be proposed. The first approach applies an all-or-nothing criterion todetermining liability. An all-or-nothing criterion holds that either there is noliability or, if liability is imposed, then it equals the full losses of the victim. Themost common all-or-nothing criterion is the threshold probability rule, underwhich full liability is imposed upon the defendant if the probability that it causedthe accident exceeds a threshold level. Potentially, any threshold can be set,including one that would require proof of causation exceeding any reasonabledoubt. However, the prevalent doctrine applying the threshold probability ruleis the preponderance-of-the-evidence standard of many common lawjurisdictions, which incorporates a threshold probability of 50 percent. (In somecases the law reverses the burden of proof and presumes that the defendant isthe cause of the injury. Then, the defendant needs to satisfy the 50 percentthreshold in proving that he is not the cause of the injury.) The second approach to resolving uncertainty over causation incorporatesa proportional liability criterion. Under this approach, whenever there is apositive probability that the defendant caused the injury, liability will beimposed, but its magnitude will be reduced proportionally to account for theuncertainty. The most common proportional rule, known as the "market share"approach, sets the defendant's liability equal to the actual harm multiplied by theprobability that the defendant caused the injury. Traditionally, the law of torts has been governed by the first approach ofall-or-nothing. Full liability is assigned to a party whose acts are assessed to bea substantial factor in bringing about the harm. A "preponderance ofprobabilities" -- a threshold of 50 percent -- is required for imposition of liability,and without it no liability is inflicted. However, beginning in the 1980's, andcoming as a response to the onslaught of mass exposure or catastrophic injurytorts, American courts have been more willing to apply the second approach. Inthe case of Sindell v. Abbott Laboratories 607 P.2d 924 (1980), which involvedthe mass disaster of the DES drug, the court determined each manufacturer to beliable for a fraction of every victim's harm, with liability determined in proportion to the manufacturer's market share. The debate over the market share doctrinehas since occupied many branches of tort scholarship, including law andeconomics. The next two Sections examine the economic justifications for thetwo approaches. The first systematic analysis applying economic methods to compare the twoliability approaches was presented by Kaye (1982), who proposed to show thesuperiority of the 50 percent threshold probability rule over any other thresholdprobability rule as well as over the proportional approach. Kaye's argument isbased on the assumption that in situations of uncertainty over causation thesocial objective of tort adjudication is to minimize the ex post costs of erroneousliability decisions. Ignoring any ex ante incentive effects that the rules may have,and assuming that the two types of potential errors courts could make -- falsepositives and false negatives -- are just as costly, Kaye shows that the 50percent threshold rule is the error-minimizing one. To illustrate the essence ofKaye's argument, consider a case in which the harm is $100 and the probabilitythat the defendant caused it is 40 percent. Under thepreponderance-of-the-evidence rule, the defendant will not be liable, and theexpected error costs will equal $40 (there is a 40 percent chance that thedefendant is truly the tortfeasor, in which case it underpays by $100, for anexpected error cost of .4×$100 = $40). In contrast, if the court applies theproportional liability rule and sets the defendant's liability at $40, the expectederror costs will be $48 (there is a 40 percent chance that the defendant is truly thetortfeasor, in which case it underpays by $60, for an expected error cost of .4×$60= $24; and there is a 60 percent chance that the defendant is not the tortfeasor,in which case it overpays by $40, for an expected error cost of .6×$40 = $24; thesum of the expected costs of the two possible errors is $24 + $24 = $48). The all-or-nothing feature embodied in the threshold liability rule has anadditional potential advantage, suggested by Levmore (1990), of reducing thedegree of uncertainty. If uncertainty is assumed to be endogenous, and to varyaccording to the incentives of the parties to bring evidence to court, then theliability approaches can be compared with respect to the degree of uncertaintythey generate. Here, Levmore claims, a high threshold probability will producethe most evidence and lead to the least uncertainty. When uncertainty is greatand tortfeasors are difficult to identify, plaintiffs face a complete denial ofrecovery under a threshold rule that sets a sufficiently high thresholdprobability. This will induce plaintiffs to invest more in developing evidence andidentifying the true injurers. In contrast, under a market share regime plaintiffsneed not invest in identifying the true injurers, since they are fully compensatedregardless of the degree of uncertainty. (Of course, if the defendant, rather thanthe plaintiff, were assumed to be the party that can develop superior evidence,then a market share rule will give the defendant the greatest incentives to bringevidence.) Again, ignoring the ex ante incentive effects of the rules and focusingon the ex post characteristics of the adjudicatory regime, a case is made for thethreshold probability rule. Apart from minimizing uncertainty and the ex post costs of uncertainty, thethreshold probability approach may offer the additional advantage of reducingadministrative costs. As Shavell (1987: p. 117) suggests, there are three distinctreasons that the administrative costs will likely be higher under the proportionalliability approach. First, the volume of cases is likely to be higher under theproportional liability approach, because actions in which the probability ofcausation is less than the threshold could be brought. Second, more defendantscould be sued in a typical case under the proportional approach, raising thecosts of litigating the case. And thirdly, litigation under the proportionalapproach requires the added judicial determination of the precise probability ofthe defendant being the cause of the injury, whereas under the thresholdprobability approach the only thing that matters is whether the probability ofcausation exceeds the threshold. Some of these excess costs may be diminishedunder the enforcement regime that Rosenberg (1984) has proposed, whichborrows features from "public law", such as class actions, damage scheduling,and insurance fund judgments. An economic analysis purporting to show the potential superiority of theproportional rule was presented by Shavell (1985, 1987, p. 115-118, 123-126).Shavell evaluated the effects of the two approaches with respect to a differentsocial objective from the ex post error-costs minimization criterion. Adopting anex ante focus, Shavell took the objective of liability regimes to create optimaldeterrence, i.e., the minimization of accident losses. In this perspective, legalerrors do not involve a welfare cost per se, and their minimization could perhapsbe taken as a measure of fairness but not as a proxy for optimal deterrence. (Seealso Kaplow (1994)). Once embracing the social objective of optimal deterrence,Shavell has managed to demonstrate that the proportional liability approach isthe superior method of inducing socially desirable behavior. The main propositions made by Shavell are as follows. First, the thresholdprobability criterion distorts the incentives of parties to take care. If theprobability of causation is systematically below the threshold probability, theparty will face too little liability and will take less than optimal care. This problemof underdeterrence under the conventional threshold probability rule waslabeled by Levmore (1990) and Farber (1990) as the problem of recurring misses.For example, if the probability of a party being the cause of a typical injury issystematically 40 percent (as in the case of a manufacturer holding a 40 percentshare of the market for a harm-causing product), the party will always escapeliability under the 50 percent threshold rule. The net of liability will miss thisparty repeatedly. Thus, the party will have no incentives to take care. Theunderinvestment result arises both under the negligence rule and under strictliability. (See also Landes and Posner (1987, p. 263-269); Robinson (1985)) Similarly, if the probability of causation is systematically assessed above thethreshold, the injurer may have excessive incentives to take care. This distortionwill arise under a strict liability regime, since the injurer will pay for all losses,more than it actually causes. The injurer may take excessive care for a subtlereason. Since the injurer pays for all losses only if he is determined to by thelikely cause, the injurer will have the incentive to reduce the chance that thisdetermination would be made. By taking excessive care, the injurer may be ableto reduce the posterior probability that he will be designated as the likely causeof the injury. That is, extra care may shift the preponderance of probabilities, andclear the injurer from liability altogether. Notice that this overinvestment resultwill not arise under a negligence regime, since the injurer will take due care andwill avoid the excessive liability (unless, of course, the level of due care is ill defined). This is another illustration of the general proposition discussed inSection 6 above, which claimed that an unrestricted scope of liability -- that is,liability for consequences that a party did not cause -- does not in itself lead todistorted incentives, and only enhances the motive to take due care under anegligence regime. In contrast to the distorted outcome under the threshold probability rule, theproportional liability approach leads to socially optimal levels of care (seeDelgado (1982); Rosenberg (1984); Shavell (1985, 1987, p. 115-118), Levmore(1990)). The injurer faces expected liability equal to the expected loss associatedwith its behavior, and will behave as it would in the absence of uncertainty overcausation. For example, a manufacturer who causes 40 percent of the harms ofa particular type will pay for losses in every case, including the 60 percent of thecases which it did not cause. But in every case its liability will equal 40 percentof the individual harm, thus it ends up bearing liability of 40 percent of the totalharm, equal to the fraction it caused. Another important proposition made by Shavell concerns the incentives ofparties to engage in the activity that produces the harm. Again, the thresholdprobability rule distorts ex ante incentives. When the probability of causationis systematically above the threshold, the injurer will be overdeterred fromengaging in activity under the strict liability regime. (Under the negligence rulethe injurer takes due care and escapes liability, thus engages in the same levelof excessive activity as it does in the absence of uncertainty over causation. SeeShavell (1987, p. 21-32).) Likewise, when the probability of causation issystematically below the threshold, the injurer escapes liability and, as a result,engages in excessive levels of activity, both under negligence and under strictliability. In contrast, under the proportional liability rule, the injurer's incentivesto engage in the activity are the same as they would be in the absence of anyuncertainty over causation. Several authors have argued that the market share approach may lead afree-rider problem which will cause underinvestment in care. Marino (1991)demonstrated that care practiced by one firm produces benefits to other firms.By reducing the probability of harm associated with its products, a firm producesa positive externality captured by the other firms in the form of reduced expectedliability. That is, each firm will underinvest in care because it bears the cost ofcare in full but can appropriate only a share of its benefits. The magnitude of thisunderinvestment will diminish as the firm's market share increases, and theunderinvestment problem will disappear if the firm is a monopoly. In similarspirit, other authors have argued that proportional liability will not generateoptimal incentives for safety research. Delgado (1982) and Rose-Ackerman(1990) have pointed out to the public good characteristics of safetyimprovements, and speculated that the infliction of full liability on an injurer whohas the greatest opportunity to conduct safety research may be superior to thedivision of liability according to proportional causation. The dichotomy between the proportional liability approach and theall-or-nothing threshold probability approach reflects the tension between exante and ex post goals of the tort system. A framework that seeks to unite thetwo approaches has been offered recently by Porat and Stein (1997). Under thisframework, a liability rule should be designed to give incentives to parties whoare the cheapest evidence providers, to reduce the ex post uncertainty inassessing liability. The ingenious mechanism these authors examine is titled"liability for uncertainty" -- imposing liability for an injury whose cause isuncertain on the party that created or had the best opportunity to prevent thatuncertainty. This will lead the parties to invest optimally in removinguncertainties, and when ex post uncertainty is eliminated, the ordinary liabilitymechanisms can operate to generate optimal incentives to reduce the primarydamage. Thus, for example, DES manufacturers can either eliminate theuncertainty over causation (thus avoid liability for uncertainty), in which casethe all-or-nothing approach will apply and will generate optimal care incentives,or the manufacturers can choose not to eliminate the uncertainty over causation,in which case they will be liable for the injuries based on their proportionalcontribution to the creation of uncertainty. The market share approach is a doctrinal step away from the strict fundamentalsof causation. But it is not the most radical step. With the growth of massexposure torts, and due to the large degree of uncertainty over causation inthese torts, authors have advocated an even more unorthodox mechanism legalmechanism which will practically abandon any causality requirement betweenthe injurer's action and actual harm. The idea is to structure a liability regimebased solely on "probabilistic causation". Under this regime, liability isproportional not to the harm itself, but rather to the risk of harm which the actorproduces; it is applied regardless of whether this risk actually materializes. Forexample, an individual who uses a product and later discovers that she is undera particular risk, that may or may not develop into actual harm, may recoverdamages equal to her expected harm. Thus, liability is assigned strictly on thebasis of the creation of unreasonable risk, independent of any injury. Contraryto the dominant role that the causation requirement was given in other influentialtheories (as in Epstein (1973)), here the causation element is essentiallyeliminated. Robinson (1985) and Landes and Posner (1984, 1987, p. 263-269) have arguedthat awarding its expected losses to each potential victim exposed to the risk ofharm will create the proper incentives for injurers to take care and to select thecorrect activity levels. In the context of mass exposure accidents, and in light ofthe severity of risk-spreading and bankruptcy concerns, this view has triggeredserious attention. (See, e.g., Roe (1984); Celli (1990).) Viewed ex post, this approach gives many potential victims a windfall, asthey are going to be compensated without actually bearing any risk; at the sametime, actual victims will be undercompensated. But viewed ex ante, this approachcan provide superior incentives for care relative to other approaches that haveto await the actual, oftentimes lagged, harm and, thus, dilute the deterrent forceof liability. Obviously, a troubling aspect of a risk-based liability regime is itsadministrative costs. Litigation need not be conditional on occurrence of harmand thus could be more frequent, let alone more complicated (see Celli (1990)).At the same time, each victim is awarded only a fraction of the actual harm,which may reduce the incentives to take legal action and, consequently, will leadto underdeterrence. A different approach to monitoring incentives in cases that pose inherentdifficulties in ascertaining causation is a centralized approach, relying onadministrative regulation to enforce optimal risk reduction. Several authors(Shavell (1984, 1993); Cooter and Ulen (1989, p. 420)) have examined theadvantages of relying on regulatory authorities to monitor and deter risk creationin the period before harm manifests itself. These authors have suggested thatregulation of safety may perform better than a risk-based liability system inpreventing mass torts. The main justifications for the superiority of a regulatoryregime are: (1) The government may be a better information-gatherer than theinjurer; (2) Injurers may be judgment proof in catastrophic harms, thus liabilitywill not generate sufficient deterrence; (3) Suits may not be brought in all cases,due to their costs and to victims' lack of information, thereby diluting thedeterrent effect of liability; (4) Administrative costs of decentralized liabilityregimes may be higher. Uncertainty over causation may involve another dimension. Apart from thedifficulty of identifying the actual cause-in-fact -- the party whose act caused theparticular accident -- courts may face the difficulty of determining the relativecausal share of each of several tortfeasors. There may be information as to theprobabilistic contribution of each act -- what ex ante risk each act imposes -- andhow the risks change when acts occur simultaneously. However, when two actsoperate simultaneously to cause harm, the contribution of each act to thecombined risk has to be determined before courts can apply either the thresholdprobability approach or the proportional liability approach. This determinationinvolves a "disentanglement" of the harm-production process, a logical exercisewhich has proven to be problematic. To illustrate the problem, imagine two fires that are set simultaneously andindependently and combine to destroy a field. It is estimated that, ex ante, thefirst fire alone had a 10% chance of destroying the field, the second fire alonehad a 20% chance, and together they had a 50% chance of destruction. That is,their joint operation creates a synergistic effect. If both fires were set and thedestruction occurred, how should liability be divided across the two "causes"?Or, suppose a particular illness can be contracted either by use of a product (1%)or, independently, by smoking (4%). However, if an individual both uses theproduct and smokes, the risk increases to 15%. Again, a significant synergisticeffect exists. What fraction of the harm can a smoker that has used the productrecover from the manufacturer? In both examples, how should the synergisticeffect arising from the multiple causes joined together be divided across thecausal contributors? The problem of allocating the shares of liability in accidents that havemultiple causes is said to have "generated a bewildering variety of legal rulesand nomenclature" ( Kaye and Aickan (1984)), and have perplexed scholars whoexpressed "doubts that there exists a single factotum satisfactory formula fordividing damages" (Kruskal (1986)). The first systematic treatment of the causalapportionment problem was offered by Rizzo and Arnold (1980) (see also Rizzoand Arnold (1986)). These authors proposed an apportionment scheme thatassigns to each act a share of liability that consists of two elements. The firstelement is proportional to the act's "marginal product", which Rizzo and Arnolddefined to be the probability of harm given this act operating alone. The secondelement is a fraction of the synergistic effect, which Rizzo and Arnold arbitrarilyselected to be one half. In the literature that followed, Rizzo and Arnold's allocation scheme wasgenerally rejected. Kaye and Aickan (1984) found flaws with the statisticalframework applied by Rizzo and Arnold, as well as with the material justificationsfor the apportionment scheme. In particular, Kaye and Aickan suggested thatRizzo and Arnold's definition of an act's marginal product -- the increase in theprobability of harm, given this act operating alone -- is no more appropriate thanmany other possible definitions, such as the incremental increase in theprobability of harm, given that the other act is also operating. Kaye and Aickanargued also that there is no one logical way to divide the synergistic effectacross the acts, and thus logic alone cannot provide a guideline for resolving thecausal apportionment problem. Hence, any apportionment scheme should beevaluated mainly according to the incentive effects it generates. Further criticism of Rizzo and Arnold was voiced by Kruskal (1986), Kelman(1987) and Rose-Ackerman (1990), who again claimed that there is no oneprincipled way to apportion damages that will not be arbitrary and that will makeeconomic sense. An alternative to the Rizzo and Arnold method of defining anact's marginal product can be derived from the cooperative game-theory conceptof the Shapley value. This method offers a more structured way to define an act'smarginal product, based on its expected marginal contribution to the probabilityof harm, averaged over all possible combinations of acts (see Ben-Shahar(1996).) While this approach enjoys some intuitive appeal that the previousmethod did not have, it has the similar shortcoming in its reluctance to considerthe ex ante effects of the apportionment rule on the incentives for care amongmultiple tortfeasors. When multiparties are responsible for an injury, there may not exist anapportionment rule that leads to efficient incentives and keeps total liabilityequal to harm. To provide the right incentives to all parties, damages exceedingfull harm may need to be assigned. For example, Landes and Posner (1980, 1987,p. 193-201) have focused on the effects of liability apportionment on incentivesfor care under the negligence regime. They have argued that joint tortfeasors canbe led to take due care under a no-contribution rule -- that is, a rule that makeseach party liable for the entire damage and allows the victim to determine eachtortfeasor's liability share. If the total cost of care is less than the expected harm,at least one of the injurers will have the incentives to take due care (his cost ofcare is less than half the expected harm), thereby placing the entire liability onthe other and leading the other to take due care as well. (See also Wittman (1981)for a related argument in a joint but sequential care setting.) Thus, in thecelebrated case of Summers v. Tice, 199 P.2d 1 (1948), where two huntersindependently and simultaneously fired in the direction of a victim but only one-- unidentified -- hit, joint liability with no contribution will lead both to takeoptimal care. Notice that a doctrinal justification for making each hunter fullyliable can be obtained through Porat and Stein's (1997) idea of liability foruncertainty. Each hunter is liable since, but for his action, the apportionmentdifficulty would not have existed: either the fatal bullet was shot by him, inwhich case but for his action there would have been no injury, or the fatal bulletwas shot by the other, in which case but for his action there would have beenno uncertainty. The problem with the negligence-based no contribution rule is that it maylead injurers to engage in excessive levels of activity. Miceli and Segerson (1991)study a different apportionment rule, one that would potentially lead jointtortfeasors to take efficient care and make efficient activity decisions. Theypropose a "decoupled" strict liability regime, under which each tortfeasor paysa sum equal to the difference between actual damages and the damages thatwould have resulted were he inactive. That is, all tortfeasors are held strictlyliable simultaneously, but each receives a "credit" for the expected damages thatwould have occurred in his absence. Since this rule may lead to paymentexceeding actual harm, the excess can be paid as a fine to the state. Whether the objective probability of an accident is low or high should not initself affect its inclusion or exclusion from the scope of liability. As Shavell(1980) explained, even if the probability of the harmful consequence is verysmall, the act that is the cause of the increase in probability should carry liability.The effects on incentives to take care and on the level of activity will becorrespondingly small, as they ought to be. In addition, the added expectedadministrative costs of adjudicating a low-probability event are small, sincethese costs will be incurred only with a small probability. Thus, the benchmarkclaim is that whenever an act is a necessary cause of the harm, liability shouldfollow (see also Rizzo (1981)). However, to determine the incentive effects that any scope of liabilitygenerates, it is not the objective