pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
75
951k
source
stringlengths
39
45
__label__cc
0.73211
0.26789
Colleges and Further Education Top / Education / Special Education / Colleges and Further Education Beaumont College Offers person-centred education programmes for students in Lancaster, Carlisle, Barrow and Blackpool. Birtenshaw College Provides specialist further education for young people aged between 16 and 25 with physical disability, including complex health needs and/or learning disability, including Autism Spectrum Conditions. Craegmoor Colleges A guide to three specialist colleges for young people aged 16-25 with learning difficulties or disabilities, challenging behaviour and complex needs including autism/ASC. Doncaster College for the Deaf Offers education and training for deaf and hearing-impaired young people and adults. Includes details of courses and vocational programmes, college life, news, and how to apply. Finchale Training College A national specialist college near Durham, providing customised programmes of vocational rehabilitation for disabled adults. Includes details of courses, residential accommodation, and support services; also describes their role in teacher training. New College Worcester A residential school and college for the blind and partially sighted aged 11 to 19. Provides an audio prospectus with course details and how to apply. Portland College A national college providing education and vocational training for people aged 16 upwards, with a wide range of disabilities. Offers a prospectus, information about facilities, and a guide to studying. Based in Mansfield, Nottinghamshire. Queen Alexandra College A national college in Birmingham for people aged 16+ with visual impairment and other disabilities. Describe their courses and facilities, student support services, and commercial enterprises. Queen Elizabeth’s Foundation College Provides training for sustainable employment for adults with disabilities; includes details of courses, eligibility and how to apply, services and contacts. Based in Surrey. RNIB College Loughborough A specialist college for people who are blind, partially sighted and/or have other disabilities; offers in-house and supported programmes in a mainstream partner college next door. The Royal National College for the Blind A college and training centre for people aged 16+ that are blind or partially sighted. Also considers fully sighted learners with other disabilities. Ruskin Mill Education Trust Operates three independent specialist colleges for young people aged 16-25 with complex learning and behavioural difficulties, offering day and residential practical skills therapeutic education. Ruskin Mill Trust Offers practical skills therapeutic education for young people and children with complex learning and behavioural difficulties in three specialist colleges and a specialist school. Mainstream Resources Society: Disability Search For Colleges and Further Education on:
cc/2019-30/en_middle_0028.json.gz/line1594672
__label__cc
0.510161
0.489839
CORROSION OF CONFORMITY Blind JAPAN CD SRCS-5775 1992 OBI Corrosion Of Conformity Blind Cd COC Dance The Dead Vote With A Bullet Buried CORROSION OF CONFORMITY / BLIND JAPAN CD OOP CORROSION OF CONFORMITY BLIND CD FROM 1995 PEPPER KEENAN KARL AGELL WEATHERMAN Corrosion of Conformity Homepage Category: Thrash Metal Label: Relativity Records Catalog Number: 88561-2031-2 Average Rating: 86 / 100 (1 rating) eBay Average Price: $ 3.86 Karl Agell vocals Woody Weatherman rhythm and lead guitars Pepper Keenan rhythm and lead guitars Phil Swisher bass Reed Mullin drums, backing vocals 1. These Shrouded Temples... 2:37 2. Damned for All Time 5:52 3. Dance of the Dead 4:29 4. Buried 5:18 5. Break the Circle 4:10 6. Painted Smiling Face 4:24 7. Mine are the Eyes of God 5:00 8. Shallow Ground 2:21 9. Vote with a Bullet 3:27 10. Great Purification 4:33 11. White Noise 4:19 12. Echoes in the Well 5:33 13. ...Remain 3:27 The music discographies on this site are works in progress. If you notice that a particular Corrosion of Conformity CD release or compilation is missing from the list above, please submit that CD using the CD submission page. The ultimate goal is to make the discographies here at Brutal Metal as complete as possible. Even if it is an obscure greatest-hits or live compilation CD, we want to add it to the site. Please only submit official CD releases; no bootlegs or cassette-only or LP-only releases. EPs and CD-singles from Corrosion of Conformity are also welcome to be added, as long as they are at least 4 songs in length. Search all current eBay listings for Corrosion of Conformity Blind Corrosion of Conformity : Blind CD $5.06 28d 3h 28m Corrosion of Conformity - Blind [New CD] $7.33 21d 5h 23m Corrosion of Conformity : Blind CD $7.97 5d 20h 19m CORROSION OF CONFORMITY Blind CD RELATIVITY $4.29 7d 16h 57m CORROSION OF CONFORMITY-BLIND CD NEW $8.29 8d 10h 1m Corrosion of Conformity - Blind [New CD] $6.32 16d 14h 8m From: GodOD69 Date: August 29, 2003 at 20:30 C.O.C. is a great sounding band. Damned for all Time & Vote with a Bullet are great but there aren't any bad songs on this CD. From: uardocabron Date: April 17, 2004 at 3:39 this album is the best they ever did. Without Karl, they lost a lot. From: leo777 Date: May 14, 2004 at 20:31 Hey greetings from Chile South America!!!!! Hey I gonna tell you that I had heard this album the same year that the metallica black album was selling here in south america, but this had just blown my fucking mind from the first time that I had listened. My favorite song its dance of dance!!! quite similar to nowdays Maiden album concept! isnt??? From: Doghouse Reilly Date: August 23, 2013 at 22:00 This is where COC really got interesting. THey started as a hardcore punk band, morphed into a crossover thrash act with some sludgy Sabbath undertones. But on Blind, they become a full-blown heavy metal band. I can't help but think this disc was pretty influential on the groove-metal bands yet to come, kind of midway between Metalllica and Pantera. Blind is a drummer's delight from "Damned For All Time" onward, with abrasive riffs and a guitar sound that's razor sharp. Karl Agell sings lead on most songs, and is good enough, but on second single "Vote With A Bullet," new guitarist Pepper Keenan takes over (via bullhorn), soon to take the mic full-time. My copy has some bonus tracks, the only one of note being a goofy blues tune (again, sung by Pepper) called "Jim Beam And The Coon-Ass." ("Coon-ass" is slang for a person of Cajun origin.)
cc/2019-30/en_middle_0028.json.gz/line1594674
__label__wiki
0.630809
0.630809
BSDB Graduates Career advice, event information and blogs for graduate members of the BSDB. Non-Academic Careers Sometimes we hear of a mythical “right way” to progress through academia: a PhD, one or two postdocs and then your own group. We really want to highlight that there is no such thing. Careers are like rivers; they twist and turn, meandering across the metaphorical academic landscape. Here you’ll find a collection of career timelines from academia from real people with unique journeys. Hopefully, these will encourage and inspire you. If you would like to share your career timeline please do get in touch. Christine Holt, Professor of Developmental Neuroscience, University of Cambridge Iwo Kucinski, Postdoc, University of Cambridge Sally Lowell, Wellcome Trust Senior Research Fellow, University of Edinburgh Ottoline Leyser, Director of the Sainsbury Laboratory, University of Cambridge Lars Østergaard, Professor, John Innes Centre Christiana Ruhrberg, Professor of Neuronal and Vascular Development, University College London Amanda Sferruzzi Perri, Royal Society Dorothy Hodgkin Research Fellow, University of Cambridge Kate Storey, Professor of Neural Development, University of Dundee Abigail Tucker, Professor, King’s College London Michelle Ware, Postdoc, University of Cambridge Helen Weavers, Sir Henry Dale Fellow, University of Bristol Richard Wingate, Reader in Developmental Neurobiology, King’s College London E-mail students@bsdb.org
cc/2019-30/en_middle_0028.json.gz/line1594676
__label__cc
0.644407
0.355593
Content Intelligence: What Is It & How Can it Empower My Business? By Fatima Al-Hussaini on October 22, 2018 The world’s digital transformation has come a long way since the first touchscreen cell phone was introduced over two decades ago. Technology is now omnipresent in a lot of people’s lives. From touchscreen devices to smart home assistants, the advancement of tech has been very apparent. Now, concepts such as the Internet of Things (IoT), artificial intelligence, machine learning, and so on have infiltrated our lives. Every day, new features are being tested and deployed to help people automate their daily tasks and accomplish entirely new feats. One of the newest players in the league is content intelligence (CI). It’s now gaining popularity among marketers and is quickly becoming their greatest ally in creating better content marketing strategies, predicting audience behavior, and so much more. What is Content Intelligence? “Content intelligence represents the systems and software that transform content data and business data into actionable insights for content strategy and tactics with impact.” - American Marketing Association Let’s dissect that a bit. Essentially, anything that helps content marketers automate processes and optimize data from releasing content falls under content intelligence. The framework is possible with the right tools that aid in content production and help marketers cook up more interesting topics for their audience. Let’s take a look at another definition from Ryan Skinner of Forrester: “Content intelligence is technology that helps content understand itself—what it’s about, how it speaks, how effective it is at accomplishing certain goals, what emotions it calls to mind, etc.” This revolutionary form of content marketing is made possible thanks to other existing technologies, namely: machine learning, artificial intelligence, big data, natural language processing, and data analytics. It’s no longer just enough to produce content for the sake of publishing, but rather understand the impact it has on your audience and how you can anticipate what they want to hear from you next. How Can Content Intelligence Help? Content Intelligence helps brands create remarkable content, which is useful for various marketing purposes including brand awareness, recognition, loyalty, and most importantly, sales conversions. The public has high expectations of today’s brands and consumers will naturally engage with those who regularly provide valuable and relevant content to them. 92% of marketers view content as a definite asset for their business. That’s a lot of companies battling out on the Internet for a prospective buyer’s attention. If you want to rise above the ranks, adapting content intelligence may be the best direction your business can take. Personalization is a very crucial aspect of content marketing now, and CI can help your audience engage more by showing them relevant posts as they browse. 74% of consumers get frustrated with websites that suggest irrelevant content to them. Take Facebook’s complex news feed algorithm, for example. While a bunch of people may see the same post on their timelines at one point, no two accounts will ever have the exact same content on their feed. Getting creative is another vital ingredient when it comes to gaining new users and maintaining your current ones. CI can speed up and inspire the creative process by providing insights for compelling content and identify the right platform for each one. Your audience has different activity levels throughout the day, and this is where timing becomes crucial. Publishing or promoting posts at certain times during the day can bring more readership, and CI aims to eliminate the guesswork here. More than 200,000 blogs are published hourly, and 84% of them get less than ten shares. Aggressive content promotion is imperative to getting your content across a broader audience; an area content intelligence can assist in. What’s more, blogs are only a piece of the puzzle. Repurposing them via photos, videos, and other platforms can help maximize your efforts. Curata shared the following areas within the scope of content intelligence: What type of content should I share? What related content can I suggest my audience read next? Which pieces should I update or refresh? Which post should I focus on promoting right now? How do I promote said content? Previously, these questions were riddled with experimentation or patterned after reports that aren’t always accurate. Content intelligence optimizes this for you on the fly, so long as you have the right tools in your business. Unlocking the Power of Content Intelligence To start experiencing the benefits of content intelligence, we’ve gathered helpful tips and a few tools that can help you stay ahead in the competition. What Content Intelligence Means for Marketers Going beyond publishing content Churning out exciting content as consistently as you can is a good thing, but it’s not enough to keep posting without having real data to base your decisions on. CI can help shorten the arduous process of content production and give you more accurate results. This will allow content creators to think beyond deadlines and focus on providing the best experience for your readers. Forming a relationship with your audience The high expectations of consumers can be met with the help of CI. Once your readers notice the kind of quality behind your content, they’ll be more inclined to engaging with your brand in the future. Regular engagement forms trust, which is one of the most important goals in modern marketing. Faster growth in the business Content intelligence gives marketers today a luxury that many weren’t able to experience before: a thorough analysis of all their content marketing efforts. Before data collection and analytics systems were the norm, people couldn’t keep up with what was going on with their content. Today, we’re able to analyze content data on a granular level, bringing real numbers into the context. A more effective content marketing plan benefiting from content intelligence can help your business soar to faster heights. It’s incredibly exciting and more challenging at the same time. With the advent of tech systems automating jobs, the development of content intelligence now begs the question: Will content become fully automated? While it’s certainly the formula of every sci-fi movie out there, the current guess is that content can’t be successful without a human touch. Getting information out there is important, but so is building the personal connection and relatability people want to see from brands—something that tech hasn’t mastered…yet. It’s safe to say that the future looks bright for content marketers who want to grow their business digitally. Are you ready to integrate content intelligence in your marketing campaigns? Contact Spiralytics to get a free content marketing assessment and take your first step towards content intelligence empowerment today! Topics: Content Marketing, Content Intelligence About Fatima Al-Hussaini Fatima is a Content Marketing Writer for Spiralytics. She graduated with a Communication Arts degree from DLSU Manila and found a career in writing shortly afterward. Her other passions include yoga, calligraphy, and traveling. She has two cats and a deep love for chocolates! Subscribe to Spiralytics' Blog
cc/2019-30/en_middle_0028.json.gz/line1594678
__label__cc
0.665381
0.334619
Tag Archives: Facebook Spoliation Facebook Spoliation Costs Lawyer $522,000; Ends His Legal Career In what many are calling the largest eDiscovery sanction penalty ever leveled directly against an attorney, a Virginia state judge ordered lawyer Matthew Murray to pay $522,000 for instructing his client to remove photos from his Facebook profile, and for his client to pay an additional $180,000 for obeying the instructions. A copy of the final order in Lester v. Allied Concrete Company is available here. If Murray had initiated a proper legal hold concerning his client’s social media evidence instead of directing blatant spoliation, he would be a lot wealthier and likely kept his job. Instead, he apparently quit his position as managing partner of the largest personal injury firm in Virginia and, according to local press reports, he no longer practices law. The court’s findings reflect that Murray told his client to remove several photos from his Facebook account on fears that they would prejudice his wrongful death case brought after his spouse’s fatal automobile accident. One of the photos depicts the allegedly distraught widower holding a beer and wearing a t-shirt emblazoned with “I [heart] hot moms.” Murray instructed his client through his assistant to “clean up” his Facebook account. “We do not want blow ups of other pics at trial,” the assistant’s email to Lester said, “so please, please clean up your Facebook and MySpace!” This case reflects a trend we see based on anecdotal data points where a minority of legal and eDiscovery practitioners have not quite placed social media evidence on the same par as other electronic evidence. For instance, I believe it is highly unlikely that Murray would have instructed his client to delete all his emails or wipe his hard drive, but for some reason he differentiated social media evidence. The attorneys we speak with are telling us that social media evidence is relevant to nearly every case they handle and the savvy ones are using social media evidence to win their cases. And as we recently noted, since 2010 social media evidence played a key role in 675 different cases with published decisions reflecting such involvement and in presumably tens of thousands more cases not involving published decisions. Those numbers will only increase as social media networks grow even more popular. However, I was struck by one recent conversation where an eDiscovery consultant had not yet included social media data source in their standard investigation checklist. To be fair, there has not been best practices technology available to enable scalable, mainstream social media eDiscovery until recently, which impacts standard processes. But just as the Virginia state court judge saw no difference between Facebook postings and other “traditional” electronically stored information, neither should anyone in the legal and investigative fields, especially since the software needed to get the job done is now available. UPDATE: Here is copy of the previous court ruling determining sanctions were in order. The final order set the amount. Tagged as $522, 000, 675 cases, eDiscovery, electronically stored information, end legal career, ESI, Facebook, Facebook Spoliation, Lester v. Allied Concrete Company, Matthew Murray, MySpace, penalty, sanction, social media evidence, spoliation, Virginia State Judge
cc/2019-30/en_middle_0028.json.gz/line1594684
__label__cc
0.665402
0.334598
Terry Zink: Security Talk Terry Zink: Security Talk Discussing Internet security in (mostly) plain English A Plan for Email over IPv6, part 4 – Population of the whitelists tzink October 1, 2012 Population of the whitelists How do email receivers go about populating whitelists? The whole strength of email is that you can hear from people you’ve never heard from before; new people outside your normal circle can talk to you. But the whole weakness of email is that you can hear from people that you’ve never heard from before; spammers can send you junk. The weakness of using whitelists – and blocking the rest of the world – is the “introduction problem.” How do you hear from new people? They have important things to say to you, yet you aren’t listening to them and that is by design. In reality, this problem has analogies in real life. Think back to your own experiences; when you first started out your working career, nobody would hire you because they wanted people with experience. But how are you supposed to get experience if nobody will hire you? Another example is when Homer Simpson wanted to join the Stonecutters, he was stonewalled because to get into the club, you had to either be related to an existing member, or save the life of an existing member. Since the Stonecutters wouldn’t reveal their membership, and the odds of saving the life of anyone is extremely small, Homer initially couldn’t get into the club. Fortunately, there are ways to get around the introduction problem, but all of these ways have their own degrees of difficulty. Below are some possible mechanisms to accomplish this: Manually - Administrators may contact each other by email over IPv4, by telephone, by regular mail, by word-of-mouth, or any other form of communication. Both parties may agree to whitelist each other, or one party may whitelist the other without the other doing the same. Difficulty: High (easy to implement but doesn’t scale) Use a 3rd party - Administrators may rely on a third party reputation service that provides lists of IP addresses of known good senders of email over IPv6. An administrator may acquire this list and proactively whitelist all IP addresses on this list, or a subset of them. Difficulty: High at first (nobody has such a list) but Low to Medium thereafter Pre-populate your list yourself - Administrators can create their own lists. One way to do this is to maintain IP reputation statistics of senders over IPv4. By combining that with sending domains and SPF records, receivers can “guess” what IP addresses senders will use to transmit over IPv6 and use that to pre-populate a whitelist. They do this by looking up the SPF records of trusted domains and proactively adding any IPv6 addresses to the whitelist. Receivers who plan to use SPF or DKIM acceptance do not need to do anything, they simply take the list of trusted domains they were using for IPv4 and reuse them for IPv6. Difficulty: High (but not in the case of DKIM or SPF whitelists) Provide an easy way for senders to get onto the whitelist - Another way to populate the whitelists is to give email senders a way to do it themselves with as little human interaction as possible. a) If a receiver rejects a sender, the bounce message might contain instructions on how to add themselves to the whitelist: 550 Access Denied. The sending IP [121::1] is not permitted to send email over IPv6. To attain permission to send over IPv6, please see the following web page: http://... b) The web page contains a form that the sender can fill out and send to the receiver. The form would have standard sign-up security checks including a CAPTCHA plus another form of identification, whether it is SMS validation or sending an email to another email address requiring a second call to action (e.g., click this link). c) Once the sender has passed multiple validations (filling in the CAPTCHA, responding to the text message to their phone or clicking on the link in the email), their IPv6 address is added to the receiver’s whitelist. This puts the responsibility on the sender to whitelist themselves and at the same time scales for the receiver so they are not endlessly managing whitelists using humans. If a sender truly needs to send email over IPv6, they will take the time to do it. Difficulty: Medium for the receiver, Easy for the sender Do it yourself by tracking reputation – Rather than rejecting mail from senders on IPv6, receivers might allow new senders transmitting over IPv6 but throttle them instead. The sender could send some mail over IPv6 and then fallback to IPv4 once they have reached their daily limits. By keeping track of a sending IP addresses’ reputation (ratio of spam to non-spam, passing authentication, etc.) over a period of time, a receiver can upgrade the sender from the Untrusted list to the Whitelist. The amount of mail they can send over IPv6 increases as their reputation increases. This changes the concept from a binary whitelist (Accept/Deny) to a sliding-scale whitelist where a sender’s reputation is on a sliding scale. It works automatically; it does not require the sender or receiver to do anything whereas in the above web page method, some users or administrators won’t understand how to or won’t care to whitelist themselves. The drawback of this method is that it can take a long time to go from Bad to Good and during that waiting time, email delivery is sporadic. It also forces mailers to send mail over IPv6 and IPv4. While most mailers can do that, it is not necessarily true for everyone and those that cannot will not be able to send email. Difficulty: Medium for the receiver, Medium for the sender Any of these methods, or a combination of them, could be used for whitelist population. Posts in this series: - A Plan for Email over IPv6, part 1 – Introduction, and How Filters Work in IPv6 - A Plan for Email over IPv6, part 2 - Why we use IP blocklists in IPv4 and why we can't in IPv6 - A Plan for Email over IPv6, part 3 - A solution - A Plan for Email over IPv6, part 4 - Population of the whitelists - A Plan for Email over IPv6, part 5 – Removals, key differences and standards Tags Spam Security Education Spam Entertainment Miscellaneous Stories Malware Authentication Botnets Hacking Reputation Legal Backscatter Outbound Economics Privacy Facebook Pages Foreign language Social Networking
cc/2019-30/en_middle_0028.json.gz/line1594688
__label__cc
0.519874
0.480126
WETA UK Programs 'Grantchester' Will Officially Return for Season 5 British Actors You Should Know: Russell Tovey See the First Photos From Julian Fellowes’ New Period Drama 'Belgravia' 'Grantchester' Season 4, Episode 1: Farewell Chambers Where We Left Everyone at the End of 'Grantchester' Season 3 The Final Season of 'Poldark' Will Air on Masterpiece This Fall 'Jamestown' Recap: Season 3, Episode 4 A New Adaptation of 'All Creatures Great and Small' is Coming to PBS 'Endeavour' Season 6 Finale Recap: "Degüello" Did 'The Spanish Princess' Get Catherine of Aragon Right? Phoebe Waller-Bridge Plans To Write Herself Into 'Killing Eve' Season 3 Watch the First Teaser for the Final Season of 'Poldark' 'Yesterday': A Fanciful Tribute to the Enduring Power of the Beatles' Music 'Endeavour' Season 6, Episode 3 Recap: "Confection" A History of the Beatles on Film 12 Days of Downton: A Downton Abbey Series 2 Wishlist 1/2/2012 in Drama by Lacy Baugher DOWNTON_ABBEY--415x415.jpg With Series 2 of Downton Abbey just days away (finally – our countdown is in single digits!), it seemed worthwhile to think about what the ideal new season would look like. There are so many plot points from Series 1 to deal with – not to mention that pesky World War – that anything can happen. So, click through for my personal wish list of what I’d like to see the most in Downton Series 2. This list is completely spoiler-free (I stayed away from the one topic that I’ve seen spoilers for, as I figured it wasn’t fair to come up with predictions influenced by things that I knew would actually happen!), so feel free to take a read through and tell us what you’d most like to see in Downton’s new episodes in the comments. Ahem so, in no particular order, here the things that I’d be over the moon to see in this new series of Downton. While it’s doubtful all of these would/could ever come true, maybe a few will happen! More Maggie Smith! Smith’s Dowager Countess was certainly one of the more memorable things about the first season of Downton for a variety of reasons, not the least of which being her sarcastic commentary, well-timed eye rolls and general ignorance of weekends. But, one of the best things we saw about her character in the first series – and something that really should be fleshed out further at some point – is that Violet is a pretty awesome person. Sure, she’s snobby and elitist and entitled, but she’s also frighteningly loyal to people she cares about and probably one of the few characters in the series to experience growth over the first season. Don’t we all love the moment that she alters the flower show judging results to give William Molesley the win? Don’t we all want to cheer for her when she apologizes to Cora and admits that she’s done her best to try and minimize the scandal for Mary stemming from the Mr. Pamuk incident? Admit it – when she says that Mary holds the trump card because she’s family, we maybe all sort of wished that Violet was our grandmother too. In Series 2, I certainly want the Dowager Countess to continue to her tradition of being the wittiest character on television, but I’d like to see more about her as a character, be it in the form of backstory or more of her growing pseudo-feminist-in-some-small-way (though I imagine she would hate that phrase) leanings. Romance for Bates and Anna! While the Matthew and Mary relationship is the central love story in Downton Abbey, for me, Bates and Anna’s quiet romance is the most appealing. Bates decent character, strong morality and obvious feelings for Anna despite his insistence that they can’t be together, is swoon-worthy. Her unshakeable belief in him is incredibly touching. In other words, they are basically the definition of adorable. Though I never seem to get what I want when it comes to romantic relationships on shows like this, if these two crazy kids don’t actually manage to get together this season, I’m going to be heartbroken. The two of them deserve some happiness together, especially Bates after everything he went through last season. Consequences for Some of Our Less Favorite Characters. Though Thomas escaped a much-deserved firing over his horrible actions in Season 1 by virtue of enlisting in the Army, at least we did get to see everyone figure out what a vile person he was, even if we couldn’t watch him be formally tossed out of Downton for being a lying liar who lies. (I’ll be curious to see where his storyline goes after this, to be honest, and hope that his past isn’t whitewashed or forgotten.) In this upcoming season, it would be great to see some of the other less-than-admirable characters face some consequences for their actions. For example, we see that O’Brien does have some form of conscience at the very end of last season, and it’s likely that she feels terrible about Lady Grantham’s miscarriage, but in order to take her seriously as more than a one-dimensional villain, we need to see her punished for her actions in some way. Even if this “punishment” something as small as someone other than Thomas finding out all the shenanigans she’s been engaged in, it would at least show the audience that she’s not getting away scott free with everything and make her change of heart (if that is indeed what’s coming) more believable. And what of Lady Edith? Granted, her nastiness levels aren’t quite on par with O’Brien or Thomas, but what further ramifications might we see from her letter to the Turkish ambassador and attempt to destroy her sister’s reputation? The argument can be made that Edith has been punished enough already, what with Mary ruining her engagement prospects and everything, but it still might be interesting to see what would happen if Lady Grantham or the Dowager Countess were to learn exactly how the Turkish ambassador got hold of his information. Stop the Merry-Go-Round, Matthew and Mary. Hopefully in Series 2, we’ll finally see Mary and Matthew commit to each other, preferably with both of them deciding to do so at the same time. As viewers, we almost always love a tortured romance – and these two have that in spades – but I question how long we’ll be willing to wait for these two to sort themselves out, when there’s little reason preventing them being together, other than Mary ‘s strange stubbornness. Would it not be almost a better story if she were to tell him about the Mr. Pamuk situation and have that be the thing that divides them (until Matthew realizes that he forgives her of course), rather than her sudden reluctance to say yes to him, despite their obvious feelings for one another. And of course now poor Matthew assumes her interest was all about his prospects instead of himself. Should have listened to your grandmother, Mary! Though it took me ages to warm up to this pairing I, I am firmly in their corner now (Mary is occasionally a hard person to like), and while I love the heartbroken staring as much as the next girl, I would desperately like them to either accept and act on their feelings in Series 2 or for a more compelling reason to keep them apart. Though the war might be reason enough for their separation in and of itself, so we’ll have to see. More backstory for everyone! Am I the only person who is dying to know more about the history of Downton? Wouldn’t it be neat to find out more about the estate when Violet was the Lady Grantham in charge? We’ve seen some interesting backstory so far for several of the servants – Carson, Mrs. Hughes, Bates to some extent, though there’s probably more to come on that front. How did Mrs. Padmore come to Downton? What about Anna? And though we’ve seen their relationship now, it would also be interesting to learn more about the early days of Lord and Lady Grantham’s marriage, especially given that Cora is a foreigner and would have been very ignorant of the way things are done at a house like Downton. There’s such a big cast of characters that there’s got to be great stories to tell about them and what makes them who they are that we just haven’t seen yet. Honorable mention list: More focus on how Sybil's political leanings clash with her family, hopefully the war will make Mary a bit less self absorbed, and maybe Daisy will be allowed to do something other than look flustered and get yelled at by Mrs. Padmore. Anyone else have any plots or characters they feel are musts for Series 2? Share your thoughts in the comments! Related Program The hit drama centers on a great English estate on the cusp of a vanishing way of life. Watch online » See broadcast times on WETA Television » Digital media type by day, Lacy has a fairly useless degree in British medieval literature, and watches entirely too much television in her free time. Ninth Doctor enthusiast and all around Whovian evangelist. Say hi on Twitter at @LacyMB. More posts by Lacy Baugher » 12 Days of Downton Wishlists Downton Abbey Masterpiece Classic Highclere Castle Celebrates Start of Filming for 'Downton Abbey' Movie Just before Highclere Castle closed for the season and filming for Downton Abbey commenced, the Carnarvons threw a World War I themed event. Remembering The 100th Anniversary of Armistice Day This weekend, the world celebrates the 100th anniversary of what is now known as Veterans Day. Christmas is Coming to Downton Abbey Highclere Castle is throwing open their door to fans for the "Downton Abbey Christmas Experience." Actors and Actresses Amazing Internet Things BBC Promos Benedict Cumberbatch Call the Midwife Call the Midwife Recaps Casting News Doctor Who Downton Abbey Endeavour Episode Recaps ITV Promos Masterpiece Classic Movies Mr. Selfridge News Roundup Other Networks PBS Promos Poldark Renewal News Sherlock The Great British Baking Show Upcoming Things of Interest US Airdates Victoria Follow Telly Visions on Twitter Tweets by telly_visions Telly Visions is a service of WETA and is supported by contributions from readers like you.
cc/2019-30/en_middle_0028.json.gz/line1594690
__label__wiki
0.541573
0.541573
Garfield children’s areas to feature at Six Flags Zhejiang and Chongqing theme parks in China 19th May 2017 Six Flags Entertainment Corporation and Riverside Tourism Investment Group Co. Ltd. have announced that Six Flags branded theme parks in China will include Garfield themed children’s areas. Six Flags Zhejiang will be the first Six Flags theme park to open in China. The theme park is part of a 30 billion yuan (USD $4.6 billion) resort development on the coast of Hangzhou Bay. In December 2016 it was announced that a Six Flags Hurricane Harbor waterpark would be built adjacent to the theme park. Both the theme and waterparks are expected to open in 2019. A second Six Flags branded theme park in China, Six Flags Chongqing, is scheduled to open in 2020. Both theme parks will feature a Garfield themed children’s area. The Garfield comics strip was created by cartoonist Jim Davis in 1978 and now has nearly 17 million other fans, on Facebook and Twitter. The Garfield IP is owned by Paws, Inc.. Commenting on the announcement, John Odum, President, Six Flags International Development Company, said, “We are excited to partner with the great team at Paws Incorporated to create unique, themed sections based on the beloved Garfield character for children and their families. From themed rides and attractions to live shows, character meet and greets and merchandise, guests will be fully immersed inside the clever world of Garfield and friends.” “This alliance is another major step toward building a world class park for millions of visitors. Garfield is already a beloved character in China and we look forward to bringing him to life inside Six Flags Zhejiang and Six Flags Chongqing,” added said Che Li, Chairman of the Riverside Investment Group. Images: Six Flags and Paws Inc Rachel Read Happy to be looking after Blooloop's news and events. Enjoy dark rides and interactive attractions, waterparks, artainment, museums and all the innovative new experiences this industry keeps creating. brand China Chongqing garfield ip riverside Six Flags theme park zhejiang Arihant creates cutting-edge river slide with effects for Portugal’s Aquashow Park Hotel SeaWorld to develop Sesame Place Theme Parks in the US Ron Morissette joins Thinkwell Montréal as VP of development Exhibits Development Group reveal booking open for Star Trek: Exploring New... Lost Island Waterpark expanding with $100m theme park set to open 2022 Attractions news 13 July: Rise of the Resistance | American Dream | Wynn... Attractions news 6 July: Star Wars: Galaxy’s Edge app | Lionsgate... Attractions news 29 June: London Resort new Paramount deal | Lego buys Merlin...
cc/2019-30/en_middle_0028.json.gz/line1594692
__label__wiki
0.802174
0.802174
/ Cory Doctorow / 4:05 am Wed Aug 3, 2011 Tom Watson, MP: copyfighting terror of News International Here's a great and engrossing profile in the Guardian of campaigning MP Tom Watson, who has been instrumental in Parliament's pursuit of the Murdoch phone-hacking case. Watson has been targetted by News International in retaliation, followed around by PIs, his neighbours' rubbish bins raided, members of his party told to sideline or fire him by high-ranking News execs. I know Tom from his exemplary work against the Digital Economy Act, and it was fascinating to learn about this other major passionate campaign of his life. "When Myler and Crone first turned up, my knowledge was novice-level," he says. "I knew about three facts. But what I knew was that in any great scandal, you've got to follow the money. They were hick, amateur questions: I think I opened with: 'When did you tell Rupert Murdoch [about the payment]?' I thought that you might as well start at the top. "They said: 'Oh no – we didn't tell Rupert Murdoch.' Then it was, 'Well, who did you tell? Who authorised it?' Myler got frustrated me with me, because I came back to this four or five times. He ranted. And don't forget: Crone had already tried to get me off the committee. So at that point, I thought: 'You're rude, you've tried to remove me from this committee, you've put me under extreme pressure for a number of years – there's more to this, and I'm getting to the bottom of it.' "When Myler was so over the top . . . it was like there was a big neon light behind his head, saying, 'Dig here.'" Tom Watson: 'Phone hacking is only the start. There's a lot more to come out' Copyfight / deact / debill / notw / politics / uk Cooperative porno copyright troll gets 5 years in prison, while his co-conspirator got 14 years Last month, Paul Hansmeier was sentenced to 14 years in prison and ordered to pay $1.5m in restitution for the copyright trolling his firm, Prenda Law, engaged in: the firm used a mix of entrapment, blackmail, identity theft, intimidation and fraud to extort millions from its victims by threatening to drag them into court for […] Judge rules that EFF's DRM lawsuit can proceed! In 2016, EFF sued the US Government on behalf of Andrew "bunnie" Huang and Matthew Green, both of whom wanted to engage in normal technological activities (auditing digital security, editing videos, etc) that put at risk from Section 1201 of the Digital Millennium Copyright Act. Pacman in 512 bytes Pillman is Oscar "Nanochess" Toledo's reimplementation of Pacman ("a game about a yellow man eating pills") in 512 bytes -- small enough to fit in a boot sector -- written in 8088 assembler. (via Four Short Links)
cc/2019-30/en_middle_0028.json.gz/line1594694
__label__cc
0.505177
0.494823
Sonu Niigaam in Concert! Events, Features | March 10, 2010 | | by Charla Manohar What Shah Rukh Khan means for Bollywood Entertainment, Sonu Niigaam means the same for the music industry and film music. Both are fantastic performers and know how to keep an audience entertained. And on the 27th of February, after a five-year wait, the fabulous Sonu Niigaam was finally back on stage in Holland. There was this presenter, whose name unfortunately slipped my mind, who said a very interesting thing about Holland. If you look at the people, the NRI’s to simply call them, they are the farthest from India. Indians were first brought to Surinam and from there on the second and third generations moved to Holland. The people in the audience were mostly fourth and fifth generation Indians. It is surprising to Indians from India, that we are still in love with our culture. We keep it alive by eating the same food, listening to Indian music and watching Indian movies. In the past there wasn’t a huge market for singers in Holland. Everybody wanted to see the actors on stage. However, nowadays more and more singers decide to perform outside India and the response is outstanding. This year in Holland we had a concert by Kailash Kher, followed by Sonu Niigaam. In the coming months we will have Usha Mageshkar, Rahet Fateh Ali Khan and Atif Aslam coming to perform and we are ecstatic. However, let’s get back to Sonu and his concert. I have to admit that I am a huge Sonu Niigaam fan, but I never saw him live on stage. I am such a big fan that if I had one wish, it would be to see Sonu Niigaam perform ‘Bijuria’ live on stage at least once in my life. That wish came true that night. Overall, it was a brilliant performance and I had a fantastic time at the concert! First let’s talk about how well the show was organized. Once it began, it went off without a hitch and a great time was had by all. However, there were complaints because the show started pretty late. I’ll let you in on a little secret – a show in Holland never starts on time. The show was supposed to start at 7 pm, but it was 8:30 before the music began. But then again, when does any Indian show abroad start on time? On Indian standard time na? Haha. I had a great seat, right in front of the stage, in the fourth row. You could see everything and with that, I mean literally everything. The prices for tickets were good, not expensive and everything seemed to be in place. The show was sold out! There might have been a few empty seats in the back, but from where I was sitting and standing the whole auditorium was filled with lots of Sonu fans. The show started with a short film on everything Sonu Niigaam had done in his career, from being a singer to a host, an RJ, a composer and performer. After that, we heard Sonu’s voice and everybody went wild and the requisite concert screaming began! People were so excited and the screaming, including mine, was unbelievably loud. Once Sonu appeared on stage, people went crazy. Almost everyone who was sitting in the back ran towards the stage just to get a glimpse of the singer. Security did try to get everyone back in their seats but that was just impossible, so they ended up just standing on both the sides of the stage. Sonu Niigaam is not only a brill playback singer, he is a fantastic performer as well. I had never seen such a terrific live show by a singer. He actually engages with his audience, shares his songs and makes you feel at home. As an audience you are a part of his performance and you feel appreciated. Just watch the ending of ‘Main Agar Kahoon’ to see how the audience gets involved: (This video is from my friend Zhunaysha) He started out with ‘Shukran Allah’ and sang the song with so much peace and feeling. He gave us the recent hits including ‘Chiggy Wiggy’, where he even sang the part of Kylie Minogue in her voice. Sonu also sang the fantastic medley from Rab Ne Bana Di Jodi, ‘Phir Milenge Chalte Chalte’, and mixed it with ‘Bachna Ae Haseeno’. Another great musical piece was the combination of old film songs together with the song ‘Main Hoon Na’. He made us fall in love with him while he sang the beautiful love songs ‘Suraj Hua Maddham’ and ‘Soniyo’. Sonu went totally crazy with the songs ‘Tenu Leke’ from Salaam-E-Ishq and ‘Aaja Soniyo’ from Mujhe Shaadi Karoge. Of course, as I said my wish came true when he sag the hit song ‘Bijuria’ from his album Mausam. I think he includes this song in every show and he should. Everywhere in the world, whenever I see him perform this song, it makes the audience go crazy. Everybody just gets up and starts to dance. His energy and the way he dances during ‘Bijuria’, puts his soul into ‘Soniyo’ and makes you naach to the Bhangra version ‘Staying Alive’ from the Bee Gees is amazing. His voice quality live is so pure and touches your heart. My friends and I has so much fun and spent the incredible three hours dancing and singing to all his tunes. At one point he even pointed to us while we were jumping and told us he loved us. That was the best gift ever. Sonu’s musicians are amazing people. One can hear and feel that they music is flowing in every vein of their body. Sonu introduced everyone to the audience and they showed the audience how much magic they can create with their instruments. The guitar player was amazing. He even joked around with Sonu in one of the songs. Then there was Sonu singing ‘Staying Alive’ from the Bee Gees. He presented a special Bhangra version of the song. While he is singing, in the background one could notice two musicians going absolutely crazy. One of them was throwing his drumsticks in the air while playing the drums. It was a great sight. ‘Staying Alive’: from 0:55 sec you can enjoy the Bhangra version The coordination between all the guys is amazing. The control they have over their instruments is another point to notice. Just hear the ending of ‘Bijuria’ and you realize that a lot has gone into coordinating and making this fantastical live version of the song come together. Musicians are often sidelined while it is actually them who are the life of a stage show for a singer. They deserve a lot of respect and appreciation. If you are a Sonu Niigaam fan then you can do nothing but have a revel in the awesome experience of seeing him and if you weren’t a Sonu fan, then you will become one after you see him perform live on stage. Sonu Niigaam is a singer, entertainer, performer and a very sweet human being. He knows his audience and he knows how to keep the night alive. He is one of the finest artists we have today. I am glad I was born in the era of Sonu Niigaam. His concert was one of the finest, biggest and best shows I have ever seen in my life. I just wish and pray he returns soon, cause once you have seen Sonu Niigaam on stage, you don’t want to see anyone else. I hope he continues to entertain us for a very long time to come. My wish: ‘Bijuria’ Charla Manohar View all posts by Charla Manohar →
cc/2019-30/en_middle_0028.json.gz/line1594697
__label__wiki
0.711329
0.711329
Assessing the Bombers’ Complicated Free Agents Situation Published on November 17, 2016 November 18, 2016 by Eric Matthews Thanks to GM Kyle Walters being on top of things and extending contracts early, the Winnipeg Football Club has been in favorable situations in terms of having a relatively small amount of pending free agents to re-sign in the off-season since he took over in 2013. Despite having already extending key players such as Chris Randle and Mathias Goossen, Walters is still poised to face decisions regarding the most free agents he’s had since taking over the player personnel reigns from Joe Mack. Fortunately, the Bombers’ 19 pending free agents about represents an average number in the CFL. The Bombers’ cap situation is quite interesting heading into the off-season. They’re now without the egregious contract of Drew Willy, but Nichols’ needed pay-raise – which will likely contain a base salary of at least $300,000 – erases much of the breathing room when you consider that both Khalil Bass and Darvin Adams after expected to go from making peanuts over the last two seasons to north of $100,000 annually. There will be other pending free agents, of course, that will demand smaller pay-raises, but pay-raises nonetheless. Every penny counts for the Bombers this off-season considering the league’s minuscule salary cap of 5.1 million. Evidently, Walters can’t keep everyone. (Although it does make sense to wish for as much continuity as possible in order for this young team to build on a successful 2016 season). It would also be nice to have a little bit of free cap space for a change after the shopping spree that was the free agency spending last February. As we look into who should stay and who should go regarding the club’s upcoming free agents, its important to consider that the Bombers will make other moves that will affect their re-sign phase that aren’t directly previewed at this time. The Bombers could be poised to release players with large cap hits such as Patrick Neufeld, which would completely change the way the re-sign phase is approached. For now, though, we’ll deal with the cards that are dealt. The club released their free agents list on the official team website. Here’s my take on the team’s suspected current cap situation in relation to their upcoming free agents, and which of their 20 should be offered an extension. Retain without hesitation… QB Matt Nichols Nichols has provided the Bombers with the most stability at the quarterback position since Kevin Glenn’s first stint in the blue and gold. As proven by the Montreal Alouettes and certainly the Bombers themselves, quality quarterbacks are not easy to come by. Whether they’re elite passers or lower-echelon game-managers, starting-caliber pivots are a must-resign when the free agent market is as weak as it will be this February. Negotiations won’t be easy between Nichols’ party and Bombers’ GM Kyle Walters, as Nichols has leverage thanks to both the free agent market and his 10-3 record as the starter in 2016. On the other hand, Walters must be careful with both the term and annual average value of the deal following the Drew Willy contract disaster, as well as Nichols’ unconvincing numbers that could regress next season. Regardless, this deal absolutely must get done as soon as possible. The Bombers need Matt Nichols. WR Darvin Adams All Adams did in 2016 was produce. Though his season was ravaged by a broken collarbone injury that limited the fourth-year veteran to just eight games, he was productive enough in limited action to warrant a significant pay-raise from the dollar figures he first signed for two off-seasons ago when he came over from the Toronto Argonauts with 261 career receiving yards. Adams accumulated 690 yards and six scores this season, and his phenomenal yards-per-game average of 86.3 yards puts him in the elite company of Adarius Bowman and Chris Williams. Don’t expect Adams to get paid like those two – the minuscule sample size is one of a few reasons – but he’ll still be benefiting financially from an extremely production season. LB Khalil Bass Bass’ value to the Bombers’ defense, despite only being a professional for two seasons, is often over-looked. He’s their much-needed bruiser between the tackles, eating blocks to free up his teammates and causing havoc at the point of attack like no one else on the defense does. He provides a steady back-side presence when the ball goes away from him, and is a surprisingly consistent tackler despite his willingness to deliver the bone-crushing hits. As the MIKE, the young ‘backer is depended on to shift his defensive lineman’s alignment and switch around assignments based on the offensive formation and motion, and as far as I can tell, Bass seems is quite reliable in that sense, too. At just 26-years-old, the Bombers need to keep around the Portland State product who’s stepped up and filled a key role in the defense in just his second season. FB James Tuck The Bombers were in no dire need to pick up other team’s Canadian training camp casualties, but they pounced on the opportunity to sign Tuck when the Argos released him – and for good reason. Tuck was a special-teams demon in 2016, and at the ripe age of 26, he should be around for awhile. While he falls into the category of a pure special-teamer who doesn’t necessarily have a regular position on offense or defense, Tuck does provide emergency depth at fullback, with Christophe Normand dressing as the Bombers’ lone fullback. LS Chad Rempel Rempel’s name was rarely – if ever – brought up this season. As a long-snapper, that’s always a good thing. Rempel, 35, is truly one of the best in the business. Should the price be favorable…. LB Tony Burnett Burnett, 26, should be re-upped from his rookie deal with a one-year contract. With Ian Wild missing several games due to injuries, Burnett had the opportunities to prove himself on defense and did not look out of place. In fact, the drop-off from Wild to Burnett was hardly noticeable at all. The USC product is another good season away from being in high demand on the free agent market to fill a starting role next year. The Bombers won’t let him walk, however, if he unseats Wild for the starting job at weak-side linebacker in 2017 – a move that would make sense financially and potentially on the field, too. If he’s again a depth player behind Wild next season, Burnett will continue to be heavily-relied upon on special-teams as he gathers film for a trip to free agency in 2018. QB Kevin Glenn A proven backup quarterback is a must-have in the CFL. At this point in his career, Glenn, soon-to-be 38, is exactly that. Youngsters Dominique Davis and Bryan Bennett haven’t given the Bombers any reason to go young and cheap at the position. Glenn must be re-signed. SB/KR Quincy McDuffie McDuffie had a quietly good first season in Blue after three seasons in Hamilton as depth to Brandon Banks. He’s merely 26-years-old, and led the league in both major kick return categories: return average (27.7) and touchdowns (2). McDuffie will likely take over all return duties next year, as its not ideal to have a starting DB in Kevin Fogg returning punts full-time. And if Fogg does not earn a starting job in the secondary, there’s likely not a spot on the roster for him at all. McDuffie, meanwhile, looks to be a solid backup receiver when used properly, too. He’s well deserving of a slight pay-raise from the near-league minimum he likely earned in 2016. LB Sam Hurl Hurl is a very solid special-teamer and, despite the Bombers being destined to draft another linebacker in 2017 along with recent draftees Garrett Waggoner and Shayne Gauthier, it he would be a noticeable loss if he isn’t deemed affordable. Signed as a starter two seasons ago, Hurl will have to take a pay-cut after being demoted following his first season in Winnipeg. QB Dominique Davis Davis has had very few chances to show his skill in a real-game situation, and that could work in his favor. In terms of accuracy and ball-placement, Davis was clearly superior to fourth-string quarterback Bryan Bennett, who’s also a free agent, in the pre-season. The Bombers are looking for a young quarterback to move into the backup role and displace Glenn, and though they’ll likely add two new faces in the off-season, expect them to retain one of Davis and Bennett. The former, who kept his third-string job all season, should be the one. SB Thomas Mayo At minimum salary, the Bombers may as well bring back Mayo, who showed potential in his few opportunities, for training camp. Worthy but likely not affordable… DT Euclid Cummings Cummings is an athletic specimen who’s statistics did not represent his effectiveness in his first season in the blue and gold. While his sack totals decreased from 8 in his unofficial rookie campaign to just three sacks in 2016, he remains an above average pass-rusher at a position largely centered on pass-rushing – the 3-technique. The 290-pounder provides versatility in that he can shift out to defensive end if needed, possessing the speed and some of the flexibility needed for playing on the edge. Regardless, as an international defensive tackle who was inconsistent against the run, the Bombers can’t break the bank for Cummings. I was surprised to read reports indicating Kyle Walters paid Cummings $140,000/year after really just one season in the league in 2015. He’ll request about the same money this year, and seeing as Darvin Adams and Khalil Bass will go from making pennies to well north of $100,000 this off-season, the Bombers may have to sacrifice Cummings, who could leave for the NFL regardless. Clarence Denmark There’s a decent chance the Bombers make room to bring back Denmark, which would likely come through releasing Tori Gurley, who has an official contract in place should he not defy the odds and earn another NFL shot. But the Bombers have to be weary in investing veteran money in international players. They certainly can’t keep both Denmark and Gurley along with Weston Dressler, Darvin Adams and Ryan Smith. For now, Denmark is the one without a contract for next year. Time to move on from… WR Rory Kohlert After starting all 18 games for the third straight season – well, he missed one game last year – Kohlert lost his starting position heading into the West semi-final, a move that was long overdue. Kohlert’s numbers have continually declined since a career-high 594 yards and three TDs in 2014. The Bombers are desperate for improved production from a Canadian at field-side wide receiver – Kohlert has shown that he’s no longer capable. HB Julian Posey The Bombers are loaded with faces at defensive back. There’s no reason to bring back a occasional-practice roster player that gave up an average of 41 receiving yards/game in six starts. LB Jessie Briggs Having drafted Canadian linebackers Garrett Waggoner and Shayne Gauthier in the last two years, the Bombers will likely choose between Briggs and Hurl in the coming months. Briggs is the cheaper option, but Hurl has significantly more starting experience. Though he played injured, Briggs had a poor season this year, riddled with penalties and missed tackles. FS Teague Sherman Though he was certainly legitimately injured at one point, the Bombers willingly kept Sherman off the active roster with the emergence of rookie FS Taylor Loffler. Fellow Canadian defensive backs Derek Jones and Brendan Morgan are already under contract for next season, leaving little room for the veteran. The University of Manitoba alumni should get another look elsewhere in the league. QB Bryan Bennett Seeing as they picked up Kevin Glenn mid-season, the Bombers certainly aren’t completely sold on Davis and Bennett for immediate returns. Glenn’s arrival could be irrelevant, but look for the Bombers to bring in a new arm next season to hopefully compete in the future for the no. 2 spot. Categories Bomber Thoughts Previous 2016 CFL Awards Picks: Stamps’ Exceptional Season Should be Reflected at Awards Next Reviewing the Wacky, Riveting and Predictable 2016 Season
cc/2019-30/en_middle_0028.json.gz/line1594699
__label__cc
0.710489
0.289511
A Promise Kept Robin Lee Hatcher God was going to save her marriage, Allison was sure of it. But neither her husband nor her marriage had been saved. What had become of His promise? Tony Kavanagh had been Allison’s dream-come-true. They were in love within days, engaged within weeks, married and pregnant within a year. Her cup bubbled over with joy . . . but years later, that joy had been extinguished by unexpected trials. The day Allison issued her husband an ultimatum, she thought it might save him. She never expected he would actually leave. She was certain God had promised to heal; it was clear that she'd misunderstood. Now, living in the quiet mountain cabin she inherited from her single, self-reliant Great Aunt Emma, Allison must come to terms with her grief and figure out how to adapt to small town life. But when she finds a wedding dress and a collection of journals in Emma’s attic, a portrait of her aunt emerges that takes Allison completely by surprise: a portrait of a heartbroken woman surprisingly like herself. As Allison reads the incredible story of Emma’s life in the 1920s and 1930s, she is forced to ask a difficult question: Does she really surrender every piece of her life to the Lord? Drawing from her own heart-wrenching story of redemption, A Promise Kept is Robin Lee Hatcher’s emotionally charged thanksgiving to a God who answers prayers—in His own time and His own ways. "Hatcher’s latest is an uplifting and heartwarming story about the power of faith to set people free from the pain of their pasts. Recommended where ­Tracie Peterson’s books (All Things Hidden; The Miner’s Lady) are popular." —Library Journal, STARRED Review More Books by Robin Lee Hatcher Whenever You Come Around Dear Lady Kiss the Bride
cc/2019-30/en_middle_0028.json.gz/line1594704
__label__cc
0.70609
0.29391
March 26, 2015 March 26, 2015 by tgriffith The Great Minivan Mystery There wasn’t a lot of outrage when Dodge decided that the Grand Caravan needed to go. There was a little bit of curiosity and maybe some shock from certain family-oriented car buyers, but no one threw much of a fuss about the news. The death of the Grand Caravan signals the end of an era and echoes a changing attitude about family transportation. Minivans are becoming a smaller niche market as car-based crossovers and SUVs secure their places in the driveways of America’s suburbs. Few people cried over the loss of the Grand Caravan because Chrysler would still sell its identical twin, the Chrysler Town & Country. For all intents and purposes, the Grand Caravan was dead. So why then, out of nowhere, did spy photographers capture images of what appears to be a new Grand Caravan, cloaked in heavy camo, testing in the American Southwest? There’s been no other indication that Dodge, or its corporate overlord FCA, have changed their minds about the Grand Caravan. Dodge is beginning its transition into a performance-oriented brand, while Chrysler intends to move slightly upmarket into a mass-market near-luxury brand. If a minivan were to exist, it makes sense to keep it as a Chrysler. But there’s another little surprise in the test mule: It doesn’t appear to have a tailpipe. Could Dodge be preparing to shock the minivan world with an all-new Grand Caravan equipped with either an electric or hybrid drivetrain? If so, no one is talking. Officials at FCA remain set in saying the company’s next minivan will wear the Chrysler wings on its grille. So what is the mysterious test mule that’s been spotted? Maybe it’s just an experiment, or maybe it’s an indication of something new to come in the next few years. Or maybe Dodge really will field a new Grand Caravan when the current one expires. One thing for sure, the Grand Caravan as we know it is gone. That leaves the Honda Odyssey and Toyota Sienna to compete with the Town & Country, and who knows how long those will last. Would an electric or hybrid minivan be interesting to you? Used Dodge Grand Caravan Used Chrysler Town & Country This entry was posted in Car Industry News, Car Minded, Car Shopping, Domestic Cars, Foreign Cars, General Chat, United States and tagged TOWN AND COUNTRY CARAVAN GRAND CARAVAN ELECTRIC PLUG-IN HYBRID FIAT CHRYSLER AUTOMOBILES. Bookmark the permalink. ← This New Cadillac Could Change the Luxury Game The Six Most Attractive, and Affordable, Cars on the Market →
cc/2019-30/en_middle_0028.json.gz/line1594707
__label__cc
0.628576
0.371424
Wannabe pseudo-scientist Anthony Watts makes a flawed assessment of coastal research A rather ordinary pseudo-scientist (prominent in climate science denying circles) claims that the observations taken by a team of scientists at Delaware Bay must be in error. Anthony Watts, whose sole qualification in science is that he owns a "climate hoax" conspiracy blog (wattsupwiththat.com), claims (wrongly of course) that a paper published in Nature's Scientific Reports is fundamentally flawed (archived here). Xiaolong Geng and Michel Boufadel, researchers at NJIT's Center for Natural Resources Development, examine salinity gradients on the Delaware Bay shore. Source: NJIT The authors of the new paper are Xiaolong Geng, Michel C. Boufadel & Nancy L. Jackson from the New Jersey Institute of Technology (engineering and chemistry departments). They were studying subsurface water and salinity in the section of a Delaware Bay sandy beach between the low and high tide marks, known as the inter-tidal zone. In this zone, water is trapped between the grains of sediment. This water, known as pore water, has its source from a combination of sea water washed in by the tide and groundwater. Because of the diluting effect of groundwater, it would be expected that the salinity levels of this pore water would be lower than sea water if the only mechanism operating were mixing of the water. That's not what the scientists found. What the researchers found was that the average salinity in the upper inter-tidal zone, the high tide line, was 60 grams a litre (g/L) with some values reaching as high as 100 g/L. By contrast, the nearshore seawater had salt concentrations of only 25 g/L. Figure 1 | Sites of wells measuring water flow and salinity at Slaughter Beach in Delaware Bay. Four piezometer wells (PW1−PW4) were installed along the intertidal zone of the beach to monitor groundwater table fluctuation due to tidal action. The mean sea level was assigned as the elevation datum (0.0 m). Major processes of subsurface pore water flow and salt fate are illustrated in the Figure, including the upper saline plume, the freshwater discharge tube, the classic saltwater wedge, and pore water evaporation from the beach surface. Note the exaggerated vertical scale. The map of the studied site is obtained from Jackson et al. (2015). Source: Geng16 Salinity in a dynamic habitat for crabs, mussels and sea anenomes The researchers figured that the only explanation for the high levels of salinity was evaporation, which would leave the remaining water saltier. From the press release at ScienceDaily.com: The intertidal, or littoral, zone, is a dynamic habitat, washed by seawater at high tide and uncovered at low tide, that is favored by crabs, mussels and sea anemones, the birds and sea mammals that feed on them, and plants such as kelp. Many of these animals burrow in the beach to find food and to seek protection from predators and the action of waves, and are in near constant contact with pore water. The researchers have developed models that show that increases in temperature associated with global warming will not only make inland locations more salty, but would also create drastically different pattern of pore water salinity that will have implications for animals and plants in the intertidal zone. "Evaporation is an important driver of underground water flow and salinity gradients, and animals such as mussels and crabs are affected by changes in salinity. If the concentrations are too high or too low, they will move away," noted Geng. From the paper, the authors wrote how salinity and water at the sites was variously affected by: evaporation, particularly around noon and particularly nearer the high tide mark inundation by tide, which diluted pore water and, at times and closer to the low tide mark, provided enough water so that it wasn't affected by evaporation waves, which brought in more water (similar to tidal action) beach capillarity. On that last point, the authors wrote: The pore-water salinity near the beach surface was also dependent on beach capillarity, namely on water retention. For example, if evaporation removes 10% of the pore volume (of the porosity), then a decrease in moisture from 80% to 70% would increase the salinity by 11%, but a decrease from 15% to 5% increases the salinity by 300%. For this beach, the sand cores were used to obtain capillary-retention properties, and along with calibration, the capillary fringe was found to be approximately between 0.2 m and 0.5 m. As the groundwater table rose, the capillary fringe provided water to the beach surface from below. This could result in two opposing outcomes: when meteorological conditions favor high evaporation, the capillary fringe would result in higher pore-water near the beach surface, which would subsequently evaporate and increase the salinity, as reported by Geng and Boufadel for inland environments. But under unfavorable meteorological conditions for evaporation, the rise of water by capillarity would dilute existing high pore-water salinity at the beach surface. Surprise: pseudo-scientist writes hogwash Pseudo-scientist Anthony Watts disputes both the observations and the findings. He said on his blog "I’m pretty sure I don’t believe [it] one bit". Unusually, Mr Watts gave his reasoning for not believing the results. His thinking went like this: Because we’ve also been told that global warming will cause more rainfall, thus increasing freshwater stream outflow and freshwater ground recharge. What I deduce is that he is arguing that there will be more groundwater, therefore when the sea-groundwater mix on the beach evaporates, there will be a greater proportion of groundwater in the mix, therefore when the water mix evaporates there won't be as much salt left behind - or something like that. It's not at all clear from the WUWT article that Mr Watts knows himself what he is arguing. Unfortunately he doesn't provide any research or data of his own that would help to clarify how his mind is working (or not working). Mr Watts does not provide any indication that he's measured: the salinity of groundwater or sea water in the area of Delaware Beach how the salinity of groundwater or sea water is expected to alter as warming continues the ratio of groundwater to sea water in the high tide zone of the beach how much the ratio of groundwater to sea water would change as the world warms how much evaporation would change as the world warms. How the pseudo-scientist's reasoning is flawed None of that stopped Anthony (Mr Watts does sound a bit too pompous, don't you think?) from claiming that "the study data gathering looks to be flawed from the start". He degenerated into pseudo-science quackery from that point on, maybe in the mistaken belief that it made him look clever and knowledgeable. Anthony wrote: the study data gathering looks to be flawed from the start as they say: “The team analyzed nearly 400 sediment samples collected during the sequential phases of a complete tidal cycle, from day to night, on seven discontinuous days.” Seven days? One beach? That’s not enough to say anything useful about trends, nor to extrapolate to local, regional, or global climate. They say “These elevated levels can only be caused by evaporation…”. Well sure, It’s called weather. Changes in weather cause changes in evaporation. If they were really thorough scientists, they would have setup an evapotranspiration measuring weather station nearby…so that they could factor in the changes in weather to their study. In fact, the word evapotranspiration doesn’t even appear in the paper. I don't know why Anthony thought the authors should have used the word "evapotranspiration", which (for for the benefit of the layperson) is described by the Bureau of Meteorology as "the term used to describe the part of the water cycle which removes liquid water from an area with vegetation and into the atmosphere by the processes of both transpiration and evaporation". From my reading, the white sandy beaches of Slaughter Beach in the region they were studying was not supporting any great volume of plants, and the scientists were just looking to measure evaporation from the water in the sand, not evapotranspiration. Nor do I understand why Anthony would think that the authors extrapolated to local, regional or global climate. They didn't. What they were investigating was the impact on the immediate community in the littoral zone on the beach. As stated in the press release: In the paper, the authors expressed it this way: We anticipate our quantitative investigation will shed light on the studies of salt-affected biological activities in the intertidal zone. It also impacts our understanding of the impact of global warming; in particular, the increase in temperature does not only shift the saltwater landward, but creates a different salinity distribution that would have implications on intertidal biological zonation. Anthony Watts explains what he would have done, but didn't. He quoted from the paper: "Our results (Figs 2 and S3–S8) suggest that the measured subsurface intertidal salinity, especially in the top beach layers, correlated strongly with the diurnal cycle. In the morning, humid atmospheric conditions resulted in negligible or no evaporation from the beach. During daylight, especially around noon, the relatively high air temperature and low humidity caused high evaporation, extracting pore water from the beach and leaving the salt behind, thereby resulting in high salinity near the beach surface." Anthony decided that instead of considering weather conditions which, as his quote illustrates, they did, the researchers should instead have considered weather conditions. He wrote: Well, yes, but if you were measuring temperature, humidity, and solar radiation, such as an evapotranspiration [station] would do, they could correlate increased evaporation to weather conditions that were measured at the time at the beach along with their monitoring wells. Umm - what is Anthony going on about? He should have read the part he quoted. He's complaining that the scientists didn't do what his quote showed that they did do. As the scientists reported, the salinity tracked expected evaporation over the daily cycle. (I can't help but wonder what words Anthony's confirmation bias translated to his brain.) The authors reported the weather conditions in the supplementary material. There was no rain during the study period, so that helped. They were able to correlate salinity measurements observed in the drill sites with the diurnal variation in weather, which was consistent with evaporation. Anthony continued but this time he just made up stuff out of thin air: Instead, what they’ve done is lazy; they took seven days worth of data, extrapolated it to a global effect, and simply blamed the universal boogeyman, “global warming” and not looked beyond their own noses, then had an eye-catching headline created with their press release. What a sad state of science this is. Well, no. Anthony got it quite wrong as usual. He's the one being lazy. If he hadn't been so busy trying to find something wrong with the research and pretend he was cleverer than real scientists, he might have read their paper properly. On the other hand, as Anthony's good friend Willis has indicated, even if Anthony had a year to read a science article he wouldn't understand it. Thing is, Anthony just made all that up. There was no extrapolation to a global effect. (For one thing, the earth isn't totally covered with beaches.) Nor did the authors blame their findings on global warming. On the contrary, the suggestion was that this has always been what's happening on beaches. The authors were mainly reporting what they found at the time when they took the measurements. They were interested in exploring the intricacies of the inter-tidal zone, which can be a rich habitat housing all sorts of creatures. As the authors wrote in the paper: The salinity structure in beaches subjected to tides and waves involves complex behavior due to seawater-groundwater circulation and mixing, which affect beach bio-geochemical processes, such as nutrients transformation and ecological functions. It is commonly assumed that the high salinity observed in the intertidal zone of a beach is that of seawater, which is due to neglecting the evaporation from the beach surface. Thing is, it's pseudo-scientists like Anthony Watts who are typically lazy, sloppy and prone to conspiracy ideation. It's a sad state indeed that idiots like Anthony Watts are adored by so many other idiots. Global warming and salty beaches If I were to speculate, I'd say that this article caught the attention of Anthony Watts because the press release had the words "global warming" in the title. Anthony's main purpose in life these days is to promote conspiracy theories postulating that climate science is a hoax. Waving the words "global" and "warming" together in front of him has the same effect as a red rag does with a bull (and Anthony Watts shares some similarities with an enraged bull). In the paper, the authors wrote about how, in the light of their research, global warming might affect beach environments (my paras). In inland environments, evaporation would increase the pore water concentration more or less uniformly across vast distances. However, this study showed that the salinity in the pore of an intertidal beach could vary over a large range within only a few hours and within a short distance, and it could reach an extremely high value (up to 200 g/l) that only halophilic bacteria can tolerate. Our numerical investigation revealed that an increase in temperature or a decrease in relative humidity (e.g., due to climate change) would not only increase the pore-water salinity in the beach, but would also alter its spatial distribution; abrupt salinity increases are expected to occur immediately near the water line. This change in salinity zonation has consequences on biogeochemical reactions in pore water and on the ecological function and structure of beaches. This study was conducted in the intertidal zone of the beach. In the supratidal zone of beach, evaporation could persist for longer time and salt-feeding would take place due to large wave run-up or unsaturated flow of ambient saline water. Therefore, evaporation might demonstrate more remarkable effects on supratidal pore-water salinity. Field campaign and numerical modeling need to be carried out in beach supratidal zone to further examine the complex interaction between surface evaporation and subsurface saline pore-water flow such as the formation of surficial salt crust and the balance of salt structure affected by multiple surface and subsurface factors. In addition, the slope of our studied beach is approximately 0.1, which is much steeper than many natural beaches. Beach slope might affect the extent of intertidal zone across the shoreline and subsequently alter exposure time of the beach segment to evaporation. Therefore, topography could be another factor affecting subsurface salt distribution in coastal beaches subjected to evaporation, tides and waves, which needs to be considered in future. All the WUWT conspiracy theorists come out to play. Few of them give any indication that they've bothered to read the article, let alone that they've understood it. They first tranche of "thoughts" are meaningless one-liners. There were also a heap of comments from evaporation deniers. John doesn't know what it is that he's saying is "bunk" but he knows it's the right thing to say at WUWT: More bunk. I've no idea what Bartleby thought he read. Not even Anthony Watts was claiming that salt evaporates when water does: Simple stupidity. Salt doesn’t evaporate. tadchem's comment came right after Bartleby's, so it could be that tadchem is saying that Bartleby's comment is stupid. Or it could be about nothing at all, and is just what he or she thinks is expected at WUWT. In any event, like John, tadchem shows no sign of having read, let alone understood the article: Sometime I suspect that there are graduate level courses in universities on “How to be stupid.” There were a heap of comments from people saying that the scientists were stupid. None of which gave any indication of why they were stupid, or what the WUWT-ers would have done differently, or what conclusions they would have drawn, or if the WUWT-ers would even have thought to investigate what happens in the micro-communities on beaches (or that they knew that life existed on beaches). JustAnOldGuy probably doesn't even know the topic of the article. He could have written the same comment under any article at WUWT: The sad part is they don’t even have to grade stupid on a curve and no remedial courses are required for their culturally disadvantaged students. Greenhouse effect denier, David Ball wonders, irrelevantly: Does anyone else recall the scientific method? Dinsdale probably doesn't believe in evaporation: You know climate science is junk when any [trimmed] can get published with any random theory. son of mulder doesn't believe in evaporation either: Where does the extra salt come from if sealevel is rising surely salinity will decrease otherwise? On a similar vein, if the amount of seawater increases how does that effect pH? Does it dilute acid or alkalai? Ryan S. is another one who doesn't believe in evaporation: But, sea level is going up, ergo, more water and less salinity right? I’d take this study with a grain of salt. Bobby Davis has a "thought" about the relation between acidification and salinity: I thought the oceans were becoming acidic though. Wouldn’t that counter the salinity? HAHA! Idiots!!!!!!! Terry doesn't name any 14 year old school science project that did better than this, nor why it would: Good God……..Even 14 year old school science projects are better than this. Or maybe it is actually a 12 year old school science project. H. D. Hoese missed more than "something", he or she missed the entire thing: Interesting paper, but difficult to connect the various factors. This is an estuarine beach, unless I missed something they did not consider fluctuations from freshwater input. Delaware Bay has a long history of water use from the river. The salinity of the bay should be the background level, varying by season, year, etc. Long way from the worst I have read, but being from the Gulf wonder why the Gulf of Mexico Research Initiative funded this. We have saltier beaches. rishrac wishes he or she was a climate scientist. Universities got a break there, thankfully :) Who thinks up these stories? Must have been a slow semester…or its become mandatory for schools that take federal aid, they have to publish a story about how bad AGW is. So they sit around thinking up the most ridiculous story… so does the ocean become less salty? Oh, oh,… they can go to the Jersey shore were they dredge up sand off shore to rebuild the beaches.. wait ! … oh no sea level rise. Will the horrors never End? Shouldn’t the beaches be under water ? I wish I was a climate scientist so I could understand all this… (sarc ) Xiaolong Geng, Michel C. Boufadel, Nancy L. Jackson. "Evidence of salt accumulation in beach intertidal zone due to evaporation." Scientific Reports, 2016; 6: 31486 DOI: 10.1038/srep31486 (open access) Global warming's next surprise: Saltier beaches - press release at ScienceDaily.com Labels: Anthony Watts, beach, ecology, Michel C. Boufadel, Nancy L. Jackson, salinity, Xiaolong Geng Millicent August 12, 2016 at 5:44 PM WUWT is like Chinese Whispers played in an asylum. Nurse Ratched (Anthony) starts the game, misinterpreting the paper. And then its the inmates' turn to take it anywhere they choose. metzomagic August 13, 2016 at 7:12 AM Sometimes(!) I wonder about how Muphry's Law seems to be the norm rather than the exception at WUWT. jrkrideau August 14, 2016 at 12:57 AM Anthony has rigorous recuiting standards? Magma August 14, 2016 at 7:06 AM Of course. There's a long set of skill-testing questions. If applicants answer too many of them correctly they fail. Wayne Dickson August 14, 2016 at 11:08 PM When I read Antony's 'evapotranspiration' faux pas I thought it summed the man up perfectly. I mean, he could have easily googled it to be sure. He's a clown, pure and simple. The less said about his acolytes the better. Reginald Perrin August 15, 2016 at 11:51 AM @sou Watt a boring weekend... so long and thanks for all the fish Denier weirdness @wattsupwiththat - The US housing... Eric Worrall wants the New York Times to "balance"... Anthony Watts, cosmic rays, Hockey Schtick and Dan... Calling for volunteers for a small project Time to look at the Arctic sea ice 2016 Denier Don Easterbrook and his 30 year periods NOAA's Climate Explorer fools climate quack Bob Ti... SciAm article gets climate science deniers to shou... Hottest July on record - global surface temperatur... Wannabe pseudo-scientist Anthony Watts makes a fla... Sea level to accelerate more quickly prompts sea l... Open thread with new climate reports Rio Olympic ceremony has a strong warning about cl... Troposphere temperatures for July 2016 A weak "climate hoax" conspiracy theory from Tim B... A red sky in the morning...is a denier's warning Anthony Watts: Loopy and out of the loop. It's bee... Anatomy of Tim Ball's conspiratorial pseudo-scienc...
cc/2019-30/en_middle_0028.json.gz/line1594713
__label__wiki
0.689996
0.689996
10 Excellent Examples of Video Marketing on Facebook Written by Ryan Philemon @RyanPhilemon Over recent years, the criteria for engagement on social media has evolved from announcing your brand or product to finding a way to tell a story. Quality branded video campaigns allow companies to project said story in some really creative and unique ways. Whether you're spreading brand awareness, announcing a new product, or launching a company, great branded video makes customers feel an emotional connection. And that emotional reaction can be really powerful. In fact, a recent survey by eZanga found that 30% of respondents were less likely to skip video content if it was humorous. And research by Dr. Karen Nelson-Field found that 65% of videos that elicited a feeling of exhilaration were most remembered. When it comes to finding the right platform to promote your video, Facebook is a strong contender. In fact, just this past January it announced that platform now sees 100 million hours of daily video watch time. So to help inspire your video marketing efforts on Facebook, I put together a list of 10 clever examples from brands like Apple, LG, BMW, and more. Check them out below. 1) #TAYLORvsTREADMILL | Apple When it comes to storytelling and connecting with an audience, Apple is among the marketing elite. Recently, they teamed up with the biggest voice in the anti-streaming movement to promote their new subscription music service, Apple Music. What’s great about this video is that Apple and Taylor Swift managed to create something that is relatable -- regardless of her celebrity status. Everyone knows someone who has fallen while running on the treadmill, and there’s something even more hilarious about knowing that this happened to Swift, too. #TAYLORvsTREADMILL featuring: #Powerbeats2Wireless: beats.is/taylor Apple Music: beats.is/applemusic Posted by Beats by Dre on Friday, April 1, 2016 2) #DayItForward | Chevrolet Chevrolet has always been quick to adopt new marketing advances and incorporate them into their strategy. For the #DayItForward campaign, Chevrolet launched multiple videos on Leap Day to promote goodwill and of course, a positive brand image. Rather than leveraging humor like the Apple video, it provokes empathy with viewers. Who doesn’t get the warm fuzzies when watching videos of people giving back? Now, those sentimental feelings translate with consumers when thinking about Chevrolet. “The Chevy #DayItForward campaign resonated strongly with its audience because it was at once entertaining and informative while being tastefully branded,” said the CEO of Philo Media, Kevin Allodi. “Celebrity talent helps draw people in, but to keep them engaged you have to deliver authentic storytelling." 3) Story for a Cause | Unicef Over the past few years, you've likely seen a ton of media coverage surrounding the Syrian refugee crisis. The political debate that ensued prompted Unicef to create a video that transforms the headlines into a story that tugs at the heartstrings of its viewers. The video turns the political issue into a humanizing and heartbreaking story, that’s meant to shine a positive light on a global issue. This is a powerful example of using a current controversial event to spread brand awareness and a positive message. Note: While this video has been well received by many, it's important that brands are incredibly careful and thoughtful when creating content around a controversial issue. 4) #LikeAGirl | Always Always is perfectly in tune with their audience when it comes to their advertising campaigns. The newest video in the series reaches out to a younger demographic by raising a concerning question about the gender bias in emojis. While Always does incorporate a controversial topic into the story, the newest #LikeAGirl video was a success because of their use of supporting stats. Using the stats and accompanying them with concerns from the girls featured in the video packs a powerful message that leaves little room for criticism. 5) #LowBatteryAnxiety | LG The mobile device market is extremely competitive. LG’s newest video campaign strives to stand out in a market dominated by Samsung and Apple. They achieve their goal by telling a story that is hilariously relatable. Low battery anxiety is real, people. There’s something about a phone’s battery diving into the single digits that send people into panic mode. LG used the relatable crisis and exaggerated it to create a video that features a dramatic support group that helps people cope with anxiety driven by a low battery. People love to make fun of themselves and LG tapped into the perfect scenario for this campaign. 6) Groups | Facebook Since the conception of Facebook, the social networking service has evolved from a collegiate platform to one for the whole family. The company has become infused in our society, making FOMO, or the fear of missing out, a real thing. Meeting friends, and sharing your life with those friends, is the business of Facebook. The platform’s ‘Groups’ video perfectly portrays how it helps people connect with others who share similar interests. It creatively identifies how users can benefit from using Facebook by providing a clearly defined problem and a beginning, middle, and end. 7) Save a Bro You Know | Organic Valley In Organic Valley’s new video campaign, they embraced their "inner bro" in an effort to promote their new line of protein drinks. What’s great about this video is that it hilariously (yet, not maliciously) pokes fun at the target audience, while also identifying the downfalls of their competitors' products. Not to mention, they cleverly found a way to increase their share count and views by having users send the video to other "bros" they know on Facebook and other social channels. By urging viewers to rally support for this faux cause, Organic Valley was able to expand the reach of the video and get more out of their investment. 8) #LoveAtFirstTaste | Knorr Food is said to be the one thing that is always certain to bring families together. In their latest video campaign, Knorr -- a spices and seasonings company -- suggests that food and all its flavor has the ability to not only bring families together, but also help people find love. With this genius video, Knorr found a way to connect with a huge audience -- garnering over 31 million views in a single week. Everyone loves food and most everyone has experienced love or the desire to be loved. By connecting their product with a human emotion, the video resonates even further with its audience -- all while promoting a positive brand image. Knorr even created an accompanying quiz for viewers, to help them find their own unique flavor profile to assist in their quest for love ... or just great recipes. 9) Tea vs. Photo | ROC Live Life Loud Roc Live Life Loud, a speaker and headphone brand by Cristiano Ronaldo and Monster, uses Real Madrid’s star forward to their full advantage in Tea vs. Photo. While the campaign is obviously centered around Cristiano Ronaldo and has little to do with the brand itself, there’s something to be said about the tasteful product placement in the video. It shows a prime example of how the most successful video ads focus more on the story, than the product itself. 10) #EyesOnGiGi | BMW Using new innovative technology is a great way to stand out from the competition and captivate an audience. BMW took advantage of Facebook’s latest 360 video technology for their most recent campaign featuring model Gigi Hadid. Sometimes companies struggle when advertising with new technology. However, BMW does a perfect job of utilizing the 360 video by making the content interactive. (Not to mention, having Gigi Hadid as part of the campaign never hurts.) But what really makes this campaign a success is its interactive game that drives viewers to the website to play and share with friends and family. What's your favorite Facebook video ad? Share your thoughts in the comments. Originally published May 30, 2016 8:00:00 AM, updated September 13 2018 10 How-To Videos That Really Work (And Why) How to Make a Video: a Step-by-Step Guide The Ultimate Guide to Video Marketing
cc/2019-30/en_middle_0028.json.gz/line1594714
__label__cc
0.52034
0.47966
(CLICK ON COVERS TO GO TO AMAZON PAGES) Rupert has lived his entire life under the cruel reign of the black squirrels. When he finds out that the artifact that causes the immortality of his enemies is missing, he is sent on a quest to find it and claim it for his own. Rupert is determined to overthrow the evil Emperor Venul and rule justly in his stead, but he is warned by the wise white squirrel Zirreo to be cautious, for countless things can go wrong when holding an object of magic. Years later, the Dark Wanderer, a shadowy figure claiming to be the servant of the squirrel goddess Astrippa, is loose in Arborand. When friends Mae and Flor accidentally cross paths with him, they get more than they bargained for when they discover that the darkest, wildest legends are often true. Meanwhile, Theo, an orphaned half-breed squirrel, finds a compass that doesn’t point north and is compelled by a series of disturbing messages to set out with his faithful chipmunk servant Parris to follow where it leads. What if inequality threatened to take over the land? What if the gods who ruled your childhood fears came to life? Would you bow down, or would you fight? What if fate gifted you with only one journey on which to find out? Before the war-torn world of A Dewdrop Away, there existed a different world, a world where magic was more than myth… As far as Tiallin Stormskiln knows, his colony is the only one of its kind left in Arborand. None of the other squirrel races seem to want anything to do with the magic-wielding, aloof white squirrels. To honor his eleventh season, Tiallin is awarded the fortune of working for blind King Sirius, who has grown paranoid due to the mysterious fate of the last white king. When Tiallin’s job becomes to investigate the king’s suspicions, he finds he knows even less about his own colony than he thought. Can Tiallin trust anyone when everyone, including his own family, seems to harbor their own secrets? Meanwhile, Edelle, a dutiful fox squirrel from a close knit community, embarks on a journey to save her colony from a crippling and puzzling famine, and Lute, a mixed breed misfit and former thief, is on the run from his second home and a crime he insists he didn’t commit. What happens when the destinies of three very different squirrels collide and intertwine and they are simultaneously forced to face the truth about themselves and the danger that has been patiently stalking them all from the beginning? The forest of Pinewood is a silent, safe place to be. At least it is until the ground itself rises up and begins to take victims. All former thief Lute wants is to be left alone. His last adventure haunting him, he has taken up residence in a dilapidated log, focusing on carving to drown out the noise of the ghosts in his memory. But when a mysterious customer comes calling about a mirror and Lute’s path crosses that of the young, neglected and highly eccentric fox squirrel Kinder, he finds himself grudgingly sucked into the mystery of the new horror terrorizing Arborand. But neither Kinder nor Lute can prepare themselves for the truth behind the tragedy. Far away in Maplewood, Mariyen, a young seer-in-training, is experiencing terrible nightmares featuring her estranged mother who seems to be harboring a dark secret. All around her is talk of a seasons-old prophecy, a dangerous exile and a squirrel with fur as white as snow, but Mariyen is warned to stay out of it. All she can be certain of is what she feels when she looks out the window to the seemingly innocuous ground. Death comes from below. And it may be coming for all of them if they do not find the means to stop it. One of their number ventured underground. One of their number promised never to tell. One of their number broke that promise. For years, the chipmunk Rin has heard hideous stories of the dangerous Overworld above. Now, a flame has been struck and the chipmunks of the Underworld are preparing for a tentative war—if their undying queen will grant it. What none of them know is that Rin has plans of her own, regardless of what any ruler might decree. As the underground forces deliberate, aboveground a small war has ended and a larger one is about to begin. The flying squirrel Mariyen and the fox squirrel Kinder start a journey of their own—a journey after the last living white squirrel, Zirreo, a journey that will hopefully give them all the answers they seek about the chaos around them—and save Mariyen’s mother’s soul from the claws of a new evil… if she can be saved at all.
cc/2019-30/en_middle_0028.json.gz/line1594721
__label__wiki
0.860776
0.860776
Anderson Silva Talks Jon Jones Fight, Chael Sonnen, & GSP The UFC presented fans with a once in a lifetime opportunity at UFC 129 to speak with all of the UFC champions at the Super 7. UFC middleweight champ Anderson Silva dominated the Q & A and had some interesting things to say about fighting Jon Jones, GSP, Chael Sonnen, and more. Watching Anderson Silva in this kind of situation is fascinating. I can’t recall ever seeing an interview with the UFC champion where he wasn’t funny, charming, and insightful. The irony here is that while he appears to be a very fan friendly fighter, he is continually one of the most polarizing fighters in all of MMA. One minute fans hate him, the next they love him…kind of like his relationship with Dana White. The fan love for Silva at UFC 129 was never more evident than it was at this Super 7 presentation of champions. Sitting there with Cain Velasquez, Frankie Edgar, and Jon Jones, Silva appeared to be the most popular fighter on the panel. Maybe it was just me, but there was something different about Silva’s presence on the panel. To me, he came off as larger than life and that says a lot sitting on a panel with the best fighters in MMA. Joe Rogan moderated the panel and asked questions to the champions. Anderson Silva’s four minutes of interrogation were the most interesting of the segment. Here are a few highlights of the Q & A which you can watch below on the UFC 129 Super 7 video. Anderson was asked who the best fighters are in the UFC or MMA. Silva said BJ Penn and Georges St. Pierre. It was kind of odd to watch Silva say that as UFC lightweight champion Frankie Edgar was sitting right next to him. Silva’s answer in regards to Penn was heavily booed which brought a smirk to Edgar’s face. Hey, you can’t fault the guy for offering his opinion. Once again Silva also speaks highly of GSP. Check out the full Camel Clutch Blog Pro Wrestling and MMA store for videos, t-shirts, books, and more. Silva was asked about his remarkable comeback in his UFC 117 fight against Chael Sonnen. Silva said that he could have quit because he had a broken rib but kept fighting for his family. He referred to the Nogueria brothers as his family. It sounded like Silva really took Sonnen’s comments about the Nogueria brothers personally which says a lot about Anderson’s character if you ask me (and maybe you didn’t). Silva was also asked about a potential Super Fight with Jon Jones at 205. This was interesting as Jon Jones was sitting right next to Silva when he was asked the question. Jones laughed when he heard the question. Silva didn’t say no. Silva said that he would fight anyone that Dana White wanted him to fight. That was a nice answer but Silva has turned down several fights including a rematch with Dan Henderson and said he would never fight Lyoto Machida when asked the same question. It was a nice answer but I don’t know if I truly believe that one. Silva also has some interesting things in regards to his retirement, Yushin Okami, fighting Cung Le, and the Vitor Belfort fight. Regarding Belfort, Rogan asked Silva about a comment Vitor Belfort made after their fight when he called Silva’s winning kick a “lucky kick.” Silva takes it in stride and offers a fun response. As much as I like Silva and really enjoyed this Q & A I do find it funny that Silva always appears to speak perfect English during these kinds of interviews and yet will fall back on speaking in his native tongue at other less convenient times. Yet at the end of the day I could care less what he speaks as long as he continues fighting in the UFC. Brock Lesnar’s autobiography – Death Clutch: My Story of Determination, Domination, and Survival UFC: Ultimate Royce Gracie DVD UFC 117 Anderson Silva Walkout T-Shirt – Red UFC shirts and videos on Amazon.com Shop Now at the Official UFC Store Related Items:anderson silva, Antonio Rodrigo Nogueira, B.J. Penn, Cung Le, Frankie Edgar, Georges St. Pierre, Jon Jones, Vitor Belfort 10 Interesting WWE Stories Told on the Something to Wrestle With Bruce Prichard Podcast Georges St-Pierre Talks Blow Up with UFC Officials, Responds to Dana White Jon Jones: The Once and Maybe Future King
cc/2019-30/en_middle_0028.json.gz/line1594724
__label__cc
0.661267
0.338733
This Week in Spanish Civil War History – Week 55/56: 1 – 14 August 1937 Published on August 1, 2017 August 1, 2017 by Caroline Angus Baker Embattled Falange leader Manuel Hedilla, arrested for defying Franco on April 25, has his death sentence commuted to life imprisonment in the Canary Islands. Since the death of Rivera eight months earlier, Hedilla has been in a battle with Agustín Aznar and Sancho Dávila for the role of leader of the Falange, the fascist ultra-right wing conservatives loyal to Franco’s cause. Hedilla has been more moderate throughout the war and does not believe in the Nationalists’ widespread use of horrific violence to take control of Spain. Franco had the Falange party merge with the Carlist groups in April, belittling Hedilla’s leadership, and he was arrested for speaking out. Franco’s brother-in-law suggested Hedilla be spared execution to keep Falange factions happy. Hedilla will only serve four years of his life sentence before being quietly let go, but will go on to write critically about Franco in the late 60’s and early 70’s. The tiny town of Torrelavega, 27 kilometres from Santander in the north, sees heavy fighting resulting in the death of 12 Republican troops. Franco is preparing another huge siege in the north and tensions are mounting. Private Catholic worship is again permitted by the Republican government. The Catholic Church, heavily involved in the war and supporting Franco, has suffered since the Second Spanish Republic began in 1931. Between 50-80% of priests in many areas have been murdered, along with nuns, monks and church laity, any suffering horrific deaths. Churches and cathedrals have been destroyed and relics have been burned. The Church has been especially cruel to the population for centuries and resistance has led them to take up against the government and support Franco and his fascists. flag of the Council of Aragon The Consejo de Aragón (Council of Aragon) is dissolved by Prime Minister Negrín. Led by Joaquín Ascaso since December from a capital in Caspe (100 kms east of Zaragoza, 200km west from Barcelona), the council ran the huge Aragon province and its attempts at social revolution and anarchist values. Now that Catalonia and its capital Barcelona are back in Republican hands instead of independent leaders, the government now wants all pro-Republican areas under their control. About 700 anarchists are arrested and the council agrees to disband the following day. Those arrested will only be imprisoned a few weeks as mostly communists troops take over the region on the government’s behalf. The Nationalist are ready to begin their massive new siege to take the north of Spain. The Army of the North of both sides have been assembled throughout the top half of Spain. General Fidel Dávila has 90,000 troops, 25,000 of them through three Italian divisions. They also have a massive cache of weapons, plus the German Condor Legion aircraft, plus Spanish and Italian planes. Their troops are fresh and the Nationalists are ready after the end of the battle of Brunete at the end of July. The Republicans have 80,000 in the region under General Mariano Gámir Ulíbarri. However, their planes are useless, and morale is low. The Basque soldiers included in the numbers are tired and devastated from a loss of their autonomous region and their capital Bilbao, and are already considering surrendering to Italian troops in order to survive. The Nationalist 1st Navarrese Brigade attacks the frontlines between Valdecebollas in the Palencia region and Cuesta Labra in order to block Republican troops south of the Cantabrian mountains. This is in preparation to start capturing Republican territories in the mountain region over the coming week and capture the entire Cantabrian region and Santander city on the coast. This is not a detailed analysis, just a highlight (lowlight?) of the week’s events. Things get lost in translation – Feel free to suggest an addition/clarification/correction below. The more the world remembers, the better. All photos and captions are auto-linked to source for credit, and to provide further information. Gallery•Categories AUGUST 1937, This Week in Spanish Civil War History•Tags Aragon, Army in the North, Barcelona, Basque, Basque nationalists, battle of Bilbao, battle of santander, Bilbao, Brunete, Cantabria, cantabrian, Catalonia, Consejo de Aragon, council of aragon, Cuesta Labra, Fidel Davila, Manuel Hedilla, Mariano Gámir Ulíbarri, Nationalist, Navarrese, Palencia, Republican, Santander, Spanish Civil War, Torrelavega, Valdecebollas Previous A Cromwell Adventure – Part 2: Thomas Cromwell Next A Cromwell Adventure- Part 3: King Henry VIII
cc/2019-30/en_middle_0028.json.gz/line1594731
__label__cc
0.617045
0.382955
Car Buying Tips, News, and Features > 2011 Best Cars for the Money Winners 1 of 18 › The Buick Regal is the 2011 Best Upscale Sedan for the Money, thanks to its combination of performance, luxury and value. Read about the 2011 Best Car for the Money awards to learn how we selected the winners. ‹ 2 of 18 › The Suzuki Equator won Best Compact Pickup for the Money because it offers good capability and low ownership costs. Plus, it has the longest warranty in the class. Suzuki makes no secret of the fact that the Equator is a rebadged Nissan Frontier. The two trucks are built side by side in the same plant, but because of different ownership costs, the Equator edges the Frontier out in value. Reviewers like the 2011 Ford Fiesta's available high-tech features and fun-to-drive nature. That, plus low ownership costs over five years, make the Fiesta the 2011 Best Subcompact Car for the Money. Read about the 2011 Best Car for the Money Awards to find out how we selected the winners. The Chevrolet Tahoe is the 2011 Best Full Size SUV for the Money. This is the third year the Tahoe has won. The Infiniti EX is the 2011 Best Luxury Compact Crossover for the Money. The Lexus RX is the Best Luxury Midsize Crossover for the Money. Reviewers love its luxurious cabin, but owners love that it costs less to own over five years than other luxury crossovers. Learn more about our 2011 Best Car for the Money awards. Families should like the practicality and value of the Kia Sedona, the 2011 Best Minivan for the Money. The Chevrolet Traverse provides comfort and value -- two things that matter to families. The Traverse is the 2011 Best Midsize Crossover for the Money. Wagons are making a comeback, and with models like the 2011 Hyundai Elantra Touring, it's not hard to see why. The Elantra Touring is the 2011 Best Wagon for the Money. ‹ 10 of 18 › The Ford Taurus is a stylish car. It's also the 2011 Best Family Sedan for the Money. Learn more about the 2011 Best Car for the Money awards. The Chevrolet Malibu is the 2011 Best Midsize Sedan for the Money -- beating out the Honda Accord, Toyota Camry, Ford Fusion, and Hyundai Sonata. The Honda Fit packs a lot of practicality into a small package, which is what hatchback buyers look for. It's the 2011 Best Hatchback for the Money. The Mazda MX-5 proves that owning a sports car doesn't have to break the bank. It's the 2011 Best Sports Car for the Money. The Toyota Prius is an icon of the movement toward more eco-friendly cars. It's the 2011 Best Hybrid Car for the Money. The Chevrolet Silverado 1500 is the 2011 Best Full Size Pickup for the Money. It beat out the Ford F-150 and Dodge Ram for the honor. Read about the 2011 Best Car for the Money awards to find out what it takes to win. The Honda Civic is a favorite with the autmotive press and compact car buyers. It's the 2011 Best Compact Car for the Money. An all-new model, the Mitsubishi Outlander Sport is the 2011 Best Compact Crossover for the Money. Small car buyers who are looking for fun don't need to look any further than the Volkswagen GTI. It's the 2011 Best Upscale Small Car for the Money. Read more about the 2011 Best Car for the Money awards. See all Car Buying Tips, News, & Features » 26 Hatchbacks With The Most Cargo Space 2019 Subaru Forester vs. 2019 Subaru Crosstrek: Head to Head Hatchbacks With the Most Cargo Space 2019 Chevrolet Silverado 1500 vs. 2019 GMC Sierra 1500 2019 Best Cars for the Money 2019 Best Cars for Families To get local pricing, enter your zip code: Cancel Cars Cars Cert. Pre-Owned Cert. Pre-Owned
cc/2019-30/en_middle_0028.json.gz/line1594732
__label__cc
0.548571
0.451429
College of Arts and Sciences Story Hub Undergraduates’ data analysis, proposals could help reduce impaired driving When Savanna Obernberger, a junior studying criminal justice, learned that drunk and drug-impaired drivers in the state kill nearly 200 people a year, she wanted to help solve the problem but didn’t know where to start. A few months later, Obernberger and four classmates presented to the state Traffic Safety Commission a set of four innovative ways to tackle the problem of impaired driving. Their proposed solutions ranged from insurance cost incentives for safe driving to a smart phone app that helps drinkers avoid driving under the influence. The students based their novel approaches on the in-depth research and data analyses they conducted during a semester-long Crime Prevention Strategies course in criminal justice and criminology at WSU Pullman. Working with their professor, David Makin, and Traffic Safety Commission staff, the team of undergraduate researchers concentrated on ways to combat recidivism, or repeat-offending, by drunk drivers. They analyzed the effectiveness of current policies in Washington and elsewhere and recommended actions and reforms to benefit key stakeholders: police departments, insurance companies, bar owners and bartenders, and the drivers themselves. Their proposals focused on intensifying cognitive behavioral therapy and on helping both drinkers and servers of alcohol to make more informed decisions. Savanna Obernberger Co-led by Obernberger, the students created charts, wrote technical reports, and conducted a variety of statistical and meta-analyses of data they gathered from throughout Washington and even Australia and the UK. They gained valuable skills and hands-on experience working with public safety professionals on research for real-world applications. Theirs was one of eight student-led research projects conducted during the class and aimed at providing area public safety agencies with practical solutions to real crime issues. A junior from Poulsbo, Washington, Obernberger described her team’s project, their recommendations, and what they learned: “We started by finding who reoffends the most and who was our target demographic. We found it was mainly middle-aged white men, and we saw that it happens more commonly in cities than in small towns. In bigger cities that have bigger bars and bigger event celebrations, such as the Fourth of July and St. Patrick’s Day, we saw an increase in drunk driving activity. “We took that information and figured out we wanted to target an older demographic in populated cities, and then brainstormed which stakeholders would benefit from which policy reform. “We decided one of our policy reforms would be to push intensive cognitive therapy for offenders, and to lower the requirements for the therapy so people don’t need to become repeat offenders or blow a high blood alcohol level before receiving treatment. “We brainstormed some other ideas, too—such as looking at which insurance companies already give safe-driving incentives. We found that drivers do really care about these bonuses. So another reform we thought of was having insurance companies target our repeat-offender demographic with these incentives to try and help them stay safe while driving. “For our next policy reform—this is where Dr. Makin really worked with us—we wanted to create an app that would allow you to take a breathalyzer while at a bar, and if your blood alcohol content (BAC) was over .08, then the app would list different transportation options, such as Uber, Lyft, taxis, etcetera. If you used one of these transportation options, the app would provide proof that could be shown to your insurance company for their incentive program.” The proposed app also would be helpful if a person registered a BAC under .08, Obernberger said. In such cases, it would provide a test to determine the person’s reaction time and cognitive level. If the person passed the test, they would be assumed safe to drive. But if someone with BAC above .08 decided to take the unnecessary risk of driving, the app would give that person a reminder every day for two weeks that they drove under the influence. Helping people on both sides of the bar Another approach the students recommended in their final presentation to the Traffic Safety Commission was to provide visual aids to help bartenders recognize when a customer or group had too much to drink. “This was almost a last-minute policy idea and ended up really catching some people’s eyes, which I found very interesting,” Obernberger said. “We tried to devise policies that touched all the different stakeholders. The whole project was very long, and I’d never really worked on a project that big before or for such a big client, so it was really cool to piece it all together.” Obernberger’s first policy research project was “eye opening but not super-surprising or shocking,” she said. “I was talking to Dr. Makin earlier about how there’s not so much surprise in the projects as much as there’s fun in being able to solve these complicated problems and being able to help people.” This spring, she is taking a related crime-prevention strategy course centered on an independent research project, also supervised by Makin. She plans to continue her education after graduation and to “keep researching policy reform,” she said. “I really do have a passion for our criminal justice system in general and I want to make it better.” Supporting entrepreneurial students The Entrepreneurial Faculty Ambassadors program, spearheaded by the Office of Research at WSU, fosters exploration of student ideas, such as the proposed alcohol safety app. EFA seeks to build upon the creative and scholarly work of faculty and students to produce positive, community-based social and economic impact. Top image: Still image from ASWSU Safe Driving video. By J. Adriana Aumen, College of Arts and Sciences; also posted on WSU Insider. policy reform « Math prof to receive Chancellor’s Medallion for research Scientists seek causes, better predictions for South Asia’s changing monsoon »
cc/2019-30/en_middle_0028.json.gz/line1594733
__label__cc
0.668642
0.331358
Mandel Wellness Pathway The Mandel Foundation Self Assessment Tools Food, Nutrition, Medical Education Organizations Steven Ricanati Steven Ricanati, MD steven.ricanati@case.edu Associate Dean Dean, Wearn Society Steven Ricanati, MD, FACP is the assistant dean for student affairs, dean of the Joseph Wearn Society and associate professor of medicine at Case Western Reserve University School of Medicine. He is an attending physician in general internal medicine at MetroHealth Medical Center. Dr. Ricanati, graduated from CWRU School of Medicine in 1995. He completed residency in internal medicine at University of Chicago Hospitals. After residency, he served three years in the National Health Service, based out of Cook County Hospital in Chicago, IL. In 2001, he returned to Cleveland to work at MetroHealth Medical Center and CWRU. At the School of Medicine, Dr. Ricanati has held numerous roles including director of the Core Physician Development Program, founding director of the Inquiry Groups (IQ) Program, and founding dean of the Joseph Wearn Society. Dr. Ricanati practices primary care internal medicine with particular interests in prevention and nutrition. He is married to another primary care internist, Ellen Gelles, MD (CWRU School of Medicine '94) and has three children. External Appointments Physician, General Internal Medicine MetroHealth Medical Center View External Profile Biomedical Research Building, 9th Floor & WG-48 Email: Department of Nutrition
cc/2019-30/en_middle_0028.json.gz/line1594734
__label__wiki
0.560881
0.560881
This Long Distance Couple Had Dozens of Mutual Friends but Finally Met on Bumble Lauren and Matthew matched in the beginning of May 2015 when they were both in grad school. Although they grew up in close proximity and even shared friends, they both say that they would have never met if it weren't for Bumble. We couldn't be happier for the lovely couple! See below for their story. How long did it take to meet up after matching? What did you do for your first meet up/date? We went out for our first date three days after our initial match. We grabbed a local coffee at Leva and then walked around the local University (that we both went to, but never knew one another) and chatted. We had both newly downloaded Bumble and deleted it very soon after our first date. Honestly, if it hadn't of been for Bumble and perfect timing we likely never would have met despite growing up blocks away from one another and having dozens of mutual friends. Lauren, what was the first message you sent on Bumble? Matthew put in his bio that he was a big coffee guy, so I asked him where his favourite place in the city was to get a latte. Matthew, what was your first reply back? "Gracious Goods, we should go sometime." Lauren, how did this match feel different? I love to laugh and we were cracking jokes back and forth right from the beginning. Also, Matthew was so sweet (he hugged me after our first date) and was up for anything, cooking, golfing, driving 1.5 hours for the best burger — you name it. Matthew, how did this match feel different? It felt different because it felt like I never wanted the date to end. We just wanted to keep doing fun things together. Lauren, what was your first impression of Matthew? How did you feel before the first date? I thought that Matthew was handsome, hilarious, and very charming. He told me that he'd had the same group of friends since he was a kid (good sign), loved hanging with his fam, playing guitar, experimenting in the kitchen — I was hooked from day one. Before the first date, I felt nervous, but excited — Matthew had definitely piqued my interest. Matthew, what was your first impression of Lauren? How did you feel before the first date? My first impression was that Lauren she was so easy to talk to, I felt like we could chat about anything and she had a very sophisticated backpack. Lauren, what do you consider a unique aspect of your relationship now? Ha! I feel like our entire relationship is a bit of an anomaly. We both wanted to pursue our careers, me at Lululemon in Community and teaching yoga in Edmonton and Matthew in Optometry school in the US and make "us" work. Through Matthew living in Edmonton, Portland, Chicago, and Montana we've made it a priority to see one another at least once every 6 weeks and we FaceTime every night. Our relationship might look different than most, but it has made us killer communicators and best friends. Matthew, what do you consider a unique aspect of your relationship now? That we only initially dated for three months before embarking on what's now been over two years of long distance. At three months in we knew that we wanted to be together (and dare I say loved one another) and we weren't going to let distance keep us apart (metaphorically, of course). I can honestly say that Lauren's support and visits over the last couple years has made my time away exponentially better, and I wouldn't trade our adventures for anything. Where are you now? Where are you headed in the future? Matthew is in Montana until mid-February, then in Walla Walla until the end of April, and then he will finally graduate in May in Portland. This summer we're planning on heading to India together for a month (10 days of yoga, 10 days of tourist stops, 10 days on a beach) and then coming back to Edmonton and buying a condo. Matthew will settle into or maybe even buy into an Optometry practice and I'll keep throwing the most rad, sweatiest events in YEG. What are your favorite things to do together? Having spent a ton of time road trippin' together, we've developed a love of podcasts, our favorites are Planet Money, The Daily, Revisionist History, How I Built This (we loved Bumble's episode) & S-town. We love to find adventure whether that looks like walking around small towns, finding the most interesting food in big cities or hitting up the latest and greatest coffee shops. We love to cook together, and often take on elaborate meals a bit beyond our scope, but more often than not they turn out to be delicious. Cooking together sounds like true #couplegoals, doesnt it? Nothing makes us more excited than hearing Bumble success stories. To submit your own success story, email stories@team.bumble.com!