probability of harm that matters, but thesubjective probability -- the ex ante assessment of the possible consequencesas it is made by the injurer. Calabresi (1975) was the first to state explicitly thatthere is no sense in trying to deter an act which is a necessary cause of theinjury by threatening to impose liability on an injurer who assigns a subjectiveprobability of zero to the injury. An injurer who does not foresee a harmfulconsequence cannot be meaningfully labeled the least-cost avoider. As Shavell(1980) clarified and generalized, whenever the subjective probability is very lowin absolute terms, and lower than the objective probability in relative terms,liability will not produce sufficient ex ante behavioral effects to justify theincrease in the costs of dispute resolutions. Thus, under the doctrine ofunforeseeability, accidents whose probabilities are likely to be underestimatedby injurers should be excluded from the scope of liability. (But see Rizzo (1981)for an alternative view, advocating the use of objective probabilities indetermining the abnormality of events.) It may be that an injurer does not foresee some specific low-probabilityconsequences that subsequently materialize. However, the same injurer may stillbe in a position to associate an activity with unforeseen risks. The injurer mayrecognize a large variance of outcomes even if it does not recognize the natureof each outcome in the distribution. In this case, assigning liability forunforeseen harms will have the desirable effect of reducing the level of anactivity that is known, ex ante, to cluster many unforeseen risks (see Shavell(1980), Landes and Posner (1987, p. 250)). For example, handing a loaded gun toa child leads to many unforeseeable risks (apart from the obvious ones), and canbe deterred by imposing liability on this action. Of course, when injurerssystematically fail to recognize the unforeseeable consequences of their actions,other forms of deterrence may be required, such as criminalizing the actions (seeCalabresi (1975)). The scope of liability for low probability events has another important effect,in determining the incentives of potential injurers to investigate and contemplatethe potential consequences of their actions. That is, the amount of informationindividuals have regarding risk and risk avoidance can be thought of asendogenous, influenced in part by liability rules. The effects of liability rules onthe incentives to acquire accurate information ex ante have been studied in moregeneral contexts by several authors (see, e.g., Kaplow and Shavell (1992, 1996),Shavell (1992), Ben-Shahar (1995)). Specifically, as the scope of liability forlow-probability harms expands, individuals will have greater incentives to learnand anticipate these harms, and to take proper measures to avoid them (orliability for them). Thus, the unforeseeability doctrine should be replaced by adoctrine of "expensive foreseeability": only risks that are too costly to anticipateand foresee will be excluded from the scope of liability. Therefore, in operatingthe hand formula to determine whether lack of care should be considerednegligent, courts have to account not only for the direct costs of care, but alsofor the costs of foresight (Calabresi (1975); Grady (1984); Landes and Posner(1987, p. 239-247)). The concept of unforeseeability in tort law differs from the concept ofunforeseeable damage in contract law. The tort doctrine excludes only "freak"accidents from the scope of liability and serves to avoid unnecessary disputeresolution costs. The contract doctrine serves only to limit damages to theaverage, reasonable, level. However, in economic terms, both tort and contractdoctrines can be justified by their effects on ex ante information acquisition. Thelimited scope of liability in tort should apply only when the risk is too costly forthe injurer to anticipate, thus it creates incentives to foresee. The limited scopeof liability in contract has the important effect of inducing high-risk contractualparties to reveal their idiosyncratic traits ex ante, so as to secure fullcompensation and to reduce the chance of breach (See Bebchuk and Shavell(1991)). Two prominent tort doctrines can further illustrate the role of foreseeabilityin monitoring incentives. The first doctrine distinguishes between categories ofharms and can be illustrated by the well-known case of Palsgraff v. Long IslandR.R. (162 N.E. 99 (1928)). In that case, as the result of a railroad employee'snegligence, a parcel containing fireworks fell from the train, exploded and causedthe crowd to panic and to knock down scales that were standing on the otherplatform, in a manner that injured a passenger. Since the employees did not knowof the parcel's content, the court found the harm to be unforeseeable and outsidethe scope of negligence. This result is found by most economic writers to bejustified (see Calabresi (1975); Shavell (1980); Landes and Posner (1983, 1987, p.246-247)). Since the injurer discounted the probability of that type of accident,liability would not have generated better incentives and would not have led toprevention of the accident. The injurer may be the least-cost avoider withrespect to losses from injuries to passengers and, at the same time, not theleast-cost avoider with respect to non-passengers. Making the railroad liable forinjuries to non-passengers from acts that were negligent due to the risk theyposed to passengers will either have no effect in reducing risks tonon-passengers, or may lead the railroad to engage in socially excessiveinvestments to identify freak accidents. Another well-known tort law doctrine is the eggshell skull doctrine,according to which courts impose liability for bodily harm equal to the fullseverity of the injury, even if the extent of the injury was unforeseeable due toa pre-existing condition of the victim. This may seem to contradict the basiceconomic insight, which established that when the probability of a high loss issystematically underestimated, holding the injurer liable for the total loss doesnot increase the incentive to take care (Shavell (1980)). However, as Landes andPosner (1983, 1987, p. 249-250) have explained, there is economic sense inholding liability for an unforeseeable extent of injury. First, allowing onlyaverage damages could potentially generate optimal care incentives, but only ifcarried out in all cases, including in cases in which victims have "thick skulls"(that is, awarding these victims average damages despite the fact such damagesare known to overcompensate them). Put differently, if at the high end of thedistribution of harms liability is capped, but at the low end of the distributionliability equals actual harm, average liability will fall short of average harm andthe incentives for care will be diluted. As long as victims with low-harms gettheir actual damages, victims with egg-shell skulls should also get their fulldamages, to maintain the correct level of average liability ex ante (see alsoKaplow (1994); Kaplow and Shavell (1996)). In addition, liability for an unlimitedextent of injury may have a desirable activity-reducing effect, resulting frominjurer's de-facto strict liability. The restriction on the scope of liability that the causation requirement embodieshas, in itself, an ambiguous effect on the administrative costs of the legalsystem. A restricted scope leads to a lower volume of suits that are filed, savingthe litigation costs in cases that are clearly outside the scope of liability. On theother hand, if the scope is unrestricted there may be less harms (through areduction in the level of activity) and thus less suits, and each suit that is filedmay be less costly to litigate, as there is no causation issue to resolve. (SeeShavell (1980, 1987, p. 109); Landes and Posner (1983).) Informational imperfections and their legal treatment have important effectson the costs of resolving disputes. When courts are uncertain about causation,a significant portion of the trial effort may be devoted to disentangling thecausation process. Applying simple standards such as thepreponderance-of-the-evidence rule may reduce administrative costs,sufficiently so to overshadow its inferior incentive effects. Similarly, when thecourt's ex post assessment of the probability of harm exceeds the injurer's ex anteassessment, administrative costs of determining liability may tip the scaletowards categorizing the harm as unforeseeable. Lastly, when causation isdifficult to verify ex post, but probabilitic linkage is known to exist ex ante, thecosts of decentralized dispute resolutions may exceed the costs of a centralizedregulatory scheme, outlining the proper bounds of the civil liability system. Abel, Richard L. (1986), 'Should Tort Law Protect Property Against Accidental Loss?', 23San Diego Law Review, 79-123. Assmann, Heinz-Dieter (1988), 'Multikausale Schäden im deutschen Haftungsrecht(Multicausal Injuries in German Tort Law)', in Fenyves, Attila and Weyers, Hans-Leo(eds.), Multikausale Schäden im modernen Haftungsrechten, Frankfurt a.M., Metzner,99-151. Barnes, David W. and Stout, Lynn A. (1992), Economic Analysis of Tort Law, WestPublishing Company. Bebchuk, Luci an Arye and Shavell, Steven (1991), 'Information and the Scope of Liabilityfor Breach of Contract: The Rule of Hadley vs. Baxendale', 7 Journal of Law,Economics, & Organisation, 284-312. Ben-Shahar, Omri (1996), 'Multiple Causation and the Shapley Value: A Note onApportionment of Damages'. Borgo, John (1979), 'Causal Paradigms in Tort Law', 8 Journal of Legal Studies, 419-455. Burrows, Paul (1984), 'Tort and Tautology: The Logic of Restricting the scope of Liability',13 Journal of Legal Studies, 399-414. Calabresi, Guido (1975), 'Concerning Cause and the Law of Torts: An Essay for HarryKalven', 43 University of Chicago Law Review, 69-100. Celli, Andrew G., Jr. (1990), 'Toward a Risk Contribution Approach to TortfeasorIdentification and Multiple Causation Cases', 65 New York University Law Review,635-692. Cooter, Robert D. (1987), 'Torts As the Union of Liberty and Efficiency: An Essay onCausation', 63 Chicago-Kent Law Review, 522-551. Cooter, Robert D. and Ulen, Thomas S. (1986), 'An Economic Case for ComparativeNegligence', 61 New York University Law Review, 1067-1110. Crasswell, Richard and Oalfee, John E. (1986), 'Deterrence and Uncertain Legal Standards',2 Journal of Law and Economics, & Organisation, 279-303. Culp, Jerome M. (1986), 'Causation, Economists, and the Dinosaur: A Response to [CausalJudgment in Attributive and Explanatory Contexts]', 49(3) Law and ContemporaryProblems, 23-46. Delgado, Richard (1982), 'Beyond Sindell: Relaxation of Cause-in-Fact Rules forIndeterminate Plaintiffs', 70 California Law Review, 881-908. Epstein, Richard A. (1979), 'Causation and Corrective Justice: A Reply to Two Critics', 8Journal of Legal Studies, 477-504. Epstein, Richard A. (1987), 'Causation - in Context: An Afterword', 63 Chicago-Kent LawReview, 653-680. Farber, Daniel A. (1990), 'Recurring Misses', 19 Journal of Legal Studies, 727-737. Faure, Michael G. (1993), (G)een Schijn van Kans. Beschouwingen over het StatistischCausaliteitsbewijs bij Milieugezondheidsschade (No chance. Reflections on StatisticalCausation and Environmental Health Damage), Antwerpen, Maklu, 68 p. Grady, Mark F. (1983), 'A New Positive Theory of Negligence', 92 Yale Law Journal,799-829. Grady, Mark F. (1984), 'Proximate Cause and the Law of Negligence', 69 Iowa Law Review,537-573. Grady, Mark F. (1988), 'Discontinuities and Information Burdens: Review of the EconomicStructure or Tort Law by William M. Landes and Richard A. Posner', 56 GeorgeWashington Law Review, 658-. Grady, Mark F. (1989), 'Untaken Precautions', 18 Journal of Legal Studies, 139-156. Kaye, David (1982), 'The Limits of the Preponderance of the Evidence Standard: JustifiablyNaked Statistical Evidence and Multiple Causation', American Bar Foundation ResearchJournal, 487-516. Kaye, David and Aickin, Mikel (1984), 'A Comment on Causal Apportionment', 13 Journalof Legal Studies, 191-208. Kelman, Mark G. (1987), 'The Necessary Myth of Objective Causation Judgments in LiberalPolitical Theory', 63 Chicago-Kent Law Review, 579-637. Kruskal, William (1986), 'Terms of Reference: Singular Confusion about Multiple Causation',15 Journal of Legal Studies, 427-436. Landes, William M. and Posner, Richard A. (1983), 'Causation in Tort Law: An EconomicApproach', 12 Journal of Legal Studies, 109-134. Landes, William M. and Posner, Richard A. (1984), 'Tort Law as a Regulatory Regime forCatastrophic Personal Injuries', 13 Journal of Legal Studies, 417-434. Levmore, Saul (1990), 'Probabilistic Recoveries, Restitution, and Recurring Wrongs', 19Journal of Legal Studies, 691-726. Marino, Anthony M. (1991), 'Market Share Liability and Economic Efficiency', 57Southern Economic Journal, 667-675. Marks, Stephen V. (1994), 'Discontinuities, Causation, and Grady's Uncertainty Theorem',23 Journal of Legal Studies, 287-301. Miceli, Thomas J. (1996), 'Cause in Fact, Proximate Cause, and the Hand Rule: ExtendingGrady's Positive Economic Theory of Negligence', 16 International Review of Law andEconomics, 473-482. Miceli, Thomas J. and Segerson, Kathleen (1991), 'Joint Liability in Torts: Marginal andInfra-Marginal Efficiency', 11 International Review of Law and Economics, 235-249. Moore, Michael S. (1987), 'Thomson's Preliminaries about Causation and Rights', 63Chicago-Kent Law Review, 497-521. Polinsky, A. Mitchell (1972), 'Probabilistic Compensation Criteria', 86 Quarterly Journalof Economics, 407-425. Porat, Ariel and Stein, Alex (1997), 'Liability for Uncertainty: Making Evidential DamageActionable', 18 Cardozo Law Review, forthcoming. Posner, Richard A. (1979), 'Epstein's Tort Theory: A Critique', 8 Journal of Legal Studies,457-475. Rizzo, Mario J. (1981), 'The Imputation Theory of Proximate Cause: An EconomicFramework', 15 Georgia Law Review, 1007-1038. Rizzo, Mario J. (ed.) (1987), 'Symposium on Causation in the Law of Torts', 63Chicago-Kent Law Review, 397-680. Rizzo, Mario J. (1987), 'Foreword: Fundamentals of Causation', 63 Chicago-Kent LawReview, 397-406. Rizzo, Mario J. and Arnold, Frank S. (1980), 'Causal Apportionment in Tort Law: AnEconomic Theory', 85 Columbia Law Review, 1399-1429. Rizzo, Mario J. and Arnold, Frank S. (1986), 'Causal Apportionment: Reply to the Critics',15 Journal of Legal Studies, 219-226. Robinson, Glen O. (1985), 'Probabilistic Causation and Compensation for Tortious Risk', 14Journal of Legal Studies, 779-798. Rose-Ackerman, Susan (1990), 'Market-Share Allocations in Tort Law: Strengths andWeaknesses', 19 Journal of Legal Studies, 739-746. Rosenberg, David M. (1984), 'The Causal Connection in Mass Exposure Cases: "Public Law"Vision of the Tort System', 97 Harvard Law Review, 849-929. Rossello, Carlo (1990), Il danno evitabile. La misura della responsabilità tra diligenza edefficienza (Avoidable Damage: The Measure of Liability Between Due Care andEfficiency), Padova, CEDAM, 320 p. Schwartz, Alan (1987), 'Causation in Private Tort Law: A Comment on Kelman', 63Chicago-Kent Law Review, 639-651. Shavell, Steven (1980), 'An Analysis of Causation and the Scope of Liability in the Law ofTorts', 9 Journal of Legal Studies, 463-516. Shavell, Steven (1985), 'Uncertainty over Causation and the Determination of CivilLiability', 28 Journal of Law and Economics, 587-609. Thomson, Judith Jarvis (1987), 'Causality and Rights: Some Preliminaries', 63 Chicago-KentLaw Review, 471-496. Weinrib, Ernest J. (1987), 'Causation and Wrongdoing', 63 Chicago-Kent Law Review,407-450. Wittman, Donald A. (1981), 'Optimal Pricing of Sequential Inputs: Last Clear Chance,Mitigation of Damages and Related Doctrines in the Law', 10 Journal of Legal Studies,65-91. Wright, Richard W. (1985), 'Actual Causation vs. Probabilistic Linkage: The Bane ofEconomic Analysis', 14 Journal of Legal Studies, 435-456. Wright, Richard W. (1987), 'The Efficiency Theory of Causation and Responsibility:Unscientific Formalism and False Semantics', 63 Chicago-Kent Law Review, 553-578. Ben-Shahar, Omri (1995), 'Informed Courts, Uninformed Individuals, and the Economics ofJudicial Hindsight', 151 Journal of Institutional and Theoretical Economics, 613-630. Brown, John P. (1973), 'Toward an Economic Theory of Liability', 2 Journal of LegalStudies, 323-350. Calabresi, Guido (1970), The Costs of Accidents (New Haven: Yale University Press). Coase, Ronald C. (1960), 'The Problem of Social Costs', 3 Journal of Law and Economics,1-44. Cooter, Robert C. (1989), 'Punitive Damages for Deterrence: When and How Much?', 40Alabama Law Review, 1143-1196. Cooter, Robert D. and Ulen, Thomas (1989), Law and Economics (Harper Collins). Epstein, Richard (1973), 'A Theory of Strict Liability', 2 Journal of Legal Studies, 151-204. Hart, H.L.A., Honoré, Tony (1985),Causation in the Law (2d ed.), Oxford. Honoré, Tony (1983), 'Causation and Remoteness of Damages', in InternationalEncyclopedia of Comparative Law, Vol. XI(1). Kaplow, Louis and Shavell, Steven (1992), 'Private versus Socially Optimal Provision of ExAnte Legal Advice, 8 Journal of Law, Economics, and Organization, 317-320. Kaplow, Louis (1994), 'The Value of Accuracy in Adjudication: An Economic Analysis', 23Journal of Legal Studies, 307-401. Kaplow, Louis and Shavell, Steven (1996), 'Accuracy in the Assessment of Damages', 39Journal of Law and Economics, 191-209. Keeton, W. Page, Dobb, Dan, Keeton, Robert and Owen, David (1984), Prosser and Keetonon Torts (5th ed.), West Publishers. Landes, William M. and Posner, Richard A. (1980), 'Joint and Multiple Tortfeasors: AnEconomic Analysis', 9 Journal of Legal Studies, 517-555. Landes, William M. and Posner, Richard A. (1987), The Economic Structure of Tort Law,Cambridge, Harvard University Press. Roe, Mark (1984), 'Bankruptcy and Mass Tort', 84 Columbia Law Review, 846-922 . Shavell, Steven (1984), 'Liability for Harm versus Regulation of Safety', 13 Journal of LegalStudies, 357-374. Shavell, Steven (1987), Economic Analysis of Accident Law, Cambridge, Harvard UniversityPress. Shavell, Steven (1992), 'Liability and the Incentives to Obtain Information about Risk', 21Journal of Legal Studies, 257-270. Shavell, Steven (1993), 'The Optimal Structure of Law Enforcement', 36 Journal of Lawand Economics, 355-388. Berry v. Borough Of Sugar Notch, 43 A. 240 (1899). City Of Piqua v. Morris, 120 N.e. 300 (1918). Sindell v. Abbott Laboratories 607 P.2d 924 (1980). Palsgraff v. Long Island R.r. 162 N.e. 99 (1928). Summers v. Tice, 199 P.2d 1 (1948).
cc/2019-30/en_middle_0012.json.gz/line1550
__label__wiki
0.606569
0.606569
PVHN Research Finding Aids Project Index to Collections Bliss-Morris Collection C. H. Newton and Co. General Store and Palm Leaf Business Guide to the Hoyt Family Papers Guide to the Williams Family Papers Records of the Deerfield Woman’s Club, 1925-1991 Second Congregational Church, South Deerfield, Mass., 1818-2016 Carlos Vega Collection of Latino History in Holyoke, 1958-2012 Chapin Family Collection Early Springfield Manuscripts Pioneer Valley Symphony Orchestra Papers Skinner Collection Pocumtuck Valley Memorial Association Memorial Street, Deerfield, MA Scope and Content Note: The Second Parish church in the village of Bloody Brook, now known as South Deerfield, was founded in 1818 as residents in the southern half of the town of Deerfield demanded an alternative to traveling north some 6 miles to worship in the village of Deerfield, or crossing the Connecticut River to the church in Sunderland. A school house served as a meeting place before the construction of a church building in 1821. That building was moved to its present location on North Main St. in 1848. The move exacerbated ongoing disputes within the congregation, leading to the organization of the Orthodox Congregational Society, known as the Monument Church, also in 1848. The Monument Church building was erected just east of the Bloody Brook monument. The two churches operated independently until 1865, when members of both congregations voted to re-unite and worship in the original 1821 building. The reunification of the congregations necessitated an enlargement of the structure. In 1891, the Monument Church building became the home of St. James Roman Catholic church, and was moved to its present location on the west side of North Main St. [in 2008, the church merged with Holy Family Parish and shares a building on Sugarloaf Street]. The church records encompass all aspects of the Church’s functions. These include Sabbath school, ministry, council minutes, orders of worship, records of births and baptisms, annual reports, cultural events, youth groups, financial affairs, and membership records. The records were a gift of the Legacy Committee of the Second Congregational Church in December 2016. Container List: Vol. I. “Records of the 2d Congregational Church in Deerfield, organized June 30, 1818, Vol. I.” Continue until March 1828. Vol. II. “Records of the Second Congregational Church, in the Town of Deerfield, (Ma) Commencing with the ordination of Rev. Tertius S. Clarke, October 3d, 1827. Vol. II.” Continues until Oct. 17, 1848. Appendix entry (single page) by M. K. Cross, Pastor, Vol. III. “Records of the First Congregational Church in South Deerfield. Vol. III. Commencing Sept. 1850, with the installation of Rev. M. K. Cross.” Continues to Sept. 1865. Vol. IV. “Volume IV. Records of the Congregational Church of South Deerfield. Commencing Sept. 1865.” Continues to annual meeting, January 1891. Vol. V. Records of the Congregational Church of South Deerfield – Commencing with a meeting to incorporate, May 14, 1891 – October 27, 1910 Vol. VI. Records of the Congregational Church of South Deerfield – Commencing with the annual meeting, December 29, 1910 – December 31, 1925 Vol. VII. Records of the Congregational Church of South Deerfield, January 1926 – January 2, 1949 Vol. VIII. Minutes of the Church Council, June 24, 1954 – November 22, 1966 Vol. IX. Minutes of the Church Council – Commencing January 30, 1968 – March 13, 1979 “Vol. I, Records of the Congregational Parish of S.D., Sept. 1865-Feb. 1890” “Second Congregational Parish Book. No. 2nd. Record of Parish Deeds, 1821” (bound vol.) “Records of Parish Deeds, Pews, 1848-1856” (bound vol.) “Parish Records, Vol. II, April 1870-May 1891” (bound vol.) “Board of Deacons Chairperson’s Handbook” “Getting to Know You,” columns, from The Lamplighter, 1995-2004, with index “Our Church Guests,” register, 1958-1972 Sabbath School library records, 1887-1902. In Peloubet’s Complete Sunday School Library Register Box 1: Records of the Orthodox Congregational Society (Monument Church), S. Deerfield: Fol. 1: Deed and correspondence, 1866; 1879 Record book of the Orthodox Congregational Society, S. Deerfield, Oct. 1848-March 1864 (1 bound vol.) “Records of the Monument Church,” 1848-1860 with later lists of members, funerals, baptisms, etc.; 1861-62 (2 bound vols.) Records of the Second Congregational Church, S. Deerfield: Fol. 1: Warrants and votes, 1827 Fol. 2: Petitions, proposals, 1817; undated Fol. 3: Financial records, 1829-1832 and undated Fol. 4: Building committee account book, 1848; land deed, 1856 Fol. 5: Sunday school, 1890; undated Fol. 6: Women’s Missionary Society meeting book, 1936-1941 Fol. 7: Miscellaneous, 1877-1979 Record book of the Sabbath School Association, Oct. 1867-Dec. 1881 (1 bound vol.) Box 2: Fol. 1: Adult Study Fol. 2: Annual meetings – announcements, minutes, etc. Fol. 3: Board of Deacons Fol. 4: Building Committee Fol. 5: Bylaws Fol. 6: Church closure Fol. 7: Church Council Fol. 8: Church Council meeting highlights Fol. 9 Church facilities, use of Fol. 10: Church history Fol. 11: Church school Fol. 12: Church yearbook reports Fol. 13: Committees (misc.) Fol. 14: Conferences, workshops, events Fol. 15: Confirmation Fol. 16: Correspondence, 1949-1985 Fol. 17: Correspondence, 1986-2007 and undated Fol. 1: Deacons meetings Fol. 2: Death & dying Fol. 3: Finances Fol. 4: Franklin Assoc., Mass. Conference of Churches Fol. 5: Franklin Co., Senior Services lawsuit Fol. 6: Fund raising Fol. 7: General Council of Congregational Christian Churches Fol. 8: In-Between Club Fol. 9: “Kitchen Theology” Fol. 10: Ladies Aid Society Fol. 11: Mass. Conference Worship Commission Fol. 12: Membership Fol. 13: Memorial Funds/Gifts, A-F Fol. 1: Memorial Funds/Gifts, S-W Fol. 2: Memorial Funds/Gifts, G-J Fol. 3: Memorial Funds/Gifts, K-R Fol. 4: Nominating Committee Fol. 6: One hundred fiftieth anniversary Fol. 7: Ordination sermons Fol. 8: Organ Fol. 9: Pastoral Counseling Center Fol. 10: Pastoral search/compensation review Fol. 11: Pastors (reports, etc.) Fol. 12: Pew Bibles Fol. 13: Physical plant Fol. 14: Safe Church policy Fol. 15: Senior Church School Fol. 16: Senior Pilgrim Fellowship Fol. 1: Special Meetings, announcements/minutes Fol. 2: Tandem Club Fol. 3: Trustee meeting, 1995 Fol. 4: Trustee minutes/reports Fol. 5: Vacation Bible School Fol. 6: Wedding certificates Fol. 7: Youth forum Fol. 8: Youth Rally, 1974-1975 Treasurer’s ledger, 1961-1964 (bound vol.) “New Beginnings Assessment” (2013) (spiral-bound vol.) “Parish Self-Appraisal, June 25, 1987” Parish Self-Appraisal binder Box 6: Plays, 1993-2013, performed by Fellowship Players, Uncommon Players. Programs, publicity materials, photographs, correspondence, financial statements, etc. Box 7: Church Council reports, 1954-1966 (bound vol.) Church Council reports, 1968-1979 (bound vol.) Minutes of Church Council Meetings, 1979-2007; 2013; 2015- 2016 Annual reports, 1977-2015 Church Directory, 1990; 2004; 2006 “A Lenten Journey,” 2004; 2005; 2008-2013; 2016 “Record Book of Ladies Serving Society Congl. Church South Deerfield Mass.,” Oct. 1904-Oct. 1915 “Record book of the Ladies Aid Society Congl. Church South Deerfield Massachusetts,” Oct. 1921-May 1930 Ladies Aid Society, reports 1934-1941 (bound vol.) Ladies Aid Society, reports, 1967-1972 (bound vol.) Ladies Aid Society, Treasurer’s Book, 1947-1975 (bound vol.) Orders of Worship, 1968-1979 Sabbath School record books, 1867-1881 Sabbath School record books, 1882-1886. Kept in Hoyt’s Improved Sunday School Record Book Sabbath School record books, 1887-1889; 1893; 1896. Kept in Peloubet’s Complete Sunday School Record Book Sabbath School record book, 1896. Kept in Pilgrim Sunday School Record Book Sabbath School record books, 1890; 1892; 1893; 1897-1909; 1913- 1916. Kept in Southworth’s Complete Sunday School Record Book Sabbath School record book, 1916 Floor plans: Additions and Alterations to South Deerfield Congregational Church, Nov. 2003; Dec. 2007 Lamplighter (newsletter) 1987-2016