cc/2019-30/en_middle_0028.json.gz/line1594737
__label__wiki
0.663158
0.663158
Symposium emphasizes preparedness Nurses articulate responsibilities, planning ahead Registered nurse Mia Johnson (left) and Samuel Merritt College representative Sheri Holbrook speak to students about the challenges of entering a nursing program during the Nursing Symposium event in HS-101 on April 8. Cody Casares / The Advocate By Marlene Rivas, Opinion Editor A nursing symposium was held on April 8 in HS-101, providing new and continuing nursing students with advice from nurses and doctors on educational planning and expectations for what is to come after graduation. “We wanted to get them at the beginning of their journey and give them advice beforehand instead of hearing about students’ regrets at the end,” counselor Kim Blackwell said. “We wanted to support and encourage students and provide them with more information. We care about our students and want them to succeed.” This event had not been put together for nursing students before, she said. Students in attendance appeared eager to take in as much information as possible as they took notes during the discussions and participated by asking the panelists questions. “A lot of us don’t know what direction to go. This was very helpful and could benefit a lot of us,” nursing student Kamya Cook said. The students present included a group from Los Medanos College in Pittsburg. There were even some from schools outside of the Contra Costa Community College District. Some of the panelists worked within Contra Costa County, while others came from Cal State-Sacramento, Stanford Hospital and Samuel Merritt University. “We wanted to represent different areas,” Blackwell said. The jobs of the panelists vary. Some are involved in more hands-on care while others hold administrative positions. All of them have nursing backgrounds. Blackwell started off the event by asking the panelists to talk of how they became interested in nursing, where they obtained their degrees, what are their previous and current jobs and to explain the road between where they started and now. Hearing about their paths allowed students to understand the effort required to achieve a career in a medical field and the different options available for students to get to their destination, Blackwell said. The panelists also did not hesitate to list in detail the struggles they faced during their academic journey. Middle College High School junior Meily Reyna said the discussion was insightful, hearing the struggles of people in the field she plans to enter. “Most people do not want to talk about the struggles,” Reyna said. “They will tell you about how great the job is and the paycheck, but they won’t tell you the struggles they had.” The next question for the panelists was about the skills they used in their daily work. A lot of the skills the panelists mentioned were personal qualities they possess or are needed to be a nurse. They mentioned organization, critical thinking and empathy . Advice on juggling responsibilities as a student was also covered. Another objective of the event was to encourage students to create an educational plan with a counselor and do more personal research, counselor Andrea Phillips said. Nursing department Chairperson Cheri Etheredge discussed the importance of planning ahead and insisted that students who plan ahead of time do better. Dr. Etheredge said this field of study comes with sacrifices and other things in their lives may need to be rearranged in order to meet the needs of their classes and work. Biology professor Ellen Coatney said students should follow their strengths and maintain realistic expectations in all that they do. She pointed out this can be done, starting with their course planning. “We all fail when we have too much on our plate. But anything worth doing is worth doing well,” Dr. Coatney said. Coatney mapped out some of the prerequisite classes needed in order to pursue nursing. She also made the connections between the relevance of the material taught and how it will be used in the workforce. Nursing schools build on what students learn in their prerequisites, Etheredge said. “You need to know your stuff. Not knowing your stuff will reflect in your work,” Stanford registered nurse Mia Johnson said. Samuel Merritt University certified registered nurse anesthetist (CRNA) Shawna Holbrook said it is important for students to seek tutoring and get to know their teachers. Tags: biology, Cal State-Sacramento, ccc nursing, contra costa county, doctors, nurses, nursing student, panel, prerequisites, Samuel Merritt University, Stanford Hospital Press conference at Fireside Hall offers insight on administrative leave designations Emergency alert system gives sense of safety on campus Former vice president reassigned to District Office Richmond Ceasefire looks to the future with town hall celebration Leaked Navy memo drives community outrage over plans of detention center District ends investigation Statement of inclusivity in question Community gathers to support families after a week of heavy violence Community mourns Courtney Beane’s sudden death Multiyear project to furnish state-of-the-art science facilities
cc/2019-30/en_middle_0028.json.gz/line1594744
__label__cc
0.613183
0.386817
Center for Public Representation A Public Interest Law Firm Dedicated to Serving Individuals with Disabilities for More Than 40 Years The History of CPR Criminal & Juvenile Justice Involuntary Interventions Legal Capacity SSI/SSDI Protect Our Medicaid Amicus Briefs, Damage and Civil Rights Cases Enforce Civil Rights Expand Opportunities Empower People With Disabilities A national legal advocacy center for people with disabilities CPR uses legal strategies, advocacy, and policy to promote the integration and full community participation of people with disabilities and all others who are devalued in today’s society. Expanding and protecting the rights of people with disabilities. Help people living in nursing facilities and other institutional settings move back to their community! Read about the Money Follows the Person program and the EMPOWER Care Act to re-authorize it. Representing individuals in western Massachusetts (Hampden, Hampshire and Franklin counties) who have been denied Social Security disability benefits. CPR opposes the nomination of Judge Kavanaugh to the U.S. Supreme Court. Read our statement to learn about Judge Kavanaugh’s record and what his confirmation could mean to the disability community. The documents contained on this page and within this web site do not constitute legal advice. Anyone engaged in legal action should consult with an attorney. Attorneys should make their own independent judgments. Local laws vary and the law may have changed since these documents were written. Litigants should fully research any claims or defenses before making them. 22 Green Street Site Design by: Gravity Switch
cc/2019-30/en_middle_0028.json.gz/line1594746
__label__cc
0.723765
0.276235
Investment recommendation: Neutrality to U.S., slight overweight to international Category: Your Wealth | Published: 07/23/14 | Print Category: Your Wealth Posted by Wade Balliet At Bank of the West, our Investment Advisory & Management team (IA&M) currently believes that Bank of the West clients should consider revisiting their equity allocation and, if appropriate, look to rotate toward neutrality to U.S. holdings and a slight overweight to international asset classes Further, we believe clients could explore the use of a diversified mix of international asset classes to round out equity portfolios. This is, in part, due to a global growth forecast of 3.7% by the International Monetary Fund (IMF), which is set to outpace U.S. growth this year. As you can probably tell, the IMF is predicting that many international markets may grow faster, but are also further back in the recovery than the U.S., which means future growth potential of economies and earnings could drive higher equity returns for globally diversified investors. Realizing better risk-adjusted returns While our allocation recommendations are based on 2014 economic projections, there is evidence to suggest that investors could utilize global diversification as an investment strategy. In a global economy, an event in one region can create diverse economic reactions and trends that do not correlate across all regions. This is why global assets can serve to increase returns and reduce risk across various economic environments. In fact, when compared to a domestic-only strategy, a portfolio with global holdings can , over time, earn a higher return for the same level of risk and/or produce less risk for the same level of return. For example, since 2000, more than half of global GDP growth was driven by emerging markets, led by Brazil, China, India, and Russia, called the BRIC economies, which produced double-digit growth rates. Investors who were positioned in these emerging counties — as well as other countries — were rewarded over those who were exclusively in U.S. equities or only invested in advanced countries. Further, in a Gerstein Fisher study, a globally diversified portfolio outperformed a U.S.-only portfolio in 96% of rolling three-year periods, with a total outperformance of 35 percentage points from 2001 to 2011. Although past performance does not guarantee future results, this suggests that investors should assess their diversification strategies and, where appropriate, adjust their allocations to help to achieve a more optimal level of non-domiciled holdings, while looking for investments that will provide low correlations with their domestic holdings. Aligning portfolio allocation with market capitalization Currently, U.S. equities comprise approximately 49% of the global market, so investors may consider having 49% of their portfolio in U.S. equities and 51% in non-U.S. equities. However, looking at short-term performance in the past decade, there are periods of time where allocating 20% of an equity portfolio to non-U.S. stocks would have captured about 85% of the maximum possible benefit. Again, past performance does not guarantee future results. Despite the evidence supporting global diversification, studies show that few investors would be comfortable with having 51% of their portfolios invested in non-U.S. equities due to a range of factors, often described as a “home bias.” For example, according to a 2014 report from Vanguard titled “Global Equities: Balancing Home Bias and Diversification,” U.S. investors maintained an allocation to U.S. stocks that was approximately 1.7x the market cap of U.S. stocks. This suggests a significant overweight in U.S. assets as well as an opportunity to evaluate the potential to add global assets to a portfolio as a core investment strategy. The opinions and recommendations presented are the views of the Investment Management and Trust Division of the Bank of the West Wealth Management Group. All investments involve risk. Investors should seek the advice of a financial professional regarding the appropriateness of any securities or strategies discussed. Foreign securities, involve additional risks including exchange rate fluctuations, social and political instability, less liquidity, greater volatility and less regulation. Economic and market forecasts reflect subjective judgments and assumptions, and unexpected events may occur. Past performance is no guarantee of future results. Tags: bonds, cash, emerging markets, equities, equity returns, global diversification, international assets, investments, portfolio, Wade Balliet, wealth management Good article. Investing in U.S. large caps also has an international flavor considering the international presence of these companies. Caterpillar, for example How well do you know global diversification? 7 investment tips to consider in 2014 Economic projections and investment insight for 2015 Angel investing: 5 factors to consider Wade Balliet More from Wade Wealth Management Strategy More from Kristin Julie Davitz More from Julie Wealth Resources Review our latest reports, infographics, and other resources related to Your Wealth. Please select a resource2019 BNP Paribas Global Entrepreneur Report (1)Infographic: New York City DiversityInfographic: Elite Entrepreneurs for 2017At a Glance: 2017 Global Entrepreneur ReportInfographic: Purpose-Built PhilanthropyGlossary of Philanthropy TermsAt a Glance: 2016 BNP Paribas Individual Philanthropy IndexInfographic: BNP Paribas Individual Philanthropy Index (2016)Infographic: Entrepreneurial HotspotsInfographic: Global Entrepreneurship by GenderReport: Succession PlanningReport: BNP Paribas Global EntrepreneursInfographic: BNP Paribas Individual Philanthropy Index (2015)Infographic: BNP Paribas Individual Philanthropy Index (2014)Bank of the West Wealth Management
cc/2019-30/en_middle_0028.json.gz/line1594760
__label__wiki
0.825105
0.825105
Home Chelsea transfer news Rudiger opens up on silverware and challenge in England Rudiger opens up on silverware and challenge in England Diptanil Roy Bildbyran Chelsea defender Antonio Rudiger has revealed he is relishing the challenge in England and wants silverware this season along with improvement for Chelsea. “I feel very comfortable in London. In my eyes the Premier League is the best league in the world. Every opponent is a difficult challenge, no game is easy. But that’s exactly what makes the charm.” “I’ve been here with Chelsea for one-and-a-half years now. I think, personally, I got better and better in the club month by month, adapting my game more and more to the league here.” “Of course there are also outstanding and world-class strikers in the Bundesliga, such as Robert Lewandowski. “But honestly, in the Premier League, even the teams in the lower half of the table have really strong players up front, which are so hard to defend. [Salomon] Rondon from Newcastle for example.” “This is 90 minutes of pure wear and tear, in which you cannot stop to focus even after a two-goal lead. But it’s fun, that’s how football should be!” “Of course I’ve been very annoyed recently that we have unnecessarily dropped points in some games, but for our goal to reach the top four we are still in business,” said Rudiger. “The FA Cup is now really at an important stage. In the League Cup, we are already in the final. “Although many people here think that this cup is not that important, a title is still a title and always something special.” SEE MORE: John Terry wants Hazard stay and why he kept jersey number 26 Antonio Rudiger Previous articleChelsea cannot beat City: Merson Next articleSarri talks about Higuain and Hazard
cc/2019-30/en_middle_0028.json.gz/line1594765
__label__wiki
0.85074
0.85074
Review: A Little Night Music (Circle Theatre) An impressive revival of Sondheim’s sex comedy classic Circle Theatre presents Music/Lyrics by Stephen Sondheim Book by Hugh Wheeler Directed by Bob Knuth at Circle Theatre, Oak Park (map) through June 5 | tickets: $22-$26 | more info Stephen Sondheim’s musicals often contain an element of nostalgic regret, focusing on characters that look back on their muddled pasts in hopes of achieving, as A Little Night Music’s Desirée Armfeldt (Anita Hoffman) says, “A coherent future.” The aging artists of Follies, the fairy tales of Into The Woods, Sweeney Todd’s titular anti-hero – these are just a few of the composer’s characters that are faced with the consequences time brings, and A Little Night Music is one of the most chronology-focused musicals in Sondheim’s canon. Key words like “now,” “soon,” “later,” and “meanwhile” are repeated to emphasize the passage of time, unified by the inquisitive “remember” that sparks the characters’ trips down memory lane. The past, present, and future intersect in a delicate waltz, and Sondheim writes most of the show’s music in ¾ time, overlapping the melodic themes with his signature complexity and precision. Bob Knuth’s staging is similar to Trevor Nunn’s recent Broadway revival, with a similarly clean, white-washed set design also from Knuth, and the production’s technical aspects have a similar level of polish. Elizabeth Powell Wislar’s costume design is particularly stunning, and these characters are dressed with the level of elegance and sophistication worthy of their status. Knuth assembles a cast that handles the difficult music especially well, layering the moving voice parts with a great sense of timing, and crisp articulation that is much appreciated during intense numbers like “Weekend in the Country” where multiple parts are being sung simultaneously. Desirée’s five actor companions serve as an observing chorus, and they begin the show with an overture that establishes the melodies that will be revisited throughout the show. In the temporal context of the show, the overture becomes more than just a collection of the show’s most memorable tunes, but rather plants seeds that will later be cultivated by the other actors in the ensemble. This is a musical about relations – husbands and wives, parents and children, the young and the old – and despite the occasional instance of overacting, Knuth’s cast succeeds in building the character connections that are elevated by Sondheim’s rich music. Hoffman anchors the production with her captivating portrayal of Desirée, capturing the weariness that comes with the touring life and the desire to finally obtain a life of stability with her daughter Fredrika (Alicia Hurtado). When she reunites with her past lover Fredrik Egerman (Kirk Swenk), she sees an opportunity to finally have the life she dreams of, but Fredrik’s eighteen-year-old wife Anne (Stephanie Stockstill) stands in their way. Matters are further complicated by Desirée’s preexisting affair with an insanely jealous dragoon Count Carl-Magnus Malcolm (Jeremy W. Rill), whose destitute wife Charlotte (Deanna Boyd) tells Anne about Desirée’s affairs with both their husbands. As Desirée’s partners, Swenk and Rill both showcase strong vocals, and there’s a clear contrast in their affection for Ms. Armfeldt. Fredrick genuinely longs for her on an emotional, whereas Malcolm desires her on a solely sexual level, and Rill gives Malcolm an exaggerated arrogance that works for the character, especially with his powerful singing. As his wife Charlotte, Boyd gives the character an appropriately dreary disposition, but she becomes too much of a caricature when her character breaks out of her depression. Stockstill’s Anne is delightfully naïve at the start of the show, still a child despite having been married for eleven months. The adorable flirtation between Anne and her step-son Henrik (Patrick Tierney) shows how innocent she is in comparison to women like the Egermans’ amorous maid Petra (Khaki Pixley), depicting an Anne who is anxious to explore her sexuality but not with her own aging husband. Stockstill has a beautiful singing voice, and her duet with Boyd, “Everyday A Little Death” is a heartbreaking revelation that underneath the sexual comedy these are people in pain. Henrik is the play’s bleakest character, and Tierney does admirable work balancing the character’s jaded opinion of the world with a desire to find the kind of the love that he so publicly renounces. Tierney, along with Rill, has some of the most difficult music in the show, and while there are times that he could use some more support to stay on key, he does strong work with difficult material. Fredrika and her grandmother Madame Armfeldt (Patti Roeder) represent the two ends of the time spectrum, as Madame lives in the past, while Fredrika is constantly looking toward the future. Roeder’s solo “Liaisons” could be considered the play’s theme, a meditation on how the affairs of her past have been grow more beautiful with age while the longing to return to them grows more painful. At the end of the play, Madame Armfeldt regrets turning away one of her lovers for giving her a wooden ring, lamenting the lost opportunity for true love. Desirée has a similar epiphany in “Send in the Clowns,” impeccably performed by Hoffman, where she finally exposes her true feelings to Fredrik before time passes them by again. After spending the play trying to recapture the past as a way to fix the present, she takes the leap into a future with Fredrik. When his responsibilities to Anne prevent him from jumping with her, Desirée ends the song with a defeated yet optimistic, “Maybe next year.” Time passes and things change. Things grow with time and they die with time. But perhaps the greatest power of time is the hope that the future brings, healing the wounds of the past and making the present an easier place to live. All images by Bob Knuth. Filed under: 2011 Reviews, Circle Theatre, Musical, Oliver Sava, Stephen Sondheim | Tagged: A Little Night Music, Alicia Hurtado, Anita Hoffman, Anna Hickey, Bob Knuth, Circle Theatre, Deanna Boyd, Elizabeth Hope Morgan, Elizabeth Powell Wislar, Erin Renee Baumrucker, Gary C. Echelmeyer, Greg Zawada, Hugh Wheeler, Jeremy Rill, Jeremy W. Rill, Jonathan Landvick, Josh Walker, Justine Palmisano, Kari Kontour, Kelly Smshoff, Kevin Bellie, Khaki Pixley, Kirk Swenk, Kristine Burdi, Matt Edmonds, Oliver Sava, Patrick Tierney, Patti Roeder, Stephanie Stockstill, Stephen Sondheim, Tim Touhy | Leave a comment »
cc/2019-30/en_middle_0028.json.gz/line1594767
__label__wiki
0.838904
0.838904
Christian-Bale.org Your 24/7 Extensive Christian Bale Resource Online Promote Christian Bale Fan You are here: Home / Projects / The Dark Knight Rises / Warner Bros. regroups on PR for ‘Dark Knight’ Warner Bros. regroups on PR for ‘Dark Knight’ July 21, 2012 by Angelic 1 Comment Studio in crisis-management mode in wake of deadly shootings Forced by tragedy to re-evaluate its marketing and PR plans for “The Dark Knight Rises,” Warner Bros. was poised to cancel the remainder of the pic’s international press tour. The studio also lost a significant amount of marketing exposure for the pic on Friday as TV spots for the pic were dropped by numerous networks out of viewer-sensitivity concerns. There were reports that Warner Bros. had taken steps to limit some of its TV marketing for the pic but that was strongly denied by sources close to the situation in Burbank. The scramble on Friday came hours after a gunman killed 12 people and wounded more than 70 others at a midnight screening of “Dark Knight” in the Denver suburb of Aurora, Colo. With media coverage of the shooting blanketing the airwaves on Friday, Warner Bros. execs went into crisis-management mode as they reviewed promo and marketing plans for the pic in light of the massacre. The studio moved quickly to cancel Friday’s scheduled premiere of the pic in Paris, and by day’s end a source with knowledge of the situation said it was leaning toward tabling the rest of its international press tour. The studio had not made an official announcement of its international plans as of late Friday afternoon. However, WB is expected to cancel next week’s premieres and press junkets that have been scheduled for Mexico City and Tokyo. The events would have featured red-carpet premieres with stars such as Christian Bale and Anne Hathaway along with screenings of the film. In the frenzy of news coverage of the shooting rampage on Friday morning, some nets proactively decided to pull the spots that had been set to run for the pic. There were conflicting reports as to whether Warner Bros. eventually asked for all blurbs to be pulled for the weekend or whether some nets took the initiative on their own. Sources at two of the Big Four broadcast nets said the studio made a request to pull “Dark Knight” spots that had been set to run this weekend. However, this was disputed to sources close to the studio, who insisted that all marketing efforts that were already in place before the shootings would proceed as planned. In most cases, spots that were pulled by the nets will be reskedded to run at a later date. The loss of millions of dollars worth of commercials during the pic’s opening weekend is a vivid illustration of how significant an impact the mass shooting will have on the tentpole that had been the cornerstone of Warner Bros.’ summer movie sked. One marketing expert estimated the value of the film’s TV spots on its opening weekend at $3 million-$5 million. Filed Under: The Dark Knight Rises Chelsey Cosaboom says All those kids in the hospital recovering from gunshot wounds at the Batman massacre could use a visit from their hero. I propose we (as in all of Facebook) should make enough noise asking Christian Bale to visit these kids in the hospital dressed in the real Batman outfit. They need to know Heroes can be real too, not just the bad guys. Show the kids there really are heroes. Dear Christian Bale, Please visit the injured children from the movie massacre as Batman, you have the power to be a Hero right now, not a movie Hero, a real life flesh & blood one to the kids. 10 + eight = Jennifer Lawrence Daily Maintained by: Angelic & Grace Opened since: March 19, 2007 Christian Bale Fan is just a non-profit making, unofficial fansite. I am no way affiliated with Christian Bale nor his relative and managment. Please do not send any fanmail and hatemail to me. All graphics are made by me unless stated, please do not reprint, copy or steal without premission given.
cc/2019-30/en_middle_0028.json.gz/line1594771
__label__cc
0.526883
0.473117
The Constitution Unit Blog Elections and referendums AV referendum Democratic Engagement and Citizens’ Assemblies Cabinet manual Special advisers Judiciary and human rights Judicial independence Parties and politicians Constitutions and constitution making Monarchy, church and state Meg Russell Alan Renwick Robert Hazell Roberta Damiani Rebecca McKee Michela Palese Jess Sargeant Ruxandra Serban Jack Sheldon Honorary staff Daniel Gover Akash Paun Alan Whysall Ben Worthy Ben Yong Constitution Unit website About the Constitution Unit How often do prime ministers bow to the will of parliament? Actually, all the time Posted on September 1, 2013 by Meg Russell David Cameron‘s defeat last night in the Commons on his motion on military intervention in Syria has been met with shock, and correctly seen as a very visible assertion of parliamentary power. But, although such confrontations are unusual, it would be wrong to assume that parliamentary checks on government ambitions are the exception. In fact, they happen all the time. Two things are unusual about yesterday’s events. First, and most widely commented upon, they address the difficult and high-profile question of peace and war. Historically, the ability to deploy troops has been seen as part of the ‘royal prerogative’ – whereby the executive can act without explicit parliamentary consent. This came under particular pressure in the run-up to the 2003 Iraq war, when Robin Cook (Leader of the House of Commons) and Jack Straw (Foreign Secretary) persuaded Tony Blair that he should not proceed without the clear support of MPs. The result, on 18 March 2003, saw ‘the largest [vote] against the whip by government MPs since the beginning of modern British politics‘ – 139 Labour MPs defied the whip – but the Prime Minister still managed to win the vote with Conservative support. Subsequently there has been pressure to entrench a convention that parliamentary consent is required for the deployment of troops, with reports from one parliamentary committee and then another . Gordon Brown, and subsequently the coalition, have been sympathetic to such calls, but – as the second of these reports explores – the issues are complex. In 2011 David Cameron sought parliamentary approval for action in Libya, which was forthcoming – but only after the event. This sparked calls from a third committee to clarify the situation. But in short, a rejection by the Commons of such a proposal is unprecedented in recent times – at least because it has so rarely been asked the question. A useful briefing by the House of Commons Library documents how Commons debates on earlier conflicts – including Suez and the Falklands war – were generally taken without a substantive vote. The other thing that is unusual is for a government to have to back down so publicly, on any kind of policy, in the face of parliamentary opposition. But this is not unheard of, including under the coalition. Most obviously, Nick Clegg’s Lords reform proposals were withdrawn when it became clear that he faced certain defeat in the Commons on the necessary programme motion. Earlier, the coalition’s Health and Social Care Bill had been withdrawn for a ‘pause’, due to resistance – particularly from the Liberal Democrats. Tony Blair also faced problems, notably being forced to implement a ban on foxhunting that he did not himself support, and being pressured into a free vote on a total ban on smoking in public places, leading to a reversal of government policy. All of these events took place in the very public arena of the House of Commons. What is more routine is for government to withdraw proposals following defeat in the House of Lords . As I document in my recent book, a key consideration for ministers in deciding whether to accept a Lords defeat is what the Commons will bear. When there is clear resistance from government backbenchers (as Brown faced over his proposals to detain terror suspects without charge for 42 days), plans are usually dropped to avoid possible Commons humiliation. But this leads to the key point – which is that the real power of parliament is primarily exercised behind-the-scenes, through ministers considering what MPs are prepared to accept, and only putting proposals that they know will achieve support. When it comes to legislation, which is the topic of one of our current projects, a huge amount of effort in Whitehall goes into developing parliamentary ‘handling strategies’ to think through what will prove controversial in both the Commons and the Lords. This is very explicit in the Cabinet Office’s own guide to making legislation which also states that if ‘the Government expects to be defeated on a non-government amendment, it may wish to pre-empt a defeat by tabling a concessionary amendment’ – in other words to avoid a defeat by changing its policy before the vote. It is through these subtle and private mechanisms of communication that parliament’s primary power is felt. Indeed among our case study bills there was one – the Corporate Manslaughter and Corporate Homicide Bill – that the Prime Minister was said himself not to want, but which was introduced due to pressure from Labour MPs. It is the whips’ job, in particular, to keep in touch with parliamentary opinion through informal chats in corridors and tearooms, and ministers do the same in private meetings with MPs. If these mechanisms are working confrontations can be avoided, but parliamentary power is being exercised nonetheless. Returning to the events of yesterday, what therefore appears to have gone wrong is communication inside the Conservative party. It is obviously more difficult for whips to keep on top of opinion during a parliamentary recess, and this can only have exacerbated the problem. What is more surprising is that when things started to look difficult the government didn’t strike a deal with the opposition so that both sides could support one resolution – the words of the government resolution and the Labour resolution were strikingly similar. But does this mark the start of a new period of confrontation between government and parliament? Probably not. A smart government is in constant dialogue with parliamentarians, and when necessary trims its ambitions to avoid public splits. If Cameron didn’t know that before, he certainly knows it now. This entry was posted in Parliament and tagged Conservative, David Cameron, House of Commons, meg russell, Syria, Tony Blair. Bookmark the permalink. ← Time For Commons To Seize The Reform Moment Announcing the Launch of Constitute: The World’s Constitutions to Read, Search and Compare → One thought on “How often do prime ministers bow to the will of parliament? Actually, all the time” Prof Dr Melanie sully says: I am sure Cameron knew the government has to stay in dialogue with parliamentarians, after all he has practice on issues such as the EU and knows about splits and rebels. A functioning parliament should also hold that element of surprise and we saw it here. In some legislatures the divisions are predictable because of overmanagement. It is not that there is better or more communication. What I find also important is that not only the dialogue between the parliament and government is important (many coalition MPs are in the government in the widest sense of the word anyway) but there should be note taken of the dialogue of both with the People and voters. Polls suggest a public mood against yet another intervention war. This link with public opinion works better in a majoritarian electoral system such as in the UK than in an election system based on the Party lists. These UK MPs have to go back to the consituencies and explain themselves. The voting lists are public and interestingly the party affiliation is never published just the MPs name and the electoral district. In some legislatures the voting can be secret and the parliamentary parties are far more important than the MP. Voting and many other aspects of parliamentary life examples of which are given in the above blog are controlled The Constitution Unit in the Department of Political Science at University College London is the UK’s leading research body on constitutional change. This blog features regular posts from academics and practitioners covering a wide range of constitutional issues in the UK and overseas. You can navigate by theme and contributor using the menus at the top of this page, and subscribe to receive new posts to your inbox below. Follow blog via e-mail Unit Mailing List: Sign up to receive notifications of of our events, newsletter and publications Search the blog chronologically Search the blog chronologically Select Month July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 Monitor 72: Brexit and the changing logic of British politics Improving discourse during election and referendum campaigns The Mechanics of a Further Referendum on Brexit The Independent Commission on Referendums A Northern Ireland border poll Legislation At Westminter
cc/2019-30/en_middle_0028.json.gz/line1594774
__label__cc
0.676401
0.323599
About the Creative Enterprise Zone The Creative Enterprise Zone, located mid-city between downtown Saint Paul and Minneapolis, has the goal to be a recognized center of creativity and enterprise, a place where people make a living by their creative capacities. Why the “Creative Enterprise Zone”? The Creative Enterprise Zone is an idea, a place, and people. For the past 30 years, this neighborhood has been home to a wide variety of creative businesses — from artists to architects, entrepreneurs to manufacturers. The new light rail line brings opportunities and challenges. Our name highlights our effort to preserve and promote the area's historic and creative character in the midst of change. The idea – Keep people who make a living by their creative capacities here. The place – The area surrounding the intersection of Raymond and University Avenues in Saint Paul. The people – Artists, manufacturers, creative entrepreneurs, artisans, and so many more. From the intersection of Raymond and University Avenues, the Creative Enterprise Zone radiates south to Interstate 94, east to Prior Avenue, north to the railroad tracks by Energy Park Drive, and west to Minneapolis. Here is the map: you can see a much larger version and get a Google Map link here. How are we organized? We are an tax-exempt, 501(c)3 nonprofit supervised by a board of directors. We have three part-time contract staff members who help us implement our vision and goals. What is the vision? To be a livable, mixed-use neighborhood, recognized and sustained as a center of enterprise and creativity. Part of this vision is already in place and must be preserved. Other elements need to be fostered. Our vision is rooted in the idea that creative work is both necessary and satisfying. That an increasing number of people make a living through their creative capacities, enhancing productivity and innovation. And that the Zone will become an even more desirable place to live and work because of our vibrant mix of people and ideas. The Creative Enterprise Zone is a supportive coalition of organizations, businesses, and individuals working together to accomplish these basic goals: Stabilize conditions in which creative enterprises, industries, artists, non-profits, and residents flourish. Connect creative enterprises, industries, artists, non-profits, and residents. Collaborate, cross-pollinate ideas, and share common interests. Build the physical infrastructure, spaces, and places that support our vision. Promote a distinctive identity that expresses the unique nature of the district. Encourage others to collaborate with us in achieving our goals. Creative Enterprise Zone in the news Pioneer Press: More fun and creativity for a former St. Paul can factory Midway Como Monitor: Everyone loves to "mix it up" in the Creative Enterprise Zone (2018) Pioneer Press: A quick guide to Creative Enterprise Zone projects (2016) Minnesota Monthly: Can Can Wonderland, a venue for mini-golf, art, and cultural performances, to open this fall in the Creative Enterprise Zone (2016) Midway Como Monitor: Make it here! Many hands at work in Creative Enterprise Zone (2015) City Pages: Preventing the "Soho" effect: Creative Enterprise Zone wants artists to thrive (2014) Knight Foundation: St. Paul's Creative Enterprise Zone declares itself with a new billboard by photographer Alec Soth (2014) Funders Collaborative: New businesses, development flocks to the Creative Enterprise Zone (2014) Park Bugle: Creative Enterprise Zone heads to city hall (2013) Finance and Commerce: Remes has big plans in St. Paul's Midway (2012) Star Tribune: Residents have a vision for St. Anthony Park rebirth (2011) MPR: St. Anthony Park tries to unite before arrival of light rail (2010) Star Tribune: Light-rail underlines intersections (2010) Pioneer Press: In St. Paul, an Art Community In Pieces (2010) Want to participate? Attend our events. Get on our mailing list. Donate.
cc/2019-30/en_middle_0028.json.gz/line1594791
__label__wiki
0.548191
0.548191
Category: Indian Airforce by defenceupdate · Published February 7, 2016 · Last modified April 15, 2019 Indian shealth fighter FGFA aka PAK-FA Update The Sukhoi/HAL Fifth Generation Fighter Aircraft (FGFA) is a fifth-generation fighter being developed by India and Russia. It is a derivative project from the PAK FA (T-50 is the prototype) being developed for the... Dassault Mirage 2000:- Indian Air Force Multirole Fighter plane The Dassault Mirage 2000 is a French multirole, single-engine fourth-generation jet fighter manufactured by Dassault Aviation. It was designed in the late 1970s as a lightweight fighter based on the Mirage III for the... Defence / Indian Airforce / Indian Military / Indian Navy HAL Rudra :- India indigenously designed Attack Helicopter The HAL Rudra also known as ALH-WSI is an armed version of HAL Dhruv. Rudra is equipped with Forward Looking Infrared (FLIR) and Thermal Imaging Sights Interface, a 20 mm turret gun, 70 mm rocket pods,... Defence / Indian Airforce / Russia / World News by defenceupdate · Published February 1, 2016 · Last modified May 4, 2019 Sukhoi Su-35:- The One Fighter Plane America’s Military Doesn’t Want to Fight The Sukhoi Su-35 is a designation for two separate, heavily upgraded derivatives of the Su-27 ‘Flanker’ jet plane. They are single-seat, twin-engine, supermaneuverable multirole fighters, designed by Sukhoi. The first variant was designed during the... Indian Airforce / Indian Military by defenceupdate · Published January 31, 2016 · Last modified April 15, 2019 HAL LCH:- India’s indigenously built multi role Light Combat Helicopter The HAL Light Combat Helicopter (LCH) is a multirole combat helicopter being developed in India by Hindustan Aeronautics Limited (HAL) for use by the Indian Air Force and the Indian Army. The LCH... AURA UCAV:: The Future of Indian Airforce AURA is an autonomous unmanned combat air vehicle (UCAV),The ADA describes the AURA as a “self-defending high-speed reconnaissance UAV with weapon firing capability”.The project is being developed by the Defence Research and Development Organisation for... Expanding the goal of Indian Airforce Indian air force slowly expanding his wings from primary air defense into major offensive force, with the induction of new generation fighter jets along with better missile systems. The Air force not only conduct... Indian Airforce / Indian Military / Indian Navy / ISRO / News / Weapons by defenceupdate · Published January 4, 2016 · Last modified April 15, 2019 Top 10 India’s Indigenous Defense Weapons Defending India is a humongous task our Armed Forces do every second. Our Men in Uniform make this possible every second through their efforts and out of the skin hard work. To do it... by defenceupdate · Published December 26, 2015 · Last modified May 14, 2019 India indigenous air to air missile Astra proves anti-jamming capability A crucial capability of the air-to-air Astra missile —its resistance to jamming — was successfully validated in recent trials conducted by missile scientists of the Defence Research and Development Organisation (DRDO), which indigenously developed... Indian Airforce / World News by defenceupdate · Published December 24, 2015 · Last modified April 15, 2019 Top 10 Best Attack Helicopters in The World Helicopter is the most effective source used for logistics,Wars and rescue purposes these days. From their first appearance in World War II, through the Vietnam War and to the modern day, helicopters have helped... The Case of Indian Acquisition of Mig-29s: Why Buy a 40-Year Old Aircraft? AN-32 has served IAF for 35 years. We can’t turn our back on ageing workhorse now India’s Infantry Combat Vehicles project may just die from apathy
cc/2019-30/en_middle_0028.json.gz/line1594807
__label__wiki
0.582414
0.582414
Omaha: The Backwaters Press, 2011. $20. Literary Nonfiction. Essays. Native American Studies. Distributed by Small Press Distribution. NATURAL THEOLOGIES: ESSAYS ABOUT LITERATURE OF THE NEW MIDDLE WEST is the first critical study of contemporary Mid-Plains literature. Denise Low shows how the region’s writers inherit a Frontier legacy from Indigenous and American settler communities. Myths continue to provide framework for fiction writers and poets, as well as nature and the rich community life. Not all of the region is rural. Cities like Minneapolis, Omaha, and Kansas City, have presence in the literature—but in context of the great acreage around them. This innovative book defines the region’s character while, at the same time, illuminating a panoramic past. Indigenous peoples and their philosophies add to this unique look at the Mid-continent’s literary culture. Rattle Review: “Almost any innovative book that combines a discussion of literature with theology will get my attention, but when Denise Low set just such a conversation in a Midwestern locale, my interest soared even more. As a cautious kid growing up and mostly remaining in the South, I found stories of Native Americans, pioneers, frontierspeople, and cowpeople (boys or girls) intriguing because they were bold, and I was not. As an adult accompanied by a brave spouse, I’ve since hugged the U.S. coastline, drooled over quaint little towns in rural New England, and said hi to Canada and other countries—but I’ve seldom set more than the stopover foot of an airline passenger onto the vast American plains. Do buffalo still roam? Do people get along? Do the Indians of my childhood prefer to be called Native Americans now? The latter question received an almost immediate answer when I saw the author’s reference to Native Americans not as Indians but Indigenous people. Good to know as I got to know the diverse voices in this “first critical study of contemporary Mid-Plains literature”—a book that includes much-admired poets and writers but also a wide range of Midwestern voices I had not previously heard. Denise Low obviously knows each of those voices well. Not only has she taught at various universities and won prestigious awards for her own books, she’s a fifth-generation Kansan, whose roots go as deep as prairie grasslands. More importantly, perhaps, her personal lineage of European and tribal peoples have given her a uniquely blended background for intelligently discussing relevant topics—from the landscape to the Lakota to the contemporary literary achievements of native Midwesterners. Taking cover under the book’s title, four sections come together in “A Revised Frontier Literature” (with a variety of accomplished poets and writers, including Denise Low), “Settlement. The Cities” (with Langston Hughes, David Ray, Mbembe Milton Smith, Stanley E. Banks), “Hard Land, Strong Character” (William Stafford, Robert Day, Patricia Traxler, and others), and “Natural Theologies,” which looks at “Ted Kooser’s Poetics of Devotion,” the “Poets in the Bible Belt” (Michael Poage, Jo Mcdougall, and Kathryn Kysar), and “Louise Erdrich’s Magic Spells, Prayers, and Parables.” That fourth section drew me to the book, but touched on more than I’d imagined, such as how “American Indian religions derive belief from specific sacred sites,” or how poems by Ted Kooser “begin located in solid reality, but then surreal leaps occur.” For instance, the poem “Etude” starts with the narrator’s “watching a Great Blue Heron,” who, by the end, “would spear the whole world if he could,/ toss it and swallow it live.” As a poet who devours well-written poetry in big chunks, I totally understood the desire. Also, in the last section, I learned that Midwestern poets who had a church upbringing seem inclined to “submerge Christian backgrounds in their writings” as they “raise theological questions and pose some answers.” For example, Michael Poage,” an ordained minister whose work I’m now eager to see, gives voice to Mary the Mother of Jesus not as a “church authority here but rather a quiet person who lives each day among ordinary details.” In discussing other poetry by Poage, Denise Low says, “Chance meetings occur repeatedly in this poet’s works, and the moments of contact that occur without warning, like bolts of lightning from a sky god, are moments of Christian grace.” That particular poet-pilgrim “struggles in a global landscape without sure answers,” which helped the previous sections of the book come together for me, too, as I began to see that the “new” Middle West does not present the same scene or situations Hollywood scriptwriters typically depict. As those early myths began to fall away, I saw what the author meant by migration becoming “an inner journey, reenacted through poetry, fiction, music, and film.” Although cross-country travels still take place along historical trails, they most likely occur not by horse and wagon but minivan or RV where “broken lines crisscross open grassland, often alongside contemporary throughways, [and] the past intersects the present.” For a little Southern girl who spent her weekly allowance on Saturday matinées featuring cowboys and Indians, the book brought an abrupt change of perspective. For example, I learned that the Lakota peoples “came to represent all ‘Indian’ groups, with their eagle feather headdresses, tipis, and horses” seen on the silver screen because of a photograph someone took when at least 300 Lakota of all ages were frozen, literally, in place and figuratively in time as temperatures plunged, instantaneously preserving those killed at Wounded Knee in the last military action against Indigenous people. The feeling of “being under siege” lingers, and yet the literature of the “New Middle West” seems more apt to adapt, innovate, and follow Low’s insightful view of Poage’s work where “Sorrow can be overcome by wonder.” Yes, and oh, what wonders! The winters, the weather, the overpowering landscapes, the open-wide spaces, the city life, the jazz music, the pool halls, the artifacts, the mounds, the floodplains, the buffalo, the coyotes, and the voices represented in these page somehow blend, harmonize, or note the discordances. As the book sweeps across the past, present, peoples, and prairie, the eclectic voices are worth hearing, literature worth reading, and places worth envisioning even if we, like the pioneers and frontierspeople of yesteryear, only get to travel through—almost always on the way to someplace else.
cc/2019-30/en_middle_0028.json.gz/line1594808
__label__cc
0.748577
0.251423
Jennie Owen Jennie Owen is listed as wife of Dr. Anderson Owen in the 1920 census, aged 32. The graph displays the other subjects mentioned on the same pages as the subject “Jennie Owen”. If the same subject occurs on a page with “Jennie Owen” more than once, it appears closer to “Jennie Owen” on the graph, and is colored in a darker shade. The closer a subject is to the center, the more "related" the subjects are. Minimum number of subjects Show related subjects that appear on at least this number of pages in common with Jennie Owen. All references to Jennie Owen All references to Jennie Owen in pages that do not link to this subject 12 pages refer to Jennie Owen Show pages that mention Jennie Owen in all works Thursday, May 15, 1919 — and wife Wednesday August 17, 1921 — Mrs Saturday, June 17, 1922 — Mrs Wednesday, June 14, 1922 — Mrs Wednesday, May 31, 1922 — Mrs Friday, February 23, 1923 — Mrs Friday, January 26, 1923 — Mrs Monday, January 22, 1923 — Mrs Sunday, January 14, 1923 — Mrs Thursday, January 25, 1923 — Mrs Tuesday, January 23, 1923 — Mrs Wednesday, February 14, 1923 — Mrs
cc/2019-30/en_middle_0028.json.gz/line1594818
__label__cc
0.565205
0.434795
Items Mechanic and steam pipe. [Powerhouse mechanic]. Mechanic and steam pipe. [Powerhouse mechanic]. The Miriam and Ira D. Wallach Division of Art, Prints and Photographs: Photography Collection Hine, Lewis Wickes (1874-1940) Shirley C. Burden Collection Hine, Lewis Wickes (1874-1940) (Photographer) Universal Unique Identifier (UUID): c2218850-c62a-012f-8c78-58d385a7bc34 The Miriam and Ira D. Wallach Division of Art, Prints and Photographs: Photography Collection, The New York Public Library. "Mechanic and steam pipe. [Powerhouse mechanic]." The New York Public Library Digital Collections. 1921. http://digitalcollections.nypl.org/items/510d47e4-41c6-a3d9-e040-e00a18064a99 The Miriam and Ira D. Wallach Division of Art, Prints and Photographs: Photography Collection, The New York Public Library. "Mechanic and steam pipe. [Powerhouse mechanic]." New York Public Library Digital Collections. Accessed July 18, 2019. http://digitalcollections.nypl.org/items/510d47e4-41c6-a3d9-e040-e00a18064a99 The Miriam and Ira D. Wallach Division of Art, Prints and Photographs: Photography Collection, The New York Public Library. (1921). Mechanic and steam pipe. [Powerhouse mechanic]. Retrieved from http://digitalcollections.nypl.org/items/510d47e4-41c6-a3d9-e040-e00a18064a99 <ref name=NYPL>{{cite web | url=http://digitalcollections.nypl.org/items/510d47e4-41c6-a3d9-e040-e00a18064a99 | title= (still image) Mechanic and steam pipe. [Powerhouse mechanic]., (1921) }} |author=Digital Collections, The New York Public Library |accessdate=July 18, 2019 |publisher=The New York Public Library, Astor, Lennox, and Tilden Foundation}}</ref>
cc/2019-30/en_middle_0028.json.gz/line1594823
__label__cc
0.562739
0.437261
Database Security Requirements Guide Cat II (Medium) 132 Clear 132 U_Database_V2R3_SRG_Manual-xccdf.xml The Database Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected] No Change 131 V-32157 No Change SRG-APP-000001-DB-000031 Database management includes the ability to control the number of users and user sessions utilizing a DBMS. Unlimited concurrent connections to the DBMS could allow a successful Denial of Service (DoS) attack by exhausting connection resources; and a system can also fail or be degraded by an overload of legitimate users. Limiting the number of concurrent sessions per user is helpful in reducing these risks. This requirement addresses concurrent session control for a single account. It does not address concurrent sessions by a single user via multiple system accounts; and it does not deal with the total number of sessions across all accounts. The capability to limit the number of concurrent sessions per user must be configured in or added to the DBMS (for example, by use of a logon trigger), when this is technically feasible. Note that it is not sufficient to limit sessions via a web server or application server alone, because legitimate users and adversaries can potentially connect to the DBMS by other means. The organization will need to define the maximum number of concurrent sessions by account type, by account, or a combination thereof. In deciding on the appropriate number, it is important to consider the work requirements of the various types of users. For example, 2 might be an acceptable limit for general users accessing the database via an application; but 10 might be too few for a database administrator using a database management GUI tool, where each query tab and navigation pane may count as a separate session. (Sessions may also be referred to as connections or logons, which for the purposes of this requirement are synonyms.) Determine whether the system documentation specifies limits on the number of concurrent DBMS sessions per account by type of user. If it does not, assume a limit of 10 for database administrators and 2 for all other users. Review the concurrent-sessions settings in the DBMS and/or the applications using it, and/or the system software supporting it. If the DBMS is capable of enforcing this restriction but is not configured to do so, this is a finding. This holds even if the restriction is enforced by applications or supporting software. If it is not technically feasible for the DBMS to enforce this restriction, but the application(s) or supporting software are configured to do so, this is not a finding. If it is not technically feasible for the DBMS to enforce this restriction, and applications and supporting software are not so configured, this is a finding. If the value for any type of user account is not set, this is a finding. If a value is set but is not equal to the value specified in the documentation (or the default value defined in this check) for the type of user, this is a finding. If the DBMS is capable of enforcing this restriction, but is not configured to do so, configure it to do so. (This may involve the development of one or more triggers.) If it is not technically feasible for the DBMS to enforce this restriction, and the application(s) and supporting software are not configured to do so, configure them to do so. If the value for any type of user account is not set, determine the correct value and set it. If a value is set but is not equal to the value specified for the type of user, determine the correct value, set it, and update the documentation, as appropriate. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Note that access via an approved and properly configured DoD Virtual Private Network (VPN) is deemed to be internal to the DoD Information Network (DoDIN) and so does not count as remote access. Note that remote access as defined here may not mean exactly the same thing as remote access in the terminology of the DBMS. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection, thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. Logon/Account information can be compromised if authentication secrets (e.g., passwords) being passed over a public network are not secured via approved cryptography. This can result in unauthorized access to the database. DoD-approved cryptography is as specified in the NIST publication FIPS PUB 140-2, "Security Requirements for Cryptographic Modules." Additionally, for classified systems, NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review settings to determine if the DBMS is configured to accept remote connections. If the DBMS is not configured to accept remote connections, this is not applicable (NA). Check DBMS settings to determine whether the authentication data for remote connections is being encrypted with approved cryptography. If authentication data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt authentication data for remote connections using DoD-approved encryption. Review system documentation to determine whether the system handles classified information. If the system handles classified information, this is not applicable (NA). Review DBMS settings to determine if the database is configured to accept remote connections. If the database is not configured to accept remote connections, this is not a finding. Check DBMS settings to determine whether the data for remote connections is being encrypted using NIST FIPS 140-2 validated cryptographic modules. If data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt data passing over remote connections using NIST FIPS 140-2 validated cryptographic modules. Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions. Check DBMS settings to determine whether the integrity of data over remote connections is being protected using NIST FIPS 140-2 validated cryptographic modules. If data integrity for remote connections is not so protected, this is a finding. Configure the DBMS to ensure integrity of data passing over remote connections using NIST FIPS 140-2 validated cryptographic modules. Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. Managing accounts for the same person in multiple places is inefficient and prone to problems with consistency and synchronization. A comprehensive application account management process that includes automation helps to ensure that accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not limited to, using automation to take action on multiple accounts designated as inactive, suspended, or terminated, or by disabling accounts located in non-centralized account stores, such as multiple servers. Account management functions can also include: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The use of automated mechanisms can include, for example: using email or text messaging to notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using automated telephone notification to report atypical system account usage. The DBMS must be configured to automatically utilize organization-level account management functions, and these functions must immediately enforce the organization's current account policy. Automation may be comprised of differing technologies that when placed together contain an overall mechanism supporting an organization's automated account management requirements. If all accounts are authenticated by the organization-level authentication/access mechanism and not by the DBMS, this is not a finding. If there are any accounts managed by the DBMS, review the system documentation for justification and approval of these accounts. If any DBMS-managed accounts exist that are not documented and approved, this is a finding. Integrate DBMS security with an organization-level authentication/access mechanism providing account management for all users, groups, roles, and any other principals. For each DBMS-managed account that is not documented and approved, either transfer it to management by the external mechanism, or document the need for it and obtain approval, as appropriate. Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access the DBMS. To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems, including databases, must be properly configured to implement access control policies. Successful authentication must not automatically give an entity access to an asset or security boundary. Authorization procedures and controls must be implemented to ensure each authenticated entity also has a validated and current authorization. Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset. Information systems use access control policies and enforcement mechanisms to implement this requirement. Access control policies include identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the application to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, and domains) in the information system. This requirement is applicable to access control enforcement applications, a category that includes database management systems. If the DBMS does not follow applicable policy when approving access, it may be in conflict with networks or other applications in the information system. This may result in users either gaining or being denied access inappropriately and in conflict with applicable policy. Check DBMS settings to determine whether users are restricted from accessing objects and data they are not authorized to access. If appropriate access controls are not implemented to restrict access to authorized users and to restrict the access of those users to objects and data they are authorized to see, this is a finding. Configure the DBMS settings and access controls to permit user access only to objects and data that the user is authorized to view or interact with, and to prevent access to all other objects and data. Non-repudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving information (e.g., indicating concurrence or signing a contract), and receiving a message. Non-repudiation protects against later claims by a user of not having created, modified, or deleted a particular data item or collection of data in the database. In designing a database, the organization must define the types of data and the user actions that must be protected from repudiation. The implementation must then include building audit features into the application data tables and configuring the DBMS's audit tools to capture the necessary audit trail. Design and implementation also must ensure that applications pass individual user identification to the DBMS, even where the application connects to the DBMS with a standard, shared account. Review system documentation to determine the data and the actions on data that need to be protected from repudiation by means of audit trails. Review DBMS settings to determine whether users can be identified as individuals when using shared accounts. If the individual user who is using a shared account cannot be identified, this is a finding. Review the design and the contents of the application data tables. If they do not include the necessary audit data, this is a finding. Review the configuration of audit logs to determine whether auditing includes details identifying the individual user. If it does not, this is a finding. Use accounts assigned to individual users. Where the application connects to the DBMS using a standard, shared account, ensure that it also captures the individual user identification and passes it to the DBMS. Modify application database tables and all supporting code to capture the necessary audit data. Modify the configuration of audit logs to include details identifying the individual user. Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the DBMS (e.g., process, module). Certain specific application functionalities may be audited as well. The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records. DoD has defined the list of events for which the DBMS will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities, or other system-level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; and (iii) All account creation, modification, disabling, and termination actions. Organizations may define additional events requiring continuous or ad hoc auditing. Check DBMS auditing to determine whether organization-defined auditable events are being audited by the system. If organization-defined auditable events are not being audited, this is a finding. Deploy a DBMS that supports the DoD minimum set of auditable events. Configure the DBMS to generate audit records for at least the DoD minimum set of events. Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent or interfere with the auditing of critical events. Suppression of auditing could permit an adversary to evade detection. Misconfigured audits can degrade the system's performance by overwhelming the audit log. Misconfigured audits may also make it more difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Check DBMS settings and documentation to determine whether designated personnel are able to select which auditable events are being audited. If designated personnel are not able to configure auditable events, this is a finding. Configure the DBMS's settings to allow designated personnel to select which auditable events are audited. Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, it must be possible to configure auditing to do this. DBMSs typically make such information available through views or functions. This requirement addresses explicit requests for privilege/permission/role membership information. It does not refer to the implicit retrieval of privileges/permissions/role memberships that the DBMS continually performs to determine if any and every action on the database is permitted. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are retrieved. If the DBMS is not capable of this, this is a finding. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are retrieved. If they are not produced, this is a finding. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are retrieved. If currently required, configure the DBMS to produce audit records when privileges/permissions/role memberships are retrieved. Session auditing is for use when a user's activities are under investigation. To be sure of capturing all activity during those periods when session auditing is in use, it needs to be in operation for the whole time the DBMS is running. Review DBMS vendor documentation to determine whether the DBMS software is capable of session auditing. If the DBMS is not capable of session auditing and a third party product is not being used for session level auditing, this is a finding. If the DBMS is capable of session level auditing and specific session audits are currently defined but session auditing is not enabled; or if a third-party product is available for session auditing and specific session audits are currently defined but session auditing is not enabled, this is a finding. Deploy a DBMS capable of session auditing. Configure the DBMS software or third-party product to enable session auditing. Without the capability to capture, record, and log all content related to a user session, investigations into suspicious user activity would be hampered. Typically, this DBMS capability would be used in conjunction with comparable monitoring of a user's online session, involving other software components such as operating systems, web servers and front-end user applications. The current requirement, however, deals specifically with the DBMS. Review DBMS vendor documentation to determine whether the DBMS is capable of capturing, recording, and logging all content related to an established user session. If the DBMS is not capable of these actions, this is a finding. Deploy a DBMS capable of capturing, recording, and logging all content related to an established user session, or acquire a third-party application to perform this function. Information system auditing capability is critical for accurate forensic analysis. Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit record content that may be necessary to satisfy the requirement of this policy includes, for example, time stamps, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Database software is capable of a range of actions on data stored within the database. It is important, for accurate forensic analysis, to know exactly what actions were performed. This requires specific information regarding the event type an audit record is referring to. If event type information is not recorded and stored with the audit record, the record itself is of very limited use. Check DBMS settings and existing audit records to verify information specific to the audit event type is being captured and stored with the audit records. If audit records exist without information regarding what type of event occurred, this is a finding. Configure DBMS audit settings to include event type as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the date and time when events occurred. Associating the date and time with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Database software is capable of a range of actions on data stored within the database. It is important, for accurate forensic analysis, to know exactly when specific actions were performed. This requires the date and time an audit record is referring to. If date and time information is not recorded and stored with the audit record, the record itself is of very limited use. Check DBMS settings and existing audit records to verify information specific to the date and time of the event is being captured and stored with the audit records. If audit records exist without the date and time of the event, this is a finding. Configure DBMS audit settings to include the date and time of the occurrence of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as application components, modules, session identifiers, filenames, host names, and functionality. Associating information about where the event occurred within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records. If audit records exist without information regarding where the event occurred, this is a finding. Configure DBMS audit settings to include where the event occurred as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events relating to an incident. In addition to logging where events occur within the application, the application must also produce audit records that identify the application itself as the source of the event. Associating information about the source of the event within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding. Configure DBMS audit settings to include the source of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred). As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Check DBMS settings and existing audit records to verify information specific to the outcome of the event is being captured and stored with the audit records. If audit records exist without the outcome of the event that occurred, this is a finding. Configure DBMS audit settings to include the outcome of the event as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Identifiers (if authenticated or otherwise known) include, but are not limited to, user database tables, primary key values, user names, or process identifiers. Check DBMS settings and existing audit records to verify a user name associated with the event is being captured and stored with the audit records. If audit records exist without specific user information, this is a finding. Configure DBMS audit settings to include user name as part of the audit record. Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. To support analysis, some types of events will need information to be logged that exceeds the basic requirements of event type, time stamps, location, source, outcome, and user identity. If additional information is not available, it could negatively impact forensic investigations into user actions or other malicious events. The organization must determine what additional information is required for complete analysis of the audited events. The additional information required is dependent on the type of information (e.g., sensitivity of the data and the environment within which it resides). At a minimum, the organization must employ either full-text recording of privileged commands or the individual identities of users of shared accounts, or both. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise. Examples of detailed information the organization may require in audit records are full-text recording of privileged commands or the individual identities of shared account users. Review the system documentation to identify what additional information the organization has determined to be necessary. Check DBMS settings and existing audit records to verify that all organization-defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any additional information is defined and is not contained in the audit records, this is a finding. Configure DBMS audit settings to include all organization-defined detailed information in the audit records for audit events identified by type, location, or subject. It is critical that when the DBMS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failures in the audit capturing mechanisms; and audit storage capacity being reached or exceeded. Responses to audit failure depend upon the nature of the failure mode. When the need for system availability does not outweigh the need for a complete audit trail, the DBMS should shut down immediately, rolling back all in-flight transactions. Systems where audit trail completeness is paramount will most likely be at a lower MAC level than MAC I; the final determination is the prerogative of the application owner, subject to Authorizing Official concurrence. In any case, sufficient auditing resources must be allocated to avoid a shutdown in all but the most extreme situations. If the application owner has determined that the need for system availability outweighs the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of shutting down, rolling back all in-flight transactions, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of shutting down upon audit failure but is not configured to do so, this is a finding. Configure the system to shut down, rolling back all in-flight transactions, in the case of an auditing failure. Internal system clocks are typically a feature of server hardware and are maintained and used by the operating system. They are typically synchronized with an authoritative time server at regular intervals. Without an internal system clock used as the reference for the time stored on each event to provide a trusted common reference for the time, forensic analysis would be impeded. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Time stamps generated by the internal system clock and used by the DBMS shall include both date and time. The time may be expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. If time sources other than the system time are used for audit records, the timeline of events can get skewed. This makes forensic analysis of the logs much less reliable. Using product documentation, verify that the DBMS uses current time stamp values obtained from or synchronized with the internal system clock used by the operating system. If it is not able to, this is a finding. If it is able to but is configured so that it does not do so, this is a finding. Deploy a DBMS that can use time stamp values obtained from or synchronized with the internal system clock used by the operating system. Configure the DBMS to use time stamp values obtained from or synchronized with the internal system clock used by the operating system. If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to audit records provides information an attacker could potentially use to his or her advantage. To ensure the veracity of audit data, the information system and/or the application must protect audit information from any and all unauthorized access. This includes read, write, copy, etc. This requirement can be achieved through multiple methods which will depend upon system architecture and design. Some commonly employed methods include ensuring log files enjoy the proper file system permissions utilizing file system protections and limiting log data location. Additionally, applications with user interfaces to audit records should not allow for the unfettered manipulation of or access to those records via the application. If the application provides access to the audit data, the application becomes accountable for ensuring that audit information is protected from unauthorized access. Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. Review locations of audit logs, both internal to the database and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized access. If appropriate controls and permissions do not exist, this is a finding. Apply controls and modify permissions to protect database audit log data from unauthorized access, whether stored in the database itself or at the OS level. If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of audit data the information system and/or the application must protect audit information from unauthorized modification. This requirement can be achieved through multiple methods that will depend upon system architecture and design. Some commonly employed methods include ensuring log files enjoy the proper file system permissions and limiting log data locations. Applications providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights that the user enjoys in order to make access decisions regarding the modification of audit data. Modification of database audit data could mask the theft of, or the unauthorized modification of, sensitive data stored in the database. Verify there are appropriate controls and permissions to protect the audit information from unauthorized modification. Apply controls and modify permissions to protect database audit log data from unauthorized modification, whether stored in the database itself or at the OS level. To ensure the veracity of audit data, the information system and/or the application must protect audit information from unauthorized deletion. This requirement can be achieved through multiple methods which will depend upon system architecture and design. Some commonly employed methods include: ensuring log files enjoy the proper file system permissions utilizing file system protections; restricting access; and backing up log data to ensure log data is retained. Applications providing a user interface to audit data will leverage user permissions and roles identifying the user accessing the data and the corresponding rights the user enjoys in order make access decisions regarding the deletion of audit data. Deletion of database audit data could mask the theft of, or the unauthorized modification of, sensitive data stored in the database. Review locations of audit logs, both internal to the database, and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized deletion. Apply controls and modify permissions to protect database audit log data from unauthorized deletion, whether stored in the database itself or at the OS level. Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may provide the only means to manipulate and manage application and system log data. It is, therefore, imperative that access to audit tools be controlled and protected from unauthorized access. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, OS-provided audit tools, vendor-provided audit tools, and open source audit tools needed to successfully view and manipulate audit information system activity and records. If an attacker were to gain access to audit tools, he could analyze audit logs for system weaknesses or weaknesses in the auditing itself. An attacker could also manipulate logs to hide evidence of malicious activity. Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database. If appropriate permissions and access controls to prevent unauthorized access are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be accessible by authorized personnel only. Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the modification of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators. If appropriate permissions and access controls to prevent unauthorized configuration are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be configurable by authorized personnel only. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order make access decisions regarding the deletion of audit tools. If appropriate permissions and access controls to prevent unauthorized removal are not applied to these tools, this is a finding. Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Ensure that tools may be removed by authorized personnel only. Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access to the owned objects to other subjects. Database functions and procedures can be coded using definer's rights. This allows anyone who utilizes the object to perform the actions if they were the owner. If not properly managed, this can lead to privileged actions being taken by unauthorized individuals. Conversely, if critical tables or other objects rely on unauthorized owner accounts, these objects may be lost when an account is removed. Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s). If any database objects are found to be owned by users not authorized to own database objects, this is a finding. Assign ownership of authorized objects to authorized object owner accounts. When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Multiple applications can provide a cumulative negative effect. A vulnerability and subsequent exploit to one application can lead to an exploit of other applications sharing the same security context. For example, an exploit to a web server process that leads to unauthorized administrative access to host system directories can most likely lead to a compromise of all applications hosted by the same system. Database software not installed using dedicated directories both threatens and is threatened by other hosted applications. Access controls defined for one application may by default provide access to the other application's database objects or directories. Any method that provides any level of separation of security context assists in the protection between applications. Review the DBMS software library directory and note other root directories located on the same disk directory or any subdirectories. If any non-DBMS software directories exist on the disk directory, examine or investigate their use. If any of the directories are used by other applications, including third-party applications that use the DBMS, this is a finding. Only applications that are required for the functioning and administration, not use, of the DBMS should be located in the same disk directory as the DBMS software libraries. If other applications are located in the same directory as the DBMS, this is a finding. For databases located on mainframes, confirm that the database and its configuration files are isolated in their own DASD pools. If database software and database configuration files share DASD with other applications, this is a finding. Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory. For mainframe-based databases, locate database software and configuration files in separate DASD pools from other mainframe applications. When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can have significant effects on the overall security of the system. If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Accordingly, only qualified and authorized individuals shall be allowed access to information system components for purposes of initiating changes, including upgrades and modifications. DBA and other privileged administrative or application owner accounts are granted privileges that allow actions that can have a great impact on database security and operation. It is especially important to grant privileged access to only those persons who are qualified and authorized to use them. Review procedures for controlling, granting access to, and tracking use of the DBMS software installation account. If access or use of this account is not restricted to the minimum number of personnel required or if unauthorized access to the account has been granted, this is a finding. Develop, document, and implement procedures to restrict and track use of the DBMS software installation account. Accordingly, only qualified and authorized individuals shall be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications. Unmanaged changes that occur to the database software libraries or configuration can lead to unauthorized or compromised installations. Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done. Verify the list of files, directories, and database application objects (procedures, functions, and triggers) being monitored is complete. If monitoring does not occur or is not complete, this is a finding. Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users. Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Examples include, but are not limited to, installing advertising software, demonstrations, or browser plugins not related to requirements or providing a wide array of functionality, not required for every mission, that cannot be disabled. DBMSs must adhere to the principles of least functionality by providing only essential capabilities. Demonstration and sample database objects and applications present publicly known attack points for malicious users. These demonstration and sample objects are meant to provide simple examples of coding specific functions and are not developed to prevent vulnerabilities from being introduced to the DBMS and host system. Review vendor documentation and vendor websites to identify vendor-provided demonstration or sample databases, database applications, objects, and files. Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application. If any are present in the database or are included with the DBMS application, this is a finding. Remove any demonstration and sample databases, database applications, objects, and files from the DBMS. It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Review the list of components and features installed with the database. Use the DBMS product installation tool if supported and review the product installation documentation. If unused components or features are installed and are not documented and authorized, this is a finding. Uninstall unused components or features that are installed and can be uninstalled. Remove any database objects and applications that are installed to support them. Unused, unnecessary DBMS components increase the attack vector for the DBMS by introducing additional targets for attack. By minimizing the services and applications installed on the system, the number of potential vulnerabilities is reduced. Components of the system that are unused and cannot be uninstalled must be disabled. The techniques available for disabling components will vary by DBMS product, OS, and the nature of the component and may include DBMS configuration settings, OS service settings, OS file access security, and DBMS user/role permissions. Review the DBMS for unused components of the system that cannot be uninstalled. If unused components or features are present on the system, can be disabled, and are not disabled, this is a finding. Disable any unused components or features that cannot be uninstalled. It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. Applications must adhere to the principles of least functionality by providing only essential capabilities. DBMSs may spawn additional external processes to execute procedures that are defined in the DBMS but stored in external host files (external procedures). The spawned process used to execute the external procedure may operate within a different OS security context than the DBMS and provide unauthorized access to the host system. Review the database for definitions of application executable objects stored external to the database. Determine if there are methods to disable use or access, or to remove definitions for external executable objects. Verify each application executable object listed is authorized by the ISSO. If any are not, this is a finding. Disable use of or remove any external application executable object definitions that are not authorized. In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols/services on information systems. Applications are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the application must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues. Database Management Systems using ports, protocols, and services deemed unsafe are open to attack through those ports, protocols, and services. This can allow unauthorized access to the database and through the database to other components of the information system. Review the DBMS settings and local documentation for functions, ports, protocols, and services that are not approved. If any are found, this is a finding. Disable functions, ports, protocols, and services that are not approved. To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses, except the following: (i) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and (ii) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals using shared accounts, for detailed accountability of individual activity. Review DBMS settings to determine whether organizational users are uniquely identified and authenticated when logging on/connecting to the system. If organizational users are not uniquely identified and authenticated, this is a finding. Configure DBMS settings to uniquely identify and authenticate all organizational users who log on/connect to the system. The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, database passwords stored in clear text, using reversible encryption, or using unsalted hashes would be vulnerable to unauthorized disclosure. Database passwords must always be in the form of one-way, salted hashes when stored internally or externally to the DBMS. Review the list of DBMS database objects, database configuration files, associated scripts, and applications defined within and external to the DBMS that access the database. The list should also include files or settings used to configure the operational environment for the DBMS and for interactive DBMS user accounts. Determine whether any DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings contain database passwords. If any do, confirm that DBMS passwords stored internally or externally to the DBMS are hashed using FIPS-approved cryptographic algorithms and include a salt. If any passwords are stored in clear text, this is a finding. If any passwords are stored with reversible encryption, this is a finding. If any passwords are stored using unsalted hashes, this is a finding. Develop, document, and maintain a list of DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings in the System Security Plan. Record whether they do or do not contain DBMS passwords. If passwords are present, ensure that they are correctly hashed using one-way, salted hashing functions, and that the hashes are protected by host system security. In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database. Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding. If it is determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding. Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level. Ensure passwords remain encrypted from source to destination. A certificate’s certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust, time validity and revocation status for each certificate in the certification path. Revocation status information for CA and subject certificates in a certification path is commonly provided via certificate revocation lists (CRLs) or online certificate status protocol (OCSP) responses. Database Management Systems that do not validate certificates by performing RFC 5280-compliant certification path validation are in danger of accepting certificates that are invalid and/or counterfeit. This could allow unauthorized access to the database. Review DBMS configuration to verify that certificates being accepted by the DBMS are validated by performing RFC 5280-compliant certification path validation. If certificates are not being validated by performing RFC 5280-compliant certification path validation, this is a finding. Configure the DBMS to validate certificates by performing RFC 5280-compliant certification path validation. The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by requiring the certificate holder to cryptographically prove possession of the corresponding private key. If the private key is stolen, an attacker can use the private key(s) to impersonate the certificate holder. In cases where the DBMS-stored private keys are used to authenticate the DBMS to the system’s clients, loss of the corresponding private keys would allow an attacker to successfully perform undetected man in the middle attacks against the DBMS system and its clients. Both the holder of a digital certificate and the issuing authority must take careful measures to protect the corresponding private key. Private keys should always be generated and protected in FIPS 140-2 validated cryptographic modules. All access to the private key(s) of the DBMS must be restricted to authorized and authenticated users. If unauthorized users have access to one or more of the DBMS's private keys, an attacker could gain access to the key(s) and use them to impersonate the database on the network or otherwise perform unauthorized actions. Review DBMS configuration to determine whether appropriate access controls exist to protect the DBMS's private key(s). If the DMBS’s private key(s) are not stored in a FIPS 140-2 validated cryptographic module, this is a finding. If access to the DBMS’s private key(s) is not restricted to authenticated and authorized users, this is a finding. Store all DBMS PKI private keys in a FIPS 140-2 validated cryptographic module. Ensure access to the DBMS PKI private keys is restricted to only authenticated and authorized users. The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to a DBMS user account for the authenticated identity to be meaningful to the DBMS and useful for authorization decisions. Review DBMS configuration to verify DBMS user accounts are being mapped directly to unique identifying information within the validated PKI certificate. If user accounts are not being mapped to authenticated identities, this is a finding. Configure the DBMS to map the authenticated identity directly to the DBMS user account. Normally, with PKI authentication, the interaction with the user for authentication will be handled by a software component separate from the DBMS, such as ActivIdentity ActivClient. However, in cases where the DBMS controls the interaction, this requirement applies. To prevent the compromise of authentication information such as passwords and PINs during the authentication process, the feedback from the system must not provide any information that would allow an unauthorized user to compromise the authentication mechanism. Obfuscation of user-provided authentication secrets when typed into the system is a method used in addressing this risk. Displaying asterisks when a user types in a password or a smart card PIN is an example of obscuring feedback of authentication secrets. If all interaction with the user for purposes of authentication is handled by a software component separate from the DBMS, this is not a finding. If any application, tool or feature associated with the DBMS/database displays any authentication secrets (to include PINs and passwords) during - or after - the authentication process, this is a finding. Modify and configure each non-compliant application, tool, or feature associated with the DBMS/database so that it does not display authentication secrets. Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures to protect data. Weak algorithms can be easily broken and not validated cryptographic modules may not implement algorithms correctly. Unapproved cryptographic modules or algorithms should not be relied on for authentication, confidentiality or integrity. Weak cryptography could allow an attacker to gain access to and modify data stored in the database as well as the administration settings of the DBMS. Applications, including DBMSs, utilizing cryptography are required to use approved NIST FIPS 140-2 validated cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The security functions validated as part of FIPS 140-2 for cryptographic modules are described in FIPS 140-2 Annex A. NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. Review DBMS configuration to verify it is using NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. If NIST FIPS 140-2 validated modules are not being used for all cryptographic operations, this is a finding. Utilize NIST FIPS 140-2 validated cryptographic modules for all cryptographic operations. Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access, such as accessing a web server. Accordingly, a risk assessment is used in determining the authentication needs of the organization. Scalability, practicality, and security are simultaneously considered in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk to organizational operations, organizational assets, individuals, other organizations, and the Nation. Review DBMS settings to determine whether non-organizational users are uniquely identified and authenticated when logging onto the system. If non-organizational users are not uniquely identified and authenticated, this is a finding. Configure DBMS settings to uniquely identify and authenticate all non-organizational users who log onto the system. Information system management functionality includes functions necessary to administer databases, network components, workstations, or servers and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical and is accomplished by using different computers, different central processing units, different instances of the operating system, different network addresses, combinations of these methods, or other methods, as appropriate. An example of this type of separation is observed in web administrative interfaces that use separate authentication methods for users of any other information system resources. This may include isolating the administrative interface on a different domain and with additional access controls. If administrative functionality or information regarding DBMS management is presented on an interface available for users, information on DBMS settings may be inadvertently made available to the user. Check DBMS settings and vendor documentation to verify that administrative functionality is separate from user functionality. If administrator and general user functionality are not separated either physically or logically, this is a finding. Configure DBMS to separate database administration and general user functionality. Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries to capture and continue to employ previously valid session IDs. This requirement focuses on communications protection for the DBMS session rather than for the network packet. The intent of this control is to establish grounds for confidence at each end of a communications session in the ongoing identity of the other party and in the validity of the information being transmitted. Session IDs are tokens generated by DBMSs to uniquely identify a user's (or process's) session. DBMSs will make access decisions and execute logic based on the session ID. Unique session IDs help to reduce predictability of said identifiers. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. When a user logs out, or when any other session termination event occurs, the DBMS must terminate the user session(s) to minimize the potential for sessions to be hijacked. Review DBMS settings and vendor documentation to verify user sessions are terminated, and session identifiers invalidated, upon user logout. If they are not, this is a finding. Review system documentation and organization policy to identify other events that should result in session terminations. If other session termination events are defined, review DBMS settings to verify occurrences of these events would cause session termination, invalidating the session identifiers. If occurrences of defined session terminating events do not cause session terminations, invalidating the session identifiers, this is a finding. Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon user logout. Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon the occurrence of any organization- or policy-defined session termination event. DBMSs utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the session identifier or can inject or manually insert session information, the session may be compromised. The DBMS must recognize only system-generated session identifiers. If an attacker were able to generate a session with a non-system-generated session identifier and have it recognized by the system, the attacker could gain access to the system without passing through access controls designed to limit database sessions to authorized users. Review DBMS settings and vendor documentation to determine whether the DBMS recognizes session identifiers that are not system-generated. If the DBMS recognizes session identifiers that are not system generated, this is a finding. Utilize a DBMS product that only recognizes session identifiers that are system-generated. Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Systems that fail suddenly and with no incorporated failure state planning may leave the hosting system available but with a reduced security protection capability. Preserving information system state data also facilitates system restart and return to the operational mode of the organization with less disruption of mission/business processes. Databases must fail to a known consistent state. Transactions must be successfully completed or rolled back. In general, security mechanisms should be designed so that a failure will follow the same execution path as disallowing the operation. For example, application security methods, such as isAuthorized(), isAuthenticated(), and validate(), should all return false if there is an exception during processing. If security controls can throw exceptions, they must be very clear about exactly what that condition means. Abort refers to stopping a program or function before it has finished naturally. The term abort refers to both requested and unexpected terminations. Check DBMS settings and vendor documentation to verify the DBMS properly handles transactions in the event of a system failure. If open transactions are not rolled back to a consistent state during system failure, this is a finding. The consistent state must include a security configuration that is at least as restrictive as before the system failure. If this is not guaranteed, this is a finding. Configure DBMS settings so that, in the event of a system failure, the DBMS will roll back open transactions to a consistent state, to include a security configuration that is at least as restrictive as before the system failure. Preserving information system state information helps to facilitate system restart and return to the operational mode of the organization with less disruption of mission/business processes. Since it is usually not possible to test this capability in a production environment, systems should either be validated in a testing environment or prior to installation. This requirement is usually a function of the design of the IDPS component. Compliance can be verified by acceptance/validation processes or vendor attestation. Check DBMS settings to determine whether organization-defined system state information is being preserved in the event of a system failure. If organization-defined system state information is not being preserved, this is a finding. Configure DBMS settings to preserve any organization-defined system state information in the event of a system failure. This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational information system. Applications and application users generate information throughout the course of their application use. User data generated, as well as application-specific configuration data, needs to be protected. Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate. If the confidentiality and integrity of application data is not protected, the data will be open to compromise and unauthorized modification. Review DBMS settings to determine whether controls exist to protect the confidentiality and integrity of data at rest in the database. If controls do not exist or are not enabled, this is a finding. Apply appropriate controls to protect the confidentiality and integrity of data at rest in the database. An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Developers and implementers can increase the assurance in security functions by employing well-defined security policy models; structured, disciplined, and rigorous hardware and software development techniques; and sound system/security engineering principles. Database Management Systems typically separate security functionality from non-security functionality via separate databases or schemas. Database objects or code implementing security functionality should not be commingled with objects or code implementing application logic. When security and non-security functionality are commingled, users who have access to non-security functionality may be able to access security functionality. Check DBMS settings to determine whether objects or code implementing security functionality are located in a separate security domain, such as a separate database or schema created specifically for security functionality. If security-related database objects or code are not kept separate, this is a finding. Locate security-related database objects and code in a separate database, schema, or other separate security domain from database objects and code implementing application logic. Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Data used for the development and testing of applications often involves copying data from production. It is important that specific procedures exist for this process, to include the conditions under which such transfer may take place, where the copies may reside, and the rules for ensuring sensitive data are not exposed. Copies of sensitive data must not be misplaced or left in a temporary location without the proper controls. Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems, or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding. Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy, and to ensure copies of production data are not left in unsecured locations. Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application or information system compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application. With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of the dynamic execution capabilities of various programming languages, including dialects of SQL. Potentially, the attacker can gain unauthorized access to data, including security settings, and severely corrupt or destroy the database. Even when no such hijacking takes place, invalid input that gets recorded in the database, whether accidental or malicious, reduces the reliability and usability of the system. Available protections include data types, referential constraints, uniqueness constraints, range checking, and application-specific logic. Application-specific logic can be implemented within the database in stored procedures and triggers, where appropriate. Review DBMS code (stored procedures, functions, triggers), application code, settings, column and field definitions, and constraints to determine whether the database is protected against invalid input. If code exists that allows invalid data to be acted upon or input into the database, this is a finding. If column/field definitions do not exist in the database, this is a finding. If columns/fields do not contain constraints and validity checking where required, this is a finding. Where a column/field is noted in the system documentation as necessarily free-form, even though its name and context suggest that it should be strongly typed and constrained, the absence of these protections is not a finding. Where a column/field is clearly identified by name, caption or context as Notes, Comments, Description, Text, etc., the absence of these protections is not a finding. Modify database code to properly validate data before it is put into the database or acted upon by the database. Modify the database to contain column/field definitions for each column/field in the database. Modify the database to contain constraints and validity checking on database columns and tables that require them for data integrity. Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromising the data and security of the system. The structure and content of error messages need to be carefully considered by the organization and development team. Databases can inadvertently provide a wealth of information to an attacker through improperly handled error messages. In addition to sensitive business or personal information, database errors can provide host names, IP addresses, user names, and other system information not required for troubleshooting but very useful to someone targeting the system. Carefully consider the structure/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, logon attempts with passwords entered by mistake as the username, mission/business information that can be derived from (if not stated explicitly by) information recorded, and personal information, such as account numbers, social security numbers, and credit card numbers. Check DBMS settings and custom database code to verify that error messages do not contain information beyond what is needed for troubleshooting the issue. If database errors contain PII data, sensitive business data, or information useful for identifying the host system or database structure, this is a finding. Configure DBMS settings, custom database code, and associated application code not to divulge sensitive information or information useful for system identification in error messages. If the DBMS provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully considered by the organization and development team. The extent to which the information system is able to identify and handle error conditions is guided by organizational policy and operational requirements. Some default DBMS error messages can contain information that could aid an attacker in, among others things, identifying the database type, host address, or state of the database. Custom errors may contain sensitive customer information. It is important that detailed error messages be visible only to those who are authorized to view them; that general users receive only generalized acknowledgment that errors have occurred; and that these generalized messages appear only when relevant to the user's task. For example, a message along the lines of, "An error has occurred. Unable to save your changes. If this problem persists, please contact your help desk" would be relevant. A message such as "Warning: your transaction generated a large number of page splits" would likely not be relevant. Administrative users authorized to review detailed error messages typically are the ISSO, ISSM, SA and DBA. Other individuals or roles may be specified according to organization-specific needs, with DBA approval. Check DBMS settings and custom database code to determine if detailed error messages are ever displayed to unauthorized individuals. If detailed error messages are displayed to individuals not authorized to view them, this is a finding. Configure DBMS settings, custom database code, and associated application code not to display detailed error messages to those not authorized to view them. Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user-controlled table permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control. Review system documentation to identify the required discretionary access control (DAC). Review the security configuration of the database and DBMS. If applicable, review the security configuration of the application(s) using the database. If the discretionary access control defined in the documentation is not implemented in the security configuration, this is a finding. Implement the organization's DAC policy in the security configuration of the database and DBMS, and, if applicable, the security configuration of the application(s) using the database. In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, functions, triggers, etc.) and/or external code modules with elevated privileges. However, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking the functionality applications/programs, those users are indirectly provided with greater privileges than assigned by organizations. Privilege elevation must be utilized only where necessary and protected from misuse. Review the system documentation, database and DBMS security configuration, source code for DBMS internal logic, source code of external modules invoked by the DBMS, and source code of the application(s) using the database. If elevation of DBMS privileges is utilized but not documented, this is a finding. If elevation of DBMS privileges is documented, but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, or in contexts other than intended, or by subjects/principals other than intended, this is a finding. Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the database and DBMS security configuration, DBMS internal logic, external modules invoked by the DBMS, and the application(s) using the database, to ensure privilege elevation is used only as required. Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. System documentation should include a definition of the functionality considered privileged. Depending on circumstances, privileged functions can include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. A privileged function in the DBMS/database context is any operation that modifies the structure of the database, its built-in logic, or its security settings. This would include all Data Definition Language (DDL) statements and all security-related statements. In an SQL environment, it encompasses, but is not necessarily limited to: There may also be Data Manipulation Language (DML) statements that, subject to context, should be regarded as privileged. Possible examples include: TRUNCATE TABLE; DELETE, or DELETE affecting more than n rows, for some n, or DELETE without a WHERE clause; UPDATE or UPDATE affecting more than n rows, for some n, or UPDATE without a WHERE clause; any SELECT, INSERT, UPDATE, or DELETE to an application-defined security table executed by other than a security principal. Depending on the capabilities of the DBMS and the design of the database and associated applications, the prevention of unauthorized use of privileged functions may be achieved by means of DBMS security features, database triggers, other mechanisms, or a combination of these. Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. Review the DBMS security configuration and/or other means used to protect privileged functionality from unauthorized use. If the configuration does not protect all of the actions defined as privileged, this is a finding. Configure DBMS security to protect all privileged functionality. This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination ends all processes associated with a user's logical session except those batch processes/jobs that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, and time-of-day restrictions on information system use. This capability is typically reserved for specific cases where the system owner, data owner, or organization requires additional assurance. Review system documentation to obtain the organization's definition of circumstances requiring automatic session termination. If the documentation explicitly states that such termination is not required or is prohibited, this is not a finding. If the documentation requires automatic session termination, but the DBMS is not configured accordingly, this is a finding. Configure the DBMS to automatically terminate a user session after organization-defined conditions or trigger events requiring session termination. If a user cannot explicitly end a DBMS session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Such logout may be explicit or implicit. Examples of explicit are: clicking on a "Log Out" link or button in the application window; clicking the Windows Start button and selecting "Log Out" or "Shut Down." Examples of implicit logout are: closing the application's (main) window; powering off the workstation without invoking the OS shutdown. Both the explicit and implicit logouts must be detected by the DBMS. In all cases, the DBMS must ensure that the user's DBMS session and all processes owned by the session are terminated. This should not, however, interfere with batch processes/jobs initiated by the user during his/her online session: these should be permitted to run to completion. Determine, by reviewing DBMS documentation and/or inquiring of the vendor's technical support staff, whether the DBMS satisfies this requirement; and, if it does, determine whether this is inherent, unchangeable behavior, or a configurable feature. If the DBMS does not satisfy the requirement, this is a permanent finding. If the behavior is inherent, this is permanently not a finding. If the behavior is configurable, and the current configuration does not enforce it, this is a finding. Where relevant, modify the configuration to allow the user to manually terminate a session initiated by that user. Without the association of security labels to information, there is no basis for the DBMS to make security-related access-control decisions. Security labels are abstractions representing the basic properties or characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information. These labels are typically associated with internal data structures (e.g., tables, rows) within the database and are used to enable the implementation of access control and flow control policies, reflect special dissemination, handling or distribution instructions, or support other aspects of the information security policy. One example includes marking data as classified or FOUO. These security labels may be assigned manually or during data processing, but, either way, it is imperative these assignments are maintained while the data is in storage. If the security labels are lost when the data is stored, there is the risk of a data compromise. The mechanism used to support security labeling may be a feature of the DBMS product, a third-party product, or custom application code. If security labeling is not required, this is not a finding. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in storage, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in storage. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in process, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in process. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in transmission, this is a finding. Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in transmission. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Review system documentation to determine whether the system handles classified information. If the system does not handle classified information, this is not applicable (NA). Review DBMS settings to determine if the database is configured to accept remote connections. If the database is not configured to accept remote connections, this is not a finding. Check DBMS settings to determine whether the data for remote connections is being encrypted with DoD-approved cryptography. If data for remote connections is not being encrypted with DoD-approved cryptography, this is a finding. Configure the DBMS to encrypt data passing over remote connections using DoD-approved encryption appropriate to the sensitivity level. Without the ability to immediately disconnect or disable remote access, an attack or other compromise in progress would not be immediately stopped. The capability must exist to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of missions/business functions and the need to eliminate immediate or future remote access to organizational information systems. The remote access application (e.g., VPN client) may implement features such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Review the DBMS architecture and deployment. If the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access does not exist, this is a finding. Deploy a DBMS with the capability to immediately disconnect current users remotely accessing the information system, and disable further remote access. Enable the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an ongoing attack. The content captured in audit records must be managed from a central location (necessitating automation). Centralized management of audit records and logs provides for efficiency in maintenance and management of records, as well as the backup and archiving of those records. The DBMS may write audit records to database tables, to files in the file system, to other kinds of local repository, or directly to a centralized log management system. Whatever the method used, it must be compatible with off-loading the records to the centralized system. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed. If the DBMS audit records are not written directly to or systematically transferred to a centralized log management system, this is a finding. Configure and/or deploy software tools to ensure that DBMS audit records are written directly to or systematically transferred to a centralized log management system. If the configuration of the DBMS's auditing is spread across multiple locations in the database management software, or across multiple commands, only loosely related, it is harder to use and takes longer to reconfigure in response to events. The DBMS must provide a unified tool for audit configuration. Review DBMS vendor documentation. If the DBMS does not provide a unified tool for audit configuration, this is a finding. Deploy a DBMS that provides a unified tool for audit configuration. In order to ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage capacity. Although another requirement (SRG-APP-000515-DB-000318) mandates that audit data be off-loaded to a centralized log management system, it remains necessary to provide space on the database server to serve as a buffer against outages and capacity limits of the off-loading mechanism. The task of allocating audit record storage capacity is usually performed during initial installation of the DBMS and is closely associated with the DBA and system administrator roles. The DBA or system administrator will usually coordinate the allocation of physical drive space with the application owner/installer and the application will prompt the installer to provide the capacity information, the physical location of the disk, or both. In determining the capacity requirements, consider such factors as: total number of users; expected number of concurrent users during busy periods; number and type of events being monitored; types and amounts of data being captured; the frequency/speed with which audit records are off-loaded to the central log management system; and any limitations that exist on the DBMS's ability to reuse the space formerly occupied by off-loaded records. Investigate whether there have been any incidents where the DBMS ran out of audit log space since the last time the space was allocated or other corrective measures were taken. If there have been, this is a finding. Allocate sufficient audit file/table space to support peak demand. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Review the system documentation for a description of how audit records are off-loaded. If the DBMS has a continuous network connection to the centralized log management system, but the DBMS audit records are not written directly to the centralized log management system or transferred in near-real-time, this is a finding. If the DBMS does not have a continuous network connection to the centralized log management system, and the DBMS audit records are not transferred to the centralized log management system weekly or more often, this is a finding. Configure the DBMS or deploy and configure software tools to transfer audit records to a centralized log management system, continuously and in near-real time where a continuous network connection to the log management system exists, or at least weekly in the absence of such a connection. Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to the DBMS on its own server will not be an issue. However, space will still be required on the DBMS server for audit records in transit, and, under abnormal conditions, this could fill up. Since a requirement exists to halt processing upon audit failure, a service outage would result. If support personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. The appropriate support staff include, at a minimum, the ISSO and the DBA/SA. Review system configuration. If appropriate support staff are not notified immediately upon storage volume utilization reaching 75%, this is a finding. Configure the system to notify appropriate support staff immediately upon storage volume utilization reaching 75%. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability, and system operation may be adversely affected. Alerts provide organizations with urgent messages. Real-time alerts provide these messages immediately (i.e., the time from event detection to alert occurs in seconds or less). Review the system documentation to determine which audit failure events require real-time alerts. Review the DBMS settings and code. If the real-time alerting that is specified in the documentation is not enabled, this is a finding. Configure the system to provide an immediate real-time alert to appropriate support staff when a specified audit failure occurs. When availability is an overriding concern, approved actions in response to an audit failure are as follows: (i) If the failure was caused by the lack of audit record storage capacity, the DBMS must continue generating audit records, if possible (automatically restarting the audit service if necessary), overwriting the oldest audit records in a first-in-first-out manner. (ii) If audit records are sent to a centralized collection server and communication with this server is lost or the server fails, the DBMS must queue audit records locally until communication is restored or until the audit records are retrieved manually. Upon restoration of the connection to the centralized collection server, action should be taken to synchronize the local audit data with the collection server. Systems where availability is paramount will most likely be MAC I; the final determination is the prerogative of the application owner, subject to Authorizing Official concurrence. In any case, sufficient auditing resources must be allocated to avoid audit data loss in all but the most extreme situations. If the application owner has determined that the need for system availability does not outweigh the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of continuing to generate audit records, overwriting the oldest existing records, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of continuing to generate audit records upon audit failure but is not configured to do so, this is a finding. Deploy a DBMS capable of continuing to generate audit records upon audit failure. Configure the system to continue to generate audit records, overwriting the oldest existing records, in the case of an auditing failure. If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the DBMS must include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Some DBMS products offer a data type called TIMESTAMP that is not a representation of date and time. Rather, it is a database state counter and does not correspond to calendar and clock time. This requirement does not refer to that meaning of TIMESTAMP. Verify that the DBMS generates time stamps, in audit records and application data, that maps to UTC. If it does not, this is a finding. Ensure the DBMS generates time stamps, in audit records and application data, that maps to UTC. Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the DBMS must include date and time. Granularity of time measurements refers to the precision available in time stamp values. Granularity coarser than one second is not sufficient for audit trail purposes. Time stamp values are typically presented with three or more decimal places of seconds; however, the actual granularity may be coarser than the apparent precision. For example, SQL Server's GETDATE()/CURRENT_TMESTAMP values are presented to three decimal places, but the granularity is not one millisecond: it is about 1/300 of a second. Review product documentation to verify that the DBMS can generate time stamps with a granularity of one second or finer. If it cannot, this is a finding. Review audit log records produced by the DBMS for confirmation that time stamps are recorded to a precision of one second or finer. If not, this is a finding. Review time stamp values in audit trail columns/fields in application data in the database. If the time stamps are not recorded to a precision of one second or finer, this is a finding. Deploy a DBMS that can generate and record time stamps with a granularity of one second or finer. Configure auditing so that the time stamps are recorded to a precision of one second or finer. Modify applications and/or column/field definitions so that the time stamps in audit trail columns/fields in application data are recorded to a precision of one second or finer. If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost. This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real time, within minutes, or within hours. If the DBMS does not provide the ability for users in authorized roles to reconfigure auditing at any time of the user's choosing, this is a finding. If changes in audit configuration cannot take effect until after a certain time or date, or until some event, such as a server restart, has occurred, and if that time or event does not meet the requirements specified by the application owner, this is a finding. Deploy a DBMS that provides the ability for users in authorized roles to reconfigure auditing at any time. Deploy a DBMS that allows audit configuration changes to take effect within the timeframe required by the application owner and without involving actions or events that the application owner rules unacceptable. To aid in diagnosis, it is necessary to keep track of failed attempts in addition to the successful ones. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to retrieve privileges/permissions/role membership. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies retrieval of privileges/permissions/role memberships. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent retrieval of privileges/permissions/role memberships. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to privileges/permissions/role membership. If currently required, configure the DBMS to produce audit records when it denies access to privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent access to privileges/permissions/role membership. Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevated privileges give users access to information and functionality that they should not have; restricted privileges wrongly deny access to authorized users. In an SQL environment, adding permissions is typically done via the GRANT command, or, in the negative, the DENY command. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are added. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are added. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are added. Configure the DBMS to produce audit records when privileges/permissions/role memberships are added. Failed attempts to change the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized attempts to elevate or restrict privileges could go undetected. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to add privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies the addition of privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent the addition of privileges/permissions/role membership. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to add privileges/permissions/role membership. In an SQL environment, modifying permissions is typically done via the GRANT, REVOKE, and DENY commands. If there is no distinction in the DBMS's security architecture between modifying permissions on the one hand, and adding and deleting permissions on the other hand, this is not a finding. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are modified. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are modified. Configure the DBMS to produce audit records when privileges/permissions/role memberships are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify privileges/permissions/role membership. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify privileges/permissions/role membership. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to modify privileges/permissions/role membership. In an SQL environment, deleting permissions is typically done via the REVOKE or DENY command. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Configure DBMS audit settings to generate an audit record when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts remove, revoke, or deny privileges/permissions/role membership to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when it denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via specialized security functionality. In an SQL environment, types of access include, but are not necessarily limited to: If the DBMS architecture makes it impossible for any user, even with the highest privileges, to directly view or directly modify the contents of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are accessed. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access security object. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Configure the DBMS to produce audit records when other errors prevent access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Changes in the database objects (tables, views, procedures, functions) that record and control permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized changes to the security subsystem could go undetected. The database could be severely compromised or rendered inoperative. If the DBMS architecture makes it impossible for any user, even with the highest privileges, to modify the structure and logic of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are modified. Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are modified. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify security objects. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies attempts to modify security objects, to include reads, creations, modifications, and deletions. Configure the DBMS to produce audit records when other errors prevent attempts to modify security objects, to include reads, creations, modifications, and deletions. The removal of security objects from the database/DBMS would seriously degrade a system's information assurance posture. If such an event occurs, it must be logged. If the DBMS architecture makes it impossible for any user, even with the highest privileges, to drop its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are drop. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are drop. Deploy a DBMS capable of producing the required audit records when security objects are deleted. Configure the DBMS to produce audit records when security objects are deleted. The removal of security objects from the database/DBMS would seriously degrade a system's information assurance posture. If such an action is attempted, it must be logged. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to drop security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to drop security objects. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to drop security objects. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to delete security objects. Configure the DBMS to produce audit records when it denies attempts to delete security objects. Configure the DBMS to produce audit records when other errors prevent attempts to delete security objects. Changes in categories of information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer to FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems, and FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems. Review DBMS documentation to verify that audit records can be produced when categories of information are accessed, to include reads, creations, modifications, and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are accessed, to include reads, creations, modifications, and deletions. Deploy a DBMS capable of producing the required audit records when categories of information are accessed. Configure the DBMS to produce audit records when categories of information are accessed, to include reads, creations, modifications, and deletions. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access categories of information, such access to include reads, creations, modifications and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access categories of information, such access to include reads, creations, modifications and deletions. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access categories of information, such access to include reads, creations, modifications and deletions. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to categories of information. Configure the DBMS to produce audit records when it denies access to categories of information, such access to include reads, creations, modifications and deletions. Configure the DBMS to produce audit records when other errors prevent access to categories of information, such access to include reads, creations, modifications and deletions. Review DBMS documentation to verify that audit records can be produced when categories of information are modified. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are modified. Deploy a DBMS capable of producing the required audit records when categories of information are modified. Configure the DBMS to produce audit records when categories of information are modified. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify categories of information. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete modification of categories of information. Configure the DBMS to produce audit records when it denies modification of categories of information. Configure the DBMS to produce audit records when other errors prevent modification of categories of information. Review DBMS documentation to verify that audit records can be produced when categories of information are deleted. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are deleted. Deploy a DBMS capable of producing the required audit records when categories of information are deleted. Configure the DBMS to produce audit records when categories of information are deleted. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to delete categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to delete categories of information. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to delete categories of information. Deploy a DBMS capable of producing the required audit records when it denies or fails to complete deletion of categories of information. Configure the DBMS to produce audit records when it denies deletion of categories of information. Configure the DBMS to produce audit records when other errors prevent deletion of categories of information. For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to the DBMS. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs on or connects to the DBMS, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs on or connects to the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier. For completeness of forensic analysis, it is necessary to track failed attempts to log on to the DBMS. While positive identification may not be possible in a case of failed authentication, as much information as possible about the incident must be captured. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) attempts but fails to log on or connect to the DBMS (including attempts where the user ID is invalid/unknown), this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) attempts but fails to log on or connect to the DBMS. Include attempts where the user ID is invalid/unknown. Ensure that the audit record contains the time of the event and the user ID that was entered (if any). For completeness of forensic analysis, it is necessary to know how long a user's (or other principal's) connection to the DBMS lasts. This can be achieved by recording disconnections, in addition to logons/connections, in the audit logs. Disconnection may be initiated by the user or forced by the system (as in a timeout) or result from a system or network failure. To the greatest extent possible, all disconnections must be logged. Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs off or disconnects from the DBMS voluntarily, or forced by the system, or because of connection or other failure, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs off or disconnects, whether voluntarily or forced by the system, or because of connection or other failure, from the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier. For completeness of forensic analysis, it is necessary to track who logs on to the DBMS. Concurrent connections by the same user from multiple workstations may be valid use of the system; or such connections may be due to improper circumvention of the requirement to use the CAC for authentication; or they may indicate unauthorized account sharing; or they may be because an account has been compromised. (If the fact of multiple, concurrent logons by a given user can be reliably reconstructed from the log entries for other events (logons/connections; voluntary and involuntary disconnections), then it is not mandatory to create additional log entries specifically for this.) Review the DBMS audit settings. If the fact of multiple, concurrent logons by a given user (or other principal) can be reliably reconstructed from the log entries for other events, then this is not a finding. If an audit record is not generated each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation, this is a finding. Configure DBMS audit settings to generate an audit record each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation. Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. A privileged function in this context is any operation that modifies the structure of the database, its built-in logic, or its security settings. This would include all Data Definition Language (DDL) statements and all security-related statements. In an SQL environment, it encompasses, but is not necessarily limited to: There may also be Data Manipulation Language (DML) statements that, subject to context, should be regarded as privileged. Possible examples in SQL include: Depending on the capabilities of the DBMS and the design of the database and associated applications, audit logging may be achieved by means of DBMS auditing features, database triggers, other mechanisms, or a combination of these. Note that it is particularly important to audit, and tightly control, any action that weakens the implementation of this requirement itself, since the objective is to have a complete audit trail of all administrative activity. Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when privileged actions occur. Review the DBMS/database security and audit configurations and/or other means used to implement audit logging. If audit logging covers at least all of the actions defined as privileged, this is not a finding; otherwise, this is a finding. Deploy a DBMS capable of producing the required audit records when privileged actions occur. Configure the DBMS to produce audit records when privileged actions occur. Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when the DBMS prevents attempted privileged actions. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS prevents attempted privileged actions. Deploy a DBMS capable of producing the required audit records when the DBMS prevents attempted privileged action. Configure the DBMS to produce audit records when the DBMS prevents attempted privileged actions. Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited and can specify which kinds of access must be audited. Review system documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that the specified access to the specified objects is audited. If not, this is a finding. Deploy a DBMS capable of producing the required audit records when object access occurs. Configure audit settings to create audit records when the specified access to the specified objects occurs. Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited, and can specify which kinds of access must be audited. Review DBMS documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that audit records are created for unsuccessful attempts at the specified access to the specified objects. Configure audit settings to create audit records when the specified access to the specified objects is unsuccessfully attempted. In this context, direct access is any query, command, or call to the DBMS that comes from any source other than the application(s) that it supports. Examples would be the command line or a database management utility program. The intent is to capture all activity from administrative and non-standard sources. If the DBMS does not generate audit records for all direct access to the database(s), this is a finding. Configure the DBMS to generate audit records for all direct access to the database(s). Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions pertaining to change control, it should be noted that any changes to the hardware, software, and/or firmware components of the information system can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals should be allowed to obtain access to system components for the purposes of initiating changes, including upgrades and modifications. Review DBMS vendor documentation with respect to its ability to enforce access restrictions associated with changes to the configuration of the DBMS or database(s). If it is not able to do this, this is a finding. Review the security configuration of the DBMS and database(s). If it does not enforce access restrictions associated with changes to the configuration of the DBMS or database(s), this is a finding. Deploy a DBMS capable of enforcing access restrictions associated with changes to the configuration of the DBMS or database(s). Configure the DBMS to enforce access restrictions associated with changes to the configuration of the DBMS or database(s). Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic investigation for after-the-fact actions. Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. Enforcement action methods may be as simple as denying access to a file based on the application of file permissions (access restriction). Audit items may consist of lists of actions blocked by access restrictions or changes identified after the fact. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to change the configuration of the DBMS or database(s). Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to change the configuration of the DBMS or database(s). Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to change the configuration of the DBMS or database(s). Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when it denies attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when other errors prevent attempts to change the configuration of the DBMS or database(s). If the DBMS were to allow any user to make changes to database structure or logic, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Identify the group(s)/role(s) established for DBMS modification. Obtain the list of users in those group(s)/roles. Identify the individuals authorized to modify the DBMS. If unauthorized access to the group(s)/role(s) has been granted, this is a finding. Revoke unauthorized memberships in the DBMS modification group(s)/role(s). Configuring the DBMS to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. In addition to this SRG, sources of guidance on security and information assurance exist. These include NSA configuration guides, CTOs, DTMs, and IAVMs. The DBMS must be configured in compliance with guidance from all such relevant sources. Review the DBMS documentation and configuration to determine if the DBMS is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs. If the DBMS is not configured in accordance with security configuration settings, this is a finding. Configure the DBMS in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs. Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. Review the network functions, ports, protocols, and services supported by the DBMS. If any protocol is prohibited by the PPSM guidance and is enabled, this is a finding. Deploy a DBMS capable of disabling a network function, port, protocol, or service prohibited by the PPSM guidance. Disable each prohibited network function, port, protocol, or service. Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceed the rights of a regular user. DBMS functionality and the nature and requirements of databases will vary; so while users are not permitted to install unapproved software, there may be instances where the organization allows the user to install approved software packages such as from an approved software repository. The requirements for production servers will be more restrictive than those used for development and research. The DBMS must enforce software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization). In the case of a database management system, this requirement covers stored procedures, functions, triggers, views, etc. If the DBMS supports only software development, experimentation and/or developer-level testing (that is, excluding production systems, integration testing, stress testing, and user acceptance testing), this is not a finding. Review the DBMS and database security settings with respect to non-administrative users' ability to create, alter, or replace logic modules, to include but not necessarily only stored procedures, functions, triggers, and views. If any such permissions exist and are not documented and approved, this is a finding. Document and obtain approval for any non-administrative users who require the ability to create, alter or replace logic modules. Implement the approved permissions. Revoke any unapproved permissions. If cached authentication information is out-of-date, the validity of the authentication information may be questionable. Review system settings to determine whether the organization-defined limit for cached authentication is implemented. If it is not implemented, this is a finding. Modify system settings to implement the organization-defined limit on the lifetime of cached authenticators. The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physical token bearing a valid, current, DoD-issued Public Key Infrastructure (PKI) certificate, coupled with a Personal Identification Number (PIN) to be entered by the user at the beginning of each session and whenever re-authentication is required. Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the functional capability of the application, it is critical the user re-authenticate. In addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of individuals and/or devices in other situations, including (but not limited to) the following circumstances: (i) When authenticators change; (ii) When roles change; (iii) When security categories of information systems change; (iv) When the execution of privileged functions occurs; (v) After a fixed period of time; or (vi) Periodically. Within the DoD, the minimum circumstances requiring re-authentication are privilege escalation and role changes. Review the system documentation and the configuration of the DBMS and related applications and tools. If there are any circumstances under which a user is not required to re-authenticate when changing role or escalating privileges, this is a finding. If the information owner has identified additional cases where re-authentication is needed, but there are circumstances where the system does not ask the user to re-authenticate when those cases occur, this is a finding. Modify and/or configure the DBMS and related applications and tools so that users are always required to re-authenticate when changing role or escalating privileges. Modify and/or configure the DBMS and related applications and tools so that users are always required to re-authenticate when the specified cases needing reauthorization occur. The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. Review the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process. If it does not effectively do so, this is a finding. Deploy a DBMS capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process. Configure the DBMS to effectively protect the private resources of one process or user from unauthorized access by another user or process. Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Permitting only DBMS processes and authorized, administrative users to have access to the files where the database resides helps ensure that those files are not shared inappropriately and are not open to backdoor access and manipulation. Review the permissions granted to users by the operating system/file system on the database files, database log files and database backup files. If any user/role who is not an authorized system administrator with a need to know or database administrator with a need to know, or a system account for running DBMS processes, is permitted to read/view any of these files, this is a finding. Configure the permissions granted by the operating system/file system on the database files, database log files, and database backup files so that only relevant system accounts and authorized system administrators and database administrators with a need to know are permitted to read/view these files. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, the DBMS, associated applications, and infrastructure must leverage transmission protection mechanisms. If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. If the DBMS does not employ protective measures against unauthorized disclosure and modification during preparation for transmission, this is a finding. Implement protective measures against unauthorized disclosure and modification during preparation for transmission. Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data nonlocally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When receiving data, the DBMS, associated applications, and infrastructure must leverage protection mechanisms. If the DBMS, associated applications, and infrastructure do not employ protective measures against unauthorized disclosure and modification during reception, this is a finding. Implement protective measures against unauthorized disclosure and modification during reception. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. It is the responsibility of the data owner to assess the cryptography requirements in light of applicable federal laws, Executive Orders, directives, policies, regulations, and standards. NSA-approved cryptography for classified networks is hardware based. This requirement addresses the compatibility of a DBMS with the encryption devices. If the DBMS is deployed in an unclassified environment, this is not applicable (NA). If the DBMS is incompatible with the use of NSA-approved cryptography, this is a finding. If the DBMS is capable but does not use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding. Deploy a DBMS compatible with the use of NSA-approved cryptography. Configure the DBMS and related system components to use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. For detailed information, refer to NIST FIPS Publication 140-2, Security Requirements For Cryptographic Modules. Note that the product's cryptographic modules must be validated and certified by NIST as FIPS-compliant. If the DBMS does not employ NIST FIPS 140-2 validated cryptographic modules to provision digital signatures, this is a finding. Implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures. If the DBMS does not employ NIST FIPS 140-2 validated cryptographic modules to generate and verify cryptographic hashes, this is a finding. Implement a NIST FIPS 140-2 validated cryptographic module in the DBMS for generation and verification of cryptographic hashes. If the DBMS contains, or is intended to contain, unclassified information requiring confidentiality and cryptographic protection, and does not employ NIST FIPS 140-2 validated cryptographic modules to provide this protection, this is a finding. Implement NIST FIPS 140-2 validated cryptographic modules to provide cryptographic protection for the unclassified information that requires it. One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers based on patterns in identifiers already known. The preferred technique for thwarting guesses at Session IDs is the generation of unique session identifiers using a FIPS 140-2 approved random number generator. However, it is recognized that available DBMS products do not all implement the preferred technique yet may have other protections against session hijacking. Therefore, other techniques are acceptable, provided they are demonstrated to be effective. Review DBMS vendor documentation and system behavior (and if necessary, consult vendor representatives) to determine whether the DBMS can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. Review DBMS settings to determine whether protections against man-in-the-middle attacks that guess at session identifier values are enabled. If they are not, this is a finding. Utilize a DBMS product that can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. Configure DBMS settings to enable protections against man-in-the-middle attacks that guess at session identifier values. Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. This requirement focuses on communications protection for the DBMS session rather than for the network packet. If the DBMS will accept non-DoD approved PKI end-entity certificates, this is a finding. Revoke trust in any certificates not issued by a DoD-approved certificate authority. Configure the DBMS to accept only DoD and DoD-approved PKI end-entity certificates. DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. These cryptographic mechanisms may be native to the DBMS or implemented via additional software or operating system/file system settings, as appropriate to the situation. Selection of a cryptographic mechanism is based on the need to protect the integrity of organizational information. The strength of the mechanism is commensurate with the security category and/or classification of the information. Organizations have the flexibility to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields). The decision whether and what to encrypt rests with the data owner and is also influenced by the physical measures taken to secure the equipment and media on which the information resides. Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding. Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection. Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from disclosure, which must include, at a minimum, PII and classified information. If the documentation indicates no information requires such protections, this is not a finding. If any of the information defined as requiring protection is not encrypted in a manner that provides the required level of protection and is not physically secured to the required level, this is a finding. Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection for information requiring cryptographic protection against disclosure. Secure the premises, equipment, and media to provide the required level of physical protection. Database management systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each process has a distinct address space so that communication between processes is controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. Review the DBMS architecture to find out if and how it protects the private resources of one process (such as working memory, temporary tables, uncommitted data and, especially, executable code) from unauthorized access or modification by another user or process. If it is not capable of maintaining a separate execution domain for each executing process, this is a finding. If the DBMS is capable of maintaining a separate execution domain for each executing process, but is configured not to do so, this is a finding. Deploy a DBMS capable of maintaining a separate execution domain for each executing process. If this is a configurable feature, configure the DBMS to implement it. Previous versions of DBMS components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some DBMSs' installation tools may remove older versions of software automatically from the information system. In other cases, manual review and removal will be required. In planning installations and upgrades, organizations must include steps (automated, manual, or both) to identify and remove the outdated modules. A transition period may be necessary when both the old and the new software are required. This should be taken into account in the planning. If software components that have been replaced or made unnecessary are not removed, this is a finding. Identify and remove software components that have been replaced or made unnecessary. Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). This requirement will apply to software patch management solutions that are used to install patches across the enclave and also to applications themselves that are not part of that patch management solution. For example, many browsers today provide the capability to install their own patch software. Patch criticality, as well as system criticality, will vary. Therefore, the tactical situations regarding the patch management process will also vary. This means that the time period utilized must be a configurable parameter. Time frames for application of security-relevant software updates may be dependent upon the Information Assurance Vulnerability Management (IAVM) process. The application will be configured to check for and install security-relevant software updates within an identified time period from the availability of the update. The specific time period will be defined by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs). Obtain evidence that software patches are consistently applied to the DBMS within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding. Institute and adhere to policies and procedures to ensure that patches are consistently applied to the DBMS within the time allowed. With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of the dynamic execution capabilities of various programming languages, including dialects of SQL. In such cases, the attacker deduces the manner in which SQL statements are being processed, either from inside knowledge or by observing system behavior in response to invalid inputs. When the attacker identifies scenarios where SQL queries are being assembled by application code (which may be within the database or separate from it) and executed dynamically, the attacker is then able to craft input strings that subvert the intent of the query. Potentially, the attacker can gain unauthorized access to data, including security settings, and severely corrupt or destroy the database. The principal protection against code injection is not to use dynamic execution except where it provides necessary functionality that cannot be utilized otherwise. Use strongly typed data items rather than general-purpose strings as input parameters to task-specific, pre-compiled stored procedures and functions (and triggers). Review DBMS source code (stored procedures, functions, triggers) and application source code, to identify cases of dynamic code execution. If dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, this is a finding. Where dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, modify the code to do so. When dynamic execution is necessary, ways to mitigate the risk include the following, which should be implemented both in the on-screen application and at the database level, in the stored procedures: -- Allow strings as input only when necessary. -- Rely on data typing to validate numbers, dates, etc. Do not accept invalid values. If substituting other values for them, think carefully about whether this could be subverted. -- Limit the size of input strings to what is truly necessary. -- If single quotes/apostrophes, double quotes, semicolons, equals signs, angle brackets, or square brackets will never be valid as input, reject them. -- If comment markers will never be valid as input, reject them. In SQL, these are -- or /* */ -- If HTML and XML tags, entities, comments, etc., will never be valid, reject them. -- If wildcards are present, reject them unless truly necessary. In SQL these are the underscore and the percentage sign, and the word ESCAPE is also a clue that wildcards are in use. -- If SQL key words, such as SELECT, INSERT, UPDATE, DELETE, CREATE, ALTER, DROP, ESCAPE, UNION, GRANT, REVOKE, DENY, MODIFY will never be valid, reject them. Use case-insensitive comparisons when searching for these. Bear in mind that some of these words, particularly Grant (as a person's name), could also be valid input. -- If there are range limits on the values that may be entered, enforce those limits. -- Institute procedures for inspection of programs for correct use of dynamic coding, by a party other than the developer. -- Conduct rigorous testing of program modules that use dynamic coding, searching for ways to subvert the intended use. -- Record the inspection and testing in the system documentation. -- Bear in mind that all this applies not only to screen input, but also to the values in an incoming message to a web service or to a stored procedure called by a software component that has not itself been hardened in these ways. Not only can the caller be subject to such vulnerabilities; it may itself be the attacker. Review DBMS source code (stored procedures, functions, triggers) and application source code to identify cases of dynamic code execution. If dynamic code execution is employed without protective measures against code injection, this is a finding. Where dynamic code execution is used, modify the code to implement protections against code injection. A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or unintended system behavior caused by invalid inputs, where information system responses to the invalid input may be disruptive or cause the system to fail into an unsafe state. The behavior will be derived from the organizational and system requirements and includes, but is not limited to, notification of the appropriate personnel, creating an audit record, and rejecting invalid input. Review system documentation to determine how input errors are to be handled in general and if any special handling is defined for specific circumstances. Review the source code for database program objects (stored procedures, functions, triggers) and application source code to identify how the system responds to invalid input. If it does not implement the documented behavior, this is a finding. Revise and deploy the source code for database program objects (stored procedures, functions, triggers) and application source code, to implement the documented behavior. V-61407 Added OS/enterprise authentication and identification must be used (SQL2-00-023600). Native DBMS authentication may be used only when circumstances make it unavoidable; and must be documented and AO-approved. The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, the DoD standards for password complexity and lifetime must be implemented. DBMS products that can inherit the rules for these from the operating system or access control program (e.g., Microsoft Active Directory) must be configured to do so. For other DBMSs, the rules must be enforced using available configuration parameters or custom code. f DBMS authentication, using passwords, is not employed, this is not a finding. If the DBMS is configured to inherit password complexity and lifetime rules from the operating system or access control program, this is not a finding. Review the DBMS settings relating to password complexity. Determine whether the following rules are enforced. If any are not, this is a finding. a. minimum of 15 characters, including at least one of each of the following character sets: - Upper-case - Lower-case - Numerics - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <) b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight Review the DBMS settings relating to password lifetime. Determine whether the following rules are enforced. If any are not, this is a finding. a. Password lifetime limits: Minimum 24 hours, maximum 60 days b. Number of password changes before an old one may be reused: Minimum of five If the use of passwords is not needed, configure the DBMS to prevent their use if it is capable of this; if it is not so capable, institute policies and procedures to prohibit their use. If the DBMS can inherit password complexity rules from the operating system or access control program, configure it to do so. Otherwise, use DBMS configuration parameters and/or custom code to enforce the following rules for passwords: a. minimum of 15 characters, including at least one of each of the following character sets: - Upper-case - Lower-case - Numerics - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <) b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight c. Password lifetime limits: Minimum 24 hours, maximum 60 days d. Number of password changes before an old one may be reused: Minimum of five
cc/2019-30/en_middle_0028.json.gz/line1594832
__label__wiki
0.837123
0.837123
Digital Academy – The Film School Abdul Saboor on The Life and Times of Anand… MOHD FAISAL on Methods and Styles of Script… Shawn Ray on Cinematographic Learning Part-… dafilmschool on Cinematographic Learning Part-… academy acting actor Amitabh Bachchan audio-visual behind the scenes Big B Bollywood box office Business Camera career cinema Cinematographer Cinematography cold competitive course creative DA DA experience dance Digital Academy Digital Academy the Film School Direction director documentaries dreams editing editor education film film-maker film festivals film groups film industry film making filmmaking films film trade film trade magazines goals good Hindi movies Hollywood India Indian movies industry trends magazines media movie movies networking niche Passion Producer production production house rewarding screenplay Screenwriting scriptwriting several sound sound effects speech delivery stardom story struggle talent Television true TV writer writing Guest Lecture with Mr.Satyajit Bhatkal Guest Lecture by Purnendu Shekhar Guest Lecture by Neil Sadwelkar Shooting with Green Screen The Art of Cinematography What happened to the Villains? Posted on October 20, 2011 by dafilmschool Stars should be dead, leaving the world lightless and pointless in the 21st Century, according to stardom theorist Richard Dyer. However, in Bollywood, we are experiencing a phenomenon of a different kind. The villains are dying. Gone are the days when cinema was larger than life, shocking the audience at every turn by the larger than life villain, be it a comic book Mogambo in Mr. India (1987), a rough edged Gabbar Sing in Sholay (1975) or a psychopath Gokul Pandit in Dushman (1998). The bad men in post-2000 Bollywood are vanishing out from the silver screen. The question is, why is this happening? If we think, the slow erasure of stardom and the death of the villain are connected. The audience is composed of common working people from all stratas of the society. Whatever the differences between two individuals may be, the common man is always driven by a typical quest regarding existence. He wants to know how anything in society is made, how making is organized and understood, and what their own relation to making is. The complex ways in which we make an explanation of the world around us involves the ways in which we separate ourselves into public and private persons, into producer and consumer. And we always make sense of the world in terms of contrasts and differences. We cannot realize the good unless we know the bad. So, good and bad define one another for us. Which one is accepted as morally or legally good and which one bad depends on the nature of our society, our position in the power hierarchy and our education. Photo Courtesy: http://bit.ly/oUWIsG Dividing all choices into black and white is known as binary opposition to social theorists and practitioners. This works fine when the society is going through a troubled or a developing phase, when the logic of we and they is functional, when the enemy is defined and is at sight. For Hollywood, the enemy was the erstwhile USSR, during the cold war. In India, the enemy was rarely named. But he was there, both inside the border and outside. In the days of nation building, after Independence, the enemies were shown in general categories, like the black marketer, the gambler, the conning middleman or the usurper in the city and the land-owning zamindar in the village. The gullible hero of the ‘50s Bollywood, Raj (as he was known in many of his films), in Raj Kapoor’s movies, who is from the village and comes to the city, is shocked at its corruption. City bred marginal heroes, played by Dev Anand, knows corruption like the back of his hand (eg, Kala Bazaar, 1960) and even the tragic hero played by Dilip Kumar; all of them were defined sharply in contrast with dark opposing characters. By being a counter-force to the enemy of the common man, the hero was recognized by the mass of viewers who thronged cinema halls after a murky day of work and survival. Villains were needed to implant dreams in the spectator. The dreams were the goals, the hero was the active virtual agent through which the spectator would reach the goals and the villain was the necessary barrier, who blocked the hero from reaching the goal. The pattern was epic in structure, as the ultimate goal was always connected to nation building in the post-independence era. The Indian mind accepted it and related it to real life sentiments. Photo Courtesy: http://bit.ly/pXcOxM The situation changed in late ‘60s and early ‘70s. The neighbouring enemy was specifically named after wars with China and Pakistan. Also, the inside enemy was spotted and shown more precisely before and during emergency period. However, the villain became more of a personal, than a social villain, during emergency and since. During the Angry Young Man’s rule in Bollywood, be it Amitabh Bachchan, Vinod Khanna or another less successful actor, the villains were much more flesh and blood and less metaphoric. Those films were driven by a spirit of family vengeance. With rising figures in unemployment, uncertainty at work and a nation caught up in unstable politics (Congress was successfully challenged and thrown out of power for the first time after independence in 1977), more personal stories were required for the dreams on the silver screen. Even after Congress came back in 1980, the scenario remained more or less the same, until it changed for a return of the lovers in the later half of the ‘80s. The villain was still a personal one. But he was not only a professional bad man like those played by Ajit, Prem Chopra or Amjad Khan, but someone like Gulshan Grover or Shakti Kapoor, who is also interested in the heroine. Facing these villians was less vengeance and more of a challenge. A good example of such a villain is Shekhar Malhotra (Deepak Tijori) in Jo Jeeta Wohi Sikandar (1992). However, the old traits did not vanish. The cinema villain matured. Photo Courtesy: http://bit.ly/qRoz1o Two new types of villains appeared in Hindi Cinema at the turn of the decade. The first was the cold blooded villain played by Nana Patekar as Anna Seth (Parinda, 1989); the other was the two-faced hero of Baazigar (1993), Shahrukh Khan. While the first type got worked, reworked and mixed with the second one in films like Krantiveer (1994) or Satya (1998), to become a stereotype in the end, and to gradually evaporate, the second one slowly became the norm. Today’s films are less of an epic and closer to reality. Today’s youth knows how a society runs. Moral values have changed with a feel good economy, after India opened a large section of its market to the world. The concept of black and white villains and heroes are dated. In today’s list of coterie movies, the ambivalence is more prominent. The Badmaash Company (2010) hero Karan (Shahid Kapoor) or Delhi Belly’s (2011) hero Tashi (Imran Khan) could not be considered good even by the standard of ‘90s in Bollywood. They are considered normal. Cheat the cheaters is their motto. Photo Courtesy: http://bit.ly/mWV3u3 When the whole world has become a competition, and the best cheater gets the crown, how can a good hero be pitted against a dark villain? Such villains do not exist anymore, as the heroes have changed themselves. Today’s society does not need such villains because it has dispensed the idea of such heroes. Today’s society lacks a hero, a model figure in the classical sense. Hence, it is only normal that it should lack the contrasting figure of the villain too. Gone are the days when the bloodthirsty Gulshan Grovers romped the screen! Filed under: Film Industry | Tagged: academy, acting, actor, Ajit, Amjad Khan, Amrish Puri, Bollywood, cinema, director, film industry, film trade, films, Gabbar Singh, Gulshan Grover, Hollywood, industry trends, Kader Khan, media, Mogambo, movie, Mr. India, production, Sholay, Villains, writing | 3 Comments » Aditya Jambhale, noted alumni of Digital Academy - The Film School & Director of National Award-winning film, “Aaba… twitter.com/i/web/status/1… 7 months ago Before leaving for the day, Mr. Zaidi shared a parting note with DA. We are humbled and overjoyed for the kind word… twitter.com/i/web/status/1… 7 months ago Any good project requires intense research, but what do you do when you do not have a good source for your research… twitter.com/i/web/status/1… 7 months ago How to impart to the reader that exact emotion that the protagonist in a book experiences? Mr. Zaidi’s narration an… twitter.com/i/web/status/1… 7 months ago Celebrated crime journalist and author Mr. Hussain Zaidi visited DA on 27th of November. Mr Zaidi is a Mumbai based… twitter.com/i/web/status/1… 7 months ago
cc/2019-30/en_middle_0028.json.gz/line1594834
__label__cc
0.58687
0.41313
‘Ochocinco’ Gets Mistakenly Attacked As ‘Chad’ From ‘Bachelorette’ Katie Jerkovich Entertainment Reporter June 08, 2016 4:50 PM ET Chad “Ochocinco” Johnson has been attacked on social media as critics of the “Bachelorette” mistake him for Chad on the show. Since Tuesday night’s show, the former professional football player’s Twitter account has been inundated with references to what he’s done wrong on the reality TV show. The only problem is they’ve got the wrong Chad. Johnson tweeted out a series of posts on his Twitter account to hopefully clear things up and hilarity ensued. (RELATED: Chad Johnson Healed His Injuries In The Most Disgusting Way Imaginable [VIDEO]) No everybody loves me, those that don’t haven’t met me in person. https://t.co/u7u3t19Utf — Chad Johnson (@ochocinco) June 8, 2016 Hi Geri, I’m the black Chad, you’re referring to the other Chad from The Bachelor, I love you. https://t.co/HuAKKThgGK Coincidently I took my classes in 2012 & it helped tremendously, but I’m the black Chad & I love you. https://t.co/RXa21lGW6V This is totally awesome, I will converse w/ the white Chad so he becomes a bit more appealing & likable, I love you. https://t.co/mbvxKpxYEl Tags : chad johnson Katie Jerkovich Follow Katie Jerkovich on Twitter Celebrate Priyanka Chopra's Birthday With These Unforgettable Looks New GOP Campaign Ad Links 'The Squad' To Terrorist Attack On ICE Facility The Democratic Party Is Falling Apart, And The Media Missed The Biggest Part Of The Story
cc/2019-30/en_middle_0028.json.gz/line1594835
__label__wiki
0.926869
0.926869
Tony Eke: Tribute As “Mr YSFON” Goes Home By Segun Adenuga: I HAVE not seen any Nigerian dead or alive, who had painstakingly devoted his entire life to the development of youth football than Tony Eke. He was excellent and elegant, a complete football aficionado of extraordinary savvy. He combined a rare administrative ingenuity in football management with patriotic fervor in raising the standard of football from grassroots level and became an apostle of youth soccer development in the last five decades in Nigeria. No one could fault Tony Eke’s genuine love for youth football development programme right from his childhood days in Ajegunle, the cradle of modern day footballers. He got involved in football matters as a teenager in 1965 when Youth Sport Federation of Apapa (YSFA) was formed by Chief Israel Adebajo, who was also the founder of the famous Stationery Stores Football Club of Lagos as a breeding ground for the would-be Lagos darling club. Tony was in his early 20’s when the likes of Avi Awotoro and Sam Nwobum were being urged to sign for Stores, but it was only petit Awotoro that was preferred to the bulky, stout and lanky Nwobum. At that period, YSFA was firmly under the supervision of former Nigeria national team manager, Major Ibikunle Armstrong, an indigene of Ilaro in Ogun State, whilst millionaire business Kano-born Garba Nautan Hamza was the chairman. Patiently but painstakingly, Tony Eke learnt the ropes and became a popular figure in football circles in Lagos State, making Ajegunle his base for youth soccer At the age of 19 in 1970, Tony Eke had already become familiar with some top brass of the Nigeria Military like Col.Sule Apollo, Major-General Joseph Garba and General Benjamin Adekunle, who had been keeping the youth club going, since the death of Mr. Israel Adebajo in 1969. The trio formed a remarkable partnership with Garba Hamza from early 1970 till 1976 when the military coup that toppled General Murtala Mohammed began to have adverse effect on the day-to-day running as financial straits crippled the activities of the body. Imbued with a burning patriotic fervor, Tony Ossai Eke, a young Nigerian of Delta State extraction, born in 1950 in the heart of Ajegunle, in Ajeromi Ifelodun Local Government of Lagos State, took up the challenge to expand the financial base of YSFA when he approached the management of VONO Nigeria Ltd to sponsor the first RAMAT CUP in Lagos State in 1977. The request was granted and Lagos was privileged to host the maiden edition of General Murtala Ramat Mohammed U-16 Boys soccer championship at St. Gregory’s College, Obalende, where Chief M.K.O. Abiola, a personal friend of Murtala Mohammed replaced the trophy and took over sponsorship of the yearly RAMAT CUP till 1994, even while in detention mid-way. The late Tony Ossai Eke It would be pertinent to recall that Tony Eke was the brain behind the transformation of a local football outfit to national spotlight when YSFA (Youth Sport Federation of Apapa) became YSFON (Youth Sport Federation of Nigeria) in 1980. For the first time, the RAMAT CUP was played in Kano and had eight (8) states from the Federation participating at Sabon Gari Stadium, Kano it was during that tournament that Tony Eke mooted the idea of changing YSFA to YSFON in order to reflect national outlook. It is also of interest that Tony Eke initiated the moves that culminated into the appointment of prince Dokun Danquah Abidoye, business mogul and owner of KODA Sports as the National President of YSFON on March 26, 1980 at the Central Working Committee of YSFON meeting held at Tony’s family house at 18, Olowojeunjeje Street, Ajegunle, which served as interim secretariat of the body. Also Read: Ikeme Happy To Be Alive After Battle With Cancer I can also attest to the fact that Tony Eke was the one that first launched Nigeria into global honour when he registered the Nigerian youtyh to take part in a competition organized in Goteborg, Sweden in 1980. Tony Eke singularly recruited a crop of talented youngsters like Tajudeen Disu, Tarila Okorowanta, Paul Okoku, Dipriye Tebowei, Christopher Anigala, Alphonsus Akhahon, Femi Olukanni, Mutiwa Oshuntolu, Felix Egogo, Patrick Udoh, Monday Onyebuchi, Monday Oyarekhua, Gbewuro Amatere, Roland Onyemechi, Lawrence Akufe and Ali Kadri and kept them under the supervision of a football technocrat and former Red Devils goal-poacher “Diamond-toed) Peter “Baby” Anieke of Nigeria’s 1949 U.K. Tourists fame. Led by the President of YSFON Prince Abidoye and seven other officials, Ben Ekpo, Isaac Eke, Patrick Akpavuerhe, Kayode Abiade and my humble self (the writer of this piece), we arrived Goteborg in Sweden to play against the best Europe could offer in terms of youth soccer. We were simply unstoppable as Tarila Okorowanta and Felix Egogo tantalized and taunted their opponents with sizzling football artistry to win Nigeria’s first soccer laurel at international U-16 stage. Tony Eke’s record as a football administrator and pathfinder of Youth soccer revolution would be uncompleted without an illusion to the fact that he was truly a national soccer icon who touched all corners of the county, staging soccer contents to immortalize or celebrate those who made the game famous at their time. For instance, Tony Eke regularly staging football competitions in honour of Kano Ado Bayero, Oba of Benin, U.J. Esuene, M.K.O. Abiola, Lekan Salami, Joe Audu, Dominic Oneya, Muda Lawal and recently the ALL STARS CUP which was his last assignments in October 2018, shortly before his sickness of almost nine years took a dramatic turn. I would like to recall Tony’s last moments on earth with an agonizing feeling. As a friend, colleague and confidant for almost four decades, Tony Eke had been the one always inviting me to his house on issues pertaining to football in Nigeria and other West African countries. In fact, he had told me in September, 2018 that we should arrange a football match to celebrate Chioma Ajunwa’s birthday and also mark her recent promotion by the Police on 25th December, 2018, but for his sickness which relapsed in the early part of December. He called on phone and I noticed that his voice was incoherent. When I got to his Oluwalose residence in Ikotun, Lagos on February 1, 2019, I noticed that Tony Eke was in his last days on earth and I quickly called his lawyer daughter Anthonia, who answered my call from Abuja. However, Tonia later told me she was making arrangement to take her father to their village in Delta and wanted to know whether I would be able to go with the family, which I unhesitatingly gave my nod. Maybe we procrastinated because it took Tonia another three days to get back to me, and when she did, it was to break the sad news that her father had passed on in the early hours of February 16, 2019. I was devastated. Meanwhile, the remains of Tony Ossai Eke will be buried on Friday, 1st March, 2019 at Ikoyi Cemetery. There will be a wake-keep on Thursday, 28th February at Navy Barracks, Ajegunle, Apapa. Sacchi: ‘I support Juve in Champions League, against Manchester United…’ | English News Fayose commends Nigerians – The Sun Nigeria
cc/2019-30/en_middle_0028.json.gz/line1594839
__label__wiki
0.905155
0.905155
Yorkshire based ‘We Built a Mountain’ have spent the best part of the past 12 months developing a reputation as an original, and interesting, indie rock outfit with strong intentions to shake things up. With their growing reputation as a solid live outfit creating a buzz for their debut single, it’s nice to see ‘Lyrical medicine’ taking some of that raw live power and capturing it in the studio. Centred around an intense, almost Adam and the Ants, tribal drum pattern, ‘medicine’ owes much of it’s success to a tight structure and semi-hypnotic feel. Cleverly altering the drum sound and rhythm across the track, the emotive narrative behind medicine is reinforced through a style of drumming which is gentle/restrained in the verse and pounding in the chorus. If there was a standout element of ‘medicine’ it would certainly be the drumming. On top of this solid foundation, Mountain incorporate clever, art/indie, guitar lines and fine vocals. Complementing each other nicely, each element adds to the creation of a debut which takes effects driven guitars, fine lead guitar lines and layered harmonies to produce an indie track which would be as equally at home on the dance floor as it would in a mosh or circle pit. A last word must be to the production of the track, which given that this is a debut, is stellar. The way that the track incorporates interesting tempo changes, solo and layered vocal parts, and moments of dropping guitar lines in and out of the main mix all add to a single which offers something different with each listen. Terrific.
cc/2019-30/en_middle_0028.json.gz/line1594841
__label__cc
0.713053
0.286947
Zeroes Are Heroes Posts Tagged‘autographs’ #Stuff This Dana Drake Blog, Zeroes Are Heroes As Thanksgiving is upon us, I must confess I’m usually in a full-blown snit by now. The snit usually sneaks up on me about the time the refrigerator is too full and something really important to the meal falls out, or I happen to glance at the TV and some media personality tells me that I’m already behind on my Christmas shopping. There will be tears and over the counter medications. I’m not only a Daughter of the Texas Revolution, I’m also a Daughter of the American Revolution. My people invented Thanksgiving. Yet, last year, despite my bloodline, the turkey came out gray and crumpled. It looked like had been dropped on the… HAPPY MONDAY and “Git ‘er Done” Blog, MY JOURNEY So I signed my first autograph this week. Dave said it was the cashier needing me to sign my receipt. I don’t recall that. I’m fairly certain she’s seen my blog. I’m nearly a celebrity. I’m happy to report over 1000 views thanks to everyone! We are having some minor website issues, so thank you for your patience! I remind myself on this Columbus Day 2015, that Columbus landed in America thinking he was in India. Maybe this is not such a terrible thing. I will remove illusions of instant perfection, and in the words of Larry the Cable Guy, “git ‘er done.” I will… About Dana Dana is a Spiritual Teacher, Author, Speaker and Blogger that teaches transcendence. Dana has written a book called Benevolent Universe, The Story of Your Unique Genius, that speaks of a benevolent universe that many no longer see or hear. Her work is highly compelling, profoundly hopeful, and astoundingly comprehensible. She is married, has two children and lives in Pennsylvania. Subscribe to the Blog via Email She’s got the goods When I first met Dana, she was eating from a jumbo bag of M&M’s in her purse. She said it was for her nerves. We were at the dentist office! I knew I loved her in that moment. I had no idea she was as brilliant as she was fun and humble. Dana knew exactly how to help me—in the first 5 minutes. She’s got the goods. She has saved my life by helping me see world in a dramatically different way. DL, Physician Praise for Benevolent Universe Inspiring and reassuring I read this book at a seaside retreat and could not put it down. Far from the typical summer page-turner this book has left a huge impact on my life and I continue to use it as a reference to help with the big questions about my life and its purpose. I do not know what category this book falls into as it is a memoir, a spiritual guide, a self-help book and both a scientific and metaphysical explanation of our universe and how it works. What I found to be very compelling was that this writer is an accomplished scientist who describes her personal journey of awakening into a world that scientists are not known to go. Yet this book gives a clear explanation using both a scientific approach and the authors own experiences to what the benevolent Universe has to offer each of us and what we have to offer back. This book is both inspiring and reassuring for those of us who are finding our way home. Sarah Bones, Photographer Miracles, Light, and Spiritual Practice Holiday Strong, Holiday Enough Do Nothing, Change Everything The Scariest Idea in the Universe Session Prices Dropped dana@danadrake.com © 2014. Dana Drake, LLC. All Rights Reserved. Sign-up for the newsletter now - don't miss the fun! Enter your name and email and get the newsletter... it's FREE! Don't miss out on the fun...
cc/2019-30/en_middle_0028.json.gz/line1594842
__label__wiki
0.899327
0.899327
New Kids On The Block: European players making their International debut at TI6 July 31st, 2016 Cristy "Pandora" Ramadani Players 9 comments Ditya Ra officially joins Vega Squadron lineup Escape Gaming parts ways with Dota 2 squad The most prestigious Dota 2 tournament of the year is quickly approaching. With a prize pool that has shattered all previous records, thus becoming the largest in esports history, The International 6 will gather some of the best Dota 2 players in the world. This year, a hefty 38 TI6 players from across four geographical regions will be making their International debut. Here are the eight debutants representing the European region! Blinding stage lights. Rising heat. Raw nerves. Tiny drops of sweat spring forth. Your heart starts racing. A deafening crowd roar rips through the Key-Arena in Seattle. The walk to the booths feels like an eternity. All eyes are now on you. A live crowd of 17,000. Millions of people from across the world are scrutinizing every step you take from the comfort of their homes. Millions of dollars are on the line. One play can make or break your dreams. One fraction of a second late on a click, one missed keystroke and it could all be over in the blink of an eye. Prayers can’t help you much now. The pressure can be insurmountable even for the most decorated of veterans. The whole year culminates with The International. The bootcamps, the emotional roller coasters, the trials and tribulations. The path is long and arduous, and little can truly prepare a player for the magnitude of The International. Most of the players who will ride the adrenaline rush of the TI6 wave are storied veterans. They’ve been there, they’ve done that. They have mastered negotiating The International path. However, this year, 38 new faces will be making their International debut. For them, emotions are at an all-time high. Eight of those 38 star players will be representing the European region. Half of the six directly invited teams and a total of four out of six teams representing Europe have two players each appearing at The International for the first time. TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players OG, Team Liquid, Na’Vi and Escape Gaming are all bringing fresh blood onto the TI6 stage. Albeit greenhorns to the International, all eight of these players have been integral parts of the success of their teams, helping them reach The International 6 spotlight. Amer “Miracle-” Al-Barkawi Miracle- at the Manila Major © PGL Amer “Miracle-” Al-Barkawi is most known for his 9k MMR and for being instrumental in OG’s recent success, with his exceptional plays. Miracle- joined Balkan Bears at the beginning of 2015. However, only four months later, he was removed from the team. During the time he was teamless, Amer began gaining recognition, as he climbed the matchmaking rating leaderboards in pub games and eventually became the no. 1 player by MMR in Europe and the world. Shortly after that, he was invited to join (monkey) Business – a new team formed during the post-TI5 reshuffle, that would later become one of the most stable and successful teams in world. OG (formerly monkey Business) stunned the world when they climbed from the Lower Brackets to upset Team Secret and take the Frankfurt Major trophy. They have since claimed multiple titles and have become the first team to win two Valve tournaments. Andreas Franck “Cr1t-” Nielsen Cr1t at the Frankfurt Major © ESL Andreas Franck “Cr1t-” Nielsen is an unassuming Danish player who has charmed and captured fans all over the world. OG is the Dane’s first tier 1 team. Cr1t- has been making multiple short appearances on various teams since 2012, including teams such as Mousesports, Meet Your Makers and Lianghao – that was later picked up by Flipside Tactics after Cr1t’s departure. It has become completely normal to see Cr1t- carrying out some of the biggest and most spectacular plays in OG’s game and creating excitement with his rotations. He has shown incredible synergy with OG’s captain, Tal “Fly” Aizik. The two players have become one of the top support duos in competitive Dota 2. Ivan “MinD_ContRoL” Borislavov MinD_ContRoL at the Manila Major © PGL Ivan “MinD_ContRoL” Borislavov is the lovable Bulgarian player who has been known to play carry, midlane and offlane with an equal amount of success. Although he is still relatively new to the spotlight, MinD_ContRoL started his Dota 2 career in 2014 with Aftershock Gaming, before moving to Basically Unknown, where he has gotten his share of exposure. Kuro “KuroKy” Salehi Takhasomi recruited him in August, 2015, and gave him the opportunity to demonstrate his previously underappreciated skills. Their squad, 5Jungz, was picked up by Team Liquid and has since become one of the best Dota 2 teams in the competitive scene. After an onslaught of top three placements in premier events this year, Ivan and Team Liquid are primed for another top finish, at TI6. Lasse “MATUMBAMAN” Urpalainen Lasse “MATUMBAMAN” Urpalainen © Nanyang Championships Lasse “MATUMBAMAN” Urpalainen is well known for his quirky and fun personality and even more so for his role in the carry position on Team Liquid. MATUMBAMAN first appeared on the circuit in 2014. He caught the eye of fans and other players after winning the Assembly Summer 2014 LAN tournament with the team Veni,Vidi,Vici – a squad he was a part of for only a few short months. He then moved on to 4 Anchors + Sea Captain – a Finnish team that he enjoyed considerable success with over the year. After being recruited by 5Jungz (that has later become Team Liquid) in August 2015, he dropped out of Sea Captain school to focus on playing Dota 2 full time. No doubt, Lasse has made the right decision and has since become one of the top Dota 2 players in the world. Despite claiming to be very nervous when playing, he always seems composed and one of the most stable members of his team. Dmitry “Ditya Ra” Minenkov Ditya Ra of Na’Vi Dmitry “Ditya Ra” Minenkov has found much success as the newly appointed captain of the legendary organization, Na’Vi. Since joining, Ditya Ra has gained heightened popularity and has been instrumental in reviving Na’Vi’s motto, “Born to win”. Ditya Ra started by playing Counter-Strike and other games for fun, moving over to DotA in 2007. He started playing at a professional level locally, with enough success to keep him motivated and moving forward. In 2011, he made the switch to Dota 2. It took a bit of time and several mixes before he started to play more professionally and was signed to Power Rangers, in December 2014. For the next year, he gained experience and honed in on his skills, eventually receiving a nod from Na’Vi. The Ukrainian organization recruited him to join their lineup built around Danil “Dendi” Ishutin and Akbar “SoNNeikO” Butaev. Ditya Ra has become unstoppable and one of the quickly rising stars in the CIS region and the world. Lycan, Terrorblade and Ember Spirit are among some of his finest heroes that invoke fear in his opponents and help to secure wins and comebacks. Victor “GeneRaL” Nigrini GeneRaL of Na’Vi Victor “GeneRaL” Nigrini is still relatively new in the scene, having only started his Dota 2 career one year ago. In a short period of time, he has skyrocketed to fame with his engaging personality and his extraordinary plays. GeneRaL has gained his experience and his reputation over the last year, after starting his career on Duza Gaming, in 2015. He had stints in Team Empire and ScaryFaceZ, as well as Elements Pro Gaming. Although he has been predominantly a midlane player, he has begun the shift to fill the shoes of the offlane position for Na’Vi. There was much hype and excitement when Victor joined Na’Vi. The promising player exuded much confidence in his role change and the organization fully supported him, hinging their hopes on their new addition. In an interview published when he joined, GeneRaL stated: I will be playing in the hard-lane. For the last three days, I’ve been crushing all pubs playing this role, so our opponents will have to go through some difficult times. His words have since rung true. Since then, Na’Vi have been declared as “back” – crushing opponents and seizing vastly improved results. Maurice “KheZu” Gutmann KheZu © EPICENTER Moscow Maurice “KheZu” Gutmann transitioned from a highly successful career in HoN to Dota 2 with a similar caliber of success, in only one year. The former HoN pro had an exceptional career previously, playing for some of the best HoN teams and received an award for the “Most Valuable Suicide Laner of 2014”. The mechanical skills and game understanding he developed in the HoN scene have made a full transition to Dota 2 offlane, giving him much success and recognition. Maurice tried his hand at joining several newly formed teams during the roster lock time periods but was unable to settle with a squad until the end of December – falling into place with COOKISS. He stayed with the Swedish team for four months before being recruited to No Diggity – a mix spearheaded by Troels “syndereN” Nielsen. Since then, he has gained much attention for his Timbersaw and Void performances, among others. Yazied “YapzOr” Jaradat YapzOr Yazied “YapzOr” Jaradat has been hailed and revered for his outstanding Rubick and Earthshaker plays, as well as his overall support role performances. Yapzor was co-opted by Monkey Freedom Fighters when the team was first established, at the end of August, 2015. He had some commendable achievements while playing for Balkan Bears before that, but it wasn’t until he joined MFF that he truly stood out. Despite a respectable run and a notable sense of synergy with teammate WehSing “SingSing” Yuen, the team disbanded. Yazied was not a free agent for long, and after catching the eye of Troels “syndereN” Nielsen, he was recruited to join No Diggity (now Escape Gaming), at the end of February. Escape Gaming’s biggest claim to fame has been their stellar run through the TI6 qualifiers. They managed to seize The International 6 Wild Card slot and a chance to visit the main stage in Seattle. TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players TI6 players Next article ViCi Gaming.Reborn: Yang's last hope for visa denied Previous article Virtus.Pro preliminary roster led by Solo Cristy "Pandora" Ramadani Pandora is a behind the scenes Dota 2 professional Jack of All Trades ranging from team manager, social media staff, business consultant, board of director member, visa guru, Garter's waifu. When not busy with Dota 2 work, she is out trying to save the world or baking cupcakes. Follow her on Twitter @pandoradota2 What a great article. I needed this, didn’t know much of the backgrounds of the new faces of dota2. Well played Glad you liked it. More to come, for the rest of the regions. Plenty of debutants left to “introduce”. 🙂 (969 comments) Looking forward to it! 🙂 Is there a Miracle interview of any sort out there? Or even better, do you have *do you have the power to interview him anyhow? Not really. He’s not very talkative. Maybe we’ll get the chance to do one, after The International. Well that’s an exclusive if you are looking for one! I know Slacks said it’s impossible to interview him, he’s an introvert. Anyway, good luck with that He will come out of his shell eventually. If there is a chance I think they can do it
cc/2019-30/en_middle_0028.json.gz/line1594851
__label__cc
0.68004
0.31996
Home » Consumer Rights » EDUCATION: UPSC cannot reject candidates for trivial slips, rules SC … The President, Shri Pranab Mukherjee addressing at the valedictory function of the 91st Foundation Courses for All India Services, at Mussoorie, in Uttarakhand on December 09, 2016. (Photo Courtesy: PIB website) EDUCATION: UPSC cannot reject candidates for trivial slips, rules SC … March 7, 2017 Consumer Rights, Court Judgements, Information, News UPSC cannot reject candidates for trivial slips, rules SC Union HRD Minister launches ‘ShaGun’ – a web-portal for Sarva Shiksha Abhiyan University copying books for teaching is not copyright violation: Delhi HC UGC approves new guidelines for Deemed universities Students for examination (Representational Photo) Deccanherald.com NEW DELHI: Feb 19, 2017 The Supreme Court has said the Union Public Service Commission cannot reject a candidate for misspelling or entering a wrong date of birth on the job application. A bench of Justices Adarsh Kumar Goel and U U Lalit dismissed a special leave petition filed by the UPSC against a Delhi High Court judgement, directing the country’s highest recruitment body to clear the selection of Ajay Kumar Mishra to the National Defence Academy. … The Union HRD Minister Shri Prakash Javadekar launched a dedicated web portal ‘ShaGun’ for the Sarva Shiksha Abhiyan at New Delhi today. ‘ShaGun’ aims to capture and showcase innovations and progress in Elementary Education sector of India by continuous monitoring of the flagship scheme – Sarva Shiksha Abhiyan (SSA). The Union HRD Minister also unveiled the ‘Toolkit for Master Trainers in Preparing Teachers for Inclusive Education for Children with Special Needs’, which has been prepared by World Bank in collaboration with Ministry of Human Resource Development. On this occasion, the Union Minister also reiterated government’s commitment for improving the ‘Quality’ of Education. He said that in this direction Ministry of HRD will be codifying the learning outcome to set assessment standards for abilities with regards to comprehension, mathematics, language etc. and thus ensuring that “all children acquire at least the minimum levels of learning” from Class I to Class VIII under Right to Education Act, 2009. Learning Outcomes are assessment standards indicating the expected levels of learning that children should achieve for that class. These outcomes can be used as check points to assess learning at different points of time. The learning outcomes would help teachers to understand the learning levels of children in their respective classes individually as well as collectively. Learning outcomes should be the point of reference for conducting achievement surveys. Hence it is necessary that the defined Learning Outcomes are also shared with parents and community at large. Ministry of HRD has uploaded draft document on its website in this regard to invite comments and suggestions through email address given. (feedback.lo@ciet.nic.in) Shri. Prakash Javadekar, Hon’ble Minister of Human Resource Development launching this e-initiative termed it as a global democratic forum enabled by technology which will give a peek in the Indian elementary education scenario and spread constructive lessons. He highlighted that this first-of-its kind platform will give due recognition to people, State governments, schools, teachers working towards improving Elementary Education across the country. The Union Minister further emphasized that ShaGun will help monitor progress of implementation of SSA by assessing performance of States and UTs on key parameters and thereby serve as a platform for the central government for effective planning and deliver on the promise of providing quality education to all. ShaGun, which has been coined from the words ‘Shala’ meaning Schools and ‘Gunvatta’ meaning Quality, has been developed with a twin track approach. First, is the Repository with an engaging interface that focuses on positive stories and developments in the field of School Education. In this repository, best practices will be documented in the form of videos, testimonials, case studies, and images, which will display state-level innovations and success stories that are driving improvements in performance under SSA. This repository has a decentralized management structure that enables State governments to choose, upload and manage their own content. Secondly, it has an online monitoring module to measure state-level performance and progress against key educational indicators. It has been developed to collect and report data which will enable the government and administrators to track the efficiency with which SSA funds are being utilized and the results that this is delivering. SSA is a centrally sponsored scheme providing universal access to education to children in the age group of six to fourteen years of age. Also, ‘Toolkit for Master Trainers in Preparing Teachers for Inclusive Education for Children with Special Needs’ is the series of five training modules will provide the teachers with practical information on effective inclusion of CWSN and build those pedagogical practices that would address the needs of all children with special needs. Shri Upendra Kushwaha, Hon’ble MoS, School Education and Literacy, MHRD, also addressed the gathering and appreciated ‘ShaGun’ as right step forward to understand the program implementation and evaluate the gap between policy and action, which will supplement the government decision making. The event also saw live interaction with Mr Junaid Kamal Ahmad, Country Director, World Bank India through a video conference. He expressed his appreciation towards Ministry of Human Resource Development for introducing this platform that will allow for global learning from SSA lessons being shared. Shri. Anil Swarup, Secretary, School Education and Literacy, GoI; Smt. Rina Ray, Additional Secretary, School Education, GoI; Smt. Shabnam Sinha, Lead Education Specialist, World Bank; senior policy makers and representatives of Autonomous Bodies such as NCTE, NCERT, CBSE and NUEPA, also attended the programme. The SSA ShaGun web portal can be accessed at http://ssashagun.nic.in. (Source: pib website) (Image for representational purpose only) Delhi University photocopy shop allowed to resume business as court dismisses suits initiated by three international publishing giants. The Delhi High Court on Friday held that the photocopying of course packs prepared by Delhi University comprising portions from books published by Oxford University Press, Cambridge University Press and Taylor & Francis did not amount to infringement of copyright. … * Vigilance Clearance * RTI Act/Rules/Circulars * Deptt. of Public Enterprises (DPE) Circulars * RBI Circulars/Master Circulars – Subject-Wise – Part-I Indiatoday.intoday.in New Delhi, Jun 16 (PTI) The University Grants Commission (UGC) has approved new regulations for Deemed Universities as per which there will be no bar on the number of off-campus centres such institutions may set up, though quality has to be assured. … Representational Image Coaching centres must go from residential areas: SC New Delhi: The Supreme Court on Tuesday said coaching centres in residential areas were a nuisance to women and the elderly and must shift out to commercial premises or institutional areas. … The President, Shri Pranab Mukherjee presenting the certificate, at the 7th Convocation of Vinoba Bhave University, at Hazaribag, in Jharkhand on January 09, 2016. (Image Courtesy: pib website) Bennett University ties up with edX MUMBAI: Bennett University has collaborated with edX, a non-profit massive open online course (Mooc), to offer its courses to students, giving them direct access to teaching from blue-chip global universities. … Mobile Apps (Pixabay Image) Study material for higher education will be soon available free on app, Smriti Irani says LUCKNOW: Union HRD minister Smriti Irani announced on Sunday that higher education course material will soon be made available free to students through mobile app and other sources…. The Union Minister for Human Resource Development, Smt. Smriti Irani releasing a brochure of UGC Scheme at the ‘State Education Ministers Conference’, in New Delhi on January 06, 2015. The Minister of State for Human Resource Development, Shri Upendra Kushwaha, the Minister of State for Human Resource Development, Prof. (Dr.) Ram Shankar Katheria and other dignitaries are also seen. (Image Courtesy: pib website) UGC releases list of fake universities COIMBATORE; The University Grants Commission, the apex body for higher education, on Wednesday published a list of fake universities in the country for the benefit of students. … Beware! That online degree may not be valid in India Hindustantimes.com Ever been tempted to take up an online degree course offered by a university in India? Those who have been taken in by advertisements of such courses in newspapers should be careful because education regulator University Grants Commission (UGC) does not recognise any course offered solely through the online mode.… Note:- It may be noted that the information in this website is subject to the Disclaimer of Dtf.in. Ifyou have a complaint with respect to any content published in this website, it may kindly be brought to our notice for appropriate action to remove such content as early as possible or publish the latest/updated content/event, if any, at info[at]dtf.in. education news 2017-03-07 Previous DIVORCE/MAINTENANCE: Man can’t seek divorce over wife’s desire for bed tea: HC … Next RESERVATION: Brahmin adopted by SCs can get quota job, says Punjab and Haryana HC; The Supreme Court is examining the “creamy layer” criteria in civil service … EDUCATION: UGC seeks reports of action taken in caste discrimination cases; No Homework for Students of Classes 1 and 2, Orders Education Department … EDUCATION: Principal, director of Delhi school jailed for two months for not allowing child in classroom … EDUCATION: NEET Exam 2017: 4 Kerala teachers suspended after student was asked to remove innerwear …
cc/2019-30/en_middle_0028.json.gz/line1594857
__label__wiki
0.827072
0.827072
Category Archives: EnerKnol Impact-Misc Categories GE Capital to Sell $1 Billion of Energy Investments to Apollo Global Management GE Capital entered into an agreement to sell a $1 billion portfolio comprised primarily of equity investments in energy assets to funds managed by affiliates of Apollo Global Management LLC, according to the company’s Oct. 8 press release. The sale includes 20 investments in renewable energy, contracted gas-powered generation, and midstream energy infrastructure assets in… October 8, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, Mergers and Acquisitions, Top NewsBy EnerKnol Pulse Invenergy Renewables Wins FERC Approval to Sell 160-Megawatt Wind Farm in Michigan The Federal Energy Regulatory Commission on Oct. 5 authorized Pine River Wind Energy LLC, a subsidiary of Invenergy Renewables LLC, to sell its 161-megawatt wind generation project to DTE Electric Company. The wind facility, which is under construction, will be interconnected to the transmission system controlled by the Midcontinent Independent System Operator Inc.’s market. DTE… October 5, 2018 EnerKnol Impact-Misc Categories, EnerKnol Impacts, EnerKnol Pulse, Mergers and Acquisitions, WindBy EnerKnol Pulse Dominion, SCANA File Settlement With North Carolina Regulators to Advance $14.6 Billion Merger Dominion Energy Inc. and SCANA Corporation on Oct. 4 submitted an agreement to the North Carolina Utilities Commission detailing customer protection measures to advance their merger deal. Under the settlement, SCANA-owned Public Service Company of North Carolina Inc., a gas distribution company, would refund $3.75 million of its 2017 revenues, raise its charitable contributions in… Enbridge Agrees to Pay up to $500 Million for Tunnel Replacing Line 5 Oil Pipeline Under Michigan’s Mackinac Straits The state of Michigan and Canadian company Enbridge Inc. signed an agreement under which the company would replace the Line 5 petroleum pipeline segment that crosses the Straits of Mackinac with a multi-utility tunnel beneath the Straits, according to an Oct. 3 press release from the Michigan Governor’s office. Enbridge agreed to bear the costs… October 3, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, OilBy EnerKnol Pulse U.S. Uranium Production Hits Historic Lows as Nuclear Plants Retire: EIA Uranium purchases by U.S. commercial nuclear power plants totaled 43 million pounds of triuranium octoxide last year, 15 percent lower than 2016 and the lowest since 1998, according to an Oct. 3 report from the U.S. Energy Information Administration. Triuranium octoxide, called yellow cake, represents the first step in nuclear fuel production. The agency attributed… October 3, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, NuclearBy EnerKnol Pulse U.S. LNG Exports Rose by 58 Percent in First Half of 2018 as Export Facilities Expand: EIA U.S. net natural gas exports averaged 0.87 billion cubic feet per day during the first six months of this year, more than double the amount during all of 2017, which marked the first time the U.S. became a net exporter in almost 60 years, according to an Oct. 1 report from the U.S. Energy Information… October 1, 2018 EnerKnol Impact-Misc Categories, EnerKnol Impacts, EnerKnol Pulse, LNG, Natural GasBy EnerKnol Pulse U.S. Energy Department Awards $28 Million to Enhance Energy Infrastructure Cybersecurity The U.S. Energy Department announced the funding to support research partnerships that will facilitate next-generation technologies to advance cybersecurity and resilience of the electric grid and oil and natural gas infrastructure, according to an Oct. 1 press release. The projects will take innovative approaches such as redesigning existing architecture that makes the grid vulnerable to… October 1, 2018 Cyber Security, EnerKnol Impact-Misc Categories, EnerKnol PulseBy EnerKnol Pulse Trump Administration Eases Oil, Gas Safeguards Developed in Response to Deepwater Horizon Spill The U.S. Interior Department’s Bureau of Safety and Environmental Enforcement on Sept. 28 updated the 2016 well control rule, one of the spate of safety regulations implemented in the wake of the 2010 Deepwater Horizon spill that spewed 4.9 million barrels of oil into the Gulf of Mexico over nearly three months. The agency said… September 28, 2018 EnerKnol Impact-Misc Categories, EnerKnol Impacts, EnerKnol Pulse, Natural Gas, OilBy EnerKnol Pulse U.S. Enacts Law Establishing $10 Million Threshold For Merger Transactions to Seek FERC Approval U.S. President Donald Trump signed legislation on Sept. 28 that requires mergers or consolidations of public utilities with a value above $10 million to be first approved by the Federal Energy Regulatory Commission. For transactions valued below that threshold but above $1 million, the law requires the utilities seeking merger to notify the commission within… September 28, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, Mergers and AcquisitionsBy EnerKnol Pulse U.S. Enacts Laws to Foster Advanced Nuclear Technologies, Encourage Private Sector to Boost Energy Innovation U.S. President Donald Trump signed legislation that will eliminate financial and technological barriers to nuclear innovation, according to a Sept. 28 press release from the U.S. Energy Department. The department said the legislation builds on the success of its Gateway for Accelerated Innovation in Nuclear or GAIN initiative, which seeks to enable the industrial community… September 28, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, NuclearBy EnerKnol Pulse New York, Illinois Nuclear Subsidies Survive Legal Challenges The U.S. Court of Appeals for the Second Circuit on Sept. 27 upheld New York’s zero emission credit program adopted in August 2016 to support the state’s financially struggling nuclear plants. The ruling rejects complaints that the program depresses energy and capacity prices in the wholesale power auction overseen by the Federal Energy Regulatory Commission.… September 27, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, Nuclear, Top NewsBy EnerKnol Pulse California Strengthens Transportation Fuel Standard Amid Trump Administration’s Rollback The California Air Resources Board extended its low-carbon fuel standard, mandating a 20 percent cut in the carbon intensity of transportation fuels by 2030, compared with the current requirement of 10 percent by 2020, according to the agency’s Sept. 27 press release. The requirement, “the most stringent in the nation,” aligns with the state’s 2030… September 27, 2018 EnerKnol Impact-Misc Categories, EnerKnol Pulse, OilBy EnerKnol Pulse
cc/2019-30/en_middle_0028.json.gz/line1594860
__label__cc
0.71191
0.28809
Child Health 2 State Programs 2 Benchmarking 1 Bibliographies 1 Financial Support 1 Health Education 1 Outreach Programs 1 Preschool Children 1 Program Implementation 1 Public Opinion 1 Public Policy 1 Public Support 1 School Readiness 1 Friedman, Mark 1 Glik, Deborah 1 Halpert-Schilt, Elena 1 Proposition 10 (California… 2 Proposition 10 (California 1998) X Guides - Non-Classroom X Public Education and Outreach. Building Community Systems for Young Children. Glik, Deborah; Halpert-Schilt, Elena – 2001 As part of a series of reports designed to support the implementation of Proposition 10: The California Children and Families Act and to provide comprehensive and authoritative information on critical issues concerning young children and families in California, this report focuses on the role of public education and outreach and provides… Descriptors: Bibliographies, Budgeting, Change Strategies, Child Care Results Accountability for Proposition 10 Commissions: A Planning Guide for Improving the Well-Being of Young Children and Their Families. Building Community Systems for Young Children. Friedman, Mark – 2000 As part of a series of reports designed to support the implementation of Proposition 10: The California Children and Families Act and to provide comprehensive and authoritative information on critical issues concerning young children and families in California, this report addresses how Proposition 10 Commissions can organize their work and their… Descriptors: Accountability, Benchmarking, Change Strategies, Child Health
cc/2019-30/en_middle_0028.json.gz/line1594864
__label__wiki
0.717469
0.717469
Sponsored by Reface Magic This story was created by Content Works, Postmedia’s commercial content division, on behalf of a client. Kitchen refacing: Refresh the look of your kitchen with lower cost and less hassle than a renovation Kay Miller, Postmedia Content Works Updated: August 1, 2017 Refacing involves installing new doors and drawer-fronts on your kitchen cabinets, and re-skinning the fronts and sides of the cabinet boxes to match. If a homeowner is happy with the basic layout of a space, refacing can deliver refresh for around 40 per cent less than the cost of full cabinet replacement. Mat Simpson Photography When Rolf and Lea Traxel decided to bring in Ken Nicholl of Reface Magic to quote on redoing their two-tiered kitchen island, they had no idea they’d end up with a brand new kitchen. The Traxels had worked with Nicholl’s company, Reface Magic, on their previous home’s kitchen and loved the results. “He came to take measurements, but while he was there, I started talking about what I didn’t like in the kitchen,” recalls Lea. For instance, the upper cabinets in the Beaumont bungalow had a dark finish she didn’t care for, and they didn’t go all the way up to the ceiling. Many were too shallow to store modern dishware. “He had some great ideas,” says Lea. Fast-forward and the Traxels now find themselves with a brand new – and magazine-worthy – two-tone kitchen with chocolate cabinetry on the bottom and off-white on the top, featuring all-new cabinet doors, glass-doored displays up to the ceiling, dozens more drawers, a refreshed island, a custom China cabinet, new quartz countertops and more. (The Traxels even had the company redo their bathroom cabinetry.) Six months later, they’re still thrilled with the work, and keen to encourage others to go the Reface Magic route. “I love everything about it,” say Lea. “It has been such a great experience, from the initial consultation to the installation and even the administration.” Before & After: Refacing can completely transform the look of your kitchen. Before. Supplied Before & After: Refacing can completely transform the look of your kitchen. After. Mat Simpson Photography What is Refacing? Refacing involves installing new doors and drawer-fronts on your kitchen cabinets, and re-skinning the fronts and sides of the cabinet boxes to match. If a homeowner is happy with the basic layout of a space, refacing can deliver refresh for around 40 per cent less than the cost of full cabinet replacement. “We give you what looks like a brand-new kitchen, without having to tear it all out,” says Nicholl. Reface Magic has been delivering high-quality refacing products and services from its location on Parsons Road NW for more than 15 years. The benefits of refacing go beyond cost savings, however. For one, it’s more environmentally friendly than renovating, because you’re not tossing out all of your cabinetry. It’s also less time-consuming and disruptive than a full-scale reno. “We’re in and out in a couple of days and the kitchen is done,” says Nicholl. “If you tear everything out, it can be four to six weeks before they’re finished and everything is back in.” Where needed in addition to refacing, the company can replace or add new cabinets, build drawers into existing frames, add crown mouldings, replace countertops and more. “Our No. 1 alteration, beyond refacing, is extending upper cabinets to the ceiling, to give more storage and create that tall look people like these days,” says Nicholl. While kitchens are its bread and butter, Reface Magic can tackle any room, from pantry, bathroom or laundry room to an entertainment centre. Lea Traxel stands in middle of her refaced kitchen. “I love everything about it,” she says. Supplied How Refacing Works The process is simple: a consultant drops by for a free in-home consultation, which takes less than an hour. Before leaving, the consultant prints out an estimate (unlike competitors, who often take five to 10 business days to follow up with a quote). Next, the customer picks a door style and colour. One of the company’s most popular styles at the moment, notes Nicholl, is the square-lined shaker door, which complements modern and traditional decor. But the best thing for customers to do is visit the company’s 1,500-square-foot showroom, to see the full range of door styles and colours, countertops and accessories in person. Is Refacing the Right Way to Refresh the Look of My Kitchen? Who should consider refacing? Pretty much anyone who has a kitchen or cabinetry and is contemplating an update, says Nicholl. Those circa-1980s golden oak cabinets are prime candidates, as are the pervasive white melamine cabinets of the ’80s and ’90s. But Reface Magic can – and does – tackle cabinetry from any era. Sometimes the company’s staff even find themselves working in new homes, where owners have moved in and realized that the cabinets provided by the developer are mediocre in quality, or lacking in interior conveniences. Some newer homes’ cabinets start to wear or peel prematurely – and Reface Magic comes to the rescue with its higher-echelon finishes. The company uses only products from Renuit for its refacing work. This family-run business based in London, Ontario produces doors and drawer fronts using the same high-quality materials and processes that go into top-quality new cabinetry, including top-of-the-line soft-close hinges. “All of our products are custom-made, so we don’t have any stock doors in repeating patterns, for example. It’s a custom look and it doesn’t look like it’s been refaced. Everybody thinks it’s a brand-new kitchen,” says Nicholl. “Anything you can get in a new kitchen we can do in a refaced kitchen.” For a healthy savings, of course. This story was created by Content Works, Postmedia’s commercial content division, on behalf of Reface Magic. Keswick dream home for a cause: Cash & Cars Lottery benefits... Living the dream: Caritas DreamLife Lottery features $2 million Cameron Heights... Top Life Videos Wedding Tale: Antique-laden, DIY acreage wedding gets Star Wars twist Local restaurant owners tackle black-hole spaces with new concepts Latest Food Stories Sabor's annual Seafood Festival kicks off with special guest dinner Aug. 3 Canada's Great Kitchen Party participants announced for fall competition in Edmonton Dining Out: Surrender yourself to cosy, crafty Say Uncle on 104th Street Thank God it's Friday Taco Night with chef Victor Hugo Raya at Get Cooking
cc/2019-30/en_middle_0028.json.gz/line1594869
__label__wiki
0.86904
0.86904
Edmonton Catholic schools look for efficiencies to keep money in the classrooms Janet FrenchMore from Janet French Updated: June 18, 2019 8:38 PM MDT Calgary man's Mental Health Act detention unconstitutional, court rules Edmonton's End of the World celebrates new beginning 'Disturbing' number of syphilis cases in young people Edmonton Catholic school board chairwoman Laura Thibert said the board is asking all school district departments to scrutinize their spending for trims as they await the fall 2019 provincial budget.Ian Kucerak / Postmedia Edmonton Catholic Schools plans to educate 613 more students next year with the same number of teachers on staff, district leaders said. Catholic trustees, meanwhile, will put pressure on the provincial government to continue the $77-million classroom improvement fund, which especially helped students with disabilities. The district expects to take a $4.7-million hit to its bottom line if the fund evaporates. “Were having to figure out ways to continue to deliver a top-notch education experience,” said James Grattan, chief financial officer for the Edmonton Catholic school district, on Tuesday. “But, from a dollars perspective, to be able to hire additional resources, we’re constrained.” The Catholic school board on Tuesday approved a $527.8-million budget for the next school year, which is a narrow 0.03 per cent increase from its budget this school year. The board plans to draw $1.6 million from reserves to balance the budget, as anticipated funding from Alberta Education drops by nearly $4 million, or 0.8 per cent. Administrators are working with best guesses, not actual figures. The provincial government delayed introducing a budget until fall after a blue-ribbon panel has studied government spending. ‘Inclusive education’ spending down Although administrators assumed student enrolment growth would be funded, they also assumed the classroom improvement fund, introduced by the former NDP government to improve teachers’ working conditions, would be history. The loss of that fund disproportionately affects the amount of money available to hire staff to help students with disabilities and complex needs, Grattan told the board. While the number of district students identified as having autism, fetal alcohol spectrum disorder, a severe medical challenge or Tourette syndrome jumped to 665 this year from 581 in 2017-18, the amount of “inclusive education” funding allotted for students with complex needs will drop $1.7 million to 2017 levels, a report to the board said. Trustee Debbie Engel said Tuesday she’s holding out hope for a “Santa Claus” moment in the fall when education funding will increase. Board chairwoman Laura Thibert said trustees have met with new Education Minister Adriana LaGrange and are imploring her government to keep the classroom improvement fund flowing. “It’s just to continue to show that those funds make a huge impact for our schools and our students,” Thibert said. For now, the board will ask every district department to “find efficiencies” to keep money in classrooms, she said. This frugality includes trustees, she said, who opted not to increase their pay to offset federal income tax exemption changes and are looking at going paperless. Exercising prudence The district aims to keep the number of teaching positions status quo, said assistant superintendent of human resource services, Duwayne Lang. However, the number of non-teaching staff will likely decrease, he said, and the mix of workers may change. There could be fewer positions in central administration, consulting or custodial, he said. “We’re still hiring, but not as much as in the past,” he said, pointing to about 300 temporary teaching contracts currently posted. Although enrolment growth has slowed down substantially during the last five years, the district is projecting a 1.4 per cent increase in student population, to 43,702 pupils, come fall. Also on Tuesday, trustees re-elected Thibert as board chairwoman for the 2018-19 school year and re-elected trustee Sandra Palazzo as board vice-chairwoman. The board also voted to sell the sports fields of the former St. Andrew School site in Inglewood to Limak Investments Inc. for $1.1 million. In February, the former Catholic school building and part of the land was sold to the Muslim Association of Canada for the MAC Islamic School. jfrench@postmedia.com FORBES: Festival season underway GUNTER: Public art out of reach, city out of touch COLUMN: Tackle equalization to stand up for taxpayers and Canada's resources Hicks on Biz: Epcor river valley solar farm bandwagon?