cc/2019-30/en_middle_0012.json.gz/line1555
__label__wiki
0.710112
0.710112
Seahawks dominate on all fronts in 40-10 win over Broncos Posted 10:20 PM, August 17, 2013, by Brett Cihon, Updated at 05:00AM, August 19, 2013 SEATTLE – Could a Hawks game make die-hard fans any happier than this one? Yes, yes. We know it’s preseason. But it was still a blowout against a good team. The Seahawks dominated the Denver Broncos across the board in a 40-10 victory Saturday night in the first preseason game at CenturyLink Field. The Hawks, who started out slow in their first preseason game against the San Diego Charges, didn’t wait around long. Quarterback Russell Wilson, who put up fairly pedestrian numbers in the first game, got the game off to a ruckus start in a hurry. After the Seahawks defense stopped Payton Manning’s first drive, Wilson capped a 10-play, 65-yard drive with a 12-yard pass to Wide receiver and former Huskies standout and undrafted second year-player Jermaine Kearse. A quick footed Wilson looked uncomfortable at times, overthrowing a number of open wide receivers. Still, Wilson went 8-for-12 with two touchdowns and 127 yards passing. Tavaris Jackson looked good again too, going 4-for-7 with 93 yards and one touchdown to Wide Receiver Stephen Williams. Jackson is in competition with Brady Quinn, who was the third Seahawks quarterback to enter the game, going 3-for-4 with 13 yards. As good as the offense looked, it was the defense and special teams that made the jaw-dropping plays. The roller coaster Hawks’ defense gave up 163 yards to Manning but held him when it counted to just one touchdown. Most notably, the defense force three fumbles, with one fumble recovered in the Hawks’ own end zone and returned 106-yards by Brandon Browner with 9:12 left to go in the second quarter, hypothetically breaking the previous 104-yard regular-season fumble return record. The Seahawks secondary – popularly known as “The Legion of Boom” – also looked strong, with Safety Kam Chancellor recording 11 tackles and Linebacker Bobby Wagner clocking in for eight. Kearse, scoring on a touchdown pass from Wilson, also returned a kick 107 yards for a TD with 1:52 left in the first quarter. Golden Tate looked strong attain in his role as a punt returner and wide receiver, catching two passes for 42 yards and returning a punt 33-yards. The Hawks will look to continue to whittle down their stacked roster before they face the Green Bay Packers at 5 p.m. Aug. 23 at Lambeau Field. Minutes of the game here: [10:18] — Sorry for the lack of updates lately, the game has turned into a bit of a slog with the Hawks up by so much. Two minute warning has the Hawks still up 40-10 [9:55] — Broncos get a field goal. A lot of backups in as the Hawks lead 40-10 with 10:33 left in the game. [9:42] — Brady Quinn in at QB for the Hawks. Tavaris Jackson looked strong again, going 4-for7- with one long touchdown to Stephen Williams. [9:31] — Woah. Another TD on a pass from Jackson to WR Stephen Williams. Williams and T-Jack connected quite a few times last week, and then follow it up again with this 38-yard TD pass. Hawks lead 39-7 with 3:30 left in the third quarter. [9:20] — Kicker Carson Wiggs misses a long field goal for the Hawks. Wiggs is the Hawks’ backup place kicker at the moment. Don’t see him taking field goals too often in the regular season. [9:17] — There’s the old Tavaris Jackson we’re used to seeing. Jackson rushes to pick up 17 yards. The Hawks have the ball on their own 48. [9:13] — 4-and-outs for both teams. Hawks get the ball on a punt return around their own 40-yard line. Special note: Marshawn Lynch touched the ball twice for a total of one yard. Don’t expect to see him too much more in the preseason. Got to keep Beast Mode’s body in shape for all of the regular season hits he’ll take. [9:06] — Tavaris Jackson is in as the Seahawks start the second half. He hopes to follow up a stellar performance in the Hawks’ first preseason game. Wilson went 8-for-12 with 127 yards passing and 2 TDs. Seahawks lead the Denver Broncos 33-7 at the end of the first half. [8:48] — Another passing touchdown from Wilson to Sean McGrath, but Hauschka misses the extra point. Hawks go up 33-7 with 32 seconds left in the first half. Hawks are dominating the game on all levels so far. [8:41] — Another turnover by the Seattle Defense. Oswieler stripped in the backfield, and Aaron Schofield recovers. Hawks have the ball on the Broncos 38. Wilson is still in the game for his fifth drive. Looking to run a two minute offense. [8:36] — Hawks and Runningback Robert Turbin can’t convert on fourth down. Denver takes over on downs on their own 38. Starting to see more defensive backups come in. [8:33] — Wilson is still out on the field for his fourth drive of the game. He is 5-for-8 with 93 yards and 1 TD so far. Hawks have the ball on the Denver 46. [8:28] — Manning is out of the game for the Broncos. Brock Osweiler is in. Manning looked strong, but was stifled by a number of turnovers. Manning went 11-for-16 with 163 yards and 1 TD. [8:23] — Hawks up by 20 after a 41-yard field goal from Steven Hauschka. Hawks lead 27-7 with 6:03 left in the first half. Quite different from last week’s slow start, huh? [8:20] — Hey, look. It’s the Seahawks offense. This is the first time Wilson and the rest of the O has touched the ball in 43 minutes. No need when your defense is doing all the work, I guess. [8:09] — I can’t believe this. Hawks recover a fumble in their own endzone and run it out for a touchdown. A 100-yard fumble recovery for a touchdown by Brandon Browner. The fumble was caused by Linebacker Heath Farwell to put the Hawks up 24-7 with 8:03 left in the game. [8:06] — Broncos complete a 4th Down conversion. Have the ball 1st and goal on the 2 yard line of the Hawks. [7:58] 2nd Quarter — Broncos have the ball on their own 45. Both teams still have a majority of their starters in at this point. [7:50] — Jermaine Kearse returns a kickoff for a touchdown! What a run. 107 yards. The Hawks go up 17-7 with 1:40 left to go in the first quarter. What a way to answer the Bronco’s TD. [7:48] — Manning completes an 11-yard touchdown pass to Wes Welker. The TD caps off a 9-play 80-yard touchdown drive. Seahawks lead 10-7 with 1:52 left to go in the first quarter. [7:45] — Big 33-yard completion from Manning on third down to put the Broncos 1st-and-10 on the Hawks’ 15-yardline. Lets see how the Hawks goal-line Defense holds up. [7:42] — Bobby Wagner sacks Peyton manning for a 3-yard loss. Hawks are hot, baby. [7:39] — Steven Hauschka hits a 42-yard field goal after a Hawks penalty pushes the team back. Hawks lead 10-0 with 5:03 left in the first quarter. [7:35] — Can’t stop the Hawks! Wilson completes a 33-yard pass to Golden Tate to put the Hawks at the Broncos 21. [7:32] — Hawks defense creates another turnover. A Manning pass to Julius Thomas is stripped by Brandon Browner. This is the third turnover forced by the Hawks’ defense so far this preseason. It follows a long Manning completion. [7:27] — Touchdown Seahawks! Hawks score on a 12-yard pass from Wilson to Wide Reciever Jermaine Kearse. The TD caps a 10-play, 65 yard drive to put the Hawks up 7-0 with 8:37 left in the first quarter. [7:20] — Bit of a stall here as a Broncos defensive lineman, Derrick Wolf, needs to be carried off the field in the stretcher. Even brought out the ambulance. Hate to see that in a preseason game. Hawks have the ball within the Broncos 10-yard line. A good mix of run and pass so far from the Hawks. [7:16] — Wilson, baby! Sean McGrath catches a 23-yard pass from Wilson to the Broncos 20. [7:15] — The Hawks are driving into Bronco territory. However, the Hawks have already received two holding penalties for a total of 20 yards, really putting a damper on the progress. [7:12] — There we go, Russell. Wilson completes his first pass attempt on the first play of the game to Golden Tate for 9 yards. The Hawks get the first down on a short Robert Turbin run. [7:08 p.m.] — Manning passes three times but only completes one and the Hawks force a 3-and-out. Golden Tate signals for a fair catch and the Hawks take over on their own 35. [7:00 p.m.] First Quarter — Kickoff! Seahawks kick to the Broncos for a touchback. Filed in: News, Seahawks I'm never really sure how much import we should give these preseason games, but they are exciting! Is 75 on the Broncos okay? I havent heard anything about him since he was hauled off in an ambulance at the beginning.. Jckhmr they reported he was moving all his extremities (hands and feet). Hickenbottom Tell the announcer to stop saying physicality on TV. It’s getting real annoying b Why no mention that the NFL record for longest fumble return for a TD is Jack Tatum's 104 return, like 40 years ago! Browner's was 106… OK, so it's preseason, still it's longer than the record. Linda Ellis I think the announcers need to understand there is a game being played – interviews should happen after the game or only between plays so they don't interfere! Kam not Cam frustrated viewer loved the game but the announcer made me crazy, less chatter and more relevant conversation, not “look how well he fills out that helmet” – give me a break, aren’t the helmets fitted. John Fuller Another dreaded season of absolutely ridiculous traffic jams in downtown Seattle for people that work every day to get caught in for two freaking hours. SEATTLE SPORTS SUCKS!!!!!! Angela Rock All I have to say to my Seahawks is……. Lets go all the way Lyrics by ICP!!!!! Go Seahawks!!!! Sounders FC announces 2019 broadcast lineup on Q13 FOX & JOEtv The renewed partnership continues the tenure of Q13 FOX and JOEtv as the regional TV home of the Rave Green throughout Western Washington. Nestle introduces a new kind of refined sugar-free chocolate Seahawks Sports Seahawks Draft Central: The 10 best fits among defensive backs in the 2019 NFL draft Seahawks Draft Central – The 10 best fits along the defensive line in the 2019 NFL Draft Seahawks Draft Central: The 10 best fits at wide receiver in the 2019 NFL Draft Seahawks draft Mississippi wide receiver DK Metcalf Instagram Seahawks Seahawks announce ‘difficult decision’ to part ways with Doug Baldwin, Kam Chancellor Seahawks offensive line not a major concern for a change Between new picks and veterans, K.J. Wright says Seahawks have the best linebacking core Seahawks announce 2019 preseason schedule – all games on Q13 FOX Seahawks Draft Central: Projecting Seattle’s plan if the top edge rushers are gone NFL releases Seahawks 2019 regular season schedule New deal with Seahawks makes Russell Wilson highest-paid NFL player Russell Wilson looking at next decade after new deal with Seahawks Seahawks land WR Metcalf, S Blair in 2nd round
cc/2019-30/en_middle_0012.json.gz/line1557
__label__cc
0.668305
0.331695
Shakespeare by Bogusławski We have already celebrated the big Shakespeare anniversary with our design of all his covers but we have (at least) one more thing to share on this occassion. The most obvious design field connected with Shakespeare are theater posters for his plays and a while ago we started researching those to write about them for the anniversary. But in the end we decided to write only about one designer and his work because it’s so damn good. Our admiration is only slightly colored by the fact that this designer taught both of us about design (and taught us a lot). The designer in question is professor Tomasz Bogusławski, who is a representative of the so called Polish school of posters – one of a later generation, who uses more modern techniques than his predecessors. Professor Bogusławski creates, among other things, theater posters, often just for the sake of design not for actual theater productions. The posters use photography of common or unusual objects photographed in a way which both emphasizes their materiality and gives them metaphorical or metaphysical depth. The three Shakespeare posters below are great examples of his unique, confident style and they also reflect well the gloom and mystery of Shakespeare’s tragedies mixed with their realistic element. Poster for Hamlet, with bread and a fancy knife. The posters are for “Teatr Rekwizytornia” (something like “props storage room theater”, I guess, which sounds better and more punny in Polish), an imaginary theater Bogusławski made up to create his self-commissioned posters. The poster for King Lear uses an old (shoe?) brush and the fact that it looks like an old man with hollowed eyes and a beard. It’s a great example of something that in Polish art schools is called “poster thinking”, where you look at things and see them in several ways at once. The image combines surreal humor and terror, much like the play itself, which is all you can ask from a poster. And possibly the strongest, certainly most straightforward and, to us, most memorable of the trio: Titus Andronicus with a head made of raw meat and a twig suggesting Roman laurel (but also playing with the idea of dinner). Frankly, since we saw this poster we can’t conceive of any other image for this play and certainly none that would reflect its pointless brutality better. It’s possibly too much to hope for but as Tomasz Bogusławski is definitely one of the people who most influenced our thinking about design, maybe you can see some of that inspiration in some of our works. At any rate, we’re happy to share this series of works in honor of Shakespeare’s year. Pingback: Shakespeare by Bogusławski — re:blog – Literele sufletului meu Laura (PA Pict) said: May 9, 201612:41 pm Wow! I wish these posters had been around when I was teaching Shakespeare. I love how visually punchy they are, how simple yet with layers of meaning and complexity. The designer is very gifted. re:ramble said: May 9, 20162:04 pm He’s one of giants.
cc/2019-30/en_middle_0012.json.gz/line1561
__label__cc
0.729054
0.270946
Katrina Kaif and Fawad Khan pairing up! It has been revealed through the Mumbai Mirror, that Fawad Khan is all set to Romance with the Dhoom 2 girl, Katrina kaif in yet to be titled film. The film is to be directed by Aditya Dhar , it will be his debut. Movie is being produced by Karan Johar under Dharma productions. The film will be shot in the north India and will be in a complete desi style. As according to the story both hero and heroine belong to Punjabi families and main story will revolve around them in a wedding function. Its great to see Fawad Khan working under such famous banners one after another. Good Luck Fawad! Actress Maya Ali Latest Clicks from her Recent Shoot Meer Abru Episode 26 & 27 – Story Review
cc/2019-30/en_middle_0012.json.gz/line1566
__label__wiki
0.81522
0.81522
SITELINES 06 By jo AUDIO BALLERINAS AUDIO BALLERINAS by Benoît Maubrey and Die Audio Gruppe at SITELINES 06, May 8 through 13, 2:30 pm; Venue: Elevated Acre at 55 Water Street, New York City; Admission: free. Benoît Maubrey is the founder and director of DIE AUDIO GRUPPE a Berlin-based performance group that build and perform with electroacoustic ('sounding') clothes. Basically these are electro-acoustic clothes, costumes and uniforms (equipped with batteries, amplifiers and loudspeakers) that create sounds by interacting with their environment. The Audio Gruppe's work is essentially site-specific. Usually the electronics are adapted into entirely a new "audio uniform" or "sonic costume" that reflect a local theme (AUDIO HERD, AUDIO CYCLISTS, AUDIO STEELWORKER, VIDEO PEACOCKS, AUDIO VACUUM CLEANERS) or customs and traditions (AUDIO GEISHAS/Japan, AUDIO CYCLISTS/France, AUDIO HANBOK/Korea). The AUDIO BALLERINAS, initially conceived in 1990 for the festival LES ARTS AU SOLEIL in France where they used solar cells to power their Audio Tutus, have since developed a variety of choreographies using electronic instruments (digital samplers, light sensors, contact microphones, music sticks, and radio receivers) that allow them to work with the sounds, surfaces, electro-magnetic waves and physical topography of the space around them. The AUDIO BALLERINAS will be presenting 3 site-specifically adapted choreographies: the LINE (contact microphones and music sticks), PEEPERS (light-to-frequency sensors), and YAMAHA (movement sensors that trigger digital sounds). Alternative: APPLE RADIOS (solar cells and white noise). Benoît Maubrey was born of French parents in 1952 in Washington D.C. and graduated from Georgetown University in 1975. After working as a writer and painter and jobbing as hotel concierge in Bordeaux, Paris, New York and Washington DC, he moved to West Berlin in 1979 where he starting building Audio Clothes in 1982. After the fall of the Berlin Wall in 1992 he moved to the village of Baitz in former East Germany. His performance and sound art installations have been presented at many international festivals around the world. The SiteLines performances are choreographed by Mimi Messner (Berlin). Local dancers and assistants: Faith Pilger, Andrea Lieske, Samantha Speis, Eline Tan, Violette Olympia, Mira Mutka, Anna Whaley, Micah Killion, Herb Hernandez Contacts: Benoît Maubrey, Bahnhofstr. 47, 14806 Baitz Germany tel +49-33841-8265 fax: +49-33841-33121 cell phone in USA 202 374 4614 Lower Manhattan Cultural Council: Nolini Barretto tel: 212-219 9401 X119 This work was made possible, in part, by Franklin Furnace Fund for Performance Art, supported by Jerome Foundation in celebration of the Jerome Hill Centennial and in recognition of the valuable cultural contributions of artists to society.
cc/2019-30/en_middle_0012.json.gz/line1569
__label__cc
0.631022
0.368978
New Orleans City Guide In Transit: How to Navigate New Orleans Sarah Baird, Daisy Dee, Despite its relatively compact size, New Orleans can be a distinctly tricky town to navigate—for locals and visitors alike. But it’s not any particularly wonky directional twists and turns or logistical hurdles that make gliding from Point A to Point B so difficult: It’s the dueling forces of messy infrastructure and curiously draconian transportation options. How do you stop a few sinkholes or a traffic-camera ticket from spoiling a good time? Read on. Louis Armstrong New Orleans International Airport (MSY) First things first: The New Orleans airport is about a 30-minute drive away in nearby Kenner, which means you’re going to be in for a fairly pricey ride both coming and going, depending on traffic and time of day. (Naturally, avoid rush hour, when you can.) When landing, if you opt for a ridesharing service like Lyft over a cab, the pick-up location is tucked away in the parking garage across from the flow of arrival traffic, so be prepared for a bit of a strut. Have a delayed flight or a long layover? Dining options inside MSY have been dismal for years, but that’s all about to change thanks to a $807 million renovation (including a brand-new terminal) currently underway. What’s more, the upgrade—slated to finish in 2018—will feature a smorgasbord of new restaurants and bars from some of the city’s most celebrated chefs, like Susan Spicer and Leah Chase. And, yes, as the airport’s jazz-inspired name suggests, there will be some sort of live music ready to great you during most normal business hours. Driving in New Orleans If you’re driving into New Orleans, as soon as you hit the parish line, flip your radio dial over to WWOZ (90.7); it’s the musical heartbeat for the city. Checked that off? Good, now you’ll at least have the proper soundtrack if traffic snarls and craters rear their ugly head. Driving in New Orleans is like a full-contact sport, and extra vigilance is necessary when behind the wheel, even for those adept at the congestion of city driving. The streets themselves are perhaps the biggest Waterloo, with cavernous potholes and unexpected cracks large enough to pop a tire (or three). New Orleanians also have a propensity for being in the middle of the street for reasons both sanctioned and unsanctioned: parades, second lines or just because someone felt like shutting down their for a barbecue are all frequent excuses. Going slow is necessary, and be prepared for snags. Another reason for going slow are an abundance of traffic-light cameras, which have a hyper-quick trigger if you’re speeding through an intersection—even a little—or roll through a stop sign. Don’t have a ticket waiting for you when you get home. The cardinal directions also disappear in New Orleans. When asking for instructions, locals are likely going to explain your whereabouts in terms of Lakeside, Riverside, Uptown, and Downtown. Lakeside (towards Lake Pontchartrain) is what the rest of the world calls “north,” Riverside (towards the Mississippi River) is south, Uptown (up the river) is west and Downtown is east. Don’t worry—you’ll get the hang of it. And if you’re playing passenger? On the whole, taxis are far less reliable (and timely) than ridesharing services. Riding the Streetcar Ah, the whimsical charm of the streetcar (never call it a trolley—seriously). For $1.25 a ride (or $3 for an all-day pass, exact change only), you, too, can roll your way down St. Charles Avenue or Canal Street while sipping a Sazerac and feeling like a dandy of yore. Sure, the streetcar isn’t the most useful way to get around—set routes only serve certain (visitor-heavy) areas of the city, and leave out massive swaths of New Orleans equally worthy of exploring—but for destinations near a streetcar stopping point, the experience alone can be worth it. With five dedicated tracks that run both along the streets and through neutral ground, it’s a means of transportation that’s often more about the journey itself than the destination. Just be forewarned: Delays are frequent, and the St. Charles line (arguably the most popular) has no air conditioning. Get ready to bump up against some sticky bodies. Biking in New Orleans Saddling up for a bike ride in New Orleans is a bit of a double-edged sword. On one hand, the city has come a long way in recent years (thanks to a slew of highly motivated cycling advocates) when it comes to dedicated bike lanes and pathways from the Central Business Direct to the Lafitte Greenway. There’s even a bike-share program now, which launched with cautious optimism in Fall 2017 and charges $15 a month for bikers to ride up to an hour each day. Progress has been made. But the flip side of biking in New Orleans is that it can be a safety crapshoot: Many drivers still don’t respect bike lanes—especially the one on Baronne Street—while road debris and poor pavement cause serious accidents on a weekly (daily?) basis. What’s more, bikes are picked off by thieves with alarming regularity. You’d be hard pressed to find a New Orleanian who hasn’t had their two-wheeled ride (or at least the tires) jacked at some point. Always wear a helmet, and ride with caution. Getting Around on Foot Whether you’re shopping the entire length of Magazine Street, or meandering through the alleys of the French Quarter with a cold one in your hand, there’s almost no better way to peruse many of the business-heavy areas of New Orleans than by foot. One important rule, though: Never walk alone after dark, especially down side streets or through unlit areas. Crime in the city is, unfortunately, no joke. Get the App—or Don’t There are several New Orleans transit apps that attempt to track the location and wait time for various public transportation routes, from buses to streetcars. None works quite right. You’re better off with a paper map and plenty of time built in as a cushion. 18 Things To Know Before You Go To New Orleans Everything New Orleans Is and Everything New Orleans Ain’t The signature drink is the Pimm’s Cup. It’s a wuss of a drink by any definition. I don’t get it. This is a bar. This is New Orleans. What gives? Beignets for Breakfast Are No Breakfast At All Let the masses have Café du Monde. Nothing kills a hangover like a plate of butter-bombed Gulf oysters from Drago’s. Drinking Family Style in the Crescent City The Maspero’s Bloody Mary gives our family of dueling New Orleans experts common ground. It Ain’t a Speakeasy, It’s a Hideaway The main delicacy is salty fished served out of a tin can.
cc/2019-30/en_middle_0012.json.gz/line1574
__label__wiki
0.807418
0.807418
Welcome for the government's change of heart on council funding for rural areas Press Releases Fairer Funding Campaign latest Public Sector Funding Tuesday, 6 February 17 Responding to a Ministerial written statement issued today, the Rural Services Network [1] has welcomed the Government's decision to release extra funding in next year’s finance settlement for rural councils [2]. RSN chief executive Graham Biggs MBE said: “Both in our formal response to the provisional settlement for 2018/19 and in subsequent discussions direct with the Local Government Minister, we raised serious concerns about the proposed removal of transitional relief and about the gap in terms of government funding per head of population between urban and rural areas. “We particularly raised deep concern about the funding of Adult Social Care Funding in rural areas. “Today’s announcement of £150m for an (England wide) Adult Social Care Support Grant – (although figures as to its distribution to individual authorities has not been made available yet) – plus an additional £16m for Rural Services Delivery Grant is a clear measure of success for the representations we made. “Indeed the Rural Services Network is specifically mention in the Briefing Pack issued by the Government.” Mr Biggs added: “The Secretary of State’s statement that he is committed to ensuring the needs of rural areas are met and his recognition of the particular costs of providing services in sparse rural areas are particularly welcomed. “We will be watching closely to make sure they follow through to cash in council budgets with the new Needs Formula being developed for implementation in 2020-21.” Graham Biggs MBE RSN chief executive E: graham.biggs@sparse.gov.uk W: www.rsnonline.org.uk [1] The Rural Services Network is the only non-governmental organisation representing the interests of rural service providers and the communities that they serve. It involves currently some 154 Local Authorities and over 100 other service providers. It comprises SPARSE Rural, the Rural Assembly, the wider Rural Services Partnership and the RSN Community Group. The organisation works with Rural England, a stand-alone CIC research group. For details, visit www.rsnonline.org.uk. [2] The written statement by the Secretary of State for Housing, Communities and Local Government on the final local government finance settlement for 2018 to 2019 is available here: https://www.gov.uk/government/speeches/final-local-government-finance-settlement-2018-to-2019-written-statement Our Key Messages: Central Government has historically and systematically underfunded rural areas giving them less grant per head than urban areas – despite the fact that it costs more to provide the services. Rural residents earn less on average than those in urban areas and therefore pay more Council Tax for fewer local government services. Government policy, implicitly, is that council services in rural areas are more reliant on funding through council tax than their urban counterparts. We demand fairer funding for all public services serving rural areas. Rural residents and businesses face multiple barriers in terms of access to key services, including transport and broadband. Yet councils providing services to rural residents receive less money from government, pay disproportionately more for fewer services and typically earn less than people in urban areas. As a result rural residents suffer multiple disadvantages. Rural communities contribute a great deal to the national economy but are facing threats to their future. This is due to a combination of chronic underfunding, demographic challenges, diminishing resources, with the needs of rural areas being systematically overlooked. Without action conditions in rural areas will deteriorate further. It is in the national interest that we all work together to revitalise this fundamental national asset. Despite its idyllic image, rural communities often experience difficulties in accessing health and support services. This is becoming increasingly difficult as specialist services are centralised to remain resilient and poor transport links reduce access. There are recruitment and retention issues amongst medical staff in rural areas. Rural residents are therefore vulnerable to isolation and poorer health outcomes in the long term. Funding cuts pile pressure on vital public services RSN response to Finance Settlement 2019 Technical Consultation Select Committee on the Rural Economy RSN Response to Fair Funding Relative Needs Technical Consultation
cc/2019-30/en_middle_0012.json.gz/line1580
__label__cc
0.734987
0.265013
African American History · miami · womanhood March 3, 2018 March 3, 2018 Sharony Green This woman. Thank you, Auntie Maxine for all you do to bring light to this world. In the background, is my dear niece Kandice, a way-shower of the highest order. Auntie, loves you. And just like that there she was…Auntie Congresswoman Maxine “Reclaiming My Time” Waters. I saw her last night at Birmingham’s airport. She’s in Alabama partly for the Jubilee in Selma. I shall travel there to participate in a tribute to the historic walk, once remembered by my late former father in law Grant Green, the jazz guitarist, in his 1965 composition “Selma March.” But oh, to have confirmation in person that it is okay to reclaim my time beforehand. Historically, the black woman has been asked to appear as if she is a superhero. She does it so well. Artist Amalia Amaki, former UA Professor of Art History, thoughtfully draws attention to the black woman and all her difficult pasts and presence. Many thoughts before me this week pose tensions with the exhibit that opened yesterday at the Paul R. Jones Museum. It was curated by students in my “Gender, Race and Urban Space” grad class. Harlem, Atlanta and yes, Miami, and other cities associated with the black body are put on display via texts and images. The idea is to interrogate the idea of a “mecca.” Is there ever such a place for the oppressed brown body? My students and I think through such an idea with various readings and visual texts in mind. Austin Schutz, one of the my grad students, is way hip waiting for Spring Break. I hear you, Bud. Next week, we have Chanelle Rose’s study on Miami. From the late 19th century to the 1968 riots, she reconsiders the various meanings of “blackness” and how the people of African descent in South Florida “present” differently partly owing to the early black Bahamian presence. While some chapters of the NAACP were far more conservative than many black foot soldiers liked, black leaders like the late Father Theodore Gibson, who self-identified in ways that went beyond the color of his skin, made demands on white powerbrokers who, among other things, denied “blacks” the right to live in certain communities and to splash on certain beaches. Imagine that. Were it not for black bodies, the city of Miami would not even be. Black signatures were needed when the city was incorporated the same year as Plessy, signaling the ironies ahead, ones still with us. Were it not for the black woman’s reproductive abilities, per Jennifer Morgan, this country would not even be. But I digress. But not entirely. For now, I want my students to ponder what Rose means when she tells us Miami helps us see how mythmaking develops. A seeming “paradise” hides many untold stories about compromise. Why did white civic leaders in South Florida in the first half of the twentieth century have to become “less reactionary?” What “new civil rights narrative” does the historical record insist be written if we were to take seriously the ability of the most unlikely to complicate the lives of the dominant culture? The book opens with the experiences of Patricia Stephens Due, a student leader of Tallahassee’s Congress of Racial Equality (CORE). She is the mother of my former Miami Herald co-worker and acclaimed author Tananarive Due. Mrs. Stephens Due watched the indignities of her mother who worked in a whites only dress shop on Miami Beach. She and her sister Priscilla were arrested in 1963 after staging a sit-in at a supermarket. Four years earlier, however, she’d been seen as a Hispanic owing to her light complexion, large hoop earrings and long jet-black hair and thus, she was permitted to eat at a Royal Castle in downtown Miami. All this with her southern accent. With her experiences in mind, what are the many ways in which Miami must be seen as a messy border culture? And what happens when we insert the equally acclaimed Edwidge Danticat and her writings into the equation, namely when we insert her recent essay in The New York Times on the impact of environment on tourism, and the pain experienced by Haitians looking for mecca via the sea as revealed in a short story in Krik? Krak! How do we find meaning in how the colonized are “maneuvered” into saying thank you to their oppressors per Audre Lorde? All this as sandy beaches await some, not all. I will be thinking through such questions with mixed feelings as I, like many academics and artists, often live through the very thing I am studying. But I remain empowered by so many who came before me. I am encouraged by the amazing students with whom I get to work, ones who are making their way through the mess we are leaving them. “Are you Dr. Green?” a blonde haired girl said last night in Paul Jones. “I am,” I replied. “I was in your Am Civ class three years ago. It is the only class I will remember,” she said next, or something along those lines. Oh, Miss Teacher of Tomorrow Natalie Phee, formerly of my Am Civ class. The world awaits the good you have to offer. We need you. I share that not to boast, but to remind myself that my work matters. But so does rest and reassessing so much. It is important to aid the narrations of your own life. I am not a fan of blogging or social media, but these are platforms that enable more inclusive storytelling. I thank you, Auntie, for helping me to see this. These are platforms that help some of us restore something unsayable. One of the images selected by graduate student Toddy Waters who tells us this, among others, has a “Idlewild” vibe. I loved “Black Panther,” but I am not Shuri. Me standing with three of my grad students Katelyn Waggoner, Shelby Norman and Toddy Waters. Emily Bibb, who manages the Paul Jones Collection of African American Art, joins us. Not in this lifetime anyway. Maybe the next. Me and my niece Kandice, who graduated with honors from Florida A & M University a few years ago. african americans art Atlanta harlem Maxine Waters miami mindfulness oppression Paul R. Jones resistance womanhood Previous Post reluctantly sharing Next Post on selma and more
cc/2019-30/en_middle_0012.json.gz/line1585
__label__cc
0.722267
0.277733
Archive for September 8th, 2016 Crime and lawlessness in Chicago with Michael Bargo Guest: Michael Bargo, contributor to American Thinker, author and resident of Chicago, joins me for a chat about the crime and lawlessness in Chicago……..how do people cope with so much violence and news of weekend shootings?…….how does it affect other communities…………..and other political stories of the week…….. Click below to listen to the show: Source: Crime and lawlessness in Chicago with Michael Bargo 09/08 by Silvio Canto Jr | News Podcasts Tagged with Crime in Chicago 1974: The Nixon pardon many years later It was President Ford’s biggest and most courageous decision. Let’s recall the events of September 8, 1974: “……President Gerald Ford, who assumed office on the heels of President Richard M. Nixon‘s resignation, pardons his predecessor for his involvement in the Watergate scandal.” As I recall, it happened on a Sunday morning. I was leaving mass and headed home to have lunch with my parents when I heard the flash on the radio. My parents and I saw the TV coverage as we ate lunch. My father’s initial reaction was that it made sense but it would be politically difficult with mid-terms 2 months away. He was prophetic because the Democrats pounded on the pardon and scored big. President Ford won in the end. Years later, the JFK Library Foundation presented him its “2001 Profile in Courage Award.” The award celebrated the fact that President Ford put country over his political ambitions. We remember that kind of presidential leadership today. President Ford left politics in 1977 and died in 2006. The pardon looks better and better with age, and so does the 30-month “accidental” Ford presidency. Tagged with 1974: The Nixon pardon many years later We remember Patsy Cline (1932-1963) Patsy Cline was born on this day in 1932. She was only 30 when killed in a plane crash in 1963. In the 1980’s, I discovered “Crazy”, a great country song. It got me to read and inquire about Patsy’s music. Today, I’m a big fan of her music. She also recorded “I fall to pieces” and several other country hits! Let’s remember Patsy Cline’s “Crazy”, her most memorable hit: Posted in Country music Tagged with Patsy Cline Trump in Mexico: The hysteria continues (My new American Thinker post) In Spanish, we say that someone will pay for the broken dishes, i.e. “pagar los platos rotos.” It’s sort of like saying that someone will get blame for a bad idea. We just learned that the person paying “los platos rotos” in Mexico is Luis Videgaray, Mexico’s finance minister. He will pay the political price, especially now that Mrs. Clinton has left President Pena-Nieto without a Democrat to share the stage with. My guess is that President Pena-Nieto had hoped to use Mrs. Clinton and gang up on Mr. Trump. Unfortunately, Mrs. Clinton is not travelling to Mexico and the plan has backfired. Here is the news from Mexico: The resignation comes a week after the meeting between Mr. Peña Nieto and Donald J. Trump, which engendered widespread dismay and anger among Mexicans and reportedly divided Mr. Peña Nieto’s cabinet. It was Mr. Videgaray’s idea to invite Mr. Trump, according to several Mexican news media reports, though Mr. Peña Nieto later claimed it was his own. Mr. Peña Nieto was scheduled to make a statement at 11 a.m. Mexico City time (noon Eastern), and is expected to name José Antonio Meade, Mexico’s social development minister, to replace Mr. Videgaray as finance minister. So much for reading recently that Mr. Videgaray was a strong ally of President Pena-Nieto! Mexico’s reaction was hysterical and totally silly. As Allan Wall reminded us, maybe President Pena-Nieto is hedging his bets and looking ahead to a very different future: There are signs that the Mexican presidential administration realizes that, and is hedging its bets. One is the promotion of the Somos Mexicanos program designed to help Mexicans returning to Mexico from the United States. I last visited Mexico this past June and July. When entering Mexico, I noticed the Mexican immigration station had been remodeled to include a section for Repatriaciones (repatriations). Does that mean the Mexican government is expecting larger numbers of Mexicans to return to Mexico? Allan Wall has a point. I would add a couple of things. Illegal immigration looks different today than it did years ago. In other words, most of the people reaching the US are not Mexicans. They are Central Americans using Mexico as a pathway to the US. This is creating serious challenges for Mexico, from police resources to immigration court dates. Frankly, Mexico now faces the difficulty of not knowing who is in the country. Border lawlessness has infected the Mexican political system. Cartels are going north and south of the border without consequences. They bring dollars into Mexico that corrupt the politicians, specially in smaller towns run by cartels. Trump’s language could have been more polite a year ago. However, his message of a lawless border is one that the Mexican political class hears and understands quite well. After all, as Allan Wall wrote in the aforementioned article, have we not heard talk of Mexico building a wall in its southern border? Tagged with Trump in Mexico: The hysteria continues
cc/2019-30/en_middle_0012.json.gz/line1589
__label__wiki
0.653691
0.653691
Home Mortgage News State AGs assail CFPB plan to build fintech sandbox State AGs assail CFPB plan to build fintech sandbox Twenty-two Democratic state attorneys general said the Consumer Financial Protection Bureau lacks sweeping authority to create a fintech sandbox that provides immunity from state law. The CFPB in December proposed two draft policies initiated by former Director Mick Mulvaney to further remove the threat of legal liability for fintech companies that test products benefiting consumers. But in a letter to the bureau commenting on the proposals, the state AGs said the consumer agency cannot give applicants such a blanket safe harbor protecting them from enforcement actions by state and federal authorities. The AGs also urged the bureau to rescind both proposals and reissue them as more formal rulemakings subject to a notice and comment period. The state AGs — led by New York’s Letitia James and California’s Xavier Becerra, above — said the CFPB has no basis to shield companies from enforcement actions brought by other jurisdictions. “The CFPB has no authority to issue such sweeping immunity absent formal rulemaking,” they said in the letter. Under one draft policy, the CFPB would expand its “no-action letters” awarded to qualified fintech applicants. The letters convey that the agency will not begin a supervisory or enforcement proceeding against a firm, but the policy developed under the Obama administration has been criticized as overly restrictive. The second proposal would create a CFPB sandbox for participating firms to test products. The state AGs — led by New York’s Letitia James and California’s Xavier Becerra — said the CFPB has no basis to shield companies from enforcement actions brought by other jurisdictions. “Under the Proposed Sandbox Policy, approvals or exemptions granted by the CFPB would purportedly confer on the recipient immunity not only from a CFPB enforcement action, but also from ‘enforcement actions by any Federal or State authorities, as well as from lawsuits brought by private parties,’” the letter stated. The CFPB made no formal announcement of the fintech sandbox but circulated a draft proposal that was published in the Federal Register in late December without a formal rulemaking. In its proposal, the CFPB said that it had concluded that the policy guidance “would constitute an agency general statement of policy” and “a rule of agency organization, procedure or practice,” that is exempt from notice-and-comment rule-making requirements. A CFPB spokeswoman said Kraninger is reviewing the comments. “The Sandbox, as proposed by the Bureau for public comment, reflects a robust, effective and modern approach to regulation,” the spokeswoman said. The attorneys general said the CFPB’s statutory authority to provide relief under a fintech sandbox is “quite narrow.” They took issue with the notion that the bureau can issue a safe harbor that would provide blanket immunity to companies, including “exemptive relief” from state and federal supervisory and enforcement actions. “Neither Dodd-Frank nor any other statute the CFPB enforces authorizes the CFPB to confer anything approximating the absolute immunity of the type proposed by the CFPB, and it is well settled that an agency may only act within the authority granted to it by statute,” the AGs said in the letter. The state AGs said the policies should not be exempt from formal notice-and-comment rulemaking procedures required by the Administrative Procedure Act. “Courts have consistently held that agency rules altering the substantive standards the agency applies in determining whether to take discretionary actions are subject to the APA’s rulemaking procedures,” the attorneys generals’ letter stated. But it is not yet clear if any state plans to mount a legal action against the CFPB. An effort by another federal regulator to reform licensing procedures for fintech firms — the special-purpose charter developed by the Office of the Comptroller of the Currency — has attracted lawsuits by state banking regulators. It is unclear yet if any state plans to sue the consumer bureau under the Administrative Procedure Act. The attorneys general also cautioned CFPB Director Kathy Kraninger, who succeeded Mulvaney, against rushing to judgment in validating certain “innovative” products and services. For example, they cited products once hailed as innovative — including “no-doc” mortgages, payment-option adjustable-rate mortgages and collateralized debt obligations — that helped set off the mortgage meltdown just over a decade ago. “The use of sophisticated technologies in the consumer financial market is not well understood, even by the creators of such technologies,” their letter said. “Unless and until these technologies — and their implications for consumers — can be better understood, it would be irresponsible to give companies employing them what may effectively be a permanent get-out-of-jail-free card.” The CFPB’s proposal on no-action letters potentially would increase the scope of relief given to companies to include unfair, deceptive and abusive acts and practices, known as UDAAP, but the attorneys general said that would go too far. The attorneys general also objected to the agency’s proposed extension of relief to third parties such as trade associations, “which could seek blanket relief on behalf of an entire industry,” the letter said. Previous articleHybrid Summit 2019 in Hong Kong Next articleQuadrigaCX Accidentally Sent Nearly $400,000 to Dead CEO’s Bitcoin Wallet Bitcoin (BTC) | Tom Lee Sticks by His $15,000 Price Prediction With the Rise of IEOs, Investing in Altcoins Can Be Brilliant M/I Homes Makes Big Revenue Gains in Q4, but Earnings Didn’t... 5 Hacks to Pay Off Your Student Loans Faster Why Dropping Cash On RFID-Blocking Tech Is A Waste Of Money The housing shortage may be turning, warning of a price bubble Hands-on with the Sirin Labs FINNEY, the First Crypto-Native Smartphone President Trump repeats call to trim federal retirement benefits, switch to... Senate reg relief vote could come next week: Banking Committee chair Bank of America to spend $5B in five years on affordable...
cc/2019-30/en_middle_0012.json.gz/line1601
__label__wiki
0.721641
0.721641
North Korea’s Lazarus Tied to Cryptojacking Campaign Targeting MacOS August 28, 2018 22:01 by Elizabeth Montalbano North Korean state-sponsored hacking group Lazarus is believed to be behind a recent crypto jacking attack on several banks with an unexpected twist–the use of a Trojan that tricked a company employee into downloading malware, according to Kaspersky Lab. Kaspersky researchers made what they call the “unexpected discovery” while assisting with incident-response efforts to an attack on a cryptocurrency exchange, a type of attack for which threat actor Lazarus has become known. However, the attack–which researchers dubbed “AppleJeus”–also was unique in that it used malware developed for MacOS, the first time researchers have identified the hacker group doing so, according to a post on the Kaspersky blog. [Also read: Cisco Talos: VPNFilter malware capable of stealing data, infecting IoT endpoints] “To ensure that the OS platform was not an obstacle to infecting targets, it seems the attackers went the extra mile and developed malware for other platforms, including for macOS,” according to the post. “A version for Linux is apparently coming soon, according to the website. It’s probably the first time we see this APT group using malware for macOS.” The attack also saw Lazarus falling back–pun intended–on an old malware tool called Fallchill, which the group previously used and “recently switched back to,” according to the post. US-CERT and other security watchdogs have noted recent re-appearances of the malware. In this case, an employee of an unidentified global bank unsuspectingly installed the malware on a company computer after downloading a third-party cryptocurrency trading application recommended over email, researchers said. Duped into malware installation Attackers lured the employee with what appeared to be an update for legitimate software called Celas Trade Pro from Celas Limited which “showed no signs of malicious behavior and looked genuine,” according to Kaspersky. By reconstructing the attack and tracing it back to its origin, researchers established that the installation of this program using a download link from an email infected a company computer with Fallchill, with the key fingerprint of the attack found rather unobtrusively at the end of the installation process, according to the post. “At the end of the installation process, the installer immediately runs the Updater.exe module with the ‘CheckUpdate’ parameter,” according to the post. “This file looks like a regular tool and most likely will not arouse the suspicion of system administrators. After all, it even contains a valid digital signature, which belongs to the same vendor. But the devil is in the detail, as usual.” A screenshot of Celas Trade Pro, a legitimate program used as a Trojan in a Lazarus cryptocurrency attack. (Source: Kaspersky Lab) That detail is that the main purpose of the Updater executable is to collect the victim’s host information and send it back to the server. In its investigation, Kaspersky discovered that the code writer developed this project under the codename “jeus,” which–along with the evidence that it’s Lazarus group’s first attack on Apple’s Mac platform–inspired researchers’ name for the incident. Researchers discovered that the attack behaves more or less the same on both Windows and MacOS platforms, according to Kaspersky. “The fact that the Lazarus group has expanded its list of targeted operating systems should be a wake-up call for users of non-Windows platforms,” according to the post. Foreshadowing of future attacks Lazarus has been active in the financial sector for about the last 10 years, so a new attack that targets cryptocurrency comes as little surprise to anyone. Just last year the group was deemed responsible for a number of successful spear-phishing campaigns against South Korean cryptocurrency exchanges and Bitcoin and Monero mining outfits aimed at stealing funds to bankroll the regime of Kim Jong Un. Its recent attack shows Lazarus has no signs of slowing down, and in fact is especially worrying for a couple of key reasons–its new OS target and its use of Celas software as a Trojan, according to Kaspersky. The first shows Lazarus expanding its scope of platforms as developers and engineers themselves switch from Windows to MacOS, giving the hacking group an even wider attack surface. “Apparently, in the chase after advanced users, software developers from supply chains and some high-profile targets, threat actors are forced to have macOS malware tools,” Kaspersky researchers said. “We believe that in the future Lazarus is going to support all platforms that software developers are using as a base platform, because compromising developers opens many doors at once.” And while Kaspersky researchers can’t say for sure if Celas was compromised as part of the attack, the use of its cryptojacking application to lure someone into downloading malware shows Lazarus’ apparent interest in continuing to exploit the supply chain as a means of infection method, they said. Researchers also issued a stern warning to businesses using third-party software–which it’s fair to say is the majority of them–not to automatically trust code running on their systems. For companies interested in running a tight security ship, you would think this would be no-brainer by now; however, it’s a method hackers continue to use to find success. “Neither good-looking website, nor solid company profile, nor the digital certificates guarantee the absence of backdoors,” researchers wrote. “Trust has to be earned and proven.” Tags: backdoor, Cryptocurrency, cryptojacking, Kaspersky Lab, Lazarus, MacOS, malware, North Korea, trojan, Windows Author: Elizabeth MontalbanoElizabeth Montalbano is a freelance writer based in Aljezur, Portugal. A seasoned technology reporter, Elizabeth's work has appeared on CNNMoney, Design News, Business Insider, ComputerWorld, The Register, InformationWeek and other publications. In her free time she enjoys surfing, traveling, music, yoga, and cooking. Pingback: Podcast Episode 116: Cryptojacking and MikroTik's Bad-Feeling Feel Good Patch Story | The Security Ledger
cc/2019-30/en_middle_0012.json.gz/line1606
__label__cc
0.534509
0.465491