cc/2019-30/en_middle_0028.json.gz/line1594870
__label__wiki
0.558614
0.558614
Animism, Dark Goddess, Egyptian Goddess, goddess, Rabbit Totem, Totem, Uncategorized A Rabbit Totem in the Egyptian Moon? Posted by Elder Mountain Dreaming on January 19, 2016 March 20, 2018 Hare and Rabbit are two of my helpers as a shaman, not only in the waking, but also in my dreams as night. I have a Lakota friend who is an (animism) Jack Rabbit and very powerful, and has helped me a few times. I had a lot of rabbit symbolism appear in my group journeys on the last Winter Solstice and when I ran across some Egyptian Rabbit art it had caught my soul eye. Apophis (Apop) was the Egyptian deity who embodied Chaos and whose animism form was a large Golden Serpent associated with various frightening natural events such as unexplained darkness of a solar eclipse, storms and earthquakes and linked to the northern sky, which was a place that the Egyptians considered to be cold, dark and dangerous. He was also associated with the Goddess Taweret during his era of the Egyptian Middle Kingdom. He was also the enemy of the God Ra, which associates him with an earlier era of pre-Ra era. The “Book of Apophis” is a collection of magical spells from the Newer Kingdom which were supposed to repel or contain the serpent. Every night Apephim (Apep) sought to destroy Ra’s Sun Boat, the “Boat of Millions of Years” as it passed through Duat, the underworld. In some stories Apep waited for Ra in a mountain in the west called Bakhu, and in others he lurked just before dawn in the Tenth Region of the Night. If Apep were to defeat Ra, darkness (the Goddess) would prevail. One of Ra’s forms was a Rabbit, which symbolically makes no sense, for rabbit is one who makes a sacrifice, not an all powerful creator, god of all gods. Where did this rabbit appear then from prior symbolism? As we can see, the Egyptian Ra the rabbit, is slaying the serpent (snake), but there had to be an earlier symbolism connecting these two, and there is: Wenet The Swift One. Unnut, Lady of Unu By © Linda Iles – Mirror of Isis work, her article shows us the earlier versions of the Great Serpent Goddess of Egyptian prehistory: To the ancient Egyptians, Deity permeated everything. Every creature, every thing we can see, hear, smell, taste and touch had correspondence with a Deity in some form or other. For the ancient Egyptians, the act of creation wasn’t the result of the handiwork of a single Deity. Creation came about through an initiating force springing from a primal Divine Being which then took the form of a plethora of Gods and Goddesses, who were the manifestations of the building blocks of life. In their cosmology, divine essence underlay all that we as human beings experience with our senses in the physical world, and all that we experience in the unseen world of spirit. The universe was therefore a conscious whole in which all the parts were interrelated, a concept which underlies modern hermetic theory. Traditionally, it is the god Thoth who is attributed with hermetic theory and several other bodies of sacred knowledge, which include architecture, medicine and alchemy. And it is to the city of Thoth, called Hermopolis Magna by the Greeks and Khemenu, ‘The Town of Eight’ by the ancient Egyptians that a search to find information about the ancient Egyptian goddess Wenet begins. In early dynastic times this main cult center of Thoth, honored several goddesses and gods. The Ennead of Hermopolis included four pairs of creator gods and goddesses: the male deities in these pairs shown either as frogs or as frog-headed, the female deities shown as serpents or as serpent-headed. Along with these four pairs of creator deities there were two other very ancient deities, a baboon god who was subsequently assimilated by the god Thoth at a very early period, and the hare goddess Wenet. The pairs of frog and serpent deities gave the city of Thoth its name, but it was the hare goddess, Wenet, whose name was given to that whole province of ancient Egypt, called a Nome, in which the city of Khemenu was located. The Nome of Wenet, the province of Hermopolis, was therefore “District of the Hare.” Wenet was both the patron goddess of the area of Wenu, the 15th Upper Egyptian Nome and of the city of Thoth which is more commonly referred to as Hermopolis. These two deities have some interesting similarities and are often paired in ancient Egyptian symbolism and art, which will be discussed further along in this article. Thoth is the scribe of the gods, credited with the invention of writing by the ancient Egyptians. Curiously, it is a hare deity in Mayan belief who invented writing. The Hare in Ancient Egypt References to the hare are plentiful in ancient Egyptian mythology and literature. The god Osiris, husband of Isis, was sometimes called Un-nefer, and portrayed with the head of a hare. As Un-nefer, Osiris was sacrificed to the Nile each year to facilitate the annual flooding which brought renewal of the land and crops. Un-nefer has been translated variously as “The Good Being” or “The One Who Brings Good into Being” or “Beautiful Renewal.” Wenet’s male counterpart, Wenenu (or Unnu), was sometimes identified as a form of Osiris or Re. The hare also appears as a standard hieroglyphic phonetic sign. This hieroglyph which is called “Wn” symbolized the very essence of life itself, and depicts a hare over a single ripple of water, the very substance from which life first appeared out of the primordial waters of Nun in ancient Egyptian creation myths. Wenet and Thoth, in their animal forms of hare and baboon respectively, share some interesting similarities. The hare was often depicted as a messenger for Thoth, and the hare was shown greeting the dawn in ancient Egyptian mythology and art, just as the baboon was. The baboon in nature has been documented from ancient times as patiently sitting and watching for the sun to rise over the horizon at dawn. The Cape Hare, the variety of hare which is the particular sacred animal of Wenet, has a distinctive yellow chest and white abdomen, which may have lent something to this animals association with greeting the sun at dawn. The Cape Hare was the subject of amulets found in tombs and tomb paintings. The Cape Hare is included under the scientific name of Lepus capensis, with the European Hare and Brown Hare. Lepus capensis is the animal upon which the Easter Bunny is based. During the Middle Kingdom, faience figurines of the Cape Hare were occasionally deposited in tombs – perhaps their legendary fecundity came into play as a symbol of fertility and thus ultimately of renewal. The earliest surviving ancient Egyptian amulets in the form of a hare come from the late Old Kingdom to First Intermediate Period. They were typically made of carnelian and ivory. The earliest surviving example of a Cape Hare in Egyptian art to date, comes from an elaborately decorated votive schist ‘Hunters’ Palette’ which features a desert hunting scene from the Late Predynastic Period. This piece is on display at the British Museum. During the Eighteenth Dynasty, Cape Hares appear as popular subjects among offerings pictured on tomb-chapel walls to nourish the deceased. One very beautiful example appears on a fragment of a wall painting from the tomb-chapel of Nebamun at Thebes. In the New Kingdom images of the hare were used as decorative motifs, particularly on items used for cosmetics and personal grooming. Dating from the Late Dynastic and Ptolemaic periods several finely cast bronze votive statuettes have been found, and a great number of small green-blue faience amulets which indicate the revered status of the hare as an amulet during these times. The hare was credited with powers of regeneration probably because of its well known fecundity. Its swiftness of movement and keenness of senses were seen as desirable defenses against forces of darkness. An amulet in the form of a hare amulet could be worn in life to endow its wearer with fertility, in death with the hope of rebirth, and both in life and in death for purposes of protection. Behavior, Characteristics and Habitat One of the best ways to get a grasp of the functions of a particular goddess or god is to study the habits and characteristics of the animal that is held sacred to them. The ancient Egyptians studied the behavior of animals around them, and like other cultures in India, China and Tibet, they believed that the behavior of certain animals manifested an aspect of deity. First of all, some of you may not know the differences between a rabbit and a hare. I didn’t! I have found that many animals we normally call ‘rabbits’ are actually a variety of hare. Jackrabbits are a perfect example of this. The primary differences between hares and rabbits are the hare is generally larger with longer ears and has more powerful hind legs. The hare lives in open habitat and runs to escape predators rather than hiding in the woods as the rabbit does. The hare does not build nests for its young which are born fully furred with their eyes open, an attribute called precocial. The rabbit does build nests and its young are born hairless with their eyes closed. The hare takes readily to the water, where it swims well. Hares are remarkably fecund, mating when scarcely a year old. The female can bring forth several broods in one year. Usually two young are born at a time and sheltered in a clump of grass or under a bush. In the early stages of life they do not seem to have a body scent, as they are passed over by predators. They grow and develop quickly, becoming weaned and independent at about one month old. The Cape Hare lives in open, dry country from coastal plains to mountains, open fields of grasslands, and open areas of sparse woodlands, that contain low grass for feeding and grass stands for cover. They can inhabit many habitats that are too arid or open to support other varieties of hares. The Cape Hare eats grass, corn, fruit, clover, wheat and other green plants in the summer. In winter it eats buds and twigs. Their resting places are shallow depressions in the ground which are known as ‘forms’ because they are shaped by the animal’s body. A Cape Hare will return to its ‘form’ day after day, and will sleep lying in exactly the same position: it is only when under stress that it may take alternative refuge in the underground burrow of some other animal. The Cape Hare is predominately nocturnal, after dark it emerges to feed on grasses and sometimes on other plants. The upper incisors are long and chisel-like and they grow throughout the hare’s lifetime. Their behavior when they are angry includes grinding of teeth, drumming of forefeet and stamping of hind feet. When warning others a Cape Hare makes a grating sound with its teeth or screams when distressed. When disturbed, the Cape Hare will suddenly leap up and dart off using a zigzag motion, sharp turns, and back tracks frequently to evade a predator. When chased, it can run 30 mph with bursts of speed up to 45 mph. It also makes very sharp turns and back tracks frequently when chased, just as it tends to do when disturbed from resting or hiding in it’s ‘form’. Leaps of 4′ to 12′ leap have been observed. Cape Hares occur throughout Africa, as well as many parts of the Middle East and Asia. The Cape hare is native of all non-forested areas of Africa, Europe and Asia to central China. It was introduced in New York in the 1890s and now inhabits open areas of New York as well as parts of Connecticut, Massachusetts and southeastern Ontario. So what does this tell us of the Goddess Wenet? Lets read the ancient texts and see if these “hare facts” can help in interpretation. The Hare Goddess Wenet Wenet was depicted either as a hare, or as a woman with a standard bearing a recumbent hare on her head, or as a woman with the head of a hare. According to Plutarch the Egyptians venerated the hare on account of its swiftness and keen senses, but the hare’s form was also taken by certain other deities who had associations with the Otherworld. In one of the vignettes of the Elysian Fields from the Egyptian Book of the Dead, a hare-headed god, a snake-headed god, and a bull-headed god sit side by side; a hare-headed deity also guards one of the Seven Halls in the Underworld. Wenet was sometimes depicted in the form of a snake, a creature with clear Otherworld associations. In the Chapter of the Egyptian Book of the Dead titled, “Of the Four Blazing Flames which are Made for the Khu,” taken from the Papyrus of Nu, Sheets 26 and 27, there is a rubric which mentions Wenet by a more archaic spelling of her name, Unnut. In this rubric Nu records “And you shalt write down these writings in accordance with the things which are found in the books of the royal son Heru-ta-ta-f, who discovered [them] in a hidden chest – now they were in the handwriting of the god himself – in the Temple of the goddess Unnut, the Lady of Unnu (Hermopolis) during his journey to make an inspection of the temples…” This furthers Wenets association with the Otherworld, for according to this text the spells for the Book of the Dead were found in her temple at Hermopolis, written out in scrolls by the god Thoth himself. In the Papyrus of Ani is a hymn to Ra in which is found the following passage: “The goddess Net-Unnut is stablished upon thy head; and her uraei of the South and the North are upon thy brow; she taketh her place before thee.” As Net-Unnut or Nebt-Unnut, the goddess Wenet is a Guardian of the Underworld, titled “Lady of the Hour.” A portion of spell 17 of the Book of the Dead reads “…Who is he? ‘Swallower of Myriads’ is his name, and he dwells in the Lake of Wenet…” This takes on a whole new meaning when one realizes that hares can swim, coupled with the fact that creation first came about in the watery abyss of Nun, out of which the primordial mound of creation first appeared, from which the newly born god manifested. To dwell in the Lake of Wenet given the well known fecundity of the Cape Hare means to live renewed, revitalized, to be reborn, to live, forever and ever renewed after death, as the god Atum-Re. Spell 17 does go on to identify the dweller in the Lake of Wenet as Atum-Re, the creator of all, whose father is said to be Nun, because he rose out of the ‘watery abyss.’ This is further emphasized in other passages which mention Wenet in the Book of the Dead. Spell 149 describes the ‘Mounds of the West’ (14 in number) which the spirit travels through to be reborn, rejuvenated while in the Otherworld or Duat: “…The twelfth mound; green. Isdjedet in the West. N. says: As for that Mound of Wenet which is in front of Rosetjau, its breath is fire, and the gods cannot get near it, the spirits cannot associate with it; there are four cobras on it whose names are ‘Destruction.’ O Mound of Wenet, I am the greatest of the spirits who are in you, I am among the Imperishable Stars who are in you, and I will not perish, nor will my name perish. ‘O savoir of a god!’ say the gods who are in the Mound of Wenet. If you love me more than your gods, I will be with you for ever…” Not only is the Mound of Wenet a site of sacred creative energy, the ability of the hare to elude destruction, makes Wenet, through her association with this animal a haven for the spirit, where it is rejuvenated on its journey through the Other world, a place where it cannot perish. The Coffin Texts also mention Wenet. Spell 47 reads “…may Wenet make firm your head for you, may you receive a sceptre in the Bark of Night, may the roads of the Lord of All be shown to you. Ho N! Raise yourself to life for ever!” It is through the goddess Wenet that the deceased will attain strength (firmness of head) and the authority (a sceptre) to become established and live again in the Otherworld. Spell 495 of the Coffin Texts reads: “I extend my arm in company with Shu, I am released in company with Wenet. I have fled with the Sistrum-player, I have reached the horizon as a great falcon, I have got rid of my impediment in the horizon, I have saved myself from the slayers…” Knowing what we do of the habits of the hare to elude its enemies, this passage corresponds this ability of the sacred animal of Wenet with a final victory of the deceased to rise above all difficulties to be reborn again in the horizon as the solar falcon. Spell 720 of the Coffin Texts states: “…I am a dawn-god. The plumes tremble when Nut ascends, those who are in the storm tremble… my voice is (that of) Wenet; …I regard myself as a dawn-god…” Remember that the hare has the capability to scream when distressed, and that the hare greets the dawn as a protective deity. Further on, near the end of the Coffin Texts, in Spell 942, “…when this goddess goes forth, having appeared as Re […] the Sole Lord…she has nothing which has been done against her in [this her name] of Wenet…” It is as Wenet, appearing as the solar god Re, brilliant and shining forth with new life that the deceased finds renewal of life. A strong resemblance to the ancient Egyptian role of Wenet in the spells of the Book of the Dead and the Coffin Texts also surfaces in the mythology of the Algonquin Indians of North America. They believed that after death, their spirits traveled to a hare god known as Menabosho. The hare was sacred to the goddess Freya and to Ostara, goddess of springtime. This link with the goddess Ostara led to the modern day Easter Bunny. The Mongolians, Chinese, Japanese, and other Far Eastern peoples all held similar beliefs about the hare. Eros, god of sexual love, is sometimes represented carrying a hare, and the hare was a favorite animal of Aphrodite, goddess of love and beauty. When a hare rested at the feet of the Virgin Mary it was a symbol of triumph over desires of the flesh. “In many ancient civilizations the hare is a “lunar animal,” because the dark patches (maria, “seas”) on the surface of the full moon suggest leaping hares…. In Buddhist, Celtic, Hottentot and ancient Egyptian cultures as well, the hare was associated with the moon… known for it’s vigilance and for the myth of it sleeping with it’s eyes open. The early Christian Physiologus mentions a further peculiarity of the hare: with its shorter front legs, it can run fastest uphill, eluding its pursuers. It’s speed and vigilance, according to Plutarch (ce 46 – 120), have a “divine” quality… A trickster figure, the hare outwits larger and stronger animals…For psychologically oriented symbologists, neither the speed nor the “timidity” of the hare is critical, but rather the rate at which it multiplies: this makes the animal a symbol of fertility and passionate sexuality.” (Biedermann, ‘Dictionary of Symbolism’) A Vision of Wenet Beautiful Mother, As the Light Illuminates Your Face, Your Beauty enfolds my soul. Swiftly runs Wenet, Lady of Wenu, Between the Two Horizons. Between the Adze of the North And the Adze of the South. I sing to You this Day, Lady of Wenu, That the Way will be opened To all who seek You. The Goddess turns and rises above me Holding the two jars, The Black and the White. She anoints my mouth. Sacred Words long unspoken rush forth from my lips. She anoints my heart. Divine Light quivers and bursts from my being. I am reborn. Source: Artwork by Fattah Hallah Abde; Ancient Egyptian amulet, symbol of the goddess Wenet ; Tomb-chapel of Nebamun Thebes, Egypt Late 18th Dynasty, around 1350 BCE;via Linda’s webpage: http://mirrorofisis.freeyellow.com/id599.html; EgyptianRabbit TotemshamanismTotem Previous Post Ring of Fire Next Post Sacred Fire Names Jared Brookes says: Good write-up. It turns out that the idea of a hare (or rabbit) sleeping with its eyes open isn’t a myth. Sometimes they actually do sleep with their eyes open. On another note, hares and rabbits are very very similar — even to the extent that hares can become tame. The university that I attended has hares that sleep sprawled out along the paths that students walk. I’ve even observed hares crane their heads to see what students are reading when people are studying out on the grass in the summer.
cc/2019-30/en_middle_0028.json.gz/line1594873
__label__cc
0.706838
0.293162
GO. A Ridiculously Useful Guide to Cheap Unconventional Travel Man Bites Dog! A Radical Approach to Raising A Lot of Money for Charity Ethan Maurice Lila: An Inquiry into Morals Lila is Robert Persig’s follow-up to one of my all-time favorite books, Zen and the Art of Motorcycle Maintenance. While “Zen” enjoyed massive commercial success, Lila didn’t. For years, I falsely assumed this book wasn’t worth the read. Curiosity eventually prevailed and I picked a copy of Lila up last spring to read on a west coast of the USA road trip. Utterly enrapt, I was unable to put the book down, reading the last 100 pages straight on a rainy day at a Burger King in Oregon. Tagged: Books Every Thing Is F*cked: A Book About Hope Every Thing Is F*cked shattered my previous record for most index cards added to my Commonplace Book: from 232 pages, I pulled 138 of them. This was nothing short of astounding, as the previous record holder, The Power of Myth, was less than half that number. Why so many index cards? Because Mark Manson's new book brims with shocking, actionable wisdom. The Power of Now is a straightforward introduction to what we in the western world refer to as “eastern philosophy,” or what I've come to recognize as a set of basic truths we can experience firsthand that nobody ever told us about. If you've never encountered the concepts of Buddhism, Taoism, or the thought that we might be something other than an individual brain or soul separate from all else, this book is a great place to start. The subtitle “A Brief History of Humankind” describes the subject of this book quite well. However, it doesn't convey the fascination, philosophy, and impact contained in this bird’s eye view of human history. Rather than focus on what happened, Sapiens is about how and why our history unfolded the way it did. Armed with ingenious metaphors, wit, and an eye for the big picture, Yuval Noah Harari delivers what I’m tempted to call a ‘masterpiece’ with unparalleled clarity. By: Paul Kalanithi At sixteen, I nearly died from a mosquito bite that resulted in this profound realization of time's value and the fragility of life. No event echoes louder through my days. Yet, I still often get caught up in trivial and lose sight of the remarkable opportunity of being. Reading When Breath Becomes Air is like going through that realization for the first time all over again. The book's written by cancer-ridden neurosurgeon Paul Kalanithi, a gifted thinker and wordsmith dying as the medical career he put a decade of devoted preparation into is about to begin. It's a gift, wholeheartedly cast back to the living, from a dying man. My 10 Favorite Index Cards: “Throughout college, my monastic, scholarly study of human meaning would conflict with my urge to forge and strengthen human relationships that formed that meaning. If the unexamined life was not worth living, was the unlived life worth examining?” — Paul Kalanithi “I spent the next year in classrooms in the English countryside, where I found myself increasingly often arguing that direct experience of life-and-death questions was essential to generating substantial moral opinions about them. Words began to feel as weightless as the breath that carried them. Stepping back, I realize that I was confirming what I already knew: I wanted that direct experience. It was only in practicing medicine that I could pursue serious biological philosophy. Moral speculation was puny compared to moral action.” “Indeed this is how 99% of people select their jobs: pay, work environment, hours. But that’s the point. Putting lifestyle first is how you find a job—not a calling.” “Had the confirmation of my fears—the CT scan, in the lab results, both showing not merely cancer but a body overwhelmed, nearing death—released me from the duty to serve, from my duty to patients, to neurosurgery, to the pursuit of goodness? Yes, I thought, and therein was the paradox: like a runner crossing the finish line only to collapse, without that duty to care for the ill pushing me forward, I became an invalid.” ““Don’t you think saying goodbye to your child will make your death more painful?” “Wouldn’t it be great if it did?” I said. Lucy and I both felt that life wasn’t about avoiding suffering. Years ago, it had occurred to me that Darwin and Nietzsche agreed on one thing: the defining characteristic of the organism is striving. Describing life otherwise was like painting a tiger without stripes. After so many years of living with death, I’d come to understand that the easiest death wasn’t necessarily the best.” “During the pastor’s scripture reading, I suddenly found myself chuckling. It featured a frustrated Jesus whose metaphorical language receives little interpretation from his followers.” “We build scientific theories to organize and manipulate the world, to reduce phenomena to manageable units. Science is based upon reproducibility and manufactured objectivity. As strong as that makes its ability to generate claims about matter and energy, it also makes scientific knowledge inapplicable to the existential, visceral nature of human life, which is unique and subjective and unpredictable. Science may provide the most useful way to organize empirical, reproducible data, but its power to do so is predicated on its inability to grasp the most central aspects of human life: hope, fear, love, hate, beauty, envy, honor, weakness, striving, suffering, virtue.” “In the end, it cannot be doubted that each of us can see only a part of the picture. The doctor sees one, the patient sees another, the engineer a third, the economist a fourth, the pearl diver a fifth, the alcoholic a sixth, the cable guy a seventh, the sheep farmer an eighth, the Indian beggar a ninth, the pastor a tenth. Human knowledge is never contained in one person. It grows from the relationships we create between each other and the world, and is still never complete. And Truth comes somewhere above all of them.” “… two people huddled together, as one faces the abyss.” “Everyone succumbs to finitude. I suspect I am not the only one who reaches this pluperfect state. Most ambitions are either achieved or abandoned; either way they belong to the past. The future, instead of the ladder toward the goals in life, flattens out into a perpetual present. Money, status, all the vanities the preacher Ecclesiastes described hold so little interest: a chasing after wind, indeed.” For more info, reviews, or to purchase: The Snow Leopard By: Peter Matthiessen The true account of a biological excursion into the Himalayas, outwardly searching for the illusive snow leopard, which becomes an overarching metaphor for the author's inward search for enlightenment. It's an adventure in the high mountains of philosophy—the outer and inner journey of a curious spirit interspersed with explanations of the most profound perceptions of the eastern religions. The Snow Leopard deepened my awe for life, stoked my love of wandering through wilderness for both the external and internal experience, and reinforced my understanding of how little we need to be perfectly content. “Compare the wild, free paintings of the child with the stiff, pinched “pictures” these become as the painter notices the painting and tries to portray “reality” as others see it; self-conscious now, he steps out of his own painting and, finding himself apart from things, notices the silence all around and becomes alarmed by the vast significations of Creation. The armor of the “I” begins to form, the construction and desperate assertion of separate identity, the loneliness: “Man has closed himself up, till he sees all things through the narrow chinks of his cavern.”” — Peter Matthiessen “The fact that many a man who goes his own way ends in ruin means nothing… He must obey his own law, as if it were a daemon whispering to him of new wonderful paths… There are not a few who are called awake by the summons of the voice, whereupon they are at once set apart from the others, feeling themselves confronted with a problem about which the others know nothing. In most cases it is impossible to explain to the others what has happened, for any understanding is walled off by impenetrable prejudices. “You are no different from anybody else,” they will chorus, or “there’s no such thing,” and even if there is such a thing, it is immediately branded as “morbid.” … He is at once set apart and isolated, as he has resolved to obey the law that commands him from within. “His own law!” everybody will cry. But he knows better: it is the law… The only meaningful life is a life that strives for the individual realization—absolute and unconditional—of its own particular law… To the extent that a man is untrue to the law of his being… he has failed to realize his life’s meaning. The undiscovered vein within us is a living part of the psyche; classical Chinese philosophy names this interior way “Tao,” and likens it to the flow of water that moves irresistibly to one’s goal. To rest in Tao means fulfillment, wholeness, one’s destination reached, one’s mission done; the beginning, end, and perfect realization of the meaning of existence innate in all things.” — Carl Jung “Do note imagine that the journey is short; and one must have the heart of a lion to follow this unusual road, for it is very long… One plods along in a state of amazement, sometimes smiling, sometimes weeping.” — Sufi Fable “As in the great religions of the East, the native American makes small distinction between religious activity and the acts of every day: the religious ceremony is life itself.” “And it is true that everywhere dangers and difficulties are exaggerated by the local people, if only as a good excuse for extortion or malingering: one must go oneself to know the truth.” “Amazingly, we take for granted that instinct for survival, fear of death, must separate us from the happiness of pure interpreted experience, in which body, mind, and nature are the same. And this debasement of our vision, the retreat from wonder, the backing away like lobsters from free swimming life into safe crannies, the desperate instinct that our life passes unlived, is reflected in proliferation without joy, corrosive money rot, the gross befouling of the earth and air and water from which we come.” “But the courage-to-be, right here and now and nowhere else, is precisely what Zen, at least, demands: eat when you eat, sleep when you sleep! Zen has no patience with “mysticism,” far less the occult although its emphasis on the enlightenment experience (called kensho or satori) is what sets it apart from other regions and philosophies.” “You never enjoy the world alright, till the Sea itself flows in your veins, till you are clothed with the heavens, and crowned with the stars: and perceive yourself to be the sole heir of the world, and more than so, because men are in it who are every one sole heirs as well as you.” — Thomas Traherne “The secret of the mountains is that the mountains simply exist, as I do myself: the mountains exist simply, which I do not. The mountains have no “meaning,” they are meaning; the mountains are. The sun is round. I ring with life, and the mountains ring, and when I can hear it, there is a ringing that we share. I understand all this, not in my mind but in my heart, knowing how meaningless it is to try to capture what cannot be expressed, knowing that mere words will remain when I read it all again, another day.” — Peter Mathiessen “GS murmurs, “Unless it moves, we are not going to see it, not even on the snow—these creatures are really something.” With our binoculars, we study the barren ridge face, foot by foot. Then he says, “You know something? We’ve seen so much, maybe it’s better if there are some things we don’t see.” He seems startled by his own remark, and I wonder if he means this as I take it—that we have been spared the desolation of success, the doubt: is this really what we came so far to see? When I say, “That was the haiku—writer speaking,” he knows just what I mean, and we both laugh. GS strikes me as much less dogmatic, more open to the unexplained then he was two months ago. In Kathmandu, he might have been suspicious of this haiku, written on our journey by himself: Cloud-men beneath loads. A dark line of tracks in the snow. Suddenly nothing.” Self-Reliance and Other Essays Written in the 1800's, with such concentration of profound thought, Self-Reliance and Other Essays requires focus and takes longer to read than larger books. It's worth it. A mere 117 pages, I penned 48 quotes from it on individual index cards for my Commonplace Book (more than I have from any other book in my life thus far). The Art of Possibility The Art of Possibility is about seeing—about expanding the constrains we impose on our lives, problems, and decisions, allowing us to examine a greater range of possibility. Yes, the title is gimmicky. But there's a reason there's 25 million copies of The 7 Habits of Highly Effective People in circulation—the book is clock-full of profound, actionable wisdom. Approaching from an academic angle, Stephen Covey focused his studies on success literature of the past 200 years, looking for parallels and common practices, and wrote this book about his discoveries. Walden is the account of Thoreau's two-year experiment in simple living on Walden Pond. One could do no better in describing its intent than he: “I went to the woods because I wished to live deliberately, to front only the essential facts of life, and see if I could not learn what it had to teach, and not, when it came time to die, discover that I had not lived.” Desert Solitaire By: Edward Abbey One doesn't read Desert Solitaire for the tales of Edward Abbey's experiences in the American Southwest (though riveting), but rather for the insights and ideas that stemmed from two years as a ranger in Arches National Park and his journeys throughout the harsh desert. Among story, humor, and descriptive prose, veins of philosophy are often encountered and run deep throughout the book. If you seek profound wilderness experiences, enjoy questioning cultural assumptions, or share Abbey's rebellious distaste for the number-obsessed system, you'll relish in these pages the way I did. I'm living just a mile outside of Yellowstone National Park as I write this and would love to hand copies out at the entrance gate to the millions of confused tourists trying to experience wilderness from the inside of car, gift shops, and camera of their phone. “Do not jump into your automobile next June and rush out to the Canyon country hoping to see some of that which I have attempted to evoke in these pages. In the first place you can’t see anything from a car; you’ve got to get out of that goddamned contraption and walk, better yet crawl, on hands and knees, over the sandstone and through the thornbush and cactus. When traces of blood begin to mark your trail you’ll see something maybe. Probably not.” “A weird, lovely, fantastic object out of nature like Delicate Arch has the curious ability to remind us—like rock and sunlight and wind and wilderness—that out there is a different world, older and greater and deeper by far than ours, a world which surrounds and sustains the little world of men as sea and sky surround and sustain a ship. The shock of the real. For a little while we are again able to see, as the child sees, a world of marvels. For a few moments we discover that nothing can be taken for granted, for if this ring of stone is marvelous, and our journey here on earth, able to see and touch and hear in the midst of tangible mysterious things-in-themselves, is the most strange and daring of all adventures.” “Unburdened by the necessity of devoting most of their lives to the production, distribution, sale and servicing of labor saving machinery, lacking proper recreational facilities, these primitive savages were free to do that which comes as naturally to men as making love...” “What for? ‘In anticipation of future needs, in order to provide for the continued industrial and population growth of the Southwest.’ And in such an answer we see that it’s only the old numbers game again, the monomania of small and very simple minds in the grip of an obsession. They cannot see that growth for the sake of growth is a cancerous madness, that Phoenix and Albuquerque are doubled again and again. They would never understand that an economic system which can only expand or expire must be false to all that is human.” “Protest alone will not halt the iron glacier moving upon us.” “If industrial man continues to multiply his numbers and expand his operations he will succeed in his apparent intention, to seal himself off from the natural and isolate himself an exile from the earth and then will know at last, if he is still capable of feeling anything, the pain and agony of final loss.” “If man’s imagination were not so weak, so easily tired, if his capacity for wonder not so limited he would abandon forever such fantasies of the supernatural. He would learn to perceive in water, leaves and silence more than sufficient of the absolute and marvelous, more than enough to console him for the loss of ancient dreams.” “Where all think alike there is little danger of innovation.” “All things excellent are as difficult as they are rare, said a wise man. If so, what happens to excellence when we eliminate the difficulty and the rarity.” “In trying to isolate this peculiarity, if it exists at all and is not simply an illusion, we must beware of a danger well known to explorers of both micro—and the macrocosmic—that of confusing the thing observed with the mind of the observer, of constructing not a picture of external reality but simply a mirror of the thinker. Can this danger be avoided without falling into an opposite but related error, that of separating too deeply the observer and the thing observed, subject and object, and again falsifying our view of the world? There is no way out of these difficulties—you might as well try running Cataract Canyon without hitting a rock. Best to launch forth boldly, with or without life jackets, keep your matches dry, and prey for the best.” For more details, reviews, or to purchase: ethan.maurice24@gmail.com A Free, Instant Download: “GO.” is a ridiculously useful collection of resources, travel hacks, and philosophies that allow me to wander the world for pennies on the dollar. Join over 2,600 others in subscribing to my monthly letter and it’s all yours, totally free of charge: Twelve letters a year, no spam ever, unsubscribe anytime. Thanks for subscribing! I’ll be in touch at the end of the month and think you’ll like what you see. CLICK HERE TO DOWNLOAD “GO.” It’s a PDF document. For future reference, remember to save it to your computer as well. - Ethan © Ethan Maurice 2019
cc/2019-30/en_middle_0028.json.gz/line1594877
__label__wiki
0.736317
0.736317
Trump attacks Brexit deal as 'great for EU' US president Donald Trump said in Washington Monday the Brexit withdrawal agreement might block US plans for free trade with the UK in future. "I think we have to take a look seriously whether or not the UK is allowed to trade because right now if you look at the deal, they may not be able to trade with us," he said, calling it "a great deal for the EU". Timmermans trolls 'idiot' Brexit negotiators The first-ever female president of the European Commission wants half of her team of commissioners to consist of women. But most of the commissioners put forward by EU member states so far have been male. Today, 08:54 Nato chief warns world against more Russian missiles Today, 09:27 Timmermans trolls 'idiot' Brexit negotiators
cc/2019-30/en_middle_0028.json.gz/line1594879
__label__wiki
0.691234
0.691234
Ivory Coast national football team This article is about the men's team. For the women's team, see Ivory Coast women's national football team. The Ivory Coast national football team (French: Équipe de Côte d'Ivoire de football), nicknamed Les Éléphants (The Elephants), represents Ivory Coast in international football and is controlled by the Ivorian Football Federation (FIF). Until 2005, their greatest accomplishment was winning the 1992 African Cup of Nations against Ghana on penalties at the Stade Leopold Senghor in Dakar, Senegal. Their second success came in the 2015 edition, again defeating Ghana on penalties at the Estadio de Bata in Bata, Equatorial Guinea. Les Éléphants (The Elephants) Ivorian Football Federation CAF (Africa) Sub-confederation WAFU (West Africa) Didier Zokora (123) Didier Drogba (65) Stade Félix Houphouët-Boigny First colours Second colours 62 3 (14 June 2019)[1] 12 (February 2013, April–May 2013) 75 (March–May 2004) 52 5 (10 July 2019)[2] 10 (26 January 2013) 70 (6 October 1996) Ivory Coast 3–2 Dahomey (Madagascar; 13 April 1960) Ivory Coast 11–0 Central African Republic (Abidjan, Ivory Coast; 27 December 1961) Netherlands 5–0 Ivory Coast (Rotterdam, Netherlands; 4 June 2017) Group stage (2006, 2010, 2014) 23 (first in 1965) Champions, 1992 and 2015 Third place, 2016 Fourth Place, 1992 Logo until 2014 The team qualified for three consecutive FIFA World Cups between 2006 and 2014, but has never advanced beyond the group stage. Ivory Coast has produced several notable players who have played in Europe, including Didier Drogba, Yaya Touré, Emmanuel Eboué, Wilfried Bony, Seydou Doumbia, Gervinho, Eric Bailly, Serge Aurier, Nicolas Pépé, Maxwel Cornet, Wilfried Zaha, Ibrahim Sangaré, Salomon Kalou and Kolo Touré. Having become a fixed presence in the World Cup (since 2006) and having won the 2015 Africa Cup of Nations, the team is generally considered to be one of the best African teams of the last decade and Didier Drogba being the best African Footballer.[citation needed] This is also confirmed by FIFA Ranking in the reference period, never having been so high for Les Éléphants. This section needs expansion. You can help by adding to it. (April 2019) World Cup recordEdit See also: Ivory Coast at the FIFA World Cup FIFA World Cup record Qualification record 1930 Did not enter – – – – – – 1934 – – – – – – 1974 Did not qualify 6 3 2 1 8 7 1994 8 4 3 1 12 6 2002 10 5 4 1 22 10 2006 Group stage 19th 3 1 0 2 5 6 Squad 10 7 1 2 20 7 2010 17th 3 1 1 1 4 3 Squad 12 8 4 0 29 6 2014 21st 3 1 0 2 4 5 Squad 8 5 3 0 19 7 2018 Did not qualify 8 4 2 2 11 5 2022 To be determined To be determined FIFA Confederations Cup recordEdit FIFA Confederations Cup record 1992 Fourth place 4th 2 0 0 2 2 9 Squad Africa Cup of Nations recordEdit Africa Cup of Nations record Host nation(s) / Year 1957 Part of 1962 Not affiliated to CAF 1965 Third place 3rd 3 2 0 1 5 4 1970 Fourth place 4th 5 2 1 2 11 9 1974 Group stage 7th 3 0 1 2 2 5 1978 Banned 1990 6th 3 1 0 2 3 5 1992 Champions 1st 5 2 3 0 4 0 1998 Quarter-finals 7th 4 2 2 0 10 6 2002 16th 3 0 1 2 1 4 2006 Runners-up 2nd 6 3 2 1 6 5 2010 Quarter-finals 8th 3 1 2 0 5 4 2023 Qualified as hosts *Denotes draws include knockout matches decided on penalty kicks. **Gold background colour indicates that the tournament was won. ***Red border color indicates tournament was held on home soil. African Nations Championship recordEdit Appearances: 4 African Games recordEdit Football at the African Games has been an under-23 tournament since 1991. See also: Ivory Coast national under-23 football team African Games record 1965 - 0 0 0 0 0 0 1991–present See Ivory Coast national under-23 football team Recent and upcoming fixturesEdit 9 September 2019 AFCONQ Rwanda Ivory Coast Kigali, Rwanda 15:30 (UTC+2) Kagere 64' Report Kodjia Gradel 48' Stadium: Stade Régional Nyamirambo Referee: Jackson Pavaza (Namibia) 12 October 2019 AFCONQ Ivory Coast Central African Republic Bouaké, Ivory Coast 17:00 (UTC±0) Kodjia Doukouré 76' Report Stadium: Stade Bouaké Referee: Alex Muhabi (Uganda) 16 October 2019 AFCONQ Central African Republic Ivory Coast Bangui, Central African Republic 15:00 (UTC+1) Report Stadium: Barthélemy Boganda Stadium Referee: Janny Sikazwe (Zambia) 18 November 2019 AFCONQ Guinea Ivory Coast Conakry, Guinea 17:00 (UTC±0) Yattara 11' Report Seri 21' Stadium: Stade du 28 Septembre Referee: Rédouane Jiyed (Morocco) 23 March 2019 AFCONQ Ivory Coast Rwanda Abidjan, Ivory Coast 17:00 UTC±0 Report Stadium: Stade Félix Houphouët-Boigny Referee: Tsegay Mogos Teklu (Eritrea) 26 March Friendly Ivory Coast Liberia Abidjan, Ivory Coast 17:00 UTC±0 Kodjia 90+1' (pen.) Report Stadium: Stade Félix Houphouët-Boigny Referee: Jean Ouattara (Burkina Faso) 7 June Friendly Ivory Coast Comoros Boulogne-sur-Mer, France Y. M'Changama 90+4' (pen.) Stadium: Stade de la Libération Referee: Mehdi Mokhtari (France) 15 June Friendly Ivory Coast Uganda Abu Dhabi, United Arab Emirates 16:30 UTC+4 Report Stadium: Zayed Sports City Stadium Referee: Sultan Abdulrazaq Ibrahim Al Marzouqi (United Arab Emirates) Zambia Abu Dhabi, United Arab Emirates Kodjia Sakala Referee: Ammar Ali Abdulla Jumaa Al Junaibi (United Arab Emirates) 24 June 2019 AFCON Ivory Coast South Africa Cairo, Egypt Report Stadium: Al Salam Stadium Referee: Mustapha Ghorbal (Algeria) 28 June 2019 AFCON Morocco Ivory Coast Cairo, Egypt En-Nesyri Referee: Sidi Alioum (Cameroon) 1 July 2019 AFCON Namibia Kamatuka Stadium: 30 June Stadium Referee: Peter Waweru (Kenya) 8 July 2019 AFCON Mali Ivory Coast Suez, Egypt Stadium: Suez Stadium 11 July 2019 AFCON Ivory Coast 1–1 (a.e.t.) (3–4 p) Algeria Suez, Egypt Feghouli Referee: Bamlak Tessema Weyesa (Ethiopia) Kessié Bensebaini Slimani Delort Ounas Belaïli CoachesEdit Paul Gévaudan Alphonse Bissouma Tapé 1966 Vacant Peter Schnittger Jean Tokpa 1974–76 empty Gérard Gabo Otto Pfister Davi Ferreira Pancho Gonzales Yeo Martial Kaé Oulaï Radivoje Ognjanović Philippe Troussier Henryk Kasperczak Pierre Pleimelding Robert Nouzaret Patrick Parizon Gbonke Tia Lama Bamba Henri Michel Gérard Gili Vahid Halilhodžić Georges Kouadio Sven-Göran Eriksson François Zahoui Sabri Lamouchi Hervé Renard Michel Dussuyer PlayersEdit Current squadEdit The following players have been selected for the 2019 Africa Cup of Nations and the previous friendlies in June 2019[3] Caps and goals updated as of 8 July 2019, after the match against Algeria. 1 1GK Tape Ira Eliezer (1997-08-31) 31 August 1997 (age 21) 0 0 16 1GK Sylvain Gbohouo (1988-10-29) 29 October 1988 (age 30) 47 0 Badra Ali Sangaré (1986-05-30) 30 May 1986 (age 33) 14 0 Free State Stars 2 2DF Wonlo Coulibaly (1991-12-22) 22 December 1991 (age 27) 8 0 Souleyman Doumbia (1996-09-24) 24 September 1996 (age 22) 2 0 Jean-Philippe Gbamin (1995-09-25) 25 September 1995 (age 23) 12 0 Wilfried Kanon (1993-07-06) 6 July 1993 (age 26) 43 1 Ismaël Traoré (1986-08-18) 18 August 1986 (age 32) 13 0 17 2DF (1992-12-24) 24 December 1992 (age 26) 57 1 Cheick Comara Wydad Casablanca Mamadou Bagayoko 7 3MF Victorien Angban Franck Kessié 10 3MF Jean Michaël Seri (1991-07-19) 19 July 1991 (age 27) 31 3 Max Gradel (1987-11-30) 30 November 1987 (age 31) 71 12 Ibrahim Sangaré (1997-12-02) 2 December 1997 (age 21) 6 1 (1984-11-07) 7 November 1984 (age 34) 51 2 Neuchâtel Xamax 9 4FW Wilfried Zaha (1992-11-10) 10 November 1992 (age 26) 16 4 11 4FW Maxwel Cornet Wilfried Bony (1988-12-10) 10 December 1988 (age 30) 59 18 Al-Arabi Roger Assalé Jonathan Kodjia (1989-10-22) 22 October 1989 (age 29) 24 11 Recent call-upsEdit The following players have also been called up to the squad within the last 12 months. Abdoul Karim Cissé (1985-10-20) 20 October 1985 (age 33) 4 0 ASEC Mimosas 2019 AFCON PRE El Hadje Danté (1998-07-18) 18 July 1998 (age 20) 0 0 LYS Sassandra v. Guinea, 18 November 2018 Nicolas Tie (2001-02-13) 13 February 2001 (age 18) 0 0 Chelsea U18 v. Central African Republic, 16 October 2018 Sayouba Mandé (1993-06-15) 15 June 1993 (age 26) 5 0 OB v. Rwanda, 9 September 2018 Slavia Prague 2019 AFCON PRE Abdoulaye Bamba (1990-04-25) 25 April 1990 (age 29) 4 0 Angers 2019 AFCON PRE Eric Bailly (1994-04-12) 12 April 1994 (age 25) 34 2 Manchester United v. Liberia, 26 March 2019 Ghislain Konan Reims v. (1990-02-03) 3 February 1990 (age 29) 13 0 Göztepe v. Kouadio-Yves Dabila (1997-01-01) 1 January 1997 (age 22) 0 0 Lille v. (1989-02-01) 1 February 1989 (age 30) 9 0 Strasbourg v. Ismaël Diomandé Caen 2019 AFCON PRE Cheick Doukouré Levante v. Serge N'Guessan Jean-Eudes Aholou (1994-03-20) 20 March 1994 (age 25) 2 0 Monaco v. Yohan Boli (1993-11-17) 17 November 1993 (age 25) 3 0 Sint-Truiden 2019 AFCON PRE Yakou Méïté Reading v. Vakoun Issouf Bayo (1997-01-10) 10 January 1997 (age 22) 2 0 Celtic v. DEC Player refused to join the team after the call-up. INJ Player withdrew from the squad due to an injury. RET Player has retired from international football. SUS Suspended from the national team. RecordsEdit The Ivory Coast team is notable for having participated in (and won) the two highest-scoring penalty shoot-outs in international football competition — the 24-shot shoot-out in the final of the 1992 African Cup of Nations when Ghana was defeated 11–10, and the 24-shot shoot-out in the quarter-final of the 2006 African Cup of Nations, when Cameroon was defeated 12–11. In 2015, Ivory Coast once again defeated Ghana in the final of an 2015 African Cup of Nations with a 22-shot shoot-out, winning 9–8. After Uli Stielike left before the Africa Cup 2008 due to his son's health situation, Gerard Gili, the co-trainer, took his position. To compensate of the lack of another co-coach, Didier Drogba acted as a player-coach. This was only the second time that a player had also acted as coach in the Africa Cup, after George Weah was both player and coach for Liberia during the 2002 tournament. In both the 2006 and 2010 World Cups, Ivory Coast were placed in a so-called "Group of Death". In 2006, Ivory Coast faced Argentina, Netherlands and Serbia and Montenegro; Argentina and Netherlands reached the Round of 16. In 2010, Ivory Coast was drawn with Brazil, Portugal and North Korea. Ivory Coast finished third in Group G, as Brazil and Portugal progressed. Most capped playersEdit As of September 9, 2018[4] Players in bold are still active. 1. Didier Zokora 2000–2014 123 1 2. Kolo Touré 2000–2015 120 7 3. Didier Drogba 2002–2014 105 65 4. Yaya Touré 2004–2015 102 19 5. Siaka Tiéné 2000–2015 100 2 6. Salomon Kalou 2007– 97 28 7. Abdoulaye Traoré 1984–1996 88 50 8. Arthur Boka 2004–2015 87 1 9. Boubacar Barry 2000–2015 86 0 10. Gervinho 2007– 84 22 Top goalscorersEdit 1. Didier Drogba 2002–2014 65 105 4. Djohan Tiéhi 1987–1999 25 40 5. Gervinho 2007– 22 84 Ibrahima Bakayoko 1996–2002 22 40 7. Yaya Touré 2004–2015 19 102 Laurent Pokou 1967–1980 19 62 9. Aruna Dindane 2000–2010 18 62 Wilfried Bony 2010– 18 59 HonoursEdit Africa Cup of Nations: Winners (2): FIFA Confederations Cup: Fourth-place (1): 1992 Ivory Coast national under-20 football team ^ "The FIFA/Coca-Cola World Ranking". FIFA. 14 June 2019. Retrieved 14 June 2019. ^ Elo rankings change compared to one year ago. "World Football Elo Ratings". eloratings.net. 10 July 2019. Retrieved 10 July 2019. ^ http://www.fifciv.com/?q=can-2019-el%C3%A9phants-voici-la-liste-des-joueurs-retenus ^ Roberto Mamrud. "IvoryCoast – Record International Players". RSSSF. Retrieved 24 January 2017. Ivory Coast Association — official website Ivory Coast at FIFA.com Ivory Coast at the World Cups Ivory Coast Teams at World Cups Ivory Coast: Head-to-Head Records at World Cups Ivory Coast Players' Clubs Retrieved from "https://en.wikipedia.org/w/index.php?title=Ivory_Coast_national_football_team&oldid=906502365"
cc/2019-30/en_middle_0028.json.gz/line1594886
__label__wiki
0.692302
0.692302
Producers Guild Film Awards (Redirected from Star Guild Awards) The Producers Guild Film Awards (previously known as the Apsara Film & Television Producers Guild Award) is an accolade given by the Apsara Producers Guild to recognize excellence in Indian film and television.[1] Originated by filmmaker and scholar Amit Khanna,[2][3] the Star Guild Awards have been one of the major award events since 2004.[4] The 22-karat gold statuette was sculpted and designed by the jewellery brand Tanishq and was "inspired by the rich heritage of one of India's most treasured possessions - the Ajanta and Ellora Caves."[1] Nominations for the awards come from selected members of the guild, with the full membership (around 160) available to vote for the winners.[4] The ballots cast by the guild members are then taken to a common venue for the final counting.[2] Producers Guild Film & Television Awards Awarded for Excellence in film and television by members of the Producers Guild First awarded Television/radio coverage Imagine TV Wizcraft International Entertainment Pvt.Ltd The first Star Guild Awards ceremony was held on 28 May 2004 in Mumbai, India to honor outstanding film and television achievements of the 2003-04 film and television season.[5] While the award ceremonies are usually held at the beginning of the subsequent year, the fourth edition of the award ceremony (2008–09) was postponed to the end of the year as a sign of respect to the victims of the 2008 Mumbai attacks.[6] List of nominees and winnersEdit For the year 2003, held in 2004 - Nominees[2] & Winners[5] For the year 2004, held in 2005 - Not held For the year 2007, held in 2008 - Nominees[9] & Winners[10] For the year 2008, held in 2009 - Nominees & Winners[6] For the year 2009, held in 2010 - Nominees[11] & Winners[12] For the year 2011, held in 2012 - Nominees & Winners[15] For the year 2012, held in 2013 - Nominees & Winners For the year 2013, held in 2014 - Nominees & Winners[16][17] HostsEdit 2008 Javed Jaffrey 2010 Arjun Rampal, Ayushmann Khurrana & Preity Zinta 2011 Sajid Khan 2012 Karan Johar & Farah Khan 2013 Salman Khan 2014[20][21] 2015 Kapil Sharma & Parineeti Chopra 2016 Kapil Sharma Film awardsEdit Merit awardsEdit Best Actor in a Negative Role Best Actor in a Comic Role Best Male Debut Best Female Debut Best Debut Director Best Lyricist Best Male Playback Singer Best Female Playback Singer Technical awardsEdit Best StoryEdit 2006 Nagesh Kukunoor Iqbal 2008 Jaideep Sahni Chak De India 2009 Amole Gupte Taare Zameen Par 2010 Imtiaz Ali Love Aaj Kal 2011 Anusha Rizvi Peepli Live 2012 Zoya Akhtar, Reema Kagti Zindagi Na Milegi Dobara 2013 Juhi Chaturvedi Vicky Donor 2014 Prasoon Joshi Bhaag Milkha Bhaag 2015 Vikas Bahl, Chaitally Parmar, Parveez Shaikh Queen 2016 K. V. Vijayendra Prasad Bajrangi Bhaijaan Best ScreenplayEdit 2004 Rajkumar Hirani, Vidhu Vinod Chopra, Lajan Joseph Munnabhai MBBS 2006 Sanjay Leela Bhansali, Prakash Kapadia, Bhavani Ilyer Black 2009 Amole Gupte (tied with) Neeraj Pandey Taare Zameen Par (tied with) A Wednesday! 2010 A. R. Murugadoss Ghajini 2011 Rajat Arora Once Upon a Time in Mumbai 2013 Sujoy Ghosh Kahaani 2016 Kabir Khan Bajrangi Bhaijaan Best DialoguesEdit 2006 Aditya Chopra Veer Zaara 2008 Imtiaz Ali Jab We Met 2009 Neeraj Pandey A Wednesday! 2010 Anurag Kashyap Dev D 2011 Abhinav Kashyap, Dilip Shukla Dabangg 2012 Rajat Arora The Dirty Picture 2014 Hussain Dalal Yeh Jawaani Hai Deewani 2015 Rajkumar Hirani, Abhijat Joshi PK 2016 Prakash Kapadia Bajirao Mastani Best EditingEdit 2004 Rajkumar Hirani Munnabhai MBBS 2006 Nipun Gupta Sarkar 2008 Amitabh Shukla Chak De India 2009 Shri Narayan Singh A Wednesday! 2011 Namrata Rao Band Baaja Baaraat 2012 Aarti Bajaj No One Killed Jessica 2013 Namrata Rao Kahaani 2014 Chandrashekhar Prajapati Madras Cafe 2015 Anurag Kashyap, Abhijit Kokate Queen Best CinematographerEdit 2004 Anil Mehta Kal Ho Naa Ho 2006 Ravi K. Chandran Black 2008 Rajiv Menon Guru 2009 Kiran Deohans Jodhaa Akbar 2011 Sudeep Chatterjee (tied with) Santosh Sivan & V. Manikandan Guzaarish (tied with) Raavan 2012 Ranjan Palit (tied with) Chirantan Das 7 Khoon Maaf (tied with) Tanu Weds Manu 2013 Rajeev Ravi (tied with) Ravi Varman Gangs of Wasseypur (tied with) Barfi! 2014 Binod Pradhan Bhaag Milkha Bhaag 2015 Setu (Winner) Rajiv Jain (Nominated) Dedh Ishqiya Manjhi - The Mountain Man 2016 Sudeep Chatterjee Bajirao Mastani Best Costume DesignEdit 2004 Muneesh Sappel Pinjar 2006 Subarna Ray Chadhuri Parineeta 2008 Manish Malhotra, Karan Johar, Sanjeev Mulchandani Om Shanti Om 2009 Neeta Lulla Jodhaa Akbar 2011 Niharika Khan Band Baaja Baaraat 2012 Payal Saluja 7 Khoon Maaf 2013 Aki Narula Shefalina Barfi! 2014 Anju Modi, Maxima Basu Goliyon Ki Raasleela Ram-Leela 2015 Payal Saluja (tied with) Isha Mantry, Rajat K. Tangry Dedh Ishqiya (tied with) Mary Kom 2016 Anju Modi, Maxima Basu Bajirao Mastani Best Art DirectionEdit 2006 Omung Kumar Black 2009 Nitin Chandrakant Desai Jodhaa Akbar 2011 Sonal Chaudhary T. B. Abid Band Baaja Baaraat 2012 Subrata Chakravarthy Punita Grover 7 Khoon Maaf 2013 Sharmishta Roy Talaash: The Answer Lies Within 2014 Rashid Khan Goliyon Ki Raasleela Ram-Leela 2015 Amit Ray Subrata Chakravarthy Dedh Ishqiya 2016 Sujeet Sawant Shriram Iyengar Saloni Dhatrak Bajirao Mastani Best ChoreographyEdit 2006 Vaibhavi Merchant "Kajra Re" Bunty Aur Babli 2008 Farah Khan "Dhoom Tara" Om Shanti Om 2009 Chinni Prakash Rekha Prakash "Azeem us Shaan" Jodhaa Akbar 2010 Shiamak Davar "Dance Pe Chance" Rab Ne Bana Di Jodi 2011 Farah Khan "Sheila Ki Jawani" Tees Maar Khan 2012 Bosco-Caesar "Senorita" Zindagi Na Milegi Dobara 2013 Ganesh Acharya "Chikni Chameli" Agneepath 2014 Remo D'Souza "Badtameez Dil" "Balam Pichkari" Yeh Jawaani Hai Deewani 2015 Bosco-Caesar "Tu Meri" Bang Bang! 2016 Remo D'Souza "Pinga" Bajirao Mastani Best Special EffectsEdit 2004 Bimmini Special Effects Studio Digital Art Media Koi Mil Gaya 2006 V G Samant Hanuman 2008 Red Chillies VFX Om Shanti Om 2011 Prime Focus Guzaarish 2012 Red Chillies VFX RA. One 2013 Tata Elxsi Ek Tha Tiger 2014 Tata Elxsi (tied with) Red Chillies VFX Dhoom 3 (tied with) Krrish 3 2015 Red Chillies VFX Happy New Year 2016 Viral Thakkar Bajirao Mastani Best Sound RecordingEdit 2004 Dwarak Warrier Bhoot 2006 Resul Pookutty Black 2009 Baylon Fonensca Rock On!! 2011 Pritam Das Love Sex Aur Dhokha Special awardsEdit Lifetime AchievementEdit 2004 Dilip Kumar All of his Film 2006 B. R. Chopra 2008 Yash Chopra 2010 Amitabh Bachchan 2011 Dharmendra 2013 Manoj Kumar 2014 Salim Khan 2015 Rakesh Roshan 2016 Jeetendra Entertainer of the YearEdit 2008 Akshay Kumar Namastey London Heyy Babyy Bhool Bhulaiyaa 2010 Ranbir Kapoor Wake Up Sid Rocket Singh: Salesman of the Year 2011 Shahrukh Khan Katrina Kaif My Name Is Khan Raajneeti Priyanka Chopra Ra.One Don 2 7 Khoon Maaf 2013 Priyanka Chopra Agneepath Barfi! Irrfan Khan Chennai Express The Lunch Box 2015 Deepika Padukone Shraddha Kapoor Finding Fanny Ek Villain Ungli Jodi of the YearEdit Jodi of the Year: Salman Khan & Govinda (2008) Style Icon / Diva of the Year: Hrithik Roshan & Katrina Kaif (2008) Heartthrob of the Year: Shahid Kapoor & Deepika Padukone (2010) During the sixth edition of the award ceremony, four separate awards were also given to honour the films and performances of December 2009; this included: Vidhu Vinod Chopra winning the Best Film for 3 Idiots, Rajkumar Hirani for his direction of 3 Idiots, as well as Amitabh Bachchan and Vidya Balan for their performances in Paa.[14] Cinematic Excellence: Sanjay Leela Bhansali, Hrithik Roshan and Aishwarya Rai (2011) Guild Hall of Fame: Aashiqui 2, Bhaag Milkha Bhaag, Chennai Express, Dhoom 3, Goliyon Ki Raasleela Ram-Leela, Grand Masti, Krrish 3, Race 2 & Yeh Jawaani Hai Deewani (2014) TelevisionEdit Best Drama Series – FictionEdit Producers/Production 2004 Jassi Jaisi Koi Nahin DJ's Creative Unit 2006 Astitva...Ek Prem Kahani Ananda Films & Telecommunications Pvt Ltd. 2010 Balika Vadhu Sphere Origins 2011 Mann Kee Awaaz Pratigya Pearl Grey 2012 Saath Nibhana Saathiya (tied with) Bade Achhe Lagte Hain Rashmi Sharma (tied with) Balaji Telefilms 2013 Diya Aur Baati Hum (tied with) Madhubala Ek Ishq Ek Junoon Shashi Sumeet Productions (tied with) Abhinav Shukla Best Director - FictionEdit 2004 Rohit Khanna Jassi Jaisi Koi Nahin 2006 Deven Bhojani Sarabhai vs Sarabhai 2010 Nandita Mehra Uttaran 2012 Sangeeta Rao Bade Acche Lagte Hain 2013 Romesh Kolra Yeh Rishta Kya Kehlata Hai 2014 Santaram Varma Jodha Akbar 2015 Rohit Jugraj Ek Hasina Thi Best Ongoing Drama SeriesEdit 2013 Bade Acche Lagte Hain Balaji Telefilms 2015 Diya Aur Baati Hum (tied with) Jodha Akbar Shashi Sumeet Productions (tied with) Balaji Telefilms Best Non-Fiction SeriesEdit Producers/ Productions 2004 Big Story: Afghanistan NDTV 2006 Kaun Banega Crorepati 2 Big Synergy 2010 10 Ka Dum 2011 Entertainment Ke Liye Kuch Bhi Karega Wizcraft International Entertainment PVT.LTD 2013 Crime Patrol Optimystix Entertainment 2014 Bigg Boss 7 Endemol India 2015 Comedy Nights with Kapil Kapil Sharma Sol Production Best Comedy SeriesEdit 2004 Office Office Eagle Video Films 2006 The Great Indian Laughter Challenge Endemol India 2012 Lapataganj Ashwini Dher 2013 Taarak Mehta Ka Ooltah Chashmah Neela Telefilms Best Mythological SeriesEdit 2013 Devon Ke Dev...Mahadev Triangle Film Company 2014 Mahabharat Swastik Pictures Best Ensemble CastEdit 2006 Sarabhai vs Sarabhai Hats Off Productions 2011 Uttaran Film Farm India 2012 Sasural Genda Phool Ravi Ojha Productions 2015 Everest Ashutosh Gowarikar Best WriterEdit 2011 Purnendu Shekhar Gajra Kotheri Rajesh Dubey Balika Vadhu 2012 Mitali Uttaran 2013 Sonali Jaffer Harneet Bade Acche Lagte Hain 2014 Bhavna Vyas Munisha Rajpal Yeh Rishta Kya Kehlata Hai Gajra Kotheri Balika Vadhu Best Production House: Balaji Telefilms (2003, 2005) Outstanding Contribution to Indian Television: Subhash Chandra (Zee Network) (2003) Outstanding Debut: Mona Singh for (Jassi Jaissi Koi Nahin) (2003) Best Marketing of Entertainment Product: Sony Entertainment Television (Jassi Jaissi Koi Nahin) (2003) Cinematic Excellence in Television: Amitabh Bachchan (2012) ^ a b "Apsara Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ a b c Indiantelevision.com Team (7 April 2004). "Apsara awards nominees announced". Indiantelevision.com. Retrieved 28 January 2011. ^ IndiaFM News Bureau (10 May 2004). "Yash Johar speaks on the Apsara Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ a b IndiaFM News Bureau (7 December 2005). "The coming of the Apsaras". Bollywood Hungama. Retrieved 28 January 2011. ^ a b United News of India (30 May 2004). "'Koi Mil Gaya' bags top honours". The Tribune. Retrieved 28 January 2011. ^ a b Indo-Asian News Service (5 December 2009). "Priyanka Chopra bags best actress at Apsara Awards". NDTV. Prannoy Roy Publications. Retrieved 28 January 2011. ^ IndiaFM News Bureau (3 January 2006). "Nominations for 2nd Apsara Awards 2005". Bollywood Hungama. Retrieved 28 January 2011. ^ IndiaFM News Bureau (22 January 2006). "Winners of 2nd Apsara Awards 2005". Bollywood Hungama. Retrieved 28 January 2011. ^ Bollywood Hungama News Network (14 March 2008). "Nominations for 3rd Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ Bollywood Hungama News Network (1 April 2008). "Winners of 3rd Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ Bollywood Hungama News Network (15 December 2009). "Nominations for 5th Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ Bollywood Hungama News Network (8 January 2010). "Winners of 5th Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ Bollywood Hungama News Network (6 January 2011). "Nominations for 6th Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ a b Bollywood Hungama News Network (11 January 2011). "Winners of 6th Apsara Film & Television Producers Guild Awards". Bollywood Hungama. Retrieved 28 January 2011. ^ Filmicafe.com (25 January 2012). "Apsara Awards 2012 Winners". Filmicafe. Retrieved 25 January 2012. ^ Hungama, Bollywood (15 January 2014). "Nominations for 9th Renault Star Guild Awards - Bollywood Hungama". bollywoodhungama.com. ^ Hungama, Bollywood. "Latest Bollywood News - Hindi Movie News - Hindi Cinema News - Bollywood Hungama". bollywoodhungama.com. ^ "Photos: Top Bollywood celebs at Star Guild Awards 2015" (Mid.day.com). Mid Day. ^ "Winners of 11th Renault Sony Guild Awards". ^ "Salman Khan helps Sunny Leone drape a saree". India Today. 24 January 2014. ^ "Live coverage of Star Guild Awards 2014". India Today. 16 January 2014. Retrieved from "https://en.wikipedia.org/w/index.php?title=Producers_Guild_Film_Awards&oldid=904160921"
cc/2019-30/en_middle_0028.json.gz/line1594887
__label__cc
0.629885
0.370115
overset From Middle English oversetten (“to set over, upset”), from Old English ofersettan (“to set over, conquer, overcome”), equivalent to over- +‎ set, from Proto-Germanic *uber (“over”) + *satjaną (“to set”). Compare Dutch overzetten (“to ferry, transport, translate”), German übersetzen (“to cross over, translate”). (UK) IPA(key): /əʊvəˈsɛt/ overset (third-person singular simple present oversets, present participle oversetting, simple past and past participle overset) (obsolete) To set over (something); to cover. (intransitive) To turn, or to be turned, over; to be upset; to capsize. 1719, Daniel Defoe, Robinson Crusoe, London: W. Taylor, p. 65,[1] […] this Raft was so unweildy, and so overloaden, that after I was enter’d the little Cove, where I had landed the rest of my Goods, not being able to guide it so handily as I did the other, it overset, and threw me and all my Cargoe into the Water […] 1766, Thomas Mortimer, A New History of England, London: J. Wilson and J. Fell, Volume 3, Part 13, “George II. A.D. 1727,” p. 596,[2] […] the barge was hoisted out for the preservation of the admiral, who entered it accordingly; but all distinction of persons being now abolished, the seamen rushed into it in such crowds, that in a few moments it overset. (transitive) To knock over, capsize, overturn. c. 1594, William Shakespeare, Romeo and Juliet, Act III, Scene 5,[3] In one little body Thou counterfeit’st a bark, a sea, a wind; For still thy eyes, which I may call the sea, Do ebb and flow with tears; the bark thy body is, Sailing in this salt flood; the winds, thy sighs; Who, raging with thy tears, and they with them, Without a sudden calm, will overset Thy tempest-tossed body. 1819, Lord Byron, Don Juan, II.104: A reef between them also now began / To show its boiling surf and bounding spray, / But finding no place for their landing better, / They ran the boat for shore,—and overset her. 1848, William Makepeace Thackeray, Vanity Fair, Chapter 6,[4] “Except when he overset the glass of wine at dinner,” Miss Sharp said, with a haughty air and a toss of the head, “I never gave the existence of Captain Dobbin one single moment’s consideration.” 1895, H. G. Wells, The Time Machine, Chapter 4,[5] A pitiless hail was hissing round me, and I was sitting on soft turf in front of the overset machine. (obsolete) To overwhelm; to overthrow, defeat. 1676, John Bunyan, The Strait Gate, or, Great Difficulty of Going to Heaven, London: Francis Smith, p. 143,[6] There is also the wilfully ignorant professor, or him that is afraid to know more, for fear of the cross; he is for picking and chusing of truth, and loveth not to hazzard his all for that worthy name by which he would be called: when he is at any time overset by arguments, or awaknings of conscience, he uses to heal all, by, I was not brought up in this faith […] (transitive) To physically disturb (someone); to make nauseous, upset. 1722, Daniel Defoe, Moll Flanders, London: W. Chetwood and T. Edling, p. 358,[7] He us’d all the Caution that he was able in letting me know a thing, which it would have been a double Cruelty to have conceal’d; and yet it was too much for me; for as Grief had overset me before, so did Joy overset now, and I fell into a much more dangerous Swooning than I did at first […] 1850, Charles Dickens, David Copperfield, Chapter 22,[8] ‘Poor little tender-heart,’ said Ham, in a low voice. ‘Martha has overset her, altogether.’ (now rare) To unbalance (a situation, state etc.); to confuse, to put into disarray. 1803, Robert Charles Dallas, The History of the Maroons, London: Longman and Rees, Volume 1, Letter 3, p. 74,[9] Amidst the calm produced by the treaty an event took place which had nearly overset the whole negotiation. 1843, Thomas Carlyle, Past and Present, book 3, chapter XIII, Democracy Thus has the Tailor-art, so to speak, overset itself, like most other things; changed its centre-of-gravity; whirled suddenly over from zenith to nadir. 1992, Hilary Mantel, A Place of Greater Safety, Harper Perennial 2007, p. 152: ‘So this is the creature who oversets the household and suborns servants and clergymen,’ d'Anton said. (printing) to set (type or copy) in excess of what is needed; to set too much type for a given space. (transitive) To translate. 1879, The Saturday magazine - Volume 1 - Page 87: Overset into English, after the spirits and measures of the anthentical; by Dr. Heinrich Krauss, Ph.D., and so wider. 1910, Leonard Bacon, Joseph Parrish Thompson, Henry Ward Beecher, The Independent - Volume 69 - Page 1220: They should be overset into English so as to reach a wider public here, for even his elementary descriptions of American universities, would not be so superfluous to any of us as we think, [...] 2006, John David Pizer, The idea of world literature: The thought and its expression—these are the two factors which must solve the problem; and it matters not how much we translate or overset—as the Germans felicitously say—so long as we go no deeper and do not grasp at what all literatures have in common. To overfill. 1646, James Howell, letter to Henry Hopkins dated 1 January, 1646 in Epistolæ Ho-Elianæ: The Familiar Letters of James Howell, Boston: Houghton, Mifflin, 1907, Volume 4, p. 17,[10] [Tobacco] is a good companion to one that converseth with dead men, for if one hath been poring long upon a book, or is toiled with the pen and stupefied with study, it quickeneth him, and dispels those clouds that usually overset the brain. e-voters, estover, overest, revotes, vetoers Retrieved from "https://en.wiktionary.org/w/index.php?title=overset&oldid=51762095" English terms inherited from Middle English English terms derived from Middle English English terms inherited from Old English English terms derived from Old English English words prefixed with over- English terms derived from Proto-Germanic English 3-syllable words English terms with IPA pronunciation English verbs English terms with obsolete senses English intransitive verbs English transitive verbs English terms with rare senses en:Printing etyl cleanup/en/gem-pro
cc/2019-30/en_middle_0028.json.gz/line1594890
__label__wiki
0.58172
0.58172
Offers “Marriott” Office Coordinator Housekeeping - 20 hours Park Lane, United Kingdom Guest Services Representative - $20.73 per hr (Full-time) - English/Japanese Capability Kailua, USA Housekeeper - PM shift - $18.21 per hr (On-call) Attendant Laundry Panamá, Panama At Your Service Runner (Part Time) Torrance (Los Angeles) Agent-At Your Service San José (San José) Assistant Spa Manager Ban Khao Lak, ประเทศไทย Nusa Dua, Indonesia Administrative Assistant, Culinary 厨房行政助理 Aïn Defla, الجزائر Algérie Accounting/HR Clerk Zibo, 中华人民共和国 Xiamen, 中华人民共和国 Moscow, Россия Chiang Mai, ประเทศไทย Apprentice Cook Amsterdam (Amsterdam) Admin Assistant to DOFB餐饮总监行政助理 Sanya, 中华人民共和国 Abu Dhabi, الإمارات العربية المتحدة Administrative Assistant I (Part-Time AM) Savaneta, Nederland Sales Coordinator 销售协调员 Huizhou, 中华人民共和国 Front Office Agent (m/w/d) Cook II - All Levels (Full-Time) Half Moon (Onslow County) Casual Waiter / Waitress - Marriott - Huntingdon - Wizbii Casual Waiter / Waitress at Marriott in Huntingdon. Apply now and find other jobs on Wizbii 15 days agoM Casual Waiter / Waitress Huntingdon (Cambridgeshire) BE PART OF THE ADVENTURE Do you love doing a job that feels a little more extraordinary? Let the journey lead you here. Joining a fun, vibrant and international team, working at the Huntingdon Marriott Hotel is a fantastic opportunity to make your mark on a truly global brand. If you're passionate about service, friendly and enjoy a fast paced environment, you could be just who we're looking for. Helping maintain the highest standards in our hotel and restaurant, it will be your close attention to detail that sets us apart from the rest. This varied role will see you doing everything from completing closing duties, to storing reusable goods, breaking down goods, and cleaning all equipment and areas. We'll also rely on you to return equipment to its rightful place, lock doors and refrigerators, restock items, turn off lights, and completing a daily checklist. All the while, we'll be keeping a close eye on your future. The Market Kitchen is our signature restaurant. As one of just five in the UK, it's a bold and brilliant new venture into the dining experience for Marriott International. Serving stylish global fare from fresh produce, our restaurant offers wholesome, culturally inspired dishes from around the world. Driven by our dedicated kitchen team, this is a dining experience that you will be proud to promote. The hotel & brand Begin an unforgettable adventure with one of the world's most admired companies. With more than 500 global locations, we're advancing the art of hosting so that our guests can travel brilliantly. Our 4-star hotel is a home from home, and there's a real family feel to working here. We listen to our people, we learn from their ideas, and we are constantly finding new ways to make the Huntingdon Marriott Hotel even better than before. It's this attention to premium choices, sophisticated style and well-crafted details that put us in the top 10 for service. What you'll bring It's less about where you've come from, and more about where you're going. We don't focus on your skills or experience to date, but we do look at your attitude and willingness to learn. What matters is that you're enthusiastic, driven and you bring a lot of heart to everything you do. Plus, you're a strong character who's passionate about creating exceptional experiences for our guests. What you'll get in return Here, we look after our people. And we know that if you're happy, our guests will be happy. We offer a competitive benefits programme including travel perks, recognition for hard work and long service, as well as pay day rewards and associate appreciation week. We'll also invest in your personal development with training and qualifications. You'll enjoy fantastic opportunities to grow, and move into other areas of the company. That's everything you need to go far. Here's to the Journey.