Muni to Test Double-Train Loading in Metro Stations This July Photo: ##http://www.flickr.com/photos/wink/2323378668/in/photostream/##juicyrai/Flickr## Muni will test out a method to improve metro operations this July, letting two trains load passengers on the same platform simultaneously, according to SFMTA spokesperson Paul Rose. Few details on the test run are available, but Muni officials have discussed making the change for several years as a way to reduce back-ups in the subway underneath Market Street. Currently, multiple trains often sit at the same platform, but only the one at the front can load. Transit officials have said that allowing two trains to load, one behind the other — also known as “double berthing” — would require changes to the Muni Metro’s automatic train control system, new training for rail operators, and an upgraded digital sign and announcement system. Mario Tanev of the SF Transit Riders Union said the organization hasn’t taken an official position on the change, but that it supports Muni’s efforts to try out new solutions to improve service. “Congestion in the subway is a serious problem,” he said. “There needs to be solutions.” Filed Under: Muni, Transit Admittedly a transit nerd About time! So excited! Mark Dreger Any ETA of when those new destination signs are coming thru? July perhaps? Also – I would hope the recently-refurbished automatic train control system would be able to handle this change in operation. MrEricSir Nice! But I hope they test this long enough for riders to get over the initial confusion. Exploring what it would take to allow double-berthing is long overdue; it seems like such a simple way to speed up Metro service. Evan Goldin Yes! I always thought it so strange that the platforms so incredibly long, but yet you have to be at the front of the line for the doors to open. ywhynot Wow! Satan must have his uggs and pea-coat on right now! From what I understand, double-berthing will only occur at Civic Center, Powell, and Montgomery Stations, right? Chris Phipps They used to do this around 15 years ago. My question is why did they ever stop? I don’t think they need new signs. There should be enough there already to make it work. I hope they were just referring to software upgrades. Don’t forget Embarcadero! That’s where it’s needed most. Confusion? I imagine there may be some scrambling to get into the proper position, but when trains arrive, those blinking letters on the sign should attract a lot of attention! (I hope!) That assumes you can even see the blinking letters. From where most people wait at Powell, for example, it would be damn hard to see that a second train was boarding. And after this… how about 3 car N-Judah’s or at least S-Shuttle’s for Ballpark service! Andy Chow For it to work effectively there should be designated boarding zones for certain lines (like boarding area A for J and N and area B for K, L, and M.) That way people don’t need to always check the sign for boarding location or having to rush to the location when the train comes, which is a problem for disabled riders. Of course it would make double berthing less effective but still better than the current set up. The Downtown Seattle tunnel has this set up for buses (light rail only stop when there are no buses and use the whole platform). Ted King Something to remember – SFMuni Metro’s platforms were designed for BART trains. When they gave them to SFMuni they made a HUGE mistake by NOT lowering them to a low-floor standard. That gave us the headaches of dual-mode stairs and expensive ramps and platforms outside of the tunnels. Mario Tanev One possible solution to the confusion that could be caused by double-berthing is to make the rear train offload-only, and have it stop again to board passengers (some will cunningly run to board, though, and others will freak out, afraid of missing their train, so confusion won’t be completely eliminated). It would at the very least, however, solve the frustrating experience of waiting for minutes on end just to exit the stopped train. Frankly, I don’t see what 3 car N trains would solve. If Muni has a shortage of operational train cars (which it does), 3 car trains would simply mean lower frequency, and thus won’t solve overcrowding and will generally worsen the experience (although, labor may be cheaper). Longer trains however may make sense once the frequency is very high already, and smaller trains tend to interfere with each other – so I can see that working on a shuttle-like service in the subway. Jamison Wieser Most of the infrastructure outside of the subway can only accommodate a 2-car train and at the loops where they turn back, just a pair 3-car train would block two intersections. Because of this, the trains were only ever designed to pull a third train in a tow mode. Since there was never any expectation to run 3-car trains it wasn’t worth the time or money to add and add the functionality. It’s a software issue: the couple carries breaking and acceleration to the third car in two-mode and it’s completely doable. Double-birthing is an option that comes along with the new announcement system, are part of tunnel control system upgrades underway. Operators, controls, and managers will need retraining anyway, so a lot of these costs are fixed whether we try it or not. But there is an opportunity cost if it does prove more effective. Like Mario explained, It’s really a matter of efficiency: a train can run faster, then in a given period of time it can make more runs. Flipping that equation around, that also means the current frequency (or headway) can be maintained with fewer trains. That’s where you get the labor cost saving. If we can get them to run efficiently (that doesn’t just mean faster, being predictable counts) that frees up cars for more 2-car trains. And that increases capacity. and so on… murphstahoe Spoken like someone who has never heard “2 car N in 2 minutes. 2 car N in 4 minutes. 2 car N in 6 Minutes. 1 Car J in 7 minutes” The underground system was originally designed to accommodate 3- or 4-car trains, even with different lines on the same train … you could have a KLM train or an NNJ run through the system, theoretically, and the cars could decouple above ground. I think they used to have multiple-line trains, but the Breda cars weren’t designed for such frequent decoupling. Low-floor boarding in a subway is not a good idea. Elevated platforms keep passengers moving. Bart trains were never designed to run in Muni tunnels, or vice-versa. One is light rail, the other heavy. Good point! It would e nice to see the other waiting area put to good use. The main one gets overcrowded sometimes. Another question: How will the voice announcements (aka Ms. Muni) work with this? “Approaching: 1-car J and 2-car N, followed by K and L.” If a car arrives while the other is stopped: “Now boarding, 1-car J behind the K” (one possibility) What about the even more logical step of [de]coupling trains at West Portal and Duboce? The fact that announcements and platform displays refer to 2-car trains as “N N” makes me think that was intended all along, like an “L M” that would decouple outbound at West Portal. I remember reading somewhere that the Bredas’ couplers didn’t handle this well — were they supposed to? If so, why aren’t they repaired or replaced at the manufacturer’s expense? I think one other reason for the ending of decoupling was the fact that it held up the line. Not sure how long the process takes. Okay. Let’s assume all trains are equally frequent (which is near enough the case), and in random order (which is also near enough the case). Now let’s imagine two trains are approaching together, close enough that the rear one would be delayed by the one in front if there was only one boarding area. The probability of your designated boarding zones reducing the stopping time for the rear train is 24% (6 out of 25). If any train could stop at any boarding zone, the probability would be 100%. Good electronic signage is the key to making this work; there should be a list of next trains for each boarding zone (four in total) so people can check where their train will be stopping and go to the appropriate area. The signs should update as soon as it’s known that one train will need to stop behind another, which should be as soon as the train leaves the previous station. If done properly there will be plenty of time for people to get to their train. So all trains have to stop twice at each platform? Sounds like a recipe for slowing things down, not speeding them up, especially during off peak hours. “Now approaching: 1-car J at boarding area A, followed by 2-car N at boarding area B, 1-car L at boarding area A.” The quality of the comments on this site is just declining rapidly. Don’t I know what Muni’s announcement is? but it has no relevance to my concern. Currently, all trains stop on the same position on the platform. Somebody who is disabled and needs to board through the first door can always wait on the same spot and get on the train quickly. The announcement about the train length is helpful for those who is able to walk quickly and want to avoid the crowd, but it can be ignored. Under the double berthing situation, if there’s no designated spot for certain line, a disabled person may have to move a couple hundred feet up or down the platform at a moment’s notice, depending on when the computer thinks the train should stop where depending on the congestion level. The other alternative is to make double stop for the disabled. Read jonobates comment. If the order is backwards of what is needed to match the boarding areas, the system would get *slower* – not faster. Simple math. I think human factors should be included in the planning and design of double berthing. I fully support it but I think that it should be highly predictable, consistent, and disabled friendly. I value predictability and consistency over flexibility. If it is not so, some riders will end up delaying the trains anyway while making the system less safe. They don’t have to stop twice. But if there is a train in the front, the train in the back can offload its passengers instead of just idly waiting. If there is no train in the front, then there is no need to stop twice. PaulCJr That’s the way it was design to work and at one time it did. The Breda car couplers are very sensitive due to the electronic connection also being right there, so if they are coupled too hard, the two trains will have issues communicating. Muni drivers used to do this informally, but it required switching the train out of “auto mode”. For inbound Embarcadero trains, they could just roll right through and not stop twice. Jeffrey Baker This is nice and everything, but doesn’t address the problem in a practical way. I’m sorry to have to point out individual humans as the problem, but the four useless goldbricks Muni employs to move the out-of-service inbound trains off the platform at Embarcadero are causing almost all delays in the inbound subway. Those guys will stand there talking on their cell phones with their girlfriends while thousands of people wait on the platform for another useless L or M train to get the hell out of the way. Meanwhile you can see the trains backing up all the way to Powell. It’s a minute-long affair at best, and these operators have no particular urgency about it. They need to figure out how to have the regular operator move the inbound trains into the yard and then be relieved, not rely on these useless yard operators. Will be interesting to see how (if) this affects travel time. Sounds like it will affect boarding times, but not travel time (granted, boarding is a large portion of transit time). On another note, this will be a headache disaster for tourists, or anyone not familiar with the already disorienting muni They also occasionally do this now too, but only after a couple of minutes and only the front door of the first car is opened. Coupling and de-coupling trains at the portals creates a time hit and causes delays if the trains don’t arrive at the same time. Once the subway switched to a rolling block system that could run trains closer, faster and safer. Trains can enter the tunnel as soon as there is clearance, and doesn’t have to wait for another train to couple with. Our current fleet of Breda trains were not designed for rapid coupling and de-coupling or to run in three-car consists. Better train control software obviated the need to join trains. Ever growing demand makes the time-hit to couple even less affordable today. Glad to see Muni is again attempting to improve its speed and reliability (in keeping with its “transit first” mantra). I hope the roll-out of this test/project is not subject to seemingly ridiculous delays. To do that effectively you will need a staff person standing on the platform to interpret the sign and to direct people. If Muni doesn’t want to spend that kind of money then it is the best to designate a boarding zone valid at all times to minimize the confusion. Yes it is less efficient, but then we need to take account delays and complaints of missed trains caused by confusion. Not everybody can read and interpret signs easily. That includes older folks who aren’t so adapt to new gadgets and people who have limited English skills. There are folks with limited mobility that cannot move as quickly to a new boarding location. There are benefits of having two designated boarding zones. One of them would be the crowd waiting for the train would be spread further down the platform rather than concentrate in one area. One of the factors for successful transit systems is consistency, which means riders can easily get into a routine and don’t expect to change it constantly. Muni’s already a step behind with the difficultly of keeping up with the schedule and constantly changing boarding location won’t help either. kdub2000 Why don’t they also try to make all metro trains two-cars long??? mike3k Why does the inbound N stop a full car length away from the exit stairs in the Powell station, yet the outbound stops right at the exit? Muni Double-Berthing Still Delayed Pending CPUC Approval By Aaron Bialick | Apr 3, 2015 The ongoing delays for double-berthing in Muni Metro stations continue, as Muni waits for its training plan to be approved by the CA Public Utilities Commission. After Muni officials demonstrated double-berthing for the CPUC in December, expecting the green light, Muni Operations Director John Haley told Streetsblog that CPUC needed to sign off its training plan, […] Muni Metro to Launch Double-Train Loading, Three-Car Trains in October By Aaron Bialick | Sep 23, 2013 Muni is poised to begin double-train loading and running three-car trains at underground metro stations to speed up boarding and increase capacity on the system’s busiest stretch. As we reported, Muni began testing double-train loading, a.k.a. “double berthing,” in July, but Transit Director John Haley said the agency hasn’t run tests with actual trains yet. […] Muni Pushes “Double Berthing” Launch Back One More Week We’ve now lost count of how many times Muni has delayed the launch of “double berthing” in its Metro stations. Last we heard, it was promised to launch tomorrow, but the agency now says it needs one more week of testing before two trains can simultaneously board on the same platform. “We are adding an […] SFMTA Board Approves Contract for New Fleet of Muni Metro Trains By Aaron Bialick | Jul 15, 2014 The purchase of Muni’s next metro train fleet took a major step forward today as the SFMTA Board of Directors unanimously approved a manufacturing contract with Siemens. Muni officials lauded the design of the new trains as far superior to the current, abysmally breakdown-prone fleet of light-rail vehicles, which were built by AnsaldoBreda. The fleet […] Muni “Double Berthing” Set to Test This Saturday, Launch a Week Later By Aaron Bialick | Dec 2, 2014 Muni could launch “double berthing,” or boarding two trains simultaneously in its Metro stations, as early as next weekend — if all goes well in a live test this Saturday, SFMTA Director Ed Reiskin told an agency board meeting today. Reiskin said Muni officials will demonstrate the feature on Saturday morning for officials at the CA […] Muni Delays “Double Berthing” Until December, Citing Sunset Tunnel Work By Aaron Bialick | Nov 20, 2014 Muni has once again pushed back its launch of “double berthing” — simultaneous loading of two trains in its Metro stations — until December. SFMTA spokesperson Paul Rose said that plans for a live test and launch in November were thwarted by recent weekend construction on the Sunset Tunnel. “Because of rail improvement project work […]
cc/2019-30/en_middle_0012.json.gz/line1607
__label__wiki
0.948519
0.948519
GiantsMLBOriginalSports Giants jump all over Bucs early, hang on late to snap streak By Julie Parker :: SFBay August 10, 2018 Reporting from AT&T Park An identical San Francisco lineup to one no-hit through five innings the night before — a batting order that had been slumping offensively for the better part of six weeks — looked like a completely different set of nine Friday night. This version of the Giants (58-59) scored 13 runs on 16 hits off bats up and down the lineup in the second game of four against Pittsburgh (60-57). And, with the outbreak of offense, a shaky bullpen threatened to ruin a handy victory, allowing eight runs in the final third of the game. In the end, a baker’s dozen was enough to hold Pittsburgh off and snap a three-game losing streak with a 13-10 victory over Clay Holmes (L, 1-2, 7.20 ERA) offering San Francisco a box score that could be read as both encouraging and concerning. This story has been updated with quotes and post-game material from the Giants clubhouse at AT&T Park. San Francisco came out swinging, chasing Holmes after just 2-2/3 innings, with the top of the order instrumental early. The Giants rocked Holmes for seven runs on eight hits, much stewarded by four veterans — Andrew McCutchen, Buster Posey, Evan Longoria and Brandon Crawford — whom Bruce Bochy parked in the 1-2-3-4 holes after a four-game losing streak July 29. This catalyzed a four-game winning streak, but after that, the Giants slid back into the mire, going 1-5. Friday they crawled out of their hole and spent the bottom halves of nine innings performing as a team in lockstep. As such, the first inning must have given whiplash to fans who had seen the Giants get routed the night before. Holmes nearly hit McCutchen leading off, and “Cutch” returned the favor with his 13th home run of the year into the arcade. It was his ninth career leadoff homer, and the fifth time the Giants have led off a game by going yard. The not-so-speedy Posey came up right behind him and managed to leg out an infield single to lead off a rally that saw seven more batters come to the plate. That number would be eclipsed in a later inning, a concept that would have been difficult to believe going into Friday’s contest. Posey’s single would be the first of four hits he would record in the first four innings, setting a record as the first Giant in the San Francisco era to do it. Said Bochy: “They had good at-bats, got in hitter’s counts and took advantage of it. They were letting it go tonight and it was good to see them have some success. We’ve been shut down, we’ve been due for a game like this where we break it open.” Posey took second base on a wild pitch and a Longoria fielder’s choice grounder to second moved Posey to third. Crawford next took the first of two walks on the night and with runners at first and third Austin Slater knocked a single to right, scoring Posey. Two runs seemed like more than enough to ask of a team in the first inning that had been pressing as hard as the Giants of late. But Alen Hanson, who has come up in the clutch pretty regularly for San Francisco, decided they weren’t done, swatting another single to right to give the Giants a 3-0 lead. Holland (W, 6-8, 3.97 ERA) tossed a quiet first, but allowed a double and a single in the second, to get the Pirates on the board 3-1. A subdued home half of the second seemed to indicate that there was nothing out of whack with the universe, but the Giants put together an onslaught in the third that perhaps even they weren’t expecting, bringing 10 batters to the plate and tacking on four more runs. The Giants led off with a Slater walk before Joe Panik singled, bringing up Holland. Far from being an easy out, he notched his third hit on the season with a single to center to load the bases for McCutchen. Holmes pitched McCutchen inside, nearly hitting him a second time, and the former Pirate returned the kindness yet again, this time by drawing a walk to force in a run. After Posey singled, the Pirates put Holmes out of his misery, replacing him with Casey Sadler. Sadler, it turned out, would be the sacrificial lamb for the Bucs in game two of this series. A Longoria single and walks to Crawford and Slater added up to the fourth run of the inning before finally Sadler got his team off the field with a score of 7-1. Sadler got further shelled in the fourth inning and Pirates manager Clint Hurdle hung him out to dry as he allowed two singles, two doubles, a walk and three more runs, and allowed a fourth run in the fifth putting the Pirates in a very deep, 11-3 hole. But that was very nearly not enough. After Holland was pulled with one out in the seventh and men on first and second, he was replaced by Pierce Johnson, who promptly walked the bases full to bring up Francisco Cervelli. With a 2-2 count, Cervelli launched a fastball over the left field wall for his fourth career grand slam and his 11th homer on the year to make it 11-7. Said Bochy of Johnson’s difficult inning: “Johnson just got behind[and] had a really a long at-bat there when he walked the hitter, [then] before the grand slam he got behind.” Johnson allowed two more singles before being pulled for Sam Dyson, who got the Giants out of the inning. The Bucs put former Giant Kyle Crick on the mound to pitch the seventh inning and he was wild, plunking Longoria on the back with a 97-mph fastball to lead off the inning. This elicited an emotional response from Longoria and the Giants dugout, not because they believed intent, but they felt it was unsafe for a guy to be throwing fire when he was struggling with command to the extent that Crick was. Said Longoria: When a guy’s throwing that hard and he really doesn’t have an idea of where its going — I mean Joey almost gets hit, and a couple other guys [get] brushed back — and obviously you’re not expecting the guy to throw the ball over the middle of the plate every time, but when a guy’s throwing that hard and he’s throwing it all over, it just doesn’t make for a good situation and you just don’t want to see anybody get hurt.” The Giants got a small piece of revenge when Hanson doubled to score Longoria, though, making it 12-7. San Francisco’soffense would produce a full bakers dozen of runs by the eighth inning, tying their season-high against the Cardinals July 8. But Tony Watson and Will Smith would each allow another run before San Francisco closed the game down. Longoria believes Friday’s outburst can be a jumping off point: “I think offensively we were able to build some confidence and momentum so that’s kinda where we have to take into tomorrow.” The Giants and Pirates will play game three of the four-game set Saturday with Ty Blach (6-6, 4.28ERA) toeing the rubber against Trevor Williams (9-8, 3.88 ERA). … The Giants will retire Barry Bonds‘ number, 25, in a ceremony that begins at 5 p.m. Saturday. Guests will include the Bonds family, Peter Magowan, Gaylord Perry, Orlando Cepeda, Juan Marichal, Willie McCovey, Willie Mays, Bobby Bonilla, Ray Durham, Robb Nen, Kirk Rueter, Royce Clayton, Will Clark, Eric Davis, Shawon Dunston and Jim Leyland (among others). Gates open at 3:45 p.m. The Giants called up former top prospect right-handed pitcher Casey Kelly ahead of Friday’s matchup to fill a ‘swing-man’ role as either a starter or reliever. Derek Law was optioned to Triple-A, and Johnny Cueto was transferred to the 60-day DL to make room for Kelly. Julie Parker is SFBay’s San Francisco Giants beat writer. Follow @SFBay and @InsideThePark3r on Twitter and at SFBay.ca for full coverage of Giants baseball. AT&T Park Casey Sadler Clay Holmes Francisco Cervellie Judge rejects Ghost Ship plea deal Salesforce Transit Center ready for public debut Bob Myers honors Durant, Iguodola in final Oakland media session By Sam-Joseph Chavarria 20 hours ago By Bay City News 2 days ago via NBA Alec Burks seeks stability with Warriors after a season of bouncing around By Brian Truong 2 days ago Mission District fatal shooting victim identified as 15-year-old boy By Bay City News July 9, 2019 More in Giants Closer Will Smith named sole Giants All-Star Pillar pounds D-Backs, Posey finds his groove in Sunday win Giants halfway to nowhere as they slide into second half View all Giants Giants promote former top pitching prospect
cc/2019-30/en_middle_0012.json.gz/line1608
__label__cc
0.719666
0.280334
Melanie Rose Senior Associate Attorney Expertise Overview Melanie is a litigator with a diverse civil litigation practice focusing on catastrophic injury, premises liability, automobile liability, dram shop, and commercial litigation. Melanie’s practice takes her all over the state of Oregon and Washington regularly, and occasionally into Idaho as well. She has given a number of presentations on changes in Oregon and Washington law highlighting the Pacific Northwest’s unique legal landscape. Before joining Smith Freed Eberhard in 2015, Melanie acted as the primary attorney for insurance subrogation claims. This high-volume practice placed a premium on efficiency, diligence, and energy that has carried over into her current practice. In law school, Melanie won awards for both client advocacy and legal writing. Some of Melanie’s first experiences in the legal community were volunteering for the Washington County Family Law Assistance Program and working at the Low Income Taxpayer Clinic. Melanie is an Oregon native and grew up in a handful of smaller, Southern Oregon towns. She moved to the big city for law school, fell in love with Portland, and can’t imagine being anywhere else. Away from work, Melanie can usually be found teaching knitting lessons at a local yarn shop, checking out a local brewery, or getting her yearly supply of Vitamin D during the 4 months of the year that it’s dry enough to be outside. Follow Melanie Follow to receive case updates, wins, and exclusive info! Download Bio Professional Certifications & Accolades Member, Oregon State Bar Association Member, Washington State Bar Association Member, Idaho State Bar Association Member, Multnomah County Bar Association Member, Oregon New Lawyers Division Admitted, U.S. District Court – District of Oregon U.S. District Court - District of Oregon Lewis and Clark Law School, J.D., cum laude, 2012 Lawrence University, B.A., summa cum laude, 2009 Would you like to receive even more resources? Contact this legal expert now to receive resources in their specialized practice area. Commercial Liability Defense Articles by Melanie Rose Legal Webinar: Year In Review - Commercial Lines in Oregon Year In Review - Commercial Lines in Oregon Join Smith Freed Eberhard partner Bill Taaffe and senior attorney Melanie Rose on Thursday, No... Legal Webinar: Oregon & Washington Construction Law Legal Webinar: Oregon & Washington Construction Law The world of construction presents a large number of issues for contractors and sub... Legal Webcast: Discovery in the Information Age - Using Technology and Data to More Effectively Defend and Settle Your Claims Legal Webcast: Discovery in the Information Age - Using Technology and Data to More Effectively Defend and Settle Your Claims Watch the reco... Certain features of this site may not function correctly without JavaScript enabled Find out how to enable JavaScript in your browser Summary of Law
cc/2019-30/en_middle_0012.json.gz/line1612
__label__cc
0.611539
0.388461
How and why did modern web application frameworks evolve to decouple URL routes from the file system? Compared to about 10 years ago I have noted a shift towards frameworks using the style of routing that decouples the URL path from the filesystem. This is typically accomplished with the help of a front-controller pattern. Namely, when before, URL path was mapped directly to the file system and therefore reflected exact files and folders on disk, nowadays, the actual URL paths are programmed to be directed to specific classes via configuration, and as such, no longer reflect the file system folder and file structure. How and why did this become commonplace? How and why was it decided that it's "better" to the point where once-commonplace direct-to-file approach was effectively abandoned? Other Answers There is a similar answer here that goes a bit into the concept of route and some benefits and drawbacks: With PHP frameworks, why is the "route" concept used? But it does not address historical change aspects, or how or why this change gradually happened, to where any new projects nowadays are pretty much using this new routing style pattern and direct-to-file is outdated or abandoned. Also, most of those benefits and drawbacks mentioned, do not appear to be significant enough to warrant such a global change. The only benefit that I can see driving this change perhaps is hiding the file/folder system from end-user, and also lack of ?param=value&param2=value, which makes URLs look a tad cleaner. But were those the sole reason for the change? And if yes, why were those reasons behind it? I am most familiar with PHP frameworks and many popular modern frameworks use this decoupled routing approach. To make it work you set up URL rewriting in Apache or similar web server, to where web application functionality is typically no longer triggered via a direct-to-file URL path. Zend Expressive https://docs.zendframework.com/zend-expressive/features/router/aura/ https://docs.zendframework.com/zend-expressive/features/router/fast-route/ https://docs.zendframework.com/zend-expressive/features/router/zf2/ https://docs.zendframework.com/zend-mvc/routing/ https://laravel.com/docs/5.5/routing https://book.cakephp.org/3.0/en/development/routing.html web-applications history routing DennisDennis was there really such a change? or maybe most languages/frameworks never used direct filesystem mapping? maybe it's just PHP that'is catching up with the rest of sane? your observations are in my opinion wrong, so there is no good answer. also "shift" you mention occured only in PHP world. but it's too broad question in my opinion... – rsm Jan 5 '18 at 16:55 @rsm I had a similar first reaction but on further thought, it really is something that has been done across many languages and platforms leading to it being a really common source of vulnerabilities. – JimmyJames Jan 5 '18 at 17:00 @rsm, this may be more evident in PHP frameworks, but to use another way -- at a certain time, before any framework really caught on, be it ASP, .NET, PHP, JSP, etc, the web mostly used direct-to-file approach. Why did all these frameworks develop to use the decoupled approach? Technically, direct-to-file approach is still feasible, and I am sure modern frameworks can use it. Or can they? Maybe they can't, and maybe there are good reasons as to why they don't? What would those reasons be..? They don't even provide a way or a plugin to do this, they just eradicated direct-to-file altogether. – Dennis Jan 5 '18 at 17:10 Isn't this (in part) also about viewing an URL (a locator, how to find a resource) as URI (and identifier)? – Hagen von Eitzen Jan 6 '18 at 16:39 Related reading from ancient history: Cool URIs Don't Change - Tim Berners-Lee, 1998 – Michael Hampton Jan 7 '18 at 2:26 In its most basic form, a website serves static files. Mapping the URL path to a file path is the most obvious choice; essentially, it's a read-only FTP site. Then people wanted to change the content of the page with some scripting. The easiest way is to embed a scripting language into the page and run it through an interpreter. Again, given the already existing path -> file path routing, this was simple enough. But really, you are running that file as an argument to the interpreter now. You have to identify when the request is for a static file and when it's for something that you need to interpret. Once you start to use more advanced compiled languages, you are even more divorced from the file location. Plus, your web server is already caching static files and doing all sorts of optimizations, that means hitting the file system is the exception rather than the rule. At this point, the old link file system path is more of a hindrance than a help. But I think the real sea change came when users wanted to get rid of the file extension from the path. Getting myPage.asp or myPage.php was somthing that confused 'normal' people and interfered with SEO. Because the user sees the path, it has become part of the UI of the web, and as such, it needs to be completely free of any technical limitations. We have lost the 'www' and virtually everything is a '.com'. Multiple URLs will point to the same page. If I make more money with mydomain.com/sale vs www.mydomain.co.uk/products/sale.aspx, then I don't want any technical limitations to stand in my way. I always thought the desire to hide file extensions was in part "security by obscurity" - making it a bit harder to tell what technology was employed by a site in order to make it less easy to target for particular attached/known exploits of certain servers and techs at the time – Caius Jard Jan 5 '18 at 17:39 @CaiusJard that's part of it, but another part is technology agnosticism - having replaced file.html in our paths, we didn't want to get stuck with another switch later (for example, file.phtml to file.php, or even to file.asp). But since we're dissociating URL and filesystem path (using routing or whatever) to access resources built from database records and/or other sources, why have an extension in the URL at all? – HorusKol Jan 5 '18 at 18:03 @HorusKol Technology agnosticism isn't even just about having to change all the files in your path. Being able to change backend technologies without breaking your customer's workflow and bookmarks and without destroying your SEO can be huge. – Shane Jan 5 '18 at 18:51 Interestingly it was never recommended to have file name extensions in the URI, so they should have been decoupled from the file system early on. The earliest reference I can find for this is from 1998, which actually predates most of the developments described in this answer. – Konrad Rudolph Jan 5 '18 at 19:46 In the old days mydomain.com/sale still worked; it redirected to /sale/ and loaded just fine (your page was mydomain.com/sale/index.aspx but nobody ever saw the index.aspx). – Joshua Jan 5 '18 at 20:55 You can look to a white paper by Roy Fielding on REpresentational State Transfer (REST) as to the when and the why. The first framework I was aware of that made the distinction between a resource and a file was Ruby on Rails--introducing the concept of URL to code routing. The main concepts behind REST that were transformational were: A URL represents a resource That resource can have multiple representations The URL should not break if the application is restructured Applications should embrace the statelessness of the web The main drawback of having files be served directly by the URL is that you experience the following issues: Resource links are constantly broken as web-sites are reorganized Resource and representation are tied together I think it is important to provide some fair balance as well: Not all resources are equal in importance. That's why you still have style based resources served directly (CSS, JavaScript/EcmaScript, images) There are refinements of REST like HATEOAS that better support single page apps. edited Jan 6 '18 at 0:13 user22a6db72d7249 Berin LoritschBerin Loritsch when you say representation do you mean things like JSON/HTML/TEXT/etc? I'm vaguely familiar with REST, but I imagine even with REST you have to have some kind of a trigger to change response representation... – Dennis Jan 5 '18 at 17:48 @Dennis, yes. HTTP has a number of headers that can be used to hint at the desired form (developer.mozilla.org/en-US/docs/Web/HTTP/Content_negotiation) and REST was all about embracing the strengths of HTTP. However, it's still not uncommon for an app to have a proprietary way of negotiating the desired content. – Berin Loritsch Jan 5 '18 at 17:51 CGI (1993), Servlets (1997) and JSP (1999) often decoupled URLs from the filesystem, and pre-date REST (2000). However this answer is basically correct in identifying the reasons for the popularity of the design pattern: REST, Java Struts and Ruby on Rails have a huge influence on the 21st century popularity of separating resources from representations. – dcorking Jan 6 '18 at 17:39 According to Fielding's paper, "The first edition of REST was developed between October 1994 and August 1995" – Connor Jan 7 '18 at 0:20 @dcorking, CGI at that time didn't decouple URLs from files, it just ran the file instead 9 times out of 10. Servlets might be the closest match, but if you are talking about the concept of routes and having a designed url space, that came with Rails and frameworks like it. – Berin Loritsch Jan 7 '18 at 14:21 I don't think it's an artefact of modern web application frameworks, it's mostly an artefact of dynamic page serving in general. In the old days there were mostly static web pages, where a software served individual files from the file system by their path. They did so mostly because the 1:1 mapping of URL paths to file system paths (with one directory designated as the web root) was the obvious choice, though URL rewriting (e.g. to make redirects after moving files) was common as well. Then came the age of serving dynamic content. CGI scripts (and everything evolved from them) did create the pages on the fly, being backed by a database of some kind. GET parameters in URL became commonplace, for example en.wikipedia.org/w/index.php?title=Path_(computing). However it is more userfriendly to have a readable URL consisting of only path segments. So the dynamic applications mapped simple paths (for example en.wikipedia.org/wiki/Path_(computing)) to parameters, and these mappings are known as "routes". Maybe this approach feels more recent as it gained popularity when the importance of usability was recognised more widely, and also became part of SEO. This is probably the reason why it was built directly into the large web frameworks. BergiBergi One reason is that loading a file from disk on every request is slow, so web servers started creating ways to cache files in memory, then if you're going to try to keep it in memory anyway, why does it matter where it was on disk? One reason is that many web frameworks are written in compiled languages, so you don't even have a file structure on disk, just a jar file or whatever. Interpreted languages borrowed ideas they liked from the compiled ones. One reason is the desire for more semantic, dynamic routes, like https://softwareengineering.stackexchange.com/questions/363517/how-and-why-did-modern-web-application-frameworks-evolve-to-decouple-url-routes. Obviously, you don't want a /var/www/questions/363517/how-and-why-did-modern-web-application-frameworks-evolve-to-decouple-url-routes.php file. You used to make url-rewriting rules in the web server configuration to create routes like this. Now it's just a code change, which is much simpler operationally. Karl BielefeldtKarl Bielefeldt You don't need url rewriting for that example. – Yay295 Jan 5 '18 at 22:07 It's handled by code that recognises the first part of the path, and uses the number /363517/ to look up the question in a database. Nothing to do with the web server itself, but an application ... – Will Crawford Jan 7 '18 at 23:59 On of the major reasons is likely that this approach of mapping URIs to file paths has lead to a large number of accidental releases of data via File Path Traversal When you map the path to the file system, it means that you then need to check that every path that you receive as a request maps to files that should be accessible through to clients. A simple approach to guarantee that is not happening is to eliminate the transparent mapping and do it more explicitly. This is not a PHP-only issue. As evidence here is a relevant section of an Apache hardening guide. JimmyJamesJimmyJames Why the downvote? – JimmyJames Jan 5 '18 at 17:19 I can't answer for the industry, but I can tell you why I moved away from the URL = file system back in the early 2000's towards virtual 'routes'. Working with 'old school' PHP, if you have a 1000 PHP pages, you'd have 1000 PHP files representing those pages. Each one duplicating header/footer includes and possibly some other logic. Now let's say you need to change that. What a mess you now have on your hands! You either have to change all 1000 files, or you end up with a jumble of very ugly code in the header/footers to handle all the cases. Using virtual routes, your header/footer logic, database connection logic, and other initialization are included once, period. Much better to work with. Another reason is to avoid ambiguity. As applications grow, the headers/footers that get included become more complex. They usually had nested includes of their own that depended on various things. In the PHP file for the 'page', often you encountered ambiguity about whether a variable isset() or not. Using virtual routes, and an application where everything you need is loaded on each page load, you no longer have that concern. Lastly (though there are other reasons, but it's the last I'll list), many of those 1000 pages represent code that would be duplicated. So after refactoring into a proper set of classes and templates, the code is greatly simplified and you can do everything you want to do without having those 1000 files. can you say more why you would end up with very ugly code? I can see the need to change 1000 files (assuming it is to update header/footer includes), but what do you mean by jumble of ugly code? – Dennis Jan 5 '18 at 21:33 See the paragraph I just added. But basically, as you extend the header/footer/initialization code to handle more cases, especially if you conditionally include other files (it was a bad habit, but lots of PHP programmers did it), you end up with very difficult to follow code. – GrandmasterB Jan 5 '18 at 21:37 I won't go into too much detail as to why this separation is beneficial. The main argument is that it separates semantics (what are you actually trying to access) from the underlying implementation. Taking that the benefits outweigh the costs as a given - which would be a separate question - it's not difficult to see why it was gradually adopted. I don't think there's a single event that caused this, although I'd certainly be open to being educated on this. At least in my experience, initially this was often done via the Apache configuration - and presumably other web servers supported this as well. However, conceptually there is no good reason why the server should be tasked with this. After all, the routes are specific to the actual application, so it makes sense to define them there. This did change globally, but as you point out, gradually. The reason for this is almost certainly a very simple one: good ideas spread over time. This is also why it's not such a surprise that the change happened globally. It's not that everybody got together and decided to do it this way. Rather, every project adapted this approach when they thought it would be beneficial (and projects that didn't support it eventually disappeared). doubleYoudoubleYou The RFCs already built the concepts from the ground up, with URIs (that didn't attach any semantics to the local part), and URLs as a special case that introduced path-like semantics to allow HTML documents to use links relative to the document base URL. The obvious implementation is to map the local part of the URL directly to the file system, so this is what simple setups did — whether you use a dedicated relational database to look up a document, or take advantage of the highly optimized low-overhead key-value store you already have does not matter to the outside, but certainly affects your cost structure for serving the documents. If you have a web application with persistent data, that cost structure changes: you always have the overhead of running the application, and integrating URL decoding into it makes a lot of features easier to implement, reducing cost. Simon RichterSimon Richter At the beginning of time, URLs mapped directly to file paths on the server because it's easy, and there's no other way of doing it anyway, is there? If I ask for /path/to/index.php, I'll get /path/to/index.php starting from the root directory of the website (usually not of the server itself, the website should be kept in a directory or a subdirectory further down). Then after a couple of years, we started learning about rewriting, that is serving a different resource than the one that was apparently asked for. /request/path/to/index.php can actually serve /response/path/to/index.php. Another trick is hiding index.php. If I ask for /index.php?foo=bar&baz=qux the server can respond by hiding index.php like so: /?foo=bar&baz=qux, all the while actually serving index.php anyway. The next step, which is the big important one, is that we learnt to redirect all URLs to /index.php. So now, /path/to/some/page is silently redirected to /index.php?path/to/some/page. This is a bit tricky, because normally each slash represents a new subdirectory, but in this case the web server is configured to send the path as a parameter, instead of looking in it. Now that we have this, we need a completely different way of thinking about how the website is organised. Before, it was a loose collection of different pages. Now, everything is routed through a single entry page. This makes the site much more complicated, but provides opportunities that weren't available before, such as site-wide user authentication, uniform application of headers, footers and styles, etc. It effectively turns your hundred or thousand app website (if you consider each file to be its own app) into a single, much more complicated but much more consistent app. This is a huge leap, as you can no longer tell what code will be executed simply by looking at the URL. You now need to have a deep understanding of how your particular framework translates URL paths into code paths, and although there are similarities between frameworks, most are different enough that you need some familiarity to be able to work with the code. Long story short, it was a gradual evolution of discovery, not a sudden jump, and each developer pretty much had to go through the same journey of discovery. The learning curve is pretty steep, unless you can grasp abstract concepts really quickly. CJ DennisCJ Dennis As a long-time webdev, I think the advent of navigation-less history control (history.pushState()) around the time of HTML5 made this practical. Before that, you had to reload the page to update the URL bar, unless you only updated the fragment (/path#fragment). This fragment was invisible to the server (it's not routed), so the only way to refresh or bookmark a dynamic page was via JavaScript. This has major implications for SEO, and led google to develop a seldom-used "hashbang" schema that required a server-side mapping of dynamic hashes to physical URLs. This was unwieldy and not universal among robots, leading the (false) axiom: "spiders can't crawl ajax content". But the benefits of ajax content are tangible: try using google maps w/o JS for example. The solution was a way to update the URL bar with a value that can be mirrored on the server (allowing bookmarks and JS-less refreshing), WITHOUT reloading the page. Once this capability was available, developers could "navigate" a site by simply updating a "main content section", URL bar, and breadcrumbs. This meant that all the JS+CSS didn't need refetched+parsed, allowing a MUCH faster page-to-page transfer. dandavisdandavis protected by gnat Jan 7 '18 at 22:02 Not the answer you're looking for? Browse other questions tagged web-applications history routing or ask your own question. With PHP frameworks, why is the “route” concept used? In a javascript only web application, what state information should the URL contain? Why did the web win the space of remote applications and X not? Securely changing system configuration from a web application How to manage automated emails sent from a web application Why should I should url routes to the user in a single page application? When did the first “REST”-model and friendly URL web technology come to be? What is the different between web site and web application? When designing a URL router, is there a reason why some frameworks choose a configuration file vs. a naming convention? Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries? How to reverse engineer URL routes from a bulk of HTTP requests/responses
cc/2019-30/en_middle_0012.json.gz/line1614
__label__cc
0.6201
0.3799
Width 2.5 2.8 3 3.5 4 4.1 4.5 4.6 4.8 5 5.1 5.3 5.5 5.7 5.9 6 6.4 6.5 6.7 6.9 7 7.2 7.5 7.6 8 8.15 8.25 8.3 8.5 8.75 9 9.5 10 10.5 11 11.2 11.25 11.5 12 12.4 12.5 12.75 13 13.5 13.6 13.9 14 14.5 14.9 15 15.5 16 16.25 16.5 16.9 17 17.5 18 18.4 18.5 19 19.5 20 20.5 20.8 21 21.5 22 22.5 23 23.1 23.5 24 24.5 25 26 26.5 27 28 29 29.5 30 30.5 31 31.5 32 33 33.25 34 35 35.5 36 37 38 39 40 41 42 43 44 48 50 60 66 67 70 73 76 78 80 85 90 100 105 110 115 120 125 130 135 140 145 150 155 160 165 170 175 180 185 190 195 200 205 210 215 220 225 228 230 235 240 245 250 255 260 265 270 275 280 285 295 300 305 315 320 325 330 335 340 345 350 355 360 365 370 375 380 385 390 395 400 405 410 420 425 435 440 445 450 455 460 480 500 505 510 520 525 540 550 560 570 580 600 610 620 650 690 700 710 750 800 850 875 900 1000 1050 1250 2415 Rear Width 2.5 2.8 3 3.5 4 4.1 4.5 4.6 4.8 5 5.1 5.3 5.5 5.7 5.9 6 6.4 6.5 6.7 6.9 7 7.2 7.5 7.6 8 8.15 8.25 8.3 8.5 8.75 9 9.5 10 10.5 11 11.2 11.25 11.5 12 12.4 12.5 12.75 13 13.5 13.6 13.9 14 14.5 14.9 15 15.5 16 16.25 16.5 16.9 17 17.5 18 18.4 18.5 19 19.5 20 20.5 20.8 21 21.5 22 22.5 23 23.1 23.5 24 24.5 25 26 26.5 27 28 29 29.5 30 30.5 31 31.5 32 33 33.25 34 35 35.5 36 37 38 39 40 41 42 43 44 48 50 60 66 67 70 73 76 78 80 85 90 100 105 110 115 120 125 130 135 140 145 150 155 160 165 170 175 180 185 190 195 200 205 210 215 220 225 228 230 235 240 245 250 255 260 265 270 275 280 285 295 300 305 315 320 325 330 335 340 345 350 355 360 365 370 375 380 385 390 395 400 405 410 420 425 435 440 445 450 455 460 480 500 505 510 520 525 540 550 560 570 580 600 610 620 650 690 700 710 750 800 850 875 900 1000 1050 1250 2415 Wild Trac LTR Max P255/65R-17 1252882 Cordovan Wild Trac LTR Max P255/65R-17 Part Number: CO-1252882 Service Description: 110 T UTQG: 500AB Load Range: SL Treadlife Warranty: 50000 miles Type: Passenger All Season P255/65R-17 Cordovan Wild Trac LTR Max SALE: Heat Wave Deal! Instant Discount Ends July 17th $124.92 118.674 $118.67 Add Road Hazard Insurance for $11.87 a tire Wild Trac LTR Max P255/65R-17 P255/65R-17 500AB 2,337 lbs 44 psi 12/32nds 8" 10" N/A 30" Purchase includes the Cordovan Wild Trac LTR Max tire only. The wheel rim shown in the picture is not included. Picture provided is a stock picture from the manufacturer and may or may not reflect the actual product being ordered. All Cordovan Wild Trac LTR Max tires are continuously developing with manufactured improvements. With that said, Simple Tire and the manufacturers have the right to change these tire specifications at any time without notice or obligation. Please Note: Specifications of the Cordovan Wild Trac LTR Max tires shown above are listed to be as accurate as possible based on the information provided to us by Cordovan tires. 31/10.50R15 109R BW LMX44 $575.68 set of 4 $143.92 1234567891011 LT215/85R16 115R BW LMX15 View Details P225/75R16 104T 500AB BW LMX75 View Details P235/75R16 108T 500AB BW LMX76 $491.68 set of 4 $122.92 1234567891011 LT245/75R16 120R OWL LMX38 View Details P255/70R16 111T 500AB OWL LMX86 $543.68 set of 4 $135.92 123456789 P265/65R17 112T 500AB OWL LMX59 $471.88 set of 4 $117.97 1234567891011121314 P265/75R16 116T 500AB OWL LMX81 View Details P275/60R20 115T 500AB BW LMX16 $1079.68 set of 4 $269.92 12345 LT285/70R17 121S BW WST84 $1287.68 set of 4 $321.92 123456789 LT315/70R17 121R BW LMX02 $955.68 set of 4 $238.92 1234567891011121314 This product is covered by a 50,000 mile manufacturer’s treadlife warranty. Merchandise covered by a manufacturer’s warranty is sold with the warranty by the manufacturer extended to the purchaser. We will be happy to assist in obtaining fulfillment of a manufacturer’s warranty. Other than applicable manufacturers’ warranties, there are no warranties, express or implied, including any warranty of merchantability or fitness for a particular purpose. The only tires SimpleTire can warranty are brand new defects (meaning that they have not been mounted or driven on). Any bead damaged will be void of any warranty claim. Any other adjustments should be taken to the nearest authorized dealer for that manufacturer. Sometimes the manufacturer also provides a treadlife warranty and mileage rating. Please be aware that not all tires hold a mileage warranty from the manufacturer. Different tire models, even from the same manufacturer, may or may not come with a treadlife warranty. Good price for Great tires By submitting a review, each person received a sweepstakes entry.
cc/2019-30/en_middle_0012.json.gz/line1617
__label__wiki
0.742041
0.742041
Teenage Mutant Milk-Caused Hurdles ← 584 "The Girl Code" "Teenage Mutant Milk-Caused Hurdles" "Much Apu About Something" 586 → VABF04 Homer sits on the couch, puts sunglasses on and the couch is taken to a lower level via a hidden elevator. Then, a montage showing Joe "Kaz" Kazinsky (Homer) and his partner, a high-tech couch chasing down their enemy, Fernando Withmore (Ned) on Miami of the '80s. In the end, it's revealed that the scenes are a rerun from a 1980 show, to which Homer replies "Damn reruns", only for the family to be surprised by Maggie imitating the show's main heroes and setting the living room's floor on fire. ( LA-Z Rider Couch Gag from Guest Animator Steve Cutts at YouTube) Maggie comes down with a parachute with a "2016" sash, while Grampa goes up with one with a "2015" sash. Sofia Vergara as Mrs. Berrera Joel H. Cohen Timothy Bailey "Teenage Mutant Milk-Caused Hurdles" is the 11th episode of season 27. It aired on January 10, 2016. 4 International airdates 6 Promo Videos "After Bart starts drinking a milk substitute filled with bad hormones, he experiences early puberty and grows a little mustache — as well as feelings for Mrs. Berrera, his new teacher. Mrs. Berrera winds up in the middle of a romantic rivalry, as she also draws the attention of Principal Skinner. She feels Skinner is a wounded soul that she wants to take care of. She is a vet like Skinner, and that's his attraction." Groundskeeper Willie was trying to be a substitute teacher for the forth grade, but in order to make the kids quiet, he starts playing a bagpipe. Superintendent Chalmers enters the room and tells Willie to stop playing the instrument and leave the room because there was a new teacher: Mrs. Berrera. Bart started acting weird when she first entered the room, and later realized that he has a crush on his new teacher. Meanwhile, Homer has to buy a healthy milk for the family, but Apu makes him buy a cheaper milk full of hormones made by Buzz Cola. The next morning, the family discovers that Bart was the first to wake up and was already dressed for class. Lisa mocks Bart that he's only doing that for his new teacher, which is true. Homer drives Bart to school only to see her, and they're surprised by other dads, also eavesdropping on her class. Later, Bart writes "Skinner is a wiener" on the school's wall, but it's surprised by Mrs. Berrera saying that she needs to see him after class. At their meeting, she tells Bart that he's way behind the class and need a tutor. When Seymour Skinner offers help on her class by pulling up her maps, Bart discovers that Skinner is also trying to impress Mrs. Berrera. The next morning, the milk hormones started making effect on Bart (who now has a little mustache), Lisa (who now has an acne problem) and Maggie. Marge decides to help Lisa while Homer teaches Bart to shave his beard, where he discovers that he has to take the plastic cover off the blade for it to work properly. Meanwhile, Lisa tries to hide her face with a hoodie, but Marge changes her mind by presenting her to makeup in order to hide her skin problems. At school, Bart pretends he's hurt to draw Mrs. Berrera's attention and take her away from Seymour to help him with first-aid. At the watching crowd, Nelson discovers that Lisa is using makeup, which makes her popular enough to be invited to a third grade party. The next day, at breakfast, Marge discovers that the Buzz Milk is the one causing problems to the kids. They call the number on the box, but Snake picks up the phone in prison. Later at school, Bart sees Mrs. Berrera and Seymour kissing on the corridor. He also calls Bart for a meeting, saying that he knows way more things about Mrs. Berrera than Bart does, and that he doesn't have a chance to win her. Angry by Skinner's play, he decides to prank them by filling a chocolate box given to Mrs. Berrera by Skinner with class pets, such as snakes and frogs. Later, at the third grade party, Lisa realizes that it's about to rain and everyone would see her acne problem if the makeup washes away, resulting on humiliation, but she decides to reveal her problem herself by taking off the makeup in front of everybody, but her skin is clean and she notices that the hormone effects are gone, so she decides to leave the party, embarassed for making an underwhelming announcement. Lisa convinces Bart to give up on Mrs. Berrera and let Skinner have her as a girlfriend, but when he presents her to Agnes, she gets so disgusted about his mother that she decides to end her relationship with him. At night, Seymour, Bart and Milhouse decided to roast marshmallows at the school, using Bart's permanent record as fuel to the fire, while Lisa plays her saxophone in the music class. At the next morning's breakfast, Lisa's playing saxophone at the kitchen, claiming that she'll never use makeup again, but Bart mocks her by saying "Carnegie Hall" out loud (which according to her, it would make her dream of playing there not come true). They start fighting on the floor, but they're separated by Maggie, who now has a huge mono-brow and super strength due to the milk hormones. The production thought it would be interesting if both Bart and Skinner had a crush on the same woman. Artwork of "Mrs. Berrera" International airdates[edit] Latin America May 8, 2016 Fox Latin America Promo Videos[edit] Simpsons Coming In January at YouTube LA-Z Rider Couch Gag from Guest Animator Steve Cutts at YouTube A Lesson at YouTube Firm But Pretty at YouTube Every Man's Dream • 'Cue Detective • Puffless • Halloween of Horror • Treehouse of Horror XXVI • Friend with Benefit • Lisa with an "S" • Paths of Glory • Barthood • The Girl Code • Teenage Mutant Milk-Caused Hurdles • Much Apu About Something • Love Is in the N2-O2-Ar-CO2-Ne-He-CH4 • Gal of Constant Sorrow • Lisa the Veterinarian • The Marge-ian Chronicles • The Burns Cage • How Lisa Got Her Marge Back • Fland Canyon • To Courier with Love • Simprovised • Orange Is the New Yellow Retrieved from "https://simpsonswiki.com/w/index.php?title=Teenage_Mutant_Milk-Caused_Hurdles&oldid=758754" Episodes written by Joel H. Cohen Episodes directed by Timothy Bailey Principal Skinner episodes Modified on October 22, 2016, at 18:27.