cc/2019-30/en_middle_0028.json.gz/line1594892
__label__cc
0.645492
0.354508
ESCAPE THE EVERY DAY Do you still remember the last time music put a big smile on your face? What it felt like when your body was infused with the amazing clarity and deep vibrations of the sound? There is no reason to miss that feeling when you are driving. When you rock out on the road and go places with Toyota, the incredible JBL sound comes along - every single day. The collaboration Tuned in to the same wavelength In 1996 JBL and Toyota teamed up with one very distinct mission: to bring the sound of legendary concerts and rock tours to your car. In a custom blend of art and science, we select, place and fine-tune each speaker to the interior of the vehicle. Hundreds of hours of dedicated work and precision adjustments go into the development of each JBL Toyota system. The result is a bold, vibrant sound. A sound that makes you feel the difference and hear the truth. The Toyota Auris has everything you’d expect: bold, dynamic styling that immediately catches the eye, and an interior that offers a spacious, high-quality environment. Equipped with the JBL premium sound system, just sit back and the perfect drive awaits you. 7 speakers in 7 locations Improved sound dispersion GreenEdge® Technology 1 2 × 25 mm horn-loaded High-Efficiency (HiE) tweeters, at either end of the instrument panel 2 2 × 170 mm High-Efficiency (HiE) woofers in the front doors 3 2 × 170 mm High-Efficiency (HiE) full range woofers in the rear doors 4 1 × 200 mm neodymium magnet, metal-cone subwoofer in its custom-engineered 20-litre enclosure, in the driver’s side rear trim panel 5 8-channel ~ 74 W / equivalent per channel Hi8 DSP amplifier Toyota Auris Touring Sports The Toyota Auris Touring Sports has everything you’d expect: bold, dynamic styling that immediately catches the eye and an interior that offers a spacious, high-quality environment. Equipped with the JBL premium sound system, just sit back and the perfect drive awaits you. The athletic design of the Toyota C-HR gives the sensation of movement at standstill. It has been created to make you feel at one with the road, and together with the tailor-made JBL premium sound system that delivers closest-to-concert-hall sound, you can start your ride and flow through urban life. Newly-designed horn tweeters Lossless audio encoding 1 2 × 25 mm horn tweeters 2 2 × 80 mm wide-dispersion midrange speakers 3 2 × 170 mm subwoofers 4 2 × 150 mm woofers 5 1 × 190 mm subwoofer in a dedicated, 10 litre, ported enclosure 6 8-channel, 576-Watt DSP High-Efficiency amplifier A low centre of gravity, optimised weight and an emotional body design are exactly what’s needed to deliver excitement. In the Toyota GT86 you feel pure driving pleasure. To make the sensation even more exhilarating, the built-in JBL premium sound system delivers an optimised and rich sound. Big, bold bass improved listening experience 1 2 × 19 mm metal-dome tweeters 2 2 × 80 mm High-Efficiency (HiE) midrange speakers 3 2 × 170 mm inverted subwoofers 4 2 × 65 mm midrange speakers 5 1 × 160 mm subwoofer 6 8-channel, 440-Watt AB Class DSP amplifier Capable by nature, the Toyota Land Cruiser’s off-road prowess meets on-road refinement. Its versatility is broadened even more in combination with the amazing JBL Synthesis® 7.1 Surround Sound. A full range of 17 custom-engineered speakers send a rich and stunning sound to every passenger onboard. 17 speakers in 14 locations Accurate vocals and instruments 4 high-output woofers 2 5 × 80 mm metal cone midrange speakers (including 3 x 80 mm coaxial speakers) 3 2 × 152 x 229 mm woofers 4 2 × 160 mm metal cone woofers 6 12-channel, 605-Watt DSP amplifier This space savvy and eco-conscious hybrid started it all. The Toyota Prius is undoubtedly a pioneering family car, perfect for anyone who wants to take great music everywhere. It’s also equipped with JBL GreenEdge® Technology that delivers dynamic performance with only half the power consumption. balanced sound coverage 1 2 × Unity Extended Bandwidth speakers (80 mm midrange with 19 mm tweeter), at either end of the instrument panel 2 2 × 170 mm High-Efficiency (HiE) subwoofers 3 2 × HiE coaxial speakers, each with 170 mm midrange speaker and 25 mm tweeter, in the rear doors Toyota Prius+ This space-savvy and eco-conscious hybrid started it all. The Toyota Prius+ is undoubtedly a pioneering family car, perfect for anyone who wants to take great music anywhere. It’s also equipped with JBL GreenEdge® technology that delivers dynamic performance with only half the power consumption 1 4 × 25 mm horn-loaded High-Efficiency (HiE) tweeters 2 2 × 180 x 250 mm High-Efficiency (HiE) woofers Stylish, smart and adventurous – the Toyota RAV4 is not only famed for its reliability, it happily accommodates people, cargo and a JBL premium sound system. With enveloping surround sound and eco-friendly technology, every passenger enjoys a powerful audio performance. 11 speakers in 7 locations Powerful performance in every seat Automatic Sound Leveliser 5 8-channel ~ 74 W / equivalent per channel Hi8 DSP-amplifier TAILOR-MADE SOUND FOR EACH TOYOTA MODEL You’re behind the wheel but you feel like you’re at London's O2 arena or New York’s Madison Square Garden. JBL equipment is used in 90% of certified THX® cinemas, 80% of live concerts, 70% of recording studios – and lots of exciting Toyota models. JBL System benefits At JBL, we strongly believe in first-class quality music reproduction. Music must always preserve its character and nature. Music is meant to be a full and rich emotional experience. The attitude determines how we see and use technology. For JBL, technology has one purpose and one purpose only – to serve the music! Every detail of the JBL sound system is precisely tuned to the interior of each Toyota model. The result is a sound system which perfectly matches the design and individual nature of your Toyota. big stages JBL’s many years of experience as a professional supplier of equipment for numerous mega music events and as a reliable partner to many international stars brings the sound of the big stage right into your Toyota. At JBL we only use high-quality materials. Therefore the JBL sound systems delivers crisp and clear sound. The amazing clarity and depth of the JBL sound makes you feel like the concert is happening in your Toyota. Do you want to take a seat in the front-row? Take an audio test drive at your local Toyota dealer and experience the true JBL sound. Automotive Reviews Alphr – 2016 Toyota Prius “The JBL sound system in the Toyota Prius delivers music in a much better fashion than you’d expect, with plenty of juicy, well-controlled bass and lots of power.” The Sun – 2016 Toyota C-HR “Toyota’s new audio technology sounds really good – thanks to HARMAN. They revealed in Paris that the system is tailor-made for the C-HR – with two newly designed acoustic JBL wave guides, called Horn Tweeters, for a concert hall like sound experience.” JBL automotive lifestyle
cc/2019-30/en_middle_0028.json.gz/line1594893
__label__wiki
0.720137
0.720137
U.S. Markets open in 5 hrs 1 min Trump backs boycott of Harley Davidson in steel tariff dispute By Ginger Gibson Reuters August 12, 2018 FILE PHOTO: The Harley Davidson logo is seen on a motorcycle at a showroom in Bangkok, Thailand, June 28, 2018. REUTERS/Athit Perawongmetha/File Photo WASHINGTON (Reuters) - President Donald Trump backed boycotting American motorcycle manufacturer Harley Davidson Inc on Sunday, the latest salvo in a dispute between the company and Trump over tariffs on steel. The Wisconsin-based motorcycle manufacturer announced a plan earlier this year to move production of motorcycles for the European Union from the United States to its overseas facilities to avoid the tariffs imposed by the trading bloc in retaliation for Trump's duties on steel and aluminum imports. In response, Trump has criticized Harley Davidson, calling for higher, targeted taxes and threatening to lure foreign producers to the United States to increase competition. "Many @harleydavidson owners plan to boycott the company if manufacturing moves overseas. Great! Most other companies are coming in our direction, including Harley competitors. A really bad move! U.S. will soon have a level playing field, or better," Trump said in a Twitter post. Harley Davidson has repeatedly declined to comment on Trump's remarks over the course of the dispute. The company could not be immediately reached for comment on Sunday. Harley has forecast that the EU tariffs would cost the company about $30 million to $45 million for the remainder of 2018 and $90 million to $100 million on a full-year basis. Trump met Saturday with a group of bikers who support him, posing for pictures with about 180 bikers at his golf resort in Bedminster, New Jersey, where he is on vacation. Motorcycle companies based outside the United States include Japan's Honda Motor Co Ltd and Yamaha Corp, Europe's BMW and Ducati as well as India's Hero MotoCorp Ltd, Bajaj Auto Ltd, among others. Related Video: Harley Davidson Will Move Some Jobs After Trump Tariffs Watch news, TV and more on Yahoo View. (Reporting by Ginger Gibson; editing by Grant McCool) Take a look inside Ivanka Trump's daily diet Schumer on ending filibuster: 'Nothing's off the table' Fox News pundit complains about Ilhan Omar quoting Trump's 'grab 'em by the p****' remark China Merchants Shekou Plans $800 Million REIT IPO in Hong Kong
cc/2019-30/en_middle_0028.json.gz/line1594895
__label__cc
0.515012
0.484988
Beech (Fagus sylvatica) 180cm (~6'0") tall Field Maple | Acer campestre | 200-210cm (6'6"-7') tall Hornbeam Ready-Grown Hedge | 120cm | 4ft tall Ilex aquifolium 'Alaska' | English Holly | 180cm (~6ft) tall Native hedging plants such as Hawthorn, Field Maple, Hazel, Hornbeam and Beech are plants that are from the UK and have grown in the UK environment for thousands of years. As a result, they are adapted to the UK ecosystems and provide natural habitats and food for many living things. Native hedges are seen growing around farmers' fields but are now also been used as garden hedges and around industrial sites and office buildings. Most native hedges are made up of a mixture of different species of plants the most common being Hawthorn, Field Maple, Hazel and Blackthorn but the exact mix depends on an individual's choice. Hawthorn | Quickthorn | Maythorn | Crataegus monogyna Hawthorn (Crataegus monogyna) is a hedging plant that provides year-round interest and a wonderful home for wildlife. It offers white blossom in the spring, bright green leaves tinged with red throughout the spring and summer, and red haws (meaning Old English for fruit) in the autumn. Hawthorn is native to the UK and is deciduous (it loses its leaves in the winter). Why plant a Hawthorn hedge? Very hardy Wind tolerant Rich haven for wildlife Beautiful spring blossom with scented flowers Dense thorny branches ideal for aditional security along garden boundaries Attractive green and red leaves Suitable for most soil types Ideal for mixed native hedge Young leaves, flowers and are edible and can be used in herbal remedies Haws can be used to make jams and jellies A hedging plant native to the UK How far apart should I plant Hawthorn? Plant our mixed native hedging troughs 1 metre apart and you will get an instant hedge as these troughs are 1 metre wide. Plant large individual plants between 3 to 5 per metre in a staggered row to get a thick, dense hedge. They can be mixed with other native hedging plants such as Field Maple (Acer campestre), Hazel (Corylus avellana) and Holly (Ilex aquifolium). Where will Hawthorn grow? Hawthorn is ideal as a hedge on its own or as part of a mixed native hedge (can be combined with Hazel, Field Maple and many other native species). It can be found growing in hedgerows, woods and heathland and is perfect for wildlife gardens due to the protection and food it supplies for birds and insects. It prefers full sun or partial shade and can grow in most soil types but does not tolerate very wet soil. It very hardy and can be grown in all parts of the UK, even on exposed sites with cold winds and where the temperature drops below -20°C. What type of soil does a Hawthorn hedge need? Hawthorn will grow in any free draining soil and is ideal as hedging or in wildlife gardens. They tolerate most soil types including acid and alkaline soil. How tall will Hawthorn grow? Mature Hawthorn trees can grow up to 15-30ft in height and width but it can be kept to any height of hedge if trimmed once a year. How fast will Hawthorn grow? Hawthorn can grow at a rate of up to 45cm (18 inches) per year making them ideal as privacy hedging and to provide dense habitats for wildlife. When can I plant Hawthorn? We sell mature hedging plants in troughs and pots online ready to plant at any time of the year. We also sell bare-root plants (whips) at our Greenshutters Garden Centre in Somerset (if you live locally and would prefer to start your hedge off from smaller hedging plants), these need to be planted between November and March (i.e. in the winter months when the plants are dormant). How often would I need to trim/prune a Hawthorn hedge? Hawthorn is quite fast growing so needs to be trimmed once a year, after it flowers or in the autumn to maintain as a hedge. Hawthorn can grow into large trees if left untrimmed. It should not be pruned between March and August to avoid disturbing nesting birds and wildlife. Native hedges can also be laid rather than trimmed. Hedge laying was the traditional way of keeping hedge dense and preventing livestock from escaping from a field before the invention of mechanical hedge trimmers. The hedging plants are left to grow for several years before being partially cut and bent down to the ground where they re-shoot to thicken the hedge. Additional Information about Hawthorn According to the Woodland Trust, common Hawthorn is second only to Oak trees for its benefits to wildlife. It can support more than 300 insects, as well as providing food for dormice, bees and birds. The flowers, fruit and leaves are all edible when young and can be used for a number of herbal remedies. The wood can be used for making furniture and tools and burns well as firewood and charcoal. Thorn, Quickthorn, May Blossom, May Thorn, May Flower, Crataegus monogyna Botany and Origins of Hawthorn Hawthorn is a member of the Rosaceae family. Deciduous trees and shrubs have spiny branches, lobed leaves and sprays of white spring flowers in spring followed by red fruits in autumn. It can be found in Northern Europe, North Africa and South West Asia Crataegus comes from the Greek kratos meaning "strength" and akis "sharp", referring to the thorns of the plants. Field Maple | Acer campestre Field Maple is a native plant suitable for use in a single species hedge or as part of a mixed native hedge. It can be found in woods, scrubs and in hedgerows. After its helicopter seeds have been released from the plant, its foliage turns a rich yellow to provide colour through to autumn. Field Maple is deciduous, meaning it loses its leaves in the winter. Why plant Field Maple? UK’s only native maple Rich autumn colours Suitable for most soils and positions Attracts wildlife Pollution tolerant Good for exposed sites Popular in towns and cities How far apart should I plant Field Maple? Plant large individual plants between 3 to 5 per metre in a staggered row to get a thick, dense hedge. They can be mixed with other native hedging plants such as Hawthorn (Crataegus monogyna), Hazel (Corylus avellana) and Holly (Ilex aquifolium). What type of soil does a Field Maple need? It will grow in most soils including chalky and coastal environments, but does not do well in waterlogged soil. Where will Field Maple grow? Field Maple will grow in sheltered or exposed sites in full sun or partial shade. How tall will Field Maple grow? It can be kept as low as 1 metre tall if trimmed once a year but will grow up to mature tree of 8m (25ft) high if left. How fast will Field Maple grow? Field Maple is fast growing and can grow between 45-60cm (18-24in) per year. How often would I need to trim/prune a Field Maple hedge? Field Maple needs to be trimmed annually; this can be done at any time of the year but avoid trimming a mixed native hedge between March and August because of nesting birds. Field maple and mixed native hedges are also suitable for laying rather than trimming. In which case, they would be not be laid once every few years. Additional Information about Field Maple Field Maple is a fantastic addition for any gardener looking to attract wildlife; especially ladybirds, hoverfly and birds. Its nectar and pollen, and subsequent fruit provide excellent food sources for birds, bees and small mammals. The many names of Field Maple Hedge maple, Common elder Botany and Origins of Field Maple Field Maple (Acer campestre) is part of the Soapberry (Sapindaceae) family and is native to the UK. It has a maple-shaped leaf with 5 rounded lobes and forms winged maple fruits and seeds (helicopter seeds). The Benefits of Field Maple A vibrantly coloured hedge that turns from green to red to yellow through the seasons. Field Maple attracts diverse array of wildlife and provides interest from spring to winter, when its leaves fall off and reveal the attractive woody stems. Field Maple makes an excellent dense hedge or suitable as part of a mixed native hedge. Alternatives to Field Maple Hawthorn, Hazel, Hornbeam, Beech, Holly or use them in a mixed native hedge. Hazel | Corylus avellana Hazel is a native hedging plant with broad leaves that provides year-round interest and is ideal for both single species hedging or mixed native hedging. It is deciduous, meaning it loses its leaves in the winter. Why plant Hazel? Attractive yellow catkins in spring Good autumn leaf colour Suitable for single species or mixed native hedging Thrives in most soils and environments Supports woodland wildlife Produces edible nuts in September and October Supports butterflies, ground nesting birds and small mammals Tolerant of windy and exposed sites How far apart should I plant Hazel? What type of soil does a Hazel hedge need? Hazel thrives well in most free-draining soils, is shade tolerant and suitable for windy and exposed sites. It will not grow in water-logged soils. How tall will Hazel grow? Hazel hedges can be kept at any height if pruned once a year. If left untrimmed, a Hazel tree can grow up to 4-8m (12-25ft) in height. How fast will Hazel grow? Hazel can grow up to 45-60cm (18-24in) per year depending on conditions making it ideal for dense hedges. How often would I need to trim a Hazel hedge? Pruning should be done annually as Hazel hedges are fast growing. Trim in the winter after the birds have eaten all of the fruit and before they begin nesting. In January and February remove any dead wood and suckers, which can be used for staking in the garden, especially for peas. Hazel and mixed native hedges are also suitable for laying rather than trimming. In which case, they would only need to be layed every few years. Additional Information about Hazel The hazel plant grows straight stems that are flexible and can be twisted into a knot without breaking. They can be used for twisting into plant supports such as peas sticks and screens or hurdles. It was also traditionally popular for making furniture. In the spring the plant produces attractive yellow catkins which are followed by edible nuts (hazelnut, cobnut or filbert nut). Hazel can also be coppiced (cut down to the ground) and it will re-grow. This is often done in managed woodlands to encourage wildlife, especially Doormice which do not like to go on the ground but prefer to move around the woodland from branch to branch. The younger branches of Hazel grow back into a dense canopy for them to move around. The many names of Hazel Hazel is also know as cobnut or filbert. Its botanical name is Corylus avellana. Botany and Origins of Hazel Hazel belongs to the Betulaceae (Birch) family of plants and is native to the UK, Europe, Western Asia and North Africa. The Benefits of Hazel A Hazel hedge provides year round interest with its berries, seeds flowers and foliage. This will help attract a wide variety of wildlife from insects and birds and small mammals. The Hazel stems can be used for a number of purposes in the garden involving weaving into screens and using to stake and support a number of tender plants as they grow. If you can harvest the nuts before the squirrels get to them you can use in many recipes or just as a healthy snack. Alternatives to Hazel Hawthorn, Field Maple, Hornbeam, Beech, Holly or use them in a mixed native hedge. Evergreen Native Alternatives to Hawthorn/Field Maple/Hazel Holly (Ilex aquifolium) is a good option providing glossy green foliage and bright red berries. Evergreen Non-Native Alternatives Try Portugal Laurel, Griselina, Pyracantha, Laurel and Photinia Red Robin.
cc/2019-30/en_middle_0028.json.gz/line1594896
__label__wiki
0.989151
0.989151
Tragedy on the ''Twilight Zone'' set Tragedy on the ''Twilight Zone'' set -- The movies' most notorious on-set accident that killed Vic Morrow shocked Hollywood a decade ago By Bruce Fretts July 24, 1992 at 04:00 AM EDT Twilight Zone: The Movie In director John Landis’ segment of Twilight Zone: The Movie, the big-screen version of the spooky TV series, a bigoted businessman (Vic Morrow) steps outside his local bar and is transported to a Vietnam swamp, where he finds himself an enemy soldier surrounded by U.S. troops. As envisioned by Landis — after prodding from studio execs for a ”feel-good” ending — the racist would repent after rescuing two Vietnamese children. ”I’ll keep you safe, kids,” Morrow was to say. ”I swear to God!” Tragically, Landis couldn’t do the same for his cast. At 2:30 a.m. on July 23, 1982, the director shot the climactic scene: Morrow held 6-year-old Renee Chen and 7-year-old Myca Dinh Le as a helicopter hovered over them on the Newhall, Calif., set. A special-effects explosion caused the chopper to crash, killing all three actors. The right skid crushed Chen, and a rotor blade decapitated Le and Morrow, a veteran actor, 53, who had starred in ABC’s Combat (1962-67) and whose survivors include actress-daughter Jennifer Jason Leigh. On June 24, 1983, the same day Twilight Zone: The Movie was released to mediocre reviews and box office, Landis and four members of the film’s production staff were indicted on charges of involuntary manslaughter. During the nine-month trial that began in September 1986, Landis admitted breaking child labor laws, but — contradicting testimony by several witnesses — said he hadn’t been warned that the scene was dangerous. The jury acquitted him and his codefendants on all counts. ”It’s unlikely children would be placed in that kind of extreme jeopardy again,” says Stephen Farber, coauthor of a 1988 book about the case, Outrageous Conduct, ”but things haven’t changed much in overall safety.” Landis has worked steadily since the crash, experiencing ups (1983’s Trading Places) and downs (1991’s Oscar). Peter Guber, now head of Sony Pictures, summed up the industry’s forgiving attitude toward Landis when he said in 1983: ”It would not make any difference to me if he’s convicted, any more than if John Dean or Richard Nixon walked in with a good project.” E.T. did out-of-this-world business at the movies, while Dallas topped the TV ratings. Record buyers wanted the Human League’s ”Don’t You Want Me,” and Jane Fonda’s Workout Book sweated up to No. 1 on the best-seller list. Dan Aykroyd, Steven Yeun cast in the new Twilight Zone series Twilight Zone reboot casts Adam Scott in remake of iconic episode Twilight’s vampire baseball game: The untold story Teen Wolf star Tyler Posey joins Twilight director for CW vampire pilot Lost Boys Inside Jordan Peele's bold Twilight Zone reboot: What's new, what's the same Twilight stars reflect on 10 years of a cultural phenomenon at New York Comic Con Bella Swan's home from Twilight for sale The new Twilight Zone is a calamity: EW review How Twilight changed the game The Twilight Zone recap: Rewinding racism on the roads Sanaa Lathan cast in Twilight Zone reboot; first episode title revealed Jordan Peele's Twilight Zone reboot has a gripping new trailer Anna Kendrick says she ‘just remembered’ she was in Twilight Shailene Woodley and Sam Claflin navigate romance and tragedy in Adrift: EW review DeWanda Wise and Jessica Williams join Twilight Zone cast Watch the creepy new trailer for Jordan Peele's Twilight Zone reboot A Divine Tragedy 16 Twilight obsessions that endure, 10 years later How Black Mirror influenced the new Twilight Zone Chicago P.D. boss on that shocking finale tragedy
cc/2019-30/en_middle_0028.json.gz/line1594899
__label__wiki
0.708898
0.708898
Custom «Romanticism in Two Emily Dickinson Poems» Essay Paper Custom «Romanticism in Two Emily Dickinson Poems» Essay Paper essay Romanism literature carried themes that evoked or criticized the past, age of enlightenment including the cult of sensibility emphasizing on women and children, isolation of artist /narrator to respect the new, wild, untrammeled and pure nature. The era also involved writings based on occult or supernatural and human psychology and led to emergence of voices for the marginalized group. Writings of the era also brought out the writer metaphysical discontent with self and the rest of society. Buy Romanticism in Two Emily Dickinson Poems essay paper online American Romanism includes simplistic descriptions of fervent landscapes and the already-exotic mythicized frontier people and it was multifaceted as well as individualistic in nature. Romantic writings demonstrated a high level of moral enthusiasm, commitment to the unfolding self and individualism and often laid an emphasis on intuitive perception and assumed that natural worlds was inherently good while the human society was full of corruption. The era favored those who wanted to break away from the strict religious traditions of the early settlements. The era gave writers a freedom to express their feelings more open and it usually privilege feeling over reason and involved rapturous response to nature and encouraged alienation from the rigid system. Romantic literature was intense and portrayed a lot of emotion as many would express themselves with less fear for creating a controversy and being ridiculed hence main characters showed extremes of excitement and sensitivity. Works done during the romantic era are diverse and unique but all have the following characteristics: a love fro nature, sense of supernatural/exoticism and a sense of nationalism. The simplicity of such characteristics is attributed to the fact they were written during a time of political turmoil which serves as the background of most romanticism. Writings of this era served as a catalyst to outpour the strong feelings at war time which then influenced art and literature. The era also saw a rise of female authors as war kept them at home and had to express their feelings as a cause for fighting though writings and literature. The poem A Bird Came Down the Walk by Emily Dickinson shows a lot of romantic characteristics: fits the involves a simple description of a bird walking as the write observe it as it eats a angel worm and the display of fear it sense as a result of the writes presence and the graceful flying into the safety of the homely skies. Such description is a romantic style which involved description of nature in this poem the bird is a wild creature in nature being described. In addition to that the writer describes the way the bird cuts the angel worm into halve and devouring it 'raw' and drinking water from the grass, by writer giving human trait to the bird implies the harsh and corrupted nature of human behavior and this is also supported by the way the bird looks around in fear when he senses the presence of the writer and the way its flying is described to be graceful and compared to swimming without splashing water hence the safety that the bird finds while in the sky away from human threats (Baym,2002). The writer is very excited in the way he describes the way the bird behaves before and after noticing his presence as well as the final state of flight. Such description is very intense and expresses deep feeling which characterizes romantic literature where the write has freedom to express their feelings as the feel it. In the poem Apparently with No Surprise the writer also intensity describes about the unfortunate beheading of a flower by the power of the frost and describes it as an act of assimilation. Also the act of sun proceeding unmoved is also described. Such human acts given to the frost is characteristic of romanticism. The idea of beheading the flower reveals the corruption that exists within the human society (Lundin, 345)Having belief that God will ultimately approve of barbaric acts of beheading and assassination of the flower implies that the writer belief in the existence of a supernatural being who is able who decides on destiny of every living thing and this is also a feature of romantic literature. Given the fact that the poem is a simple description of extermination of a flower by frost makes it's a description of a natural occurrence hence the romantic nature. It describes how causes of nature happen without inference by God as its destinies had already been defined. In both poems the writer shows all the basic characteristics of a romantic era literature which involves description of wild nature, the corrupted human society and the intense expression of individualistic feeling about a scenario. Merchant of Venice Their Eyes Were Watching God Flight Patterns by Sherman Alexie Literacy Assessment Frost and his Poem ‘Never Again Would Bird’s Song Be the Same Literally Analysis The novel midnight's children The Effect of Tradition on Society
cc/2019-30/en_middle_0028.json.gz/line1594900
__label__cc
0.743013
0.256987
HOME » Tassé, Joseph, 1848-1895. (x) » 1885 (x) » Search results Baillairge, Charles P. Florent, 1827-1906. (2) Chapleau, Joseph-Adolphe, Sir, 1840-1898. (2) Riel Rebellion, 1885. (2) Riel, Louis, -- 1844-1885. (2) Universities and colleges -- Ontario (2) Studies of plant life in Canada, or, Gleanings from forest, lake and plain (1885) Traill, Catherine Parr, 1802-1899 A. S. Woodburn Mother Seigel's almanac 1885 Hamlin's Wizard Oil the greatest medical wonder Mrs. T. Charles Watson, the most brilliant reader of the day Free Press Print. Love of country; a lecture delivered before the Benevolent Irish Society, Charlottetown, Prince Edward Island, on Monday evening, February 23, 1885 Ferguson, Donald, 1839-1909 Printed by J.W. Mitchell Mémoire sur les chevaux de l'Amérique du nord, États-Unis et Canada / par le baron Favarot [sic] de Kerbrech Faverot de Kerbrech, François Nicolas Guy Napoléon, baron, 1837-1905 Rapport de Mr. Baillairge ... sur la 3eme section du chemin de fer de Quebec & Lac St. Jean au nord de St. Raymond. Quebec 24 sept. 1885 Baillairge, Charles P. Florent, 1827-1906. G. Vincent, imprimeur Report by Charles Baillairge, City Engineer, to the City Council on the 3rd section of the Quebec [and] Lake St. John Railway northward from St. Raymond, Quebec, Sept. 24th, 1885 City Printer Bill : an act to amend the Liquor Licence Act : first reading, 19th February, 1885, second reading, 4th March, 1885, third reading, 27th March, 1885 : Mr. Gibson, Hamilton Ontario. Legislative Assembly. Printed by the 'Grip' Print. and Pub. Co. Speech delivered in the Senate of Canada, April, 1885, on a resolution relating to Canada temperance act and Liquor license act amendment bill Smith, Frank, Sir, 1822-1901 Principal Grant's inaugural address, delivered at Queen's University, Kingston, on University Day Grant, George Monro, 1835-1902. Printed by the Grip Print. and Pub. Co. An exposure of the mischievous perversions of Holy Scripture in the National Temperance Society's jublications, addressed to men of sense and candour Carry, John Printed by Rowsell & Hutchison La statue de Cartier : poesie : inauguree a Ottawa le 29 janvier 1885 Sulte, Benjamin, 1841-1923 Prospectus : Biblical expositor and people's commentary / by J.M. Hirschfelder Hirschfelder, Jacob M. (Jacob Maier), 1819-1902. The Riel question; [a] letter Chapleau, Joseph-Adolphe, Sir, 1840-1898. The Dominion of Canada Dawson, George Mercer, 1849-1901 Boundaries formerly in dispute between Great Britain and the United States Hincks, Francis, Sir, 1807-1885. Letters on the interpretation of the Federal Constitution called the British North America Act, 1867: Second and third letters Loranger, T. J. J. (Thomas Jean Jacques), 1823-1885. Beauchemin
cc/2019-30/en_middle_0028.json.gz/line1594909
__label__cc
0.562695
0.437305
info@fluid-engineering.co.uk NEW JOURNEYMAN AT ROBBIE FLUID ENGINEERING Callum McCarthy, 21, started his journey into a Modern Apprenticeship with Robbie Fluid Engineering straight from school at the age of 16. He also attended West Lothian College one day per week to continue to improve his skills and understanding, and also to give him the opportunity to share his experiences with other apprentices in similar fields. Callum successfully completed his apprenticeship in March 2017 and works for Robbie Fluid Engineering to further continue his development. As well as assisting customers within our business, Callum is also part of the on-call engineer team available 24/7/365 to attend customer sites. He is heavily involved in the training and development of our current young apprentice. Managing Director, Mark Robbie, recognizes the value of on-the-job training. He says “Callum has developed well, in particular over the past 24 months. He should have a good sense of achievement for what he has done while in training.” David Hill (Engineering Work-Based Assessor at West Lothian College) presenting Callum McCarthy with his Modern Apprenticeship certificate. West Lothian College can offer Foundation Apprenticeships in 9 different subject areas, and provide Work Based Assessments for Modern Apprenticeships in over 80 different frameworks. See website for more details. To make an enquiry, place an order, or check course availability. 5 Inchwood Park Starlaw Road EH48 2FY Fax. 0845 180 0077 RFE secure ISO 45001 Occupational Health & Safety Standard After the successful completion of the British Standard Institute (BSI) audit earlier this month, Robbie Fluid Engineering are happy to announce we have been granted a certificate of registration for complying with the 2018 ISO 45001 Occupational Health & Safety Standard. We shall run this new management system in tandem with the current Quality Management System, ISO 9001, which... Robbie Fluid Engineering Monday - Friday: 8:30am - 5.30pm Saturday: 8.30am - 12 noon Copyright © 2013 Robbie Fluid Engineering Limited. All rights reserved. This website uses cookies. For more information read out Terms of Use & Privacy
cc/2019-30/en_middle_0028.json.gz/line1594916
__label__wiki
0.614938
0.614938
Family and Children's Society Grant Award For more information contact: June 16, 2015 Keith D. Chadwick, Interim CEO For Immediate Release Community Foundation for South Central New York Awards Funding for Capital Equipment Grant (Binghamton, N.Y.) The Community Foundation for South Central New York awarded $2,500 from the Lillian Briggs Fund to The Family & Children’s Society toward the purchase of art for the 257 Main Street building where counseling and mental health services are provided. Staff and clients are very pleased with how the addition of art has improved the atmosphere. More information about the Community Foundation may be found on its website, www.cfscny.org. The Family & Children’s Society is a leading community provider of human services in the Southern Tier. With a goal of helping people to improve the quality of their lives, The Family & Children’s Society is committed to renewing hope for those who face challenges due to troubling circumstances. The Society provides assistance, care and counseling to strengthen and support individuals and healthy relationships. For more information, please contact The Family & Children’s Society at 729-6206. The Family & Children’s Society, Inc. 257 Main St., Binghamton, NY 13905 607.729.6206 – Fax: 607.729.1858 – email: info@familycs.org – Web site: www.familycs.org Interim CEO: Keith D. Chadwick Member: United Way of Broome County and Tioga United Way New Substance Abuse Treatment Program Launched Making the Holidays a Little Brighter Family Counseling Services Named Non-Profit of the Year by Cortland Chamber of Commerce Grant Enables Information Technology Hire Esther W. Couper Memorial Award Family Homes for the Elderly Health Homes School-Based View Annual Report Binghamton Office: Owego Office: Owego, NY 13827 Johnson City Office: Johnson City, NY 13790 Esther Couper Award Copyright 2015 The Family & Children's Society |
cc/2019-30/en_middle_0028.json.gz/line1594925
__label__wiki
0.539794
0.539794
Posted by BondPosted 5 years ago February 4, 2014 Looking skinnier, Jennifer Connelly denies for taking cosmetic surgery to improve her appearance. Everyone has right to do whether they think it is the best for them, including celebrities. When the Hollywood stars seem making changes, public will shoot the eyesight to them and make the judgment. Jennifer Connely is just one of those targeted stars. Many people believe if she has taken some cosmetic treatments to be seen like today. But still, she refuses to admit this opinion. Jennifer Connely is an American actress who started the career as a model when she was a child. She was born on December 12th 1970. Her first debut was on motion picture in crime film in 1984 titled Once Upon a Time in America. But she had appeared on magazine, newspaper and television before. She began to play a role in Labyrinth in 1986 and Career Opportunities in 1991. She also played many more movies. In 2002, she earned an Academy Award, a Golden Award and a BAFTA Award for supporting role as Alicia Nash in Ron Howard’s 2001 biopic A Beautiful Mind. She married to Paul Bettany in 2003 and they have three kids. The first kid is from her pervious relationship. The latest news rumored about this actress is her skinny appearance. They think it is probably because of Paul directorial debut, Shelter where Jennifer plays a role as a homeless woman. Jennifer Connelly Nose Job Before And After When she was young, she looked fatter and had bigger breast sizes. It is estimated D size. But on her newest appearance when she gets 42 or almost 43, she looks thinner. People argue to the change of her nose and breast. They think that she probably has taken cosmetic procedure under the surgeon’s knife like breast reduction. However, her publicist, Cari Ross, denied this rumor flatly, “She simply lost weight and when she did she apparently lost weight in her beasts as well.” Has Ashley Green Had a Nose Job? How Anjelica Huston’s Pillow Face is Explained? Bo Derek Said She Hasn’t Had Plastic Surgery Did Alicia Witt Get Breast Implants? Britney Spears Denied About Her Plastic Surgery Rumor Is Burt Reynolds Facelift True? Breast Reduction Surgery Jennifer Connelly Jennifer Connelly Before And After Jennifer Connelly Breast Reduction Surgery Jennifer Connelly Nose Job Before And After Nose Job Previous Article Nose Job and Lip Injection on Jessica Biel Next Article Did Tiffany SNSD Have Eyelid Surgery? Cyndi Lauper had Three Different Cosmetic Procedures Linda Hamilton and Her Natural Living
cc/2019-30/en_middle_0028.json.gz/line1594926
__label__cc
0.684558
0.315442
Major IVA change By Daan, February 21, 2018 in International Forum supaimpy 19 Location:Hants n Dorset http://www.nsra.org.uk/2018/02/action-required-dft-improving-air-quality-and-safety-consultation/ sums it all up mad_pete 86 Forum Financial Supporter Location:Hants “We are proposing that for kit cars, compliance with the MOT emissions standards current at the date of registration will be required, despite the use of an older engine. In other words the current relaxation for emissions according to the age of the engine will no longer apply.” That’s the section. Snagger 323 Location:Dubai On 23/02/2018 at 4:23 AM, mad_pete said: Just latest mot standards. That’s not that hard to pass is it ? Must have some mot savvy people here. What’s the latest rules on emissions to pass mot ? You're missing the point. At the moment, a kit car or amateur build car has to pass the MoT standard appropriate to the age of the engine. Under this proposal, new kit or amateur built cars would have to pass Eu6 MoT standards. Now, that's tricky for us but doesn't sound devastating if you plan a new build using a Eu6 engine and exhaust, but if you have an older vehicle with a few mods that doesn't currently need IVA, but that later needs another mod for some reason (like PAS or auto box because you're to old or disabled to continue with the original) and you car now needs IVA, you'll be screwed. Pete, look at 4.11: Kit cars 4.10 Kit cars and reconstructed classic cars undergoing IVA will not be required to meet WLTP, given that at present they are not required to meet NEDC or the latest EU standards. Instead they are tested to age-appropriate MOT standards, on the basis of the date of manufacture or first use of the engine. 4.11 We are proposing that for kit cars, compliance with the MOT emissions standards current at the date of registration will be required, despite the use of an older engine. In other words the current relaxation for emissions according to the age of the engine will no longer apply. 4.12 Reconstructed (restored) classic cars undergoing IVA will not be required to meet the latest MOT standards, as long as the appearance of the vehicle is broadly unchanged and the engine is of the same capacity as that supplied with the vehicle when it was new. 4.13 When new vehicles were first required to be fitted with catalytic converters around 1992 (Euro 1 emissions standard), kit car makers typically used older engines which were not fitted with catalytic converters, hence the justification for age-appropriate testing of emissions based on date of engine manufacture or first use. The majority of the fleet is now vehicles up to 25 years old whose engines are fitted with catalytic converters, providing plenty of choice to the kit car builder. Miketomcat, you're OK - look at section 4.7. I'm hoping that it also covers cars already in service that are modified beyond the DVLA points restriction and become subject to IVA (allaying my concerns a couple of posts above) Multi-stage build 4.7 Where a vehicle converter is in possession of an incomplete vehicle or chassis built prior to 1 September 2018 (or 1 July 2018 in the case of IVA) and issued by the manufacturer with an Emissions approval and an Incomplete or Complete Certificate of Conformity, the converter will be permitted to carry out a conversion or addition of bodywork after that date without having to upgrade the engine to WLTP, as this would be prohibitively expensive, as long as he maintains the existing emissions control system in good working order. 4.8 More generally, we are proposing that where a converter modifies a massproduced vehicle which complies with WLTP, he will in principle be required to retain WLTP compliance by maintaining the emissions control system in good working order. Increases in unladen weight due to additional bodywork, for example, and modifications to the frontal area of a vehicle or changes to aerodynamics will be permitted. 4.9 We are also proposing that where a converter changes a vehicle category, for example a van converted to a minibus, the compliance required will be that applicable to the base vehicle on the date of its completion and prior to the conversion, because to require anything else would be disproportionately costly for the SMEs involved in such conversions. 51 minutes ago, Snagger said: I’m looking to clarify the point rather than missing it. The text says MOT it does not mention EU6. I don’t think EU6 is the same as the MOT current pass standard. And that’s my question is it the same? Sure it’s a higher than older car standard but a bet you a cup of tea the tests aren’t the same. I reckon a 10 year old engine in good condition and cats will pass current MOT emissions test and I’m asking people who know the details on the standards to confirm. If you take the chapter as a whole, it's pretty clear that the proposal means that all new built cars, including IVA, will have to be Eu6 compliant, and the text specifically talks about removing the exemption of having an engine age related standard. MoT emissions standards are variable, dependant on age, so this makes the proposal pretty clear, Pete. Daan 186 optimist with experience It may pass an MOT, but that Is irrelevant, as it won't pass an IVA. Thing is that a lot of people try to wiggle out of IVA as they think it is too much hassle. These rules are only going to increase this. It would mean you need to buy a new LS engine or a Ford TDCI with all the after treatment equipment if you want your build to pass IVA. So the good old days of buying bits for cheap to build your home grown special would change a bit. You still can modify existing cars, so although it will not be ideal, it also is not the end of our hobby I think. The Mot is the only standard I see in that section. I do not see EU6 anywhere so please paste the section that has it. Actually not to worry. My reading is it’s current MOT pass only, others see it as EU6 required. I think it is poor the document is not clear on this point. I’m fine to leave it there. Bowie69 654 Permanently befuddled...... Location:Wedmore, Somerset Yep, Pete, I know I read it, but now can't find it again! As you say, very poorly worded and needs much greater clarification, either way it will affect us negatively. miketomcat 392 Keeper of Ze Mikebarge Location:southampton 2 hours ago, Snagger said: Nope still screwed as no kit car has a certificate of conformity that' why they need an IVA. I understood that to be that the donor vehicle has conformity, so the certificate would be LR and already dealt with by VCA. As always, these legal documents are full of traps and vague terms. My chassis isn't land rover though it's foers. Twas what I thought, hence my comment above about it being essentially a new vehicle. MECCANO 6 Location:bob I presume this applies to any chassis modifications. For example, foley doing a 3rd axle extension, even if the rest of the vehicle is original. My understanding is it used to be altering the wheel base was a fail. But brackets, out riggers even front and back mods weren't a problem. However with IVA this was changed to any modifications to the chassis became a fail. You can add by bolting or welding to the chassis from what I can make out and repairs are fine but if you "cut" the chassis to mod it then that's a fail. I wrote this letter to my local MP (it is largely copied from the link in my first post): I am writing to you to bring your attention to the Governments “Road Vehicles Improving Air quality and Safety’ consultation. https://www.gov.uk/government/consul...ity-and-safety I am very concerned about the section containing Kit Cars, Page 16, 4.10 - 4.13. In this section it is proposed that all cars going through Individual Vehicle Approval (IVA) would have to comply with current new car emission laws. IVA is a “Super MOT” that a kit or modified car has to pass to be registered or re-registered. Some kit cars and vehicles such as conversions for the disabled are based on new cars, so compliance would not be a problem, but modified classics would never pass these emission laws. The technology in a modern engine with computers controlling emissions is out of reach of the average person building a modified classic or kit car, even the manufacturers have been caught cheating. At the moment emissions checks carried out at the IVA test are based on the current MOT limits and are determined by the age of the engine and not the car. This is a fair way to determine compliance and does not need to change. There are people all over the country Being employed in the business of building and modifying cars. A considerable amount of money is invested in these projects and many people earn a living in this industry. If these proposals are implemented it will kill a multi million pound industry dead, part suppliers, craftsmen, magazines, car shows and charity donations to name a few affected areas. I feel with a relatively short consultation time of 2nd February - 2nd March 2018 and an implication date in July this year, that this is not a consultation but a notice of intent. There is no time for due process and no time to consult, only to take initial opinions. There is obviously a lack of understanding by consultation authors on what type of vehicle uses IVA and of the DVLA rules for obtaining original vehicle identity. The recent EU Road Worthiness Testing Directive due to be implemented this May, directs “substantially changed” vehicles towards IVA. If this proposal goes through, IVA will not be an option for these vehicles. The “Kit Car” section of this proposal needs to be dropped as it is totally unusable. I hope I have given you some insight into the situation and I urge you to take this up with the relevant Minister as soon as possible, or a whole way of life for many people will be lost forever. Daan Schreuders I think if everyone on here write a similar letter to their local MP, we might get some leverage against these proposals. Daan, thank you, I have blatantly copied and modded for my own use and sent it off to my local MP. Ta again, gav- 1 Location:cambridgeshire I just wondered is there any way of finding out the progress of this change?? As in if it will be approved or not? I have been putting off getting my vehicle iva’d For years now - not been a priority and now I am thinking I need to rush to get it tested? Would like to find out if it’s likely?? GW8IZR 86 Plank Floored - Dark Side of the Shed Location:Anglesey - North Wales has anyone had any response from their elected member? I wrote to my AM two weeks ago and have not even had a response. The bad weather has probably taken priority but that hasn't changed the end date. I got the following responses: Thank you for contacting me about the Department for Transport's consultation on improving air quality and safety. I note the concerns you raise and I hope that you have responded to the consultation. Given the recent VW dieselgate scandal, and the strong imperative to improve air quality, I understand Ministers are investigating what more can be done. As a part of this, the consultation seeks views on new penalties for vehicle manufacturers supplying vehicles fitted with defeat devices and proposals to implement various safety and environmental rules. I can assure you that I want to see the UK retain a thriving car industry. This means supporting both the construction and development of new models as well as the restoration of classic cars and the building of new kit cars. As the consultation is still ongoing, I would encourage you to respond directly to it to make your views known. As I am sure you can appreciate, I am not able to pre-empt the results of the consultation but it is important that informed views such as your own are considered by the Government as part of its plans to improve air quality. Thank you again for taking the time to contact me. And, after informing him that I had completed the survey and clarified a few points: Thank you for your further email. I appreciate your further points and have taken them up directly with the Department of Transport. As soon as I receive a reply from the Transport Minister I will write to you again. No response from mine yet though. That is a fair response - I'll advise if my AM answers my latest 'prod' ejparrott 87 Location:Rugby Waste of time addressing the Rugby MP, he's spineless, he'll only do what head office tells him to do, never challenges anything WesBrooks 16 Location:Merseyside, UK Multistage builds are commercial things like coach building or motor caravans. Doesn't apply to amateurs, although just incase it does I have sent a letter to the dvla ask for permission to transfer a vin or get a new one for my custom D1 chassis as a vague time stamp on top of receipt of the body. Modern car emissions are not tested to the same level as needed for a class of engine to pass one of the euro standards. This is demonstrated by the imminent changes to the MOT that tighten the emissions testing for recent cars but doesn't exceed or match the performance required to achieve a euro level of performance. I think the main loop hole they are trying to close is building an otherwise new kit car and being free to drop in a pre 94 lump to avoid the need for cat and potentially use carbs rathet than EFI. The proposals are vague, and probably purposely so. If they had successfully got a regulation change approved with vague wording it leaves them free to tighten it later! What is not clear to me is date of registration. When modifying a car you keep the current registration if you reuse enough of the donor and don't mod the chassis. These projects are not effected by this change. You do however have the option to target an age related plate, new registration, or Q plate. I'd argue that the age related should be tested to the same standards as the donor. Q plate and new registration for kits or significantly modified vehicles are at real risk here even with my proposed interpretation. I have also raised the point in my objection letter that the changes will have an insignificant effect to the total uk emissions. I bet total annual number of amateur BIVA'ed vehicles compared to new registrations of type apprived vehicles is probably single digit or fractional percentage levels, and annual mileage in these is also likely to be less as these are often second vehicles. Edited March 5, 2018 by WesBrooks
cc/2019-30/en_middle_0028.json.gz/line1594934
__label__wiki
0.600109
0.600109