cc/2019-30/en_middle_0012.json.gz/line1618
__label__wiki
0.579553
0.579553
The Day the Violence Died Season 7 Episode ← 145 "Homer the Smithers" "The Day the Violence Died" "A Fish Called Selma" 147 → The Simpsons are colorless blobs; mechanical arms color and detail the family. Kirk Douglas as Chester J. Lampwick Alex Rocco as Roger Meyers Jr. Jack Sheldon as the Amendment To Be Suzanne Somers as herself John Swartzwelder Wesley Archer DVD features "The Day the Violence Died" is the eighteenth episode of Season 7. It first aired on March 17, 1996. The episode was written by John Swartzwelder and directed by Wes Archer. Kirk Douglas, Alex Rocco, Jack Sheldon, Suzanne Somers guest star. "With the help of Lionel Hutz, Bart unwittingly bankrupts the studio that produces Itchy & Scratchy when he and Hutz successfully prove the idea for Itchy was stolen some 70–80 years ago." It's the 75th Anniversary of Itchy and Scratchy and Bart, Lisa and Homer go to the Itchy and Scratchy Parade. Bart follows it to "Bum Town", where he meets a homeless man named Chester, who claims that he created Itchy of the Itchy & Scratchy cartoons, and indeed cartoon violence itself. As proof, Chester shows Bart and Milhouse an animated short he made in the 1920s, in which Itchy is the star and goes about his usual violent tendencies. Bart now believes Chester, but the nitrate print of the film catches fire, eliminating their only proof. Even so, Bart decides to help Chester. Chester moves in but things turn bad when Chester and Grampa get into a fist-fight. When Bart and Chester try to prove that Chester created the cartoon to the C.E.O of Itchy and Scratchy, Roger Meyers Jr., they are thrown out by security. They decide to take it to court. During the trial, Krusty and Chester get into a fist-fight. The Itchy and Scratchy company have much better lawyers (obviously) than the children and Chester. Chester claims he created all the good Itchy and Scratchy characters, and asserts that Meyers was an untalented man who could only draw "pathetic stick figures." Yet Chester presents no hard evidence supporting his claims, and the case seems to be over. However, thinking quickly, Bart borrows $750 from Homer and runs to the local comic shop and returns with a framed image of Itchy, which he recognized from Lampwick's cartoon. When Bart removes the image from the frame, an autograph is evident in which Lampwick dedicated the image to Roger Meyers Sr., and encourages keep drawing, as he clearly suffers from a "lack of talent". The date on the signature also predates Itchy's first appearance in 'Steamboat Itchy'. With the revelation that his father stole Itchy, along with any every other cartoon the studio owned, Meyers Jr. makes a last-ditch effort to claim all successful cartoons borrow from other sources. Chester wins the case, and the Itchy and Scratchy company pays him his requested sum of $800 million. Bart is happy for Chester, but becomes saddened when he realizes that by helping Chester, he has bankrupted and shut down the production company for Itchy & Scratchy. He and Lisa try to solve the problem, but are shocked when they find out the problem has already been solved by two other (similar-looking) kids; Lester and Eliza. It turns out that one of Meyers Sr.'s lame stick-figure characters, "Manic Mailman", was actually plagiarized by the US Postal Service, which results in a huge cash settlement for the Itchy & Scratchy studio. At the same press conference, Lester and Eliza announce that they have rescued Apu and Krusty from various scandals as well. The episode ends with Bart and Lisa declaring themselves unsatisfied with someone else saving the day. Wikisimpsons has a collection of images related to "The Day the Violence Died". ← Season 6 Season 8 → Who Shot Mr. Burns? (Part Two) • Radioactive Man • Home Sweet Homediddly-Dum-Doodily • Bart Sells His Soul • Lisa the Vegetarian • Treehouse of Horror VI • King-Size Homer • Mother Simpson • Sideshow Bob's Last Gleaming • The Simpsons 138th Episode Spectacular • Marge Be Not Proud • Team Homer • Two Bad Neighbors • Scenes from the Class Struggle in Springfield • Bart the Fink • Lisa the Iconoclast • Homer the Smithers • The Day the Violence Died • A Fish Called Selma • Bart on the Road • 22 Short Films About Springfield • Raging Abe Simpson and His Grumbling Grandson in "The Curse of the Flying Hellfish" • Much Apu About Nothing • Homerpalooza • Summer of 4 Ft. 2 Retrieved from "https://simpsonswiki.com/w/index.php?title=The_Day_the_Violence_Died&oldid=858954" Episodes written by John Swartzwelder Episodes directed by Wes Archer Modified on April 23, 2019, at 02:55.
cc/2019-30/en_middle_0012.json.gz/line1619
__label__wiki
0.797468
0.797468
Something Very Big The search for the story of Lancaster B for Baker 467 Postblog: List of all sources used « The First Flight in B for Baker 10 Really Useful Bomber Command Websites » Two Railway Attacks: Tours and Lille, April-May 1944 Published September 11, 2013 Operations , Research 2 Comments Tags: 467 Squadron, Bomber Command, Transportation Plan By the beginning of April 1944, the crew of B for Baker had completed their first dozen or so operations. They had been members of 467 Squadron at Waddington for three months and their last time off had been in February. Consequently all seven spent the first week and a half of April away on leave. But while they were away the war continued. I’ve been having a close look recently at the operations that were carried out during the period that the crew were at Waddington. On 10 April 1944 – the day that they were due back from leave – the rest of the squadron were part of a force of 166 aircraft that were sent to attack the marshalling yards at Tours in southern France. When I first saw the Tours raid in the Operational Record Books, I wasn’t intending to take too much time to study it closely because the crew of B for Baker were not themselves involved in it. But the Tours operation nevertheless shows some interesting parallels when compared with the operation a month later from which they failed to return, an attack on Lille on 10 May 1944. Both operations were part of the so-called ‘Transportation Plan’, a series of attacks designed to cripple the Germans’ ability to move troops and equipment around France in preparation for the coming invasion of the continent. As such, each was one of a number of attacks made on railway targets on the same nights. 180 aircraft went to Tours, but only 89 went to Lille. Interestingly, both were a little ‘different’ tactically when compared with the other raids they accompanied. While the four other raids carried out on 10 April (Aulnoye, Ghent, Laon and Tergnier) used Mosquitos to lay ground markers on the aiming point using the Oboe blind bombing aid, at Tours the marking was done visually by Lancasters under the light of white parachute flares, similar to the Pathfinders’ Newhaven tactics. Three other railway targets were attacked on 10 May 1944, each also using Oboe-equipped Mosquitos backed up by visual flares and using a Master Bomber to control the raid (Lens, Ghent and Courtrai). At Lille the same night, however, the marking was carried out entirely by visual means. At this stage in my research I can’t establish why Oboe was used for the other raids but not at Tours or Lille – perhaps it was a capacity issue, and the expected clear conditions and bright moonlight on each night meant that a visual technique was considered sufficient. At both Tours and Lille, the first markers went down accurately. But on each operation problems arose after the first few bombs had fallen. At Tours, this was because the markers were laid on the actual aiming point itself, and smoke from the resulting bombing obscured the markers for later aircraft. The resulting delay before the target could be remarked caused some aircraft to circle in the target area for up to an hour. A new tactic was developed between the two operations so that markers were laid a short distance away from the actual aiming point, and bomb sights were adjusted accordingly so that bombs still fell onto the actual target, and Lille was the second time that this technique had been attempted. Unfortunately it failed when the first few bombs fell onto the target indicator anyway (perhaps because some early bomb aimers had not made the necessary adjustments to their sights) and it was extinguished or obscured by blast and smoke. A delay ensued, like at Tours, while the target was remarked and the appropriate wind correction was calculated for the bomb sights. The biggest difference between the two raids, however, was that while the defences of Tours failed to take advantage of 180 bombers circling for up to an hour, at Lille it was rather a different story. Few fighters and little flak was encountered on the Tours trip and only one bomber was lost. But at Lille, while the delay was ‘only’ about 20 minutes and there was slight to moderate flak over the target, the fighters put up stiff opposition and twelve aircraft out of 89 failed to return. 467 and 463 Squadron Operational Record Books for the Tours operation, 10APR44, and for the Lille operation, 10MAY44 Night Raid Reports Nos. 576 and 602 Lawrence, W.J. 1951. No. 5 Bomber Group, R.A.F. 1939-1945, Faber and Faber Limited, 24 Russell Square, London W.C.1, p. 185 © 2013 Adam Purcell 2 Responses to “Two Railway Attacks: Tours and Lille, April-May 1944” 1 Peter Harvey December 25, 2013 at 01:02 I have been carrying out research re the attack on Lille 10/11th May 1944. My late uncle P/O DED Harvey DFM was a Wireless Operator in 97 PFF Squadron Lancaster JB708 OF-J which was shot down over the airfield at Vendville. Of the 7 crew members I have details of 6 of them. I am in contact with a Richard Jozefiak who has researched the raid and lives near the crash scene of JB708. If you would like details from a 97 Sqn perspective please let me know. Peter Harvey greynomad@live.co.uk 2 Adam Purcell December 25, 2013 at 20:12 G’day Peter, Thanks for your comment – great stuff. I’ll send you an email shortly… When I was young my father showed me a small blue felt-covered notebook. It was the flying logbook of my great uncle Jack, a Lancaster navigator in WWII. Jack's crew was made up of seven young men, all from vastly different backgrounds. They were normal, everyday lads caught up in extraordinary circumstances. This blog charts my search for their story and where it is leading me. Collections and Archives The Australians at War Film Archive RAF Commands Forum Stirling Aircraft Society Forums Bomber Command History Forum Gaining an RAF Pilot's Brevet in WWII Institutions and Associations Shrine of Remembrance Bomber Command Association in Australia International Bomber Command Centre Bomber Command Commemorative Day Foundation An Ordinary Crew Lancaster Bombers of 49 Squadron 75 (NZ) Squadron Aircrew Book Review Aircraft Q Failed to Return National Archives of Australia World War Two Nominal Roll 467 Postblog (100) Airfields (10) ANZAC Day (18) Bardney (1) Commemoration (67) Dale Johnston (8) Eric Hill (7) Flying (13) Gilbert Pate (12) IBCC (17) Jack Purcell (19) Jerry Parker (6) Joining Up (1) Ken Tabor (8) Lichfield (3) Llandwrog (1) Myths & Legends (9) Other Aircrew (62) Pathfinders (2) Phil Smith (28) The Search (42) Tiger Moth (1) Transportation Plan (2) Waddington (3)
cc/2019-30/en_middle_0012.json.gz/line1625
__label__wiki
0.872106
0.872106
Lyell Collection home Geological Society home Current volume Past volumes GSL fellows Other member types Access for GSL Fellows Access for other member types Alert sign up eTOC alerts Online First alerts GSL blog Geological Society of London Publications Engineering Geology Special Publications Geochemistry: Exploration, Environment, Analysis Journal of Micropalaeontology Journal of the Geological Society Petroleum Geology Conference Series Petroleum Geoscience Proceedings of the Yorkshire Geological Society Quarterly Journal of Engineering Geology and Hydrogeology Quarterly Journal of the Geological Society Scottish Journal of Geology Transactions of the Edinburgh Geological Society Transactions of the Geological Society of Glasgow Transactions of the Geological Society of London Follow gsl on Twitter Visit gsl on Facebook Visit gsl on Youtube Visit gsl on Linkedin Previous volumeNext volume Continent Formation Through Time N. M. W. Roberts, NERC Isotope Geosciences Laboratory, UK M. Van Kranendonk, University of New South Wales, Australia S. Parman, Brown University, USA S. Shirey, Carnegie Institution of Washington, USA and P. D. Clift, Louisiana State University, USA Licensed Free About this title ‐ Continent Formation Through Time Geological Society, London, Special Publications, 389, NP, 26 January 2015, https://doi.org/10.1144/SP389.0 Nick M. W. Roberts, Martin J. Van Kranendonk, Stephen Parman and Peter D. Clift Geological Society, London, Special Publications, 389, 1-16, 13 November 2014, https://doi.org/10.1144/SP389.13 Geophysics and Numerical Modelling Earth's punctuated tectonic evolution: cause and effect C. O’Neill, A. Lenardic and K. C. Condie Geological Society, London, Special Publications, 389, 17-40, 6 November 2013, https://doi.org/10.1144/SP389.4 The Hudson Bay Lithospheric Experiment (HuBLE): insights into Precambrian plate tectonics and the development of mantle keels I. D. Bastow, D. W. Eaton, J.-M. Kendall, G. Helffrich, D. B. Snyder, D. A. Thompson, J. Wookey, F. A. Darbyshire and A. E. Pawlak Geological Society, London, Special Publications, 389, 41-67, 27 November 2013, https://doi.org/10.1144/SP389.7 Supercontinent integrity between 0.8 and 0.6 Ga: the nemesis of Rodinia? J. D. A. Piper Geological Society, London, Special Publications, 389, 69-81, 28 October 2013, https://doi.org/10.1144/SP389.8 Making it thick: a volcanic plateau origin of Palaeoarchean continental lithosphere of the Pilbara and Kaapvaal cratons Martin J. Van Kranendonk, R. Hugh Smithies, William L. Griffin, David L. Huston, Arthur H. Hickman, David C. Champion, Carl R. Anhaeusser and Franco Pirajno Geological Society, London, Special Publications, 389, 83-111, 3 September 2014, https://doi.org/10.1144/SP389.12 The emergence of the Eoarchaean proto-arc: evolution of a c. 3700 Ma convergent plate boundary at Isua, southern West Greenland Allen P. Nutman, Vickie C. Bennett and Clark R. L. Friend Geological Society, London, Special Publications, 389, 113-133, 9 September 2013, https://doi.org/10.1144/SP389.5 Neoarchaean crustal growth by combined arc–plume action: evidence from the Kadiri Greenstone Belt, eastern Dharwar craton, India Sukanta Dey, Jinia Nandy, A. K. Choudhary, Yongsheng Liu and Keqing Zong U–Pb zircon ages and (isotope) geochemical signatures of the Kamanjab Inlier (NW Namibia): constraints on Palaeoproterozoic crustal evolution along the southern Congo craton I. C. Kleinhanns, T. Fullgraf, F. Wilsky, N. Nolte, D. Fliegel, R. Klemd and B. T. Hansen Geological Society, London, Special Publications, 389, 165-195, 22 August 2013, https://doi.org/10.1144/SP389.1 The zircon archive of continent formation through time Nick M. W. Roberts and Christopher J. Spencer Geological Society, London, Special Publications, 389, 197-225, 7 November 2014, https://doi.org/10.1144/SP389.14 The oldest crust in the Ukrainian Shield – Eoarchaean U–Pb ages and Hf–Nd constraints from enderbites and metasediments S. Claesson, E. Bibikova, L. Shumlyanskyy, B. Dhuime and C. J. Hawkesworth Geological Society, London, Special Publications, 389, 227-259, 3 January 2014, https://doi.org/10.1144/SP389.9 The Eoarchaean foundation of the North Atlantic Craton Penelope J. Lancaster, Craig D. Storey and Chris J. Hawkesworth Geological Society, London, Special Publications, 389, 261-279, 18 August 2014, https://doi.org/10.1144/SP389.11 Zircon U–Pb and Hf – isotopes from the eastern part of the Sveconorwegian Orogen, SW Sweden: implications for the growth of Fennoscandia Andreas Petersson, Anders Scherstén, Jenny Andersson and Charlotte Möller A Hf-isotope perspective on continent formation in the south Peruvian Andes Flora Boekhout, Nick M. W. Roberts, Axel Gerdes and Urs Schaltegger Gondwana margin evolution from zircon REE, O and Hf signatures of Western Province gneisses, Zealandia Joe Hiess, Keewook Yi, Jon Woodhead, Trevor Ireland and Mark Rattenbury Geological Society, London, Special Publications, 389, 323-353, 2 June 2014, https://doi.org/10.1144/SP389.10 This Volume Entire Issue ($200) Buy a hard copy Fundamental controls on fluid flow in carbonates: current workflows to emerging technologies The role of women in the history and development of geology: an introduction The history of the European oil and gas industry (1600s–2000s) Himalayan earthquakes: a review of historical seismicity and early 21st century slip potential Basement exploration, West of Shetlands: progress in opening a new play on the UKCS Books Editorial Committee Alerts & RSS Activate Online Subscription Lyell Collection About the Lyell Collection Lyell Collection homepage Open Access Collection Lyell Collection access help Lyell Collection Sponsors Geofacets The Geological Society Awards, Grants & Bursaries Geoscientist Online Library & Information Services Policy & Media Society blog Published by The Geological Society of London, registered charity number 210161 Copyright © 2019 Geological Society of London
cc/2019-30/en_middle_0012.json.gz/line1629
__label__wiki
0.629219
0.629219
Driver Spotlight | Andreas Bäckman January 10, 2019 N. Cardwell With the newly organised TCR Australia coming to us in a few months time, we decided to bug someone in Europe who strapped themselves into a TCR car for the first time in 2018. Andreas Bäckman’s first seat in the TCR UK championship was in the West Coast Racing Golf GTi TCR and it wasn’t a performance to ignore. In his first race he finished 2nd, and throughout the season he managed 6 podiums, a pole position, and a win at Croft Circuit. Andreas Bäckman West Cost Racing, STCC premiären Knutstorp 2018-05-05 fotoTony Welam Before his blast onto the TCR scene Andreas could be seen whipping around the heavily popular Rallycross circuits in the 2017 RX2 Championship, a support series for the World Rallycross Championship. For the Australian’s with no exposure to the sport, Rallycross combines dirt and tarmac driving all into one small twisted track. According to Andreas he wanted to get into the sport for a new challenge, and moved over from Karting after 10 years. “It was a completely new experience, coming from Karting, as I had never been driving on gravel before as well as I had never driven a track with jumps and changing surfaces. It was a nice experience.” After a season with mostly midfield finishes, and a best of 4th in the RX2 Championship, he ended his championship position in the middle of the pack in 10th. Whilst it was a promising season, considering he had never raced in Rallycross before that year, the move over to touring cars in 2018 was the best choice. “This felt for me as a more natural step from Karting, as it had the same kind of race distance and tracks like in Karting, just that it was a much bigger and heavier car on a bigger track.” Success in TCR UK has paid off for Andreas, and he has managed to land a spot in the Target Competition team along with his sister Jessica, who is also making the move after a promising drive in 2018 with a best of 2nd at Brands Hatch for the year. Andreas promises an exciting series for Australian fans with wheel to wheel racing, and plenty of action. “The TCR concept has proven to be very successful, as it’s very close between all the cars because of the regulations. I think it should give the spectators a very good show with some close race action. The races can sometimes be very unpredictable, which should be interesting for the spectators.” Andreas will be representing the Target Competition team in the driver’s seat of a Hyundai i30N TCR. With his sister in the second car. All photos provided by A. Bäckman Words: N.Cardwell Previous Post Formula 5000: A Flashback at Historic Sandown Next Post Gippsland Car Club Hill Climb – April 2019
cc/2019-30/en_middle_0012.json.gz/line1632
__label__wiki
0.719197
0.719197
search filter Books & JournalsAll JournalsRadical History Review About Radical History Review Volume 2017, Issue 127 David Serlin Jennifer Tucker Simon Schaffer Other|January 01 2017 The Scientific Revolution That Wasn't: The British Society for Social Responsibility in Science Radical History Review (2017) 2017 (127): 149-172. Alice Bell; The Scientific Revolution That Wasn't: The British Society for Social Responsibility in Science. Radical History Review 1 January 2017; 2017 (127): 149–172. doi: https://doi.org/10.1215/01636545-3690930 This is one of those tales of a scientific revolution that never quite came to pass. Science, the movement's would-be revolutionaries argued, had lost its way. It had become too hierarchical and too focused on the whims of senior staff and their cronies. Humanity had allowed its collective scientific energies to be applied to war and environmental destruction, rather than to the public good. In the shadow of the still-blazing light of the atomic bomb, and with increasing concern over chemical and biological weapons as well as an emerging environmental crisis, science needed to take a long, hard look at itself. Elitist and stuffy, science had let itself fester. The time had come to imagine a new way of doing science. scientific revolution, war, atomic bomb, BSSRS © 2017 by MARHO: The Radical Historians' Organization, Inc. Histories of Radical Science Making Space for the Nation: Satellite Television, Indian Scientific Elites, and the Cold War Live Fire: On Ron Haviv's The Lost Rolls Animals of War: A Historical Bestiary “A City of the Future”: Gravity’s Rainbow and the 1962 Seattle World’s Fair scientific revolution BSSRS Introduction Labor, (Workers’) Autonomy, (Art) Work The Silence of Ely S. Parker Becoming Mexico The Conflictive Search for a North American Nation Emilio in Angola
cc/2019-30/en_middle_0012.json.gz/line1641
__label__cc
0.663807
0.336193
Obama Foundation has announced the participants selected for the 2019 Leaders: Africa programme. The “Obama Foundation Leaders: Africa” programme is a year-long initiative to inspire, empower, and connect 200 emerging leaders from across Africa. The leaders were chosen from 45 countries across the continent. Among those chosen from Nigeria include: Ada Ezeokoli, the Editor-In-Chief of Nigeria Health Watch, and she believes in the importance of empowering Nigerians with accurate, reliable, and relevant health information to drive accountability, transparency, and good governance. Bukola Bolarinwa, a sickle cell awareness advocate and the Founder of Haima Health Initiative, a social enterprise that seeks to plug the blood supply gap in Nigeria. She is passionate about quality health care systems with a focus on improving supply chains. Fola Bamisaye, a Monitoring and Evaluation Specialist with the Prime Health Response Initiative. She is also the Founder of My Period Kit. Hauwa Ojeifo, the Founder of She Writes Woman, a women-led movement of love, hope, and support that gives mental health a voice. Nkemdilim Begho, the Founder and Chief Executive Officer of Futuresoft, one of Nigeria’s leading digital solution providers. Her love for technology is rooted in bridging the digital divide and transforming Africa by harnessing the benefits of embracing technology. Uadamen Ilevbaoje, a Project Manager for Tracka, for BudgIT, a Nigeria-based civic organization focused on simplifying public data and making the budget accessible to all Nigerians. He believes that the transformation of Africa is in the hands of citizens. Michael Sunbola, the Lagos Food Bank, a nonprofit, nutrition-focused initiative committed to combating malnutrition and improving the health of pregnant women and infants in rural communities. Anthony Owei, the Founder of Tonyve Farms, an agricultural company inspired by the severe 2011 East African drought, and ePoultry.ng, Africa’s first digital poultry investment platform. Oyo Effiom, the Founder and Executive Director of The Guru Foundation, a social development organization working to provide students with affordable educational support services. He is also the author of two books and a leading motivational speaker. Kingsley Ezeani, the Founder of Information Nigeria, a leading Nigerian news website that provides young Nigerians with information relevant to them. Blaise Aboh, the founder Orodata Science, a citizen-focused civic tech organization that works to increase public access to data through visualization and democratization. Lanre Oniyitan, the Founder of Sustainable Education & Enterprise Development, a social impact project that supports and advocates for schools serving children from low-income families. Charles Immanuel Akhimien, a medical doctor who is the Co-Founder of MOBicure, the digital health company behind the Omomi & myPaddi health apps, which have reached over 60,000 people across Africa. Uchenna Onwuamaegbu Ugwu, who’s on the TEAM-Leadership Capacity of Edufun Technik STEM Center, where she focuses on developing children’s potential skill-sets and talents by providing quality hands-on-training in coding, programming, and robotics. Uchenna holds a bachelor’s degree in psychology and an innovative business/entrepreneurship certificate from Kellogg School of Management at Northwestern University. Funkola Odeleye, a Co-Founder of DIYLaw, a legal technology company committed to empowering Nigerian entrepreneurs through free legal and business resources. She believes that entrepreneurship is the most sustainable solution to unemployment. Somto Anunobi, the Founder of Geek Code Planet, an organization equipping kids and young adults in Nigeria with information and communications technology skills to help improve their creative, cognitive, and collaboration skills. Nichole Onome Yembra, the CFO of Venture Garden Group, a fintech holding company, and partner at GreenHouse Capital, its investment arm. This has allowed her to match her passion for innovation and service-centric personality with her career. Titilayo Ogunride, the Founder and Chief Executive Officer of Milky Express Nigeria, a pioneering organization in the lactation industry, where she equips mothers with the tools they need to breastfeed effectively. Isabella Akinseye, a writer, editor, seasoned host, and Founder and Chief Executive Officer of Yellow Tamarind Productions, a media and PR company. Adaku Ufere-Awoonor, the Chief Executive Officer of DAX Consult, a firm providing advisory services on energy transactions, gender mainstreaming, and image consulting. Lucky Chambers Umezulike, the Senior Program Manager of Connected Development at Follow The Money initiative, where he works to improve millions of lives across the world through development governance. Kay Nwanyanwu, the President and Chief Executive Officer of Dehat Ability Support Initiative, a nonprofit that promotes the welfare of deaf and hard of hearing teens by ensuring they have equal access to opportunity. Dirug Samuel, the founder of the Big Family 360 Foundation, a nonprofit organization that provides education, livelihood, and protection services to women, orphans, and vulnerable children. Nosa Oghafua, the founder of Learnira, a nonprofit working to make the world’s best science, technology, engineering, and math educational tools and programs accessible to under-resourced schools in Nigeria. See Full List Here This post is courtesy BellaNaija.com. Related tags : Barack ObamaLeadershipMichael SunbolaObama Foundation Leaders Career and OpportunitiesLatest News Are You A Young Passionate Journalist? Apply Reham Al-Farra Memorial Journalism Fellowship Are you a young journalist in Africa? Are you aged between 22 to 35? if you are, you are qualified for this fellowship opportunity by the Reham Al-Farra Memorial. The Program, established by the Un Grassroots Women’s Organisations Can Apply For Spark Seed And Early-Stage Grants, 2019 The application is now open for the Spark Seed and Early-Stage Grants 2019 for Women’s Organisations and Initiatives. The initiatives provide early-stage grants and loans to grassroots women’s orga Career and OpportunitiesFeatures Five Things NYSC Corp Members Fail To Do During Their Service Year. Five things NYSC Corp members fail to do during their Service year. There is no doubt that National Youth Service Corp, is a shield for Nigerian young Graduate from the harsh realities of unemploymen Career and OpportunitiesTimeless Articles May 1, 20190153 Damilola Faustino: Job Hunting in the Digital Age There was a time, not so very long ago for most of us, when job hunting involved scanning newspaper advertisements or actually knocking on the door of a desired employer. This is no longer the case Are You A Young Entrepreneur? Apply for AYEEN 2019 Now The African Young Entrepreneurs Empowerment Nigeria’s (AYEEN) 2019 entrepreneurship programme is back for the fifth consecutive year to help young entrepreneurs to get the required equipment, funding, Are You A Young Journalist? Apply For The Future News Worldwide 2019 International Summit Are you the future of journalism? Apply now for Future News Worldwide 2019, an international summit for the world's best young media makers. The deadline is 12.00 (noon) GMT on 21 March 2019. We’r
cc/2019-30/en_middle_0012.json.gz/line1642
__label__wiki
0.725233
0.725233
by Daniel Roure © Copyright - DANIEL ROURE / DANIEL ROURE (634479855115) French Kiss is a compilation of standards sung by Daniel Roure in the language of love and the French touch. Review: Daniel Roure, French Kiss Daniel Roure, French Kiss 31 Oct, 2014 Kelly O'Neil danielrourefrenchkissThe brilliant follow up to French musician Daniel Roure’s Le Temps d’un Jazz is the romantic collection French Kiss. Once again surrounded by a bevy of immensely talented instrumentalists and fellow countrymen, not to mention Roure’s own fantastic piano skills, the familiar love songs on the album are given a French twist with amorous inflections and tight jazz synchrony. Cole Porter’s “C’est Magnifique” features a fun and jovial aside conversation with the piano and alto saxophone as Roure sings the first half in French and the second in English. Translated “It’s Magnificent” from the 1953 musical Can-Can, the drummer does a phenomenal job of keeping a relaxed steady beat throughout the noodling instrumental solos. “When You’re Smiling” was thrice recorded by Louis Ar Genre: Jazz: Cool Jazz cd in stock order now 1. C`est Magnifique 4:32 album only 2. C'est Si Bon 3. Summer wind 4. When Your Smiling 5. These Foolish Things 6. Que Reste-il De Nos Amours ? 7. La Vie En Rose 9. As Time Goes By 10. Fly Me to the Moon With "FRENCH KISS" new recording, Daniel ROURE,[Piano and vocal], awards of "Jazz in Toulon" France 2001 want to sing the most beautiful songs well known by every body in the world, and print his warm and deeply voice and swing surounded by the most proficient musiciens for this new CD "FRENCH KISS':Paul Pioli [Guitar],Francesco Castellani [Trombone],Fabien Giacchi [Bass],Giles Alamel [Drums],Jean François Bonnel [Sax Trumpet Clarinet],The best of swing,Daniel want just to remain these love songs for his friends. Review: Daniel Roure, French Kiss Daniel Roure, French Kiss 31 Oct, 2014 Kelly O'Neil danielrourefrenchkissThe brilliant follow up to French musician Daniel Roure’s Le Temps d’un Jazz is the romantic collection French Kiss. Once again surrounded by a bevy of immensely talented instrumentalists and fellow countrymen, not to mention Roure’s own fantastic piano skills, the familiar love songs on the album are given a French twist with amorous inflections and tight jazz synchrony. Cole Porter’s “C’est Magnifique” features a fun and jovial aside conversation with the piano and alto saxophone as Roure sings the first half in French and the second in English. Translated “It’s Magnificent” from the 1953 musical Can-Can, the drummer does a phenomenal job of keeping a relaxed steady beat throughout the noodling instrumental solos. “When You’re Smiling” was thrice recorded by Louis Armstrong so it is apt that award-winning musician and professor Jean François Bonnel play a clear and tasteful trumpet solo in the bridge. Francesco Castellani once again collaborates with Roure on trombone and together the brass and rhythm section produce a neat and tidy coda. Bonnel began his career as a woodwind player and lends his saxophone work to the album as well. He does however deliver absolute perfection with his clarinet solo in “Candy”. Accompanied by Roure on the keys, the range on the reed instrument is elegant and expertly played. The true epitome of the instrumental prowess on French Kiss is evident in “Que reste t’il de nos Amours” translated “What Remains of Our Love” also written in English “I Wish You Love”. Roure opens in musing French, while Paul Pioli quietly plays guitar. Then the full jazz combo enters and numerous solos are thrown about between all involved. The entire section is well balanced and structured. The soloists play off each other’s stylistic melodies but no one ever gets flashy. It is an extremely satisfying instrumental break with drums adding a few splash cymbals among the rim hits, the saxophone refraining from sounding too garish and the trombone remaining subdued. The familiar cute ending is delightful. Roure and his colleagues do attempt to make a unique imprint on these well-known tunes. “As Time Goes By” famously heard in the movie Casablanca is known for its reserved nonchalance, but Roure’s version is even more subdued with free form guitar lacing his quiet French accented vocals. It is an interesting take on the familiar standard. These nuances do not work on all of the pieces on the album though. The scant abstract arrangement of “Fly Me to the Moon” is devoid of any swing resulting in an easily forgotten song. Edith Piaf’s “La vie en Rose” also fails to fully engage the listener. The romantic lyrics of “Summer Wind” famously sung by Wayne Newton and then Frank Sinatra in the 1960’s lack any vocal range or depth as Roure whispers his recitative. Once the remainder of the instruments enters, there is nothing indistinguishable about this piece than another other jazz standard. Fabien Giacchi provides a steady walking bass to guide “These Foolish Things (Remind Me of You)” with slight piano remarks peppered throughout. This andante low key number is thrown for a loop when the guitar solo plays a superfluous amount of notes that fail to complement the easy jaunt of the piano and vocals. Romance can abound when music and French ambiances combine, however finding a perfect balance between the two takes special care. Roure and his compatriots manage to create this effect most of the time and those songs are well worth a listen. Reviewers Name: Kelly O’Neil Rating: 4 stars/5
cc/2019-30/en_middle_0012.json.gz/line1648
__label__cc
0.56559
0.43441
Home / Stories / ABLE Through your purchase, you are ABLE to empower women and give them a job with dignity. Invest in Women ABLE chooses to work with women because we know that when women thrive so do the economies in which they operate. According to UNICEF, Women reinvest 80 percent of their income into their families, while men invest only 30 to 40 percent. The fashion industry is the third largest industrial industry in the world, employing over 60 million people, over 75% of whom are women. Ending poverty: why women and why fashion? We should not be able to enjoy the things we consume at the expense of those whose basic necessities are not being met. ABLE is a lifestyle brand focused on ending generational poverty by working with women who have often overcome extraordinary circumstances. We manufacture directly in the communities we wish to impact, both locally and globally, creating jobs and ending the cycle of charity dependency. While living in Ethiopia Barrett Ward saw firsthand how extreme poverty forced young women, generation after generation, to resort to prostitution as a means of supporting themselves and their families. The goal was to provide an alternative that would provide these women with the opportunity to earn a living, empowering them to end the cycle of poverty that kept them trapped. Armed with multiple studies illustrating how the employment of women benefits and strengthens an entire community, the ABLE team set out on a mission to end generational poverty, one job at a time. The High Rise - Carla Wash The High Rise - Claudia Wash The High Rise - Elvira Wash The Kick - Susana Wash The Skinny - Carla Wash
cc/2019-30/en_middle_0012.json.gz/line1650
__label__cc
0.647777
0.352223
What is the currently unemployment rate for a Theatre, Fashion, Exhibit and Other Creative Designers? 6% of Theatre, Fashion, Exhibit and Other Creative Designers are unemployed. This rate is close to the average for technical, professional, and skilled occupations. What is a day in the life of a Theatre, Fashion, Exhibit and Other Creative Designers like? The following is a summary of main duties for some occupations in this unit group: A. Theatre designers design and... more What education do you need to become a Theatre, Fashion, Exhibit and Other Creative Designers? 1. A university degree in fine arts or visual arts with specialization in theatre design, clothing design or exhibit... more What is the current Job Outlook for a Theatre, Fashion, Exhibit and Other Creative Designers? The job outlook for Theatre, Fashion, Exhibit and Other Creative Designers is considered Average because: 1.... more What is the future Job Outlook for a Theatre, Fashion, Exhibit and Other Creative Designers? Your job outlook will continue to be Average because: 1. The employment growth rate will likely be close to the... more How much does a Theatre, Fashion, Exhibit and Other Creative Designers make? The average hourly wages for Theatre, Fashion, Exhibit and Other Creative Designers is $16.12/HR, which is close to... more How many Theatre, Fashion, Exhibit and Other Creative Designers are employed part-time? 19% of Theatre, Fashion, Exhibit and Other Creative Designers are employed only on a part-time basis. There were... more How many Theatre, Fashion, Exhibit and Other Creative Designers are self-employed? Roughly 32% of Theatre, Fashion, Exhibit and Other Creative Designers are self-employed. This is considered Above... more What is the average age of a Theatre, Fashion, Exhibit and Other Creative Designers? The retirement rate to 2009 will likely be average reflecting the age/retirement structure of the occupation. more A Day in the Life of a Fashion Designer Fashion Designer: Day in the Life Fashion Designers Salary Fashion Designers: Working Conditions
cc/2019-30/en_middle_0012.json.gz/line1656
__label__cc
0.551059
0.448941
Michael Rozenberg I like to prove inequalities If $a+b=1$ so $a^{4b^2}+b^{4a^2}\leq1$ calculus inequality exponential-function asked Mar 7 '17 at 20:54 Prove that $a\sqrt{a^2+bc}+b\sqrt{b^2+ac}+c\sqrt{c^2+ab}\geq\sqrt{2(a^2+b^2+c^2)(ab+ac+bc)}$ inequality contest-math radicals sos asked Jan 1 '16 at 8:53 Inequality with five variables inequality contest-math fractions a.m.-g.m.-inequality cauchy-schwarz-inequality asked Nov 11 '14 at 17:18 Inequality $\sum\limits_{cyc}\frac{a^3}{13a^2+5b^2}\geq\frac{a+b+c}{18}$ real-analysis inequality contest-math asked May 8 '16 at 18:10 Prove that $\sqrt{a^2+3b^2}+\sqrt{b^2+3c^2}+\sqrt{c^2+3a^2}\geq6$ if $(a+b+c)^2(a^2+b^2+c^2)=27$ real-analysis inequality contest-math asked Jul 13 '16 at 6:20 $f(f(x)f(y))+f(x+y)=f(xy)$ contest-math functional-equations asked Jul 18 '17 at 18:07 Geometric inequality $\frac{R_a}{2a+b}+\frac{R_b}{2b+c}+\frac{R_c}{2c+a}\geq\frac{1}{\sqrt3}$ geometry inequality contest-math geometric-inequalities asked Feb 19 '16 at 11:33 If $\{x,y,z\}\subset[-1,1]$ and $x+y+z=0$ so $\sum\limits_{cyc}\sqrt{1+x+\frac{y^2}{6}}\leq3$ inequality contest-math asked Oct 11 '16 at 5:10 Prove that $\sum\limits_{cyc}\frac{a}{\sqrt{a+3b}}\geq\sqrt{a+b+c+d}$ multivariable-calculus inequality contest-math radicals asked Dec 9 '16 at 16:06 If $\{a,b,c,d,e\}\subset[0,1]$ so $\sum\limits_{cyc}\frac{1}{1+a+b}\leq\frac{5}{1+2\sqrt[5]{abcde}}$ Show that $(2,0,4) , (4,1,-1) , (6,7,7)$ form a right triangle Why does the discriminant in the Quadratic Formula reveal the number of real solutions? Can the product of three complex numbers ever be real? How to simplify $\int{\sqrt[4]{1-8{{x}^{2}}+8{{x}^{4}}-4x\sqrt{{{x}^{2}}-1}+8{{x}^{3}}\sqrt{{{x}^{2}}-1}}dx}$? Can sum of a rational number and its reciprocal be an integer? Limit question - L'Hopital's rule doesn't seem to work Knowing that for any set of real numbers $x,y,z$, such that $x+y+z = 1$ the inequality $x^2+y^2+z^2 \ge \frac{1}{3}$ holds. Why does $2+2=5$ in this example? Which number is larger: $5^{44}$ or $4^{53}$? Why doesn't the definition “$p$ is called 'prime' if $p\mid ab\implies p\mid a\,\text{ or }\,p\mid b$” hold up when we square numbers? How to show that $\int_{0}^{1}\sqrt{x}\sqrt{1-x}\,\mathrm dx =\frac{\pi}{8}$ Largest possible value of trigonometric functions If $A$ and $B$ are matrices such that $AB^2=BA$ and $A^4=I$ then find $B^{16}$. Is there an analytic solution for the equation $\log_{2}{x}+\log_{3}{x}+\log_{4}{x}=1$? Can we calculate $ i\sqrt { i\sqrt { i\sqrt { \cdots } } }$? Prove $\ln(1+x)\geq x-\frac{x^2}{2}$ An olympic mathematics problem regarding Cauchy-Schwarz Olympiad Inequality $\sum\limits_{cyc} \frac{x^4}{8x^3+5y^3} \geqslant \frac{x+y+z}{13}$ Proving irrationality of $\sqrt[3]{3}+\sqrt[3]{9}$ Why is the Ratio of $\ln(x)$ and $\log(x)$ a constant? How to solve the diophantine equation $2(x+y)=xy+9$? Show this $|\sin{x}|+|\sin{(x+1)}|+|\sin{(x+2)}|>\frac85$ If $f(x)=\frac{1}{x^2+x+1}$, how to find $f^{(36)} (0)$? Write $(x^2 + y^2 + z^2)^2 - 3 ( x^3 y + y^3 z + z^3 x)$ as a sum of (three) squares of quadratic forms Prove that a degree-$6$ polynomial has exactly $2$ real roots To prove $n\binom{2n-1}{n-1}$ is divisible by $n(2n-1)$ Suppose $A,B\in M_n(\mathbb{C})$ such that $AB-BA=A $ . Prove that $A$ is not invertible . New Year Maths $2019$ Functional equation - Cyclic Substitutions Showing that $\sum_{k=N+1}^\infty \frac {1}{k!} < \frac {1}{N!}$
cc/2019-30/en_middle_0012.json.gz/line1663
__label__cc
0.563264
0.436736
Amy Waeschle: Author and Surfer: “Going Over the Falls” Posted on July 4, 2017 By Darrell Kirk in Podcasts Amy Waeschle is an epic Mom, Surfer, and the Author of “Going Over the Falls” Amy talks about her Family, Surfing, and the writing of her novel. She also shares her writing process and offers tips to others who would like to write a book. Surfer and Seattle E.R. doctor Lorna Jacobs is pulled into a dangerous journey to find her estranged mother, who is dying from a mysterious illness. Lorna finally finds her, deep in Mexico, but Alex is more concerned with rekindling their mutual love of surfing than preparing for her last days. The secret big wave she plans to share with Lorna could bond them forever, or destroy them. Amy Waeschle is an author, professional editor, and wilderness medicine instructor for the Wilderness Medicine Institute. She lives in Poulsbo, Washington, and is the author of Going Over the Falls, and Chasing Waves, A Surfer’s Tale of Obsessive Wandering. Her stories have appeared in publications such as The Seattle Times, The Bellingham Herald, Surfer, Sierra, and Surf Life for Women. https://tornado.files.wordpress.com/2017/07/amy_waeschle.mp3 Tags: Amy Watschle, Going over the falls Karl Kruger–Race to Alaska–750 Miles by Stand Up Paddle Board Posted on June 26, 2017 By Darrell Kirk in Podcasts Karl Kruger is the first person ever to complete the grueling “Race to Alaska” from Port Townsend Washington, to Ketchikan Alaska–by Stand Up Paddle Board! Meet the incredible athlete and gentleman behind this epic feat which is a huge victory for him and the rest of the stand paddle board community.https://tornado.files.wordpress.com/2017/06/karl_kruger.mp3 Tags: adventure, Alaska, alert bay, america, athlete, Bark, Bela Bela, british columbia, canada, cape caution, catch, darrell kirk, facebook, food, fuel, Hammer Nutrition, heart of gold, How, incredible, Interview, Jessica Kruger, Joe Bark, Juan de Fuca, Karl Kruger, KETCHIKAN, Kruger Escapes, Northwest Maritime Center, ocean, orcas, orcas island, paddle, Podcast, Port Townsend, R2AK, Race to Alaska, sport, stand up paddle, Stand Up Paddle The World, stroke, sup, swells, uncruise, usa, victoria, water Terence Quong: Epic Nine Channel Hawaiian Island Crossing Terence Quong is a beloved athlete and friend in the Sand Point Outrigger Club in Seattle and the one everyone wants to pass. Endurance is one of “Q’s” strongest suits and helped him in an epic nine channel Hawaiian Island Crossing, as well as an incredible military and civilian career in aviation. Q talks about early life, family, Outrigger Canoe, and the O’hana that make it all happen. Terence shares the story of his journey with Cancer and offers valuable information to others. https://tornado.files.wordpress.com/2017/06/terence_quong.mp3 Wade Lawson: Big Wave Sup Surfer, Helicopter Pilot, Epic Life. Wade Lawson lives an epic life as a Big Wave Surfer, Helicopter Pilot, and a man of curiosity and action. Wade tells of his rags to riches story growing up the son of an Arkansas chicken farmer and the dreams he had of becoming a pilot, and living an incredible life. Wade says you can have this life too and gives a premiere on Big Wave Surfing and flying. Disclaimer—Big Wave Surfing is an extreme sport where accidents and death can occur—it is not a matter of if, but when, in the sport of Big Wave Surfing.https://tornado.files.wordpress.com/2017/06/wade_lawson.mp3 Randall Barna–Epic Pedorthist and Sup Pioneer Posted on June 3, 2017 By Darrell Kirk in Podcasts Randall Barna is an epic Pedorthist and SUP and Surfing pioneer who knows a lot about feet and sports performance. During the 1992 NBA Championships, 80% of the starting lineup for the Portland Trailblazers wore Barna’s orthotics and many professionals go to him to this day to improve their performance. Randall talks about his early days as an Oregon surfing pioneer and the natural progression of surfing to Stand Up Paddle Boarding and, giving back to the sport to continue the stoke he has received over many decades. Randall is fast and tells why the feet are so important in SUP racing and what you need to know to make an immediate difference on the water and in your next race.https://tornado.files.wordpress.com/2017/06/randal_barna.mp3 Tanvi Jagadish: India’s First Woman Stand Up Paddle Board Racer Posted on May 24, 2017 By Darrell Kirk in Podcasts Tanvi Jagadish is India’s first Stand Up Paddle Racer and a darling of her country as a pioneer of female surfing and SUP racing. She was always told that girls don’t surf, but with the help of family and her local “Surfing Ashram”, Tanvi found Nirvana in the sport and in Mother Ocean. Tanvi talks about early family life in India, and her daily rituals in preparing for SUP races and gives thanks to all those who have helped including SUP Racer and North Carolina native April Zilg.https://tornado.files.wordpress.com/2017/05/tanvi_jagadish.mp3 John Schalka: Epic Stand Up Paddle Racing At Any Age John Schalka is a very fast stand up paddle board racer and shows us what is possible in this life at any age. At the start of John’s SUP racing career, he weighed over three hundred pounds and suffered a pulmonary embolism that almost killed him. Loosing over one hundred pounds, saying goodbye to alcohol, and drawing from a lifetime of outdoor sports, John reinvented himself into a SUP racing machine that is the envy of those nearly half his age.https://tornado.files.wordpress.com/2017/05/john_schalka.mp3 Matt and Grant Hassenrik: Epic Father and Son Stand Up Paddle Team Posted on May 4, 2017 By Darrell Kirk in Podcasts Matt and Grant Hassenrik are an epic father-son duo both on and off the water in the sport of Stand Up Paddle Boarding and stoked to share their story of how it all began. Thirteen-year-old Grant loves his dad, and extended family of Stand Up Paddle Boarders in the Holland, Michigan O’hana located along the “Third Coast” of Lake Michigan. It’s not always smooth sailing for the two, and Matt and Grant reflect on mishaps and dangers of some of their trips and how these epic moments brought them closer to each other, their O’hana, and the sport of SUP itself. Matt and Grant reach out and give us tips on building your own epic family SUP team!https://tornado.files.wordpress.com/2017/05/mattgrant_hassenrik.mp3 Sarah Sandstrom: Carolina Cup and Race Preparation Sarah Sandstrom is an epic lady on and off the water and a seasoned SUP racer. She’s back from the Carolina Cup and stoked to tell about her race and what it takes to prepare for a SUP event far from home. Sarah is a Fisheries Biologist and her work spans a range of wetland, stream, and estuarine projects. When she’s not in the field, monitoring stream conditions or delineating wetlands, Sarah is working on watershed-scale planning, evaluating project effects on listed fish and wildlife, or developing creative approaches to restoration and mitigation. Sarah talks a bit about her work and how being on the water brings meaning and continued purpose to her career.https://tornado.files.wordpress.com/2017/05/sarah_sandstrom.mp3
cc/2019-30/en_middle_0012.json.gz/line1665