Baldur's Gate 2 > PoE 2 Deadfire By Walkyr, June 30, 2018 in Pillars of Eternity II: Deadfire General Discussion (NO SPOILERS) jones092201 76 jones092201 (2) Evoker For me, the best experience was BG1. You know what, that's true for me as well. I think I would rate BG2 as a far better game objectively, but I just find BG1 more immersive. I think the low-level gameplay actually makes it feel more realistic to me. I also like BG1 the most. I think some of that comes from the quest design and the linear nature of the overall narrative structure. There is always a feeling of going forward and discovering stuff. When you have a quest hub (like Cad Nua) you're always worried am I doing all these things in the best order. Also the devs have to be sure you can do the content in any order. So instead of creating a very focused narrative that creates interesting moments and quests along the main quest line (sinking the cloakwood mines, escaping your return to candlkeep) what you end up with is three (sometimes four) episodic longer quests that don't really trigger much response. Deadfire also had this problem. It had some good moments-- excellent art, great voicework, interesting quest locations in the main quest, but these were short and lacked tension because nothing forced me onwards. Maybe that's the price of an open world. If so, I don't mind a bit more linearity in an isometric--particularly in the first game in a series. BG1 was great because you also felt challenged but rarely overwhelmed. that allows you to focus on story and lore and looting. That feeling doesn't really hit with PoE or deadfire. I love both of the games, but they're not on the same level as BG I & II (and fallout I & II) Judicator 92 Judicator (4) Theurgist The problem with Minsc is that if you ever play a FR Tabletop game where your character happens to be from Rashemen, everyone in the group will make comments that your character is supposed to be a ****ing retard. It gets worse if your character is a druid. The reality being that if Minsc really did come from Rashemen one of the shamans would have had him executed for being weak long before he ran into CharName. Minsc is only retarded because of his head wound, which he mentions when you meet him. That is reflected in his wis and int stats, which are illegal for a Ranger. He was presumably normal before since he had to have had better stats to become a Ranger in the first place. (11) Wizard Steam:DragonSoundxSG Yes that certainly is a common problem isn't it ThacoBell 212 ThacoBell (3) Conjurer Weak? Are you SURE you are talking about Minsc. Dude could armwrestle Schwarzenaegger back when that would mean comething. Wompoo 12 Wompoo (1) Prestidigitator I must agree the main story in POE 2 is totally forgetable... I play these games for complex story and game play. The art work and VO are excellent, just a shame the rest of it isn't Edited July 25, 2018 by Wompoo PizzaSHARK 122 PizzaSHARK So, I'm missing something then. If your preferred metric is "does this character evoke a response?", then why are you criticizing characters for being one-dimensional? Probably cuz I'm thinking through it as I'm talking to people. ~shrug~ So where I am now is somewhere around Minsc is a) a one-dimensional character but b) if that was all the writer really needed him to be then he can still be considered a successful character. I can also say that c) successfully crafting a one dimensional character like Minsc probably requires less skill/talent/focus/experience/intent than a lot of Bioware's more recent offerings. This makes me think that d) when people say Minsc is a better character than Sera they're prooobably comparing raw end states, Minsc is pretty straightforward A - B kind of character, he's either funny or he's not. Sera on the other hand is more complex, intended to be a fuller person and this results in a lot of places to get hung up on the character ie she's annoying, she has a bad haircut, she's narrow-minded and responds aggressively to people suggesting she maybe try to broaden her horizons a bit, her accent isn't always easy to parse, she's childish etc. Since readers/gamers are so varied characters can always fail e) Minsc happens to fail for me since I don't find his shtick funny for very long, and while people might get hung up on Sera's characteristics and dislike her as a person and conflate that with being poorly written (this is a different issue I have with people who often consider "I really dislike that character" as being synonymous with a badly written character), she can also absolutely fail as a written character*. What winds up separating BG2 characters from modern Bioware ones f) is an ambitiousness that BG2 characters didn't/couldn't have, they can still fail but there's fundamentally and purposefully more there which I think matters even if more work = more opportunities for failures. * - I see Sera as being created with the intent of or giving the players something to respond to in the shape of the common man's response to world shaping events. You occasionally hear people bemoan the lack of commoners in high medieval fantasy type settings. It's always nobles saving the world or otherwise wealthy, learned people. Well, Sera's as common as it gets. The one thing that makes her special or noteworthy from the really truly unworkably common man is that she has a strong, if basic, sense of right and wrong. So what happens when you introduce existential concerns like gods, mythological figures and whatnot to someone who doesn't have either the education or the mental predisposition to really grapple with these concepts? You get someone who vehemently rejects it and circles the wagons around what she knows. What do you get when you introduce nuance to moral considerations with someone who has a strong, but basic, conception of it? You get someone who murders the noble rather than let you continue teasing out the threads of the situation. Keep things simple. Let the baddies stay bad. This is not, like really not, something commonly explored in fiction. Usually when an ingenue gets exposed to the facts of the world it goes with a gentle sense of blooming horizons and enlightenment. Is Sera blooming? No, Sera is definitely not blooming. Does the character fail because she never develops beyond this mindset, yeah maybe. There's a slightly adjacent discussion to be had there about what a reasonable degree of influence the PC should have on the core of who a NPC is but w/e. I feel like some people are gonna read this and see "Ah, this character I like is better than the character you like because of its inherent depth and such and the fact that you can't see that just means that you, sir, are a dumb-dumb and only truly refined gentlepeople such as myself can get it. So there." I can see how that would be a conclusion but it's genuinely not what I was trying to convey. I don't see it as talking to a real person. Dialogue very much does NOT work like it does in Bioware games, the characters in Bioware games are largely unbelievable as being "real people," and the game design as a whole is so uninspired and formulaic I think it's all a bunch of nonsense. When you have more simplistic characters, and especially ones that aren't even trying to be realistic (such as Minsc, Jan, etc), you don't have those problems. They aren't trying to be realistic, so it's not a problem that their behavior and your interaction with them is unrealistic. But when you have Bioware characters that are all basically ****ing formed from the same mold, have the same story beats, have identical romance progression etc and they try to present things as realistic... it just falls flat. I enjoy Bioware characters but I don't consider them to be inherently better or worse than older characters. I find most of BG2's cast to be better than Dragon Age Origins', Mass Effect, etc. baldurs gate 2 is better. it isn't just nostalgia. its a more cohesive and personal story, with characters that have been a part of your story in a more intimate way, set in a world that isn't built around a single gimmick (the soul stuff in pillars). you also fight a greater variety of enemies, and from the perspective of narrative progression, the tension is better. Yeah, the first chapter of BGII feels off-- like you're doing subquests instead of beelining for imoen, but the entirety of POE 2 feels like subquests instead of confronting the great conflict of the game. I like PoE and PoE II very much, but it just doesn't compete in terms of narrative. BG2's problem was that there was no narrative urgency in Chapter 2. We're TOLD that we need to get out there and save Imoen, but in gameplay mechanics our time is unlimited. Gathering lots of gold to buy assistance to rescue her is a perfectly fine narrative hook and it even plays into CHARNAME encountering Firkraag (who offers undeniably the largest bounty for aiding him, whose behavior is quite obviously fishy... but if you're in a real hurry to raise funds to save your little sister, you wouldn't have time to run a fantasy background check on him, even if an adult red would be dumb enough to leave stuff like that in the open.) It only falls apart if the player drags their feet... and they have plenty of incentive to, with all kinds of fancy items and places to explore on offer and no clear indication that Imoen is going to die if they don't get there in X months. What if you're playing an evil character and you don't give a **** about Imoen? Also, you could justify it by saying you're gathering resources to face the Wizards, I mean they are a pretty big institution in the game. And let's be honest, you could do most of the quests within a couple of weeks in-game time if you know what you're doing. A month tops if you're doing everything. That's not an unrealistic amount of time to mount a rescue like that. algroth 2,794 algroth (10) Necromancer The game makes no assumption about you caring for Imoen at that stage though. The Shadow Thieves use both Imoen and Irenicus as bait to encourage you to help them out with their feud (assuming you care about getting even with Irenicus instead as another possible motivation), but to the best of my memory, to either of these motivations you can express indifference and go about your own way, at which point either faction will drop their prices once if you wait long enough, and *again* a second time if you continue to ignore them. I'd say they are pretty deliberately offering you this option because this is the point at which the game introduces its massive semi-open world to you and exploring it may well respond to the motivation of a character that is indifferent to Imoen/Irencus' fate. Otherwise, the bag of money you need to collect also offers a major incentive for the character to go out and get dragged into the many massive quests out to do in Amn if they *do* show concern about the plot. It does perhaps fall apart a little more if what you do instead is to leave all the exploration for chapter 6, and embark at that point into most of the side-content and so on, considering how urgent the soul-theft business is made to be. Edited July 25, 2018 by algroth My Twitch channel: https://www.twitch.tv/alephg Currently playing: Pillars of Eternity II: Deadfire BG2 does have it's problems in terms narrative and urgency, and that fine balance between the two. But keep in mind that once you go to spellhold, your funneled back to fairly linear plot where the major focus is on the main narrative. There is some awesome stuff that happens in the underdark that is side-questy, but it occurs within the context of the main plot. So aside from the first chapter of BGII, you never feel antsy about taking a quick detour. PoE and Deadfire's problem is that the whole game feels like it lacks this urgency. There are some really interesting quests in both, both they are almost always tangential to the plot. If there was one criticism I would level against OBS since they've rebooted the isometric genre, its that the plots of these new games-- critical path-- is far shorter and less engaging than the older generation of games. Some of this is down to us as backers, I think. we keep screaming for open world and freedom and that almost necessitates a reduced emphasis on the critical path narrative. ^ really well said morgothm 6 morgothm Unfortunately, I only managed to skim the forum entries, so I'm not sure if anyone as already posted this, but there is a podcast called "Mages and Murderdads", where the hosts played through the Baldur's Gate series recently, and can be an interesting listen for some of you (I know it was for me). It is geared towards the discussion of the story and the gameplay mechanics an the way they complement or detract from the experience. Link will be below. https://www.youtube.com/playlist?playnext=1&list=PLVcfOocLDkUzbmK5SuMdQ5drxIX7BMteN&index=1 On a personal note, having played through it for the first time recently, I do not particularly enjoy the combat (this level of complexity has to be turn-based, my dudes), being more interested in the story and, although there are some very interesting side-quests and moments throughout the series, I don't think it stood away from DnD tropes enough to be perfect. PST did this much better for me, and letting me dodge most of the combat. So far, I haven't finished PoE2, but have been enjoying it so far, appreciating the options it provides to solving quests and the moral dilemmas they pose. Vitalis 189 Well that's really the problem with most RPG video game adaptions of D&D, the combat is rarely turn based. In all iterations of the tabletop, the combat is turn based with each side rolling turn initiative for turn order at the start of the fight. RTWP > Turn-based. Manveru123 433 Manveru123 (7) Enchanter 100% agree. Turn-based games tend to drag the fights way too much. I agree that it drags the fights more, but you can compensate that by having less "trashmobs" and tighter encounters, making each fight worth that "dragging". When dealing with RTWP, I always sensed it demanded a level of control of what was going on that is at odds with the diluted notion of "turn" it has. I recommend the episode of Three Moves Ahead that goes through this better than I could, also featuring Cameron Kunzelman: https://www.idlethumbs.net/3ma/episodes/to-infinity-engine-and-beyond-1 Turning on all auto pause options in BG = Turn based. Sorry if I'm expressing myself poorly, but English isn't my first language. I know it would be a form of turn-based combat, but what I'm talking about would require a systems, encounter and level design overhaul, as turning those options in the game in it's current form, does transform it into to much of a slog. It would require, at least the removal of the most pointless encounters, and wouldn't be something as simple as tweaking the options (although, in some areas, that helps). Anyway, I'm not detracting anything from the Baldur's Gate games, and I still enjoy them for what they do well in the narrative and roll-play potential. For me, (emphasis on "for me") the combat isn't the most well realized aspect, as it lacks the clearness and user-friendliness its complexity requires. "Fixing" that, would unbalance the rhythm of play in a major way. In the end of the day, to each his own. As for me, when I find myself revisiting Baldur's Gate, my CTRL an Y keys might see some unusual usage. Palas 25 Hello guys. I am frustrated that I am waiting 20 years for RPG game simmilar to Baldur's Gate 2 and no one can make it. Pillars of eternity 1/2 are great games but there is easy to see different of quality comparing to Baldur's Gate 2 I dont know what od the reson. Why Baldur's Gate after so many years os still the best RPG? Its deepht od the forgotten realms world? Its many and great characters? Its great story, rewarding quests, dungeons and fights? Maybe its becouse world is changing and so comptuter games are changing and even obsidian enterteiment need to make their games to sell it for more people so they making PoE easy and flat. Can samoene explains me what's going on? 20 years after BG 2 and no one can make gamę simmilar or EVEN GREATER! than BG 2? And dont tell me about nostalgia becouse its not the case. It is mostly childhood memory and the charm of the new. So yeah, its mostly nostalgia, even if you deny it. Nothing can beat the memory, as for most people the first kiss is unforgettable. Back then, there were no western rpg with that unique companions, party-banter and romances. But only a few companions had a complex personalty, Minsk, Mazzy and the Ranger hadn't much more personality than thesidekicks in poe2. Combat was only soso, fighters get only auto attack, and for me real time battles, wich can (and must) paused, wasn't the best solution. quests and story were quite good, even today, but quite standart fantasy stuff. i played BG recently again. And while it is still a good game, i wonder why i coulnd stop playing it in the past. I think backdays there were no games, that were in story, lore, game mechanics or companion notable better than BG2. today there is everytime a game, that is in on or another aspect better. Like poe2: factionsystem and romances are not bad by them self, but we know games, that are far better than poe2 in that aspect. We old BG2 Fans just want this first feeling ofan akmost perfect game back, but this is impossible. So we should not have these expectations. Then we could enjoy the moderb rpg's more. i love poe2 for its fesh setting and pirate feeling, the thrill of explore the islands and nice combat mechanics. By the way, iam 40 now ^^ Wenn etwas auf facebook steht, dann muss es ja wahr sein! ;-) illathid 644 illathid (6) Magician PSN Online ID:illathid My best friend just played BG2 for the first time this spring. He had played Dragon Age, Mass Effect, Fallout 3, and other newer RPGs, but not any of the IE games. According to him, while there are parts of the game that feel very dated and unfun, it easily the best RPG he ever played. So I don't think it's nostalgia alone that cement's BG2's place in gaming history, rather we should praise it for the things it did well and seek learn from the mistakes that it made. In this respect I think Deadfire did a good job, although it likely could do better. "Wizards do not need to be The Dudes Who Can AoE Nuke You and Gish and Take as Many Hits as a Fighter and Make all Skills Irrelevant Because Magic." -Josh Sawyer RTWP is just a very pretentious form of turn-based. Since that's a pretty loaded statement, I'll explain my reasoning: - Most (all?) RTWP systems are either directly based on turn-based rules (Infinity Engine games are based on 2E D&D rules and, later, 3E for example) or are heavily inspired by them (Pillars.) They share many of the same design conventions. Action speed isn't much different from the free/swift/move/standard/full round action setup used in 3.5E or action points in other systems. Recovery time is analogous to initiative order or JRPG-style ATB bars. So there are a lot of obvious, intentional similarities. - At any difficulty level appropriately challenging to the player (whether the player feels challenged by normal, veteran, PotD, whatever), the game is designed for the player to pause the game to examine the playing field, take enemy actions into consideration, and issue orders to their units to be carried out after unpausing. RTWP games also typically include a multitude of auto-pause options. Assuming the player is playing at a difficulty appropriate to their level of skill (assuming "appropriate" means "challenging"), they will be pausing frequently. Many people on these forums, for example, talk about how they don't even really use the AI routines because they don't want the AI wasting actions or resources. If you are pausing frequently to issue commands and read the state of the battle, you are effectively playing a very pretentious kind of turn-based game. The enemy wizard gets a Fireball off, it hits, you pause the game to examine the status of all your dudes, the enemy dudes, what that enemy wizard will be doing next, and then begin to issue orders in response to this change. - Authentic turn-based games are rightfully known for playing slower than RTWP games. This is often due to most turn-based games not natively giving the player options to speed up/skip animations, often adding in a pause between turns, etc. XCOM 2, for example, has the animations for characters moving around, aiming, and then has a weird little pause between ending one character's turn and beginning another's... and many mods remove or reduce these things and the game plays much faster as a result. Some games, like Age of Decadence, don't have delays or pauses at all and so the game cycles through AI turns very rapidly meaning there's very little delay between each of your turns even on a crowded battlefield. But strictly speaking, a difficult battle in a turn-based game will be pretty similar in length to a difficult battle in a RTWP game, because the player is pausing frequently in RTWP anyhow. So we can see that the gameplay systems are often very similar, and gameplay length is also often pretty similar - assuming the player is playing challenging content. So the only thing that RTWP has an advantage in is the sort of trash mob fights where you can just let the AI play the game for you. But such encounters are not generally very interesting (see: complaints about random encounter systems in JRPGs), so in many cases... the game may be better off with them removed entirely! So I call RTWP a pretentious form of turn-based because the style has pretensions to being different from turn-based when, again assuming appropriately challenging content, it is effectively the same. Unlike BG2, there's simply not a lot of care put into PoEs characters. Examples - Pallegina is kicked out of the VTC. But somehow she is still blindly devoted, not questioning anything? Oh and if you follow a diplomatic path in a conflict she is invested in...she says nothing? No acknowledgement what so ever? Serafan is if one thing, anti slavery. But when you confront a certain person bout it with him in the party...HE SAYS NOTHING, WTF?! And then if you perform a heinous act against one of your companion's factions (no spoilers) with a cert char in the party, they again say NOTHING. Nothing. It's lazy and insulting. Deadfire characters are faction/combat bots with maybe 1 or 2 exceptions. Whereas BG2 assessed things at a decision/alignment level, Deadfire is all about some lame point system which has always been seriously bugged making the experience even more vapid. Edited July 27, 2018 by Verde we (the community) need to stop using the nostalgia argument. It's too dismissive of reasonable criticisms, like yelling 'fake news' to derail someone's argument in totality. If the point of criticism is to help devs create increasingly better games for everyone, you have to acknowledge everyone's ideas. You don't have to accept them, nor do you have to hide that fact, but you do need to account for what they say. That said, nostalgia is a part of it. That point I happily concede. Still, there are ways to, with reasonable objectivity, make the claim that BG 2 is the superior crpg. Not only in terms narrative and narrative structure, but also in terms of gameplay qnd characters. Really by any metric outside of the dialogue-- Pillars has better dialogue-- and the clunky UI that is improved in the EE editions but still doesn't compete, I would argue BG2 is stronger. the specific quests are longer, more involved and more interesting there is a larger bestiary to fight there is are far, far better villains and more of them who you interact with enough to form an opinion of before you run them through. (Deadfire does some of this, admittedly. Not Pillars 1) and while a lot of the combat is auto-attack, I think a lot of the fights in BG2 are more interesting. Tell me one battle in Deadfire that comapares with the big fight just before the Demogorgon in Watcher's keep? Lastly, and most importantly, BG2 (and the trilogy as a whole) presents an intensely personal quest narrative woven through a larger series of events that takes the PC from humble origins to the threshold of apotheosis. Very rarely in the series does the urgency falter, and the characters you meet throughout remain useful and interesting. Certainly you don't have to like everyone of them, but someone out there does, which is really the thing of it. And of course, in the end you get to choose to be, literally the embodiment of chaotic evil as the Lord of Murder, or choose the good path. taken together, to me BG2 is stronger. Loren Tyr 555 Loren Tyr While you are certainly entitled to your opinion, and I think it is always of interest to read other people's reasoned opinions: why undermine that by claiming to some kind of objectivity? Because by and large, when it comes to this sort of thing there is none to be had (and I would argue, it isn't particularly needed). Which in a way is also illustrated by the reasons you proceed to give, which read very much like reasons why you specifically prefer BG2 (and the series in general); both in the kinds of reason given, and in the way you phrase them. As you say, those are what *to you* makes BG2 stronger. Not meant as an attack on your preference of course, just curious where in your view that reasonable objectivity is in all that. Taking for example the last point, of the trilogy being an intensely personal quest, going from nothing to an almost godlike status: this is certainly something that plenty of people like, but how does that translate to an objective marker of quality? knownastherat 198 knownastherat "Reasonable objectivity" is an interesting concept While I have some ideas what is meant by it in the given context, let me just say the obvious that objectivity is a property independent of perception.
cc/2019-30/en_middle_0028.json.gz/line1594935
__label__wiki
0.712802
0.712802
AC Milan Podcast Inter Podcast Juventus Podcast Lazio Podcast Napoli Podcast Roma Podcast Stromberg: What’s happening at Atalanta is extraordinary, I’m ready to play if Gasperini wants me Date: 15th May 2019 at 11:15am Written by: Conor Clancy @ConJClancy Ex-Atalanta captain Glenn Stromberg is backing the Bergamaschi to continue their incredible season in the Coppa Italia final and their remaining Serie A games. Remarkably, the Nerazzurri are within touching-distance of reaching the Champions League despite having Serie A’s 14th biggest wage budget, but the Swede is confident they can achieve what was seen as unachievable. “What’s happening is something out of the ordinary,” the Atalanta icon said of his former club’s success ahead of their Coppa Italia final meeting with Lazio on Wednesday. “It’s no longer a surprise. People now talk of them abroad.” Gian Piero Gasperini has masterminded La Dea’s rise, and Stromberg had some words of praise for the coach. “Gasperini is extraordinary,” he said, “he takes everyone on face to face, which makes a difference. “Then he shows them [Papu] Gomez, [Josip] Ilicic and [Duvan] Zapata – who can stop them? “The Champions League and Coppa Italia are both wonderfully possible, in the summer I would never have believed it.” With Juventus and Sassuolo still to come in Serie A, with both games being played away from Bergamo, the Bergamaschi need four points to guarantee their participation in next season’s Champions League. “They can do it,” the former player said. “They don’t know the fatigue. “Who wouldn’t want to play in this team? I’m 59 years old, if Gasperini gives the ok, I’m ready!” Serie A News 24/7
cc/2019-30/en_middle_0028.json.gz/line1594937
__label__wiki
0.634869
0.634869
120115 + 120216 (an improbable tree) Filed under: Andrew Lafkas, Andy Hayleck, Ben Owen, Bryan Eubanks, Carver Audain, Catherine Lamb, Doron Sadja, events, Gill Arno (mpld), Mike Bullock, o.blaat (Keiko Uenishi), sessions, Tim Feeney, Tyler Wilcox One thing I really enjoy about documenting the meetings at Fotofono is the opportunity to observe firsthand the group dynamics which unfold in and around the studio. As I read the _participants abc list (here at left) I see a loose collective of artists that keeps growing and mutating like an organism. What I like is the unpredictability of its crossings and bifurcations, and the eclectic range of its sonic manifestations. 120115, first set: Doron Sadja 120115, second set: Tyler Wilcox 120115, third set: Andy Hayleck and Ben Owen This plurality is well reflected in the present post, which includes recordings from two recent events roughly separated by a month of time. The first three tracks are from the latest open doors event of January the 15th, which featured solo sets by Doron Sadja and Tyler Wilcox and a duet by Andy Hayleck and Ben Owen. A fourth recording was made when a nine-piece ensemble gathered again in the studio just about a month later. At work in the dark: Doron Sadja http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/120115-120216/120115ff1.mp3Doron Sadja (computer) [27 min. 13 sec.]. With firm hands in the flickering candlelight and a resolute evil shine in his eye Doron tames his quadraphonic beast to a lush culmination. Wonderful opening set. Tyler shows the score of the piece he’s just performed http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/120115-120216/120115ff2.mp3Tyler Wilcox (soprano saxophone, field recording) In this meditative, very quiet set Tyler performs his new composition “4hk4ak 2012”. Field recordings from Coney Island and Rockaway Park Beach are looped into brief sequences, constructing a carefully paced structure over which Tyler lays out his soprano sax playing. A sense of fragility permeates the piece, beautifully enhanced by the absolute stillness held by the audience tightly packed in the studio during the performance [32 min. 28 sec.]. Andy and Ben chilling during sound check. http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/120115-120216/120115ff3.mp3Andy Hayleck and Ben Owen (computer and electronics)[25 min. 59 sec.]. Ben and Andy have known each other for years, but to my knowledge this is the first time that they have performed together as a duo. This low-frequency dialogue constitutes a brilliant study on poise and understatement. While the listener’s imagination (at least in my case) drifts in the mystery of the spectral elision, Andy’s and Ben’s sound creature slowly fills the room, finds a comfortable place in it and then slowly dissolves. It takes a few silent minutes before an applause follows and marks the end of the concert. mpld projection http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/120115-120216/120216ff1.mp3Gill Arno (mpld setup), Carver Audain (computer), Mike Bullock (acoustic bass), Bryan Eubanks (electronics), Tim Feeney (percussion), Andrew Lafkas (acoustic bass), Catherine Lamb (viola), Ben Owen (electronics), Keiko Uenishi (computer and microphone) [36 min. 10 sec.]. The last piece of this post shows the other side of fotofono – the last-minute coming together of regular “closed doors” studio sessions. On February 16th a bunch of improvisers got together when Mike Bullock and Tim Feeney briefly stopped by in Brooklyn while on transit towards New Jersey. This is the first piece of two that were played that night, and I think the recording translates quite well the excitement that I felt at the time for the nice group that had gathered in the studio. For a nine-participant improvised session, there is quite some space for everybody to explore unconstrainedly. As I listen back to this recording I really enjoy finding each participant’s signature sound to define the contour of the collective exploration. Download all sets as zipped files: flac [444.8 MB] mp3 320 kbps [268.7 MB] Recorded and prepared by Gill Arno. Thanks for the photos to Derek Morton and Theres Wegmann. Brooklyn steam Filed under: Andrew Lafkas, Bryan Eubanks, C. Spencer Yeh, events, Mike Bullock, Tim Feeney, Todd Capp, Vic Rawlings As anticipated in the previous post, this summer was going to be hot at Fotofono. It’s good to think about it, now that brisk winds are blowing it away. Um.. I am probably the only one around who’s missing NYC’s summer steam…. so let’s just talk about music. The initial idea for the event documented here came up after I listened to Andrew Lafkas and Mike Bullock playing together at Middle Press last May, at the release party for their duo release on Winds Measure Recordings. Both the release and their set were such a treat. I just wanted to try and somehow extend the scope of their collaboration, see where it would lead up to. So I asked if they were into curating together one Fotofono night. The following recordings are the outcome — indeed, more goodies came out of that encounter. Fast forward to July 23. The tiny Fotofono studio was packed, and some people had to stay in the hallway for the concert. But the doors and windows were full open, as the heat inside was quite extreme. The boundary between the studio and the outside world became fuzzy, and the street noise overlapped with the improvised music coming from inside. Particularly in the first set one can clearly hear the various vehicles passing, a doorbell ringing, and my neighbor’s dog barking and barking, among other things. In the summer heat, everything seemed to melt together. After the concert I tried to apologize to Vic for the noisy environment. He just replied: ‘Oh, no. We were digging it’! I liked that. And I liked his choice of words. In retrospect, I can see how the music that he and Tim were playing was meant to open up wide expanses, allowing the sounds of the Brooklyn summer to fill the room, and their music. http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/100723/100723ff1.mp3Vic Rawlings (cello, electronics), Tim Feeney (percussion) [24 min. 36 sec.]. http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/100723/100723ff2.mp3Mike Bullock (bass + electronics), C. Spencer Yeh (violin/voice) [15 min. 10 sec.]. http://www.m-i-c-r-o.net/fotofono/fotofono_media/snd/100723/100723ff3.mp3Andrew Lafkas (bass/electronics), Bryan Eubanks (soprano sax/electronics), Todd Capp (drums) [35 min. 43 sec.]. Recorded by Gill Arno at Fotofono, July 23 2010. Thanks to Vic Rawlings for the images of this post.
cc/2019-30/en_middle_0028.json.gz/line1594938
__label__wiki
0.974235
0.974235
Family speaks for the first time, remembering slain West Valley City compliance officer Posted 5:48 pm, August 13, 2018, by Taylor Hartman and Lauren Steinbrecher, Updated at 11:06PM, August 14, 2018 WEST VALLEY CITY, Utah -- The family of Jill Robinson, a slain West Valley City code enforcement officer, spoke Monday about her love of her job, her children, and her grandchildren. Robinson was killed while working Thursday after police say Kevin Wayne Billings shot her and lit her city truck on fire as well as his next-door neighbor's home. Two of Robinson's daughters spoke of their mother fondly, and gave a sense of the passion she had for her job. They said Robinson graduated from the Utah Peace Officer Standards and Training program before West Valley City hired her. "She always wanted a position where she could make a difference in the community," Katie Merrill, one of Robinson's daughters, said. Merrill recalled the excitement Robinson exuded when she took the job as a code enforcement officer. "We all were at the ceremony where she got her badge," Merrill said. "She kept track of her start date with West Valley every year. She would throw herself a little party at her anniversary." Her colleagues described seeing that same passion from Robinson, and said she often enthusiastically volunteered for community events to educate the public about the importance of property upkeep. "She was almost instantly looked up to as someone who knew what she was doing," said Layne Morris, West Valley City Community Preservation Department Director. "[She] had made a conscious decision, that this is what she wanted to do with her life." Robinson oversaw 3,000 homes, Morris said, and had just celebrated the 10-year mark with West Valley City earlier this year. Outside of work, Robinson's daughters said the mother of four enjoyed spending time with her two young grandsons-- Izac, 2 and Zayne, 9 months. "They were her entire world," Merrill said. Robinson also loved playing games, working on craft projects and decorating for various holidays, they said. "Fall was her favorite time of the year," daughter Halie Smith said. "When we were at her house, she already had a box of Halloween decorations labeled, 'Halloween 2018.'" They said their mother truly was a mom to everyone in the family, and always helped out in times of need. "She was a 100 percent match for bone marrow donation to her brother, our uncle Jaron, who had leukemia," Smith said. "Jaron is still here with us today, because of her." Funeral services for Jill Robinson will take place Friday at 10 a.m. at the Maverick Center. A full press conference with Robinson's daughters can be seen below: Topics: arson, homicide, west valley city Get the Fox 13 News app for Android! Get the latest breaking news, weather forecasts, live streaming newscasts and much more! Man who killed West Valley City code officer will spend the rest of his life in prison Life sentence for man who pleaded guilty to killing WVC code enforcement officer Jill Robinson 16-year-old babysitter arrested after 4-month-old infant found injured Family of 5-month-old baby, allegedly killed by father, trying to cope with loss West Valley City woman killed after tree falls on her in Summit County Unified Police seek man who evaded officers after chase, say he’s armed and dangerous Soldier who grew up in Eagle Mountain given welcome home procession Police: man killed in vehicle fire along I-215 in West Valley City Customers crowd Kowloon Cafe to say goodbye after 60 years in business Man arrested on suspicion of sexual assault after passersby interrupt attack outside concert venue Police searching for suspect(s) who shot teenager in West Valley City Park ‘Everyday Heroes’ honored at Red Cross luncheon
cc/2019-30/en_middle_0028.json.gz/line1594940
__label__wiki
0.822332
0.822332
Gadgets Hours Latest laptops, mobiles, gaming and more news! Flipkart, Amazon Restrained by Delhi High Court From Selling Direct Sellers’ Products Without Consent July 10, 2019 by admin 0 Comments The Delhi High Court has restrained e-commerce majors like Amazon, Flipkart, and Snapdeal from selling health and beauty products of direct sellers — Amway, Modicare, and Oriflame, without their consent. The interim direction by Justice Pratibha M Singh came on the pleas of the three direct sellers alleging that products under their brands were being sold on the e-commerce platforms at cheaper rates resulting in financial losses to them. They also raised apprehension that the goods may be tampered with or counterfeited. The court observed that according to the report submitted by local commissioners who inspected the warehouses of the e-commerce platforms, also including 1MG and healthkart, the conditions of the goods had been changed. Besides, it said, the MRPs were on the higher side, there was wrong attribution of names, codes and inner seals had been tampered with and expired products were being given new manufacturing dates. Quoting an adage – with great power comes great responsibility - which was popularised by the Spiderman movie, the court said e-commerce platforms, which has penetrated all forms of business, have the obligation to maintain the sanctity of contracts and should not encourage or induce a breach. It said the manner, in which these platforms operate, makes it extremely convenient and easy for sellers to sell products without any quality controls. “The minimum conduct expected of the platforms is adherence to their own policies, which they have failed to do in the present case. “Thus, this court has no hesitation in holding that the continued sale of the plaintiffs’ (Amway, Modicare and Oriflame) products on the e-commerce platforms, without their consent, results in inducement of breach of contract, and tortious interference with contractual relationships of the plaintiffs with their distributors,” the court said in its 225-page interim order. It noted in its order that the manner in which Amway, Modicare and Oriflames’ marks, logos, company names and product images, were being used was “clearly misleading to a consumer” as the sellers names were not fully disclosed. “Contact details are not disclosed. The consumer, would find it extremely difficult to contact a seller. Consumers cannot be expected to do a fine and detailed examination to find out the actual source. “The consumer is not being told that the seller is not authorised by the pconsumer would, literally, require investigative capabilities to trace the actual seller,” the court added. The judge said the facts “clearly show that at the prima facie stage, the apprehension of the plaintiffs that the products are being sourced through unauthorised channels and that the products are tampered, conditions changed and impaired, is completely valid.” The court said that the company’s right to carry on business was being affected and jeopardised by the “large scale violations on the e-commerce platforms”. It said that such activities also affect the rights of genuine consumers. “The plaintiffs have, therefore, established a prima facie case. Balance of convenience is in favour of plaintiffs. Irreparable injury would be caused to plaintiffs, their businesses, and all those who depend on plaintiffs’ successful business, such as employees, distributors/direct sellers, agents, and finally the consumers, if interim relief is not granted,” the court said. It directed that only those sellers who have obtained the consent of Amway, Oriflame and Modicare be allowed to sell their products on the e-commerce platforms. The court also directed the e-commerce platforms to display the complete contact details of the sellers who had obtained the consent of the plaintiffs to sell their products. This article was originally published by Ndtv.com. Read the original article here. Amazon Prime Day Sale in India: OnePlus 6T, Redmi 6, and Other Mobile Discounts, Offers Listed Nintendo introduces a Switch model refresh with better battery life Samsung Galaxy S10 Users Complain of Lockout Issue After Recent Update, Verizon and AT&T Subscribers Affected OnePlus TV May Debut Soon, as Remote Control Gets Bluetooth Certification Chandrayaan-2: ISRO Moon Mission’s Launch Date, Time, Registration, Facts & Figures – All You Need to Know Sony’s new A7R IV camera is a 61 MP full-frame mirrorless beast Voyant Photonics raises $4.3M to fit lidar on the head of a pin Petcube’s Bites 2 and Play 2 amuse pets and humans alike with Alexa built-in Hero Labs raises £2.5M for its ultrasonic device to monitor a property’s water use and prevent leaks Amazon said to be launching new Echo speaker with premium sound next year These robo-ants can work together in swarms to navigate tricky terrain Archinaut snags $73 million in NASA funding to 3D-print giant spacecraft parts in orbit Amazon reportedly ramps development on Alexa-powered home robot on wheels Spotify Lite for Android, Finally Watch YouTube on Fire TV, Fix Common PC Gaming Problems Refurbished vs. Used vs. Certified Pre-Owned: Which Is Better? What Is PCIe 4.0 and Should You Upgrade? What Does RAM Do for Gaming and How Much RAM Do I Need? How to Open JAR Files in Windows 10 Mac Disk Permissions Explained: How to Repair macOS Permissions AMD Ryzen 9 3900X and Ryzen 7 3700X Review Netflix will roll out a lower-priced subscription plan in India Samsung to Introduce One UI 2.0 With Android Q, Galaxy S11 to Come With One UI 2.1: Report Mi Super Sale Returns on Mi.com: Offers on Xiaomi Phones, TVs, and Accessories Copyright © 2019 by Gadgets Hours. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms of Use and Privacy Policy.
cc/2019-30/en_middle_0028.json.gz/line1594946
__label__wiki
0.544288
0.544288
The Tuesday usual: I chat games with Radio Wammo Posted on January 31, 2012 by Gamejunkienz Leave a comment It’s Tuesday so that means I chat games with Glenn “Wammo” Williams on Kiwi FM. Today we talked about Resident Evil: Revelations on the Nintendo 3DS and the Circle Pad Pro accessory that adds a second thumb stick to Nintendo’s handheld. I also did a written review of the Circle Pad Pro yesterday and while it’s ugly, bulky and only comes in black it actually works really well, especially in games like Resident Evil: Revelations. That’s all I’ve got. Thank you and goodnight. Hands-on with Nintendo’s Circle Pad Pro If I’m being completely honest, Nintendo’s Circle Pad Pro for it’s Nintendo 3DS handheld is pretty ugly, especially when it’s clashing with the blue of my 3DS. As you can see in the photo, I’ve got a blue 3DS and the Circle Pad Pro is black. In fact, it only comes in one colour: black. The Circle Pad Pro is a bulky, strange-looking peripheral – that’s it there in the photo – that you slot the 3DS into, snug and tight thanks to six rubber pads that hold it into place. It takes a AAA battery and as well as a second thumb stick – which I have always argued the 3DS needed from the beginning – it adds an additional right shoulder button and two triggers: ZR and ZL. It’s so bulky I can’t fit my 3DS into it’s case without removing it. I’ve long said that the one mistake Nintendo made with the 3DS was not including a second thumb stick, crucial for action games and manual camera control – and the Circle Pad Pro sorts that problem out. The first game to make use of the peripheral is Capcom’s Resident Evil: Revelations, the first game of the series I’ve played on a handheld and it’s actually enjoyable using the Circle Pad Pro: more enjoyable than I thought it would be. Being able to move the camera around as you move Jill Valentine and Chris Redfield around the game world of Revelations is a breeze thanks to the Circle Pad Pro. I played the demo of Revelations before I got the Circle Pad Pro and while playable, I think you get a lot more freedom of movement in the game if you didn’t have the device. If there’s one think that’s frustrating about the device it’s that after a certain period of inactivity the device goes into standby mode, for example shutting the lid for a few minutes. What that means is that you have to go back into the options menu and re-activate the device. It’s not a big deal but it’s frustrating – especially when you have to keep closing the game because of interruptions. A message also tells you that if it enters standby mode again to press ZR and ZL together. Look, I have to say I was pleasantly surprised with the Circle Pad Pro. It looks ungainly, awkward and complicated but it actually works and works well. Hopefully there will be plenty of games coming out that make the most of it. I know there is a huge market of gamers who don’t see the merit in dedicated handheld gaming consoles like the 3DS but if you own one and want more control then I can’t see you going wrong with the Circle Pad Pro. Edit: Something I forgot to mention about the Circle Pad Pro but remembered it this morning when I was doing my segment with Glenn “Wammo” Williams was that the volume slider on the left side of the 3DS is awkward to get to when it’s in the peripheral. I often turn the volume down when I’m playing while sitting on the couch with Mrs Game Junkie (or put in one ear piece) but when it’s all the way down it’s quite hard to turn the volume up while it’s in the Circle Pad Pro. The Circle Pad Pro is out in New Zealand on February 2 (Thursday) and will cost $35. Resident Evil: Revelations is also out on February 2 and will cost about $90. We talk Syndicate and Xcom: Enemy Unknown Posted on January 24, 2012 by Gamejunkienz 2 comments Jeepers, two videos in one post: what the hell is wrong with me? Seriously, though: two videos in one post. That’s pretty good on my part. Today was the first video game slot for 2012 with Kiwi FM’s Glenn “Wammo” Williams. We talked about games, as we do. The games of choice today were remakes of the 1990s games Syndicate, which was first made by Peter Molyneux’s Bullfrog Productions company back in the day, and Xcom Enemy Unknown, a tactical strategy game not to be confused with the first person shooter Xcom game also in the works. I’m sure I ramble sometimes and get off topic but it’s sure to make entertaining listening. Oh, as an added bonus, I sort of spring on Wammo that Trials Evolution, the sequel to Trials HD, one of our favourite games on XBLA where Wammo, I and some other Xbox mates tried to outdo each others scores . Trials HD is a great game but I agree with Wammo that the difficulty spike on some of the later courses is so brutal that we both gave up. Trials Evolution, which seems jammed packed with features, also allows for competitive multiplayer, so you can race against your mates and really show them who’s boss. Here’s a trailer of it in action. It looks pretty neat. Trailer bonanza: Resident Evil 6 Posted on January 23, 2012 by Gamejunkienz One comment Things are fairly quiet at the moment so here’s a little bit of Resident Evil news to put some excitement into your Monday night (well, it’s Monday night for us here in New Zealand but it could be Sunday somewhere else). Resident Evil fans rejoice, Capcom have released a trailer for Resident Evil 6, the next console game in the survival horror series. The game, coming out on Xbox 360 and PlayStation 3, is due in November and is rumoured to feature six-player co-op and takes place 10 years after the original Resident Evil. The game features Chris Redfield and Leon S Kennedy as the game’s main heroes. In completely unrelated news, I’ve been playing the Resident Evil Revelations demo on the 3DS. It’s pretty good, and I’m not even that scared while I’m playing it either. So, who’s excited about RE6 then? Haterz always going to hate [Today’s posting is a rant. I just have to get it off my chest] I have two gaming T-shirts that I wear quite a bit. One of them has the images of four game controllers (Xbox 360, PlayStation 3, PC mouse and Wii-mote) accompanied with the words: “Contrary to popular opinion, these do not make me a killer (Well maybe the Wii-mote, that thing is dangerous)” It’s my “I like to play video games T-shirt, get used to it” T-shirt and nine times out of 10 when I wear it someone will give me a strange look. In fact, a week or so ago when we were staying at a remote location in the Marlborough Sounds I wore it into the camp shop/diary to get milk and a paper. The woman behind the counter sort of looked strange when she saw it. I mention my T-shirt because if there’s one thing really grinds my gears it’s people who criticise people who play video games. That’s why I like wearing that T-shirt (it came from Insert Coin clothing in the UK): it makes it known to people that I play video games and, contrary to what they believe, years of playing games haven’t made me a killer. I don’t go out at night, like Dexter Morgan in the TV show Dexter does, prowling for evil doers. I’m raising this topic because today someone who has hardly played video games at all criticised why I played video games. I don’t understand why people do that: why criticise someone just because it’s something you don’t like? Sorry, but I just don’t understand it. I think it’s because they don’t understand video games or the technology behind them. That’s the only answer I can give. Seriously. Or they’ve watched a mainstream news story about “video game nasties” and based their opinion on that. I’m not making people who don’t like video games play them so why do they criticise them? “Oh, why do you waste your time playing that when you could be outside, in the sun, riding a bike, or doing something with nature?” is a common comment I get on another blog from people who have no understanding of the industry or video games. I don’t like hunting but it would be like me visiting a hunting forum then telling hunters to give it a rest and start taking up crochet or something. What these people who tell me to “go outside in the sun instead of playing video games” don’t seem to realise is that I actually am able to play video games and go outside and spent time with Mother Nature, on my bike and with my family. It’s called a balanced lifestyle and I have one. I ride my bike, I spend time with my family, I go out in the boat, I go fishing. I also play video games. Anyway, sorry for the rant. Sometimes small things get my back up, especially when people slag off something that I enjoy just because they don’t understand it. Let us play video games: we’re not hurting anyone. Promise I won’t moan again in future. Much. Posted on January 1, 2012 by Gamejunkienz Leave a comment It was a little slippery underfoot this morning as I walked into work so I tip my cycle helmet to those hardy souls… twitter.com/i/web/status/1… 9 hours ago
cc/2019-30/en_middle_0028.json.gz/line1594948
__label__wiki
0.54002
0.54002
Skip to access keys Toggle the display of Navigation Toggle the display of Search Mission Officials Trade & The Ghana Economy Bank of Ghana Setting Up Business In Ghana Free Zone - Incentives Investment In Oil & Gas Ministry Of Trade Consular & Diaspora Section Registration of Ghanaians Passport and Emergency Travel Document Diaspora Affairs Tourism & touringghana.com AAU confers honorary doctoral degree on Ethiopian Group CEO I advised Bagbin from contesting NDC primaries – Kyei-Mensah-Bonsu Court sets July 31 to rule on application to stay proceedings Afoko trial: Prosecution to call 19 witnesses Tourism & Culture Ghana’s Unique Attraction Ghana is the closet landmark to the centre of the earth. The Greenwich Meridien passes through the port city of Tema, which lies about 15 kilometres from the city of Accra. The Equator lies just 500km below Tema, making Tema the closest city to the intersecting point of Latitude 0 and Longitude 0 degrees, making it a near-perfect centre of the earth. Ghana has several unique attractions such as 539 kilometres of white sandy coastline that is ideal for surfing and swimming as well as fresh water bodies such as the Volta Lake and its River estuary that are excellent for other water sports. In addition to beach and the riverain attractions, the thirty-three (33) Castles and Forts constructed between 1482 and 1786 and are dotted along the coast of Ghana, of which twenty-one (21) have been designated as UNESCO World Heritage sites, provide useful insights into the country’s history. The country also boasts of abundant Eco and Cultural Tourism attractions that provide a variety that is varied from the sand and beach along its coast. Top Attractions of Ghana Cape Coast Castle ‘Cabo Corso,’ meaning ‘short cape’, is the name the Portuguese settled on for the local... Mole National Park Mole National Park is Ghana’s biggest and best National Park and is located in West... Kakum National Park Kakum Conservation Area is made up of mostly rain-forest comprising the Kakum National Park and... Elmina Castle The St. George’s Castle Museum is located within St. George’s Castle (often called ‘Elmina Castle’),... Nzulezo Stilt Village The settlement of Nzulezo, the “Village on water”, is located 90 kilometres west of Takoradi... Paga Crocodile Pond Located in the north-eastern border of Ghana, Paga is a sacred crocodile sanctuary. Although crocodiles are... Lake Volta, Ghana Lake Volta lies along the Greenwich Meridian, and just six degrees of latitude north of... Fort Metal Cross, Dixcove The British colonial fortification, Fort Metal Cross (originally Dixcove Fort) is located on a promontory... Cape Three Points, Ghana Cape Three Points is at the southernmost tip of Ghana. On the map, you’ll see... VISA SECTION CONSULAR & DIASPORA SECTION GHANA HIGH COMMISSION. NO. 14, JALAN AMPANG HILIR Telephone : +60(3)42526995, +60(3)42579703 and +60147359511 Fax: +60(3)42578698 Email: info@ghanacom.org.my Consular Section Email: consular@ghanacom.org.my Monday to Friday:9:00am to 4:00pm Copyright © 2018. All Rights Reserved. Powered by Biztech Softsys (M) Sdn. Bhd.
cc/2019-30/en_middle_0028.json.gz/line1594959
__label__cc
0.625316
0.374684
Chelsea willing to sign Bundesliga giants No.10 playmaker lado zangi May 15, 2019 May 14, 2019 No Comments on Chelsea willing to sign Bundesliga giants No.10 playmaker Chelsea will likely rival Manchester United for the services of Real Madrid playmaker James Rodriguez this transfer window, with the Spanish club having put him up for sale. James Rodriguez has been on loan with German giants Bayern Munich since the summer of 2017, and he is due to return to the Spanish capital on June 15. However, Zinedine Zidane is not keen on reintroducing James Rodriguez into the fold in Real Madrid, and will let the Colombia international leave for a cut-price £36 million deal. Marca claims Bayern Munich will be given the first refusal until June 15, but if they decide to pass up on the chance to sign the midfielder, Chelsea and Manchester United are expected to fight for him. If both Premier League giants are willing to match the requested fee, the decision could go to the player, which is where Champions League qualification could be vital, and the Blues have secured their way to the top European competition. Despite that success, the FA Cup holders have advanced to the final of the Europa League where they will face London rivals Arsenal in their last game of the season. But Chelsea are resigned to losing Eden Hazard to Real Madrid in the summer transfer window, and the addition of James Rodriguez would be a great move for the Blues as Christian Pulisic will join the club in the summer since he agreed to move in summer. Reports in France already claim that Chelsea agreed £100 million transfer fee for Eden Hazard to send him to Madrid. 22-year-old Chelsea star reportedly attracting interest from Championship Man United reluctant to meet Liga NOS giants asking price of £70m for key man Release Chelsea starlet reportedly on verge of joining Newcastle United Arsenal keen to bolster attack by signing £90,000-a-week Barcelona youngster Emery reportedly wants to sign released PSG defender for Arsenal Chelsea to receive big offer from Bundesliga giants for talented winger European giants may abandon their pursuit of £200,000-a-week Man United star Klopp wants to keep £90,000-a-week central defender at Liverpool Arsenal passed up brilliant chance to bring International No.7 star to Emirates Out-of-favour Liverpool midfielder unlikely to stay at Anfield beyond summer Gibfootballshow is a football website founded by myself…Andrew Gibney in October 2009. All Rights Reserved Gibfootballshow.com
cc/2019-30/en_middle_0028.json.gz/line1594960
__label__cc
0.653286
0.346714
Glee snags 19 Emmy nominations tags: awards, Emmys, nominations [picapp align=”center” wrap=”false” link=”term=glee&iid=8961212″ src=”http://view1.picapp.com/pictures.photo/image/8961212/glee-live-concert-radio/glee-live-concert-radio.jpg?size=500&imageId=8961212&#8243; width=”500″ height=”333″ /] Update: Although this post originally listed 20 Emmy noms, I’ve been informed that the nomination for Outstanding Creative Achievement in Interactive Media – Fiction (Glee Hyperpromo and Superfan) doesn’t actually count as a Glee nod, as it’s technically done by the marketing company, not anyone on the Glee cast or crew. Be it 19, or 20, congrats to Glee all the same. First off, my apologies to my readers for being M.I.A. as of late! Full-time job + finishing off the book = one very overworked girl. But it’s a big Glee news today, so I had to give you all the details on Glee‘s 19 Emmy nominations! The noms were announced this morning and what a huge honour for Glee to be recognized so many times over! Some of the nominations were to be expected, but there are a few pleasant surprises in here as well. Here’s the full list of Glee‘s 19 nominations in 15 different categories: Outstanding Lead Actor in a Comedy Series (Matthew Morrison) Outstanding Lead Actress in a Comedy Series (Lea Michele) Outstanding Supporting Actor in a Comedy Series (Chris Colfer) Outstanding Supporting Actress in a Comedy Series (Jane Lynch) Outstanding Casting for a Comedy Series Outstanding Guest Actor in a Comedy Series (Mike O’Malley for “Wheels” and Neil Patrick Harris for “Dream On”) Outstanding Guest Actress in a Comedy Series (Kristin Chenoweth for “The Rhodes Not Taken”) Outstanding Directing for a Comedy Series (“Pilot” and “Wheels”) Outstanding Writing for a Comedy Series (“Pilot”) Outstanding Costumes for a Series (“The Power of Madonna”) Outstanding Hairstyling for a Single-Camera Series (“The Power of Madonna” and “Hairography”) Outstanding Makeup for a Single-Camera Series [Non-Prosthetic] (“The Power of Madonna” and “Theatricality”) Outstanding Art Direction for a Single-Camera Series (“Pilot”) Outstanding Sound Mixing for a Comedy or Drama Series [1-hour] (“The Power of Madonna”) Congratulations to the cast and crew of Glee for completely rocking the Emmy noms! The full list of nominations is available here. And to see who wins what, be sure to tune into the awards ceremony on Sunday, August 29 at 8 p.m. EST on NBC. from → News ← Is a Glee movie trilogy in the works? Glee returns on September 21! → Glee brings home 4 Emmys and rocks the intro number « Gleeks United
cc/2019-30/en_middle_0028.json.gz/line1594963
__label__wiki
0.607929
0.607929
You are here: Home Page > Arts & Humanities > Philosophy > History of Western Philosophy > 19th Century Philosophy > Hegel: Lectures on the History of Philosophy 1825-6 Hegel: Lectures on the History of Philosophy 1825-6 Volume I: Introduction and Oriental Philosophy Edited and translated by Robert F. Brown Brown Hegel Lectures Notable work by one of the great philosophers, unavailable elsewhere Accurate new translation with detailed editorial matter Identifies and discusses the many sources that Hegel drew upon - both primary sources from the past, and the works of his contemporaries Hegel's lectures have had as great a historical impact as the works he himself published. Important elements of his system are elaborated only in the lectures, especially those given in Berlin during the last decade of his life. The original editors conflated materials from different sources and dates, obscuring the development and logic of Hegel's thought. The Hegel Lectures series is based on a selection of extant and recently discovered transcripts and manuscripts. The original lecture series are reconstructed so that the structure of Hegel's argument can be followed. Each volume presents an accurate new translation accompanied by an editorial introduction and annotations on the text, which make possible the identification of Hegel's many allusions and sources. This new edition of Hegel's Lectures on the History of Philosophy sets forth clearly, for the first time for the English reader, what Hegel actually said. These lectures challenged the antiquarianism of Hegel's contemporaries by boldly contending that the history of philosophy is itself philosophy, not just history. It portrays the journey of reason or spirit through time, as reason or spirit comes in stages to its full development and self-conscious existence, through the successive products of human intellect and activity. These lectures proved to be extremely influential on the intellectual history of the past two centuries. They are crucial to understanding Hegel's own systematic philosophy in its constructive aspect, as well as his views on the centrality of reason in human history and culture. Volume I holds additional importance because, as well as setting out Hegel's discussion of the history of Chinese and Indian philosophy, it presents the interesting and significant changes that Hegel made to the stage-setting introduction to these lectures across the years from 1819 to 1831. This edition adapts the considerable editorial resources of the German edition that it translates, to the needs of the general reader as well as the serious scholar, so as to constitute an unparalleled resource on this topic in the English language. EDITORIAL INTRODUCTION THE LECTURES OF 1825-6 1a. The History of Philosophy as a Philosophical Topic Introduction 1b. The Divisions of the History of Philosophy and the Literature on It 2. Oriental Philosophy 2b. Chinese Philosophy 2c. Indian Philosophy INTRODUCTIONS TO THE OTHER LECTURE SERIES 1. Explanation of Editorial Practices 2. The Introductions 2a. The 1819 Lectures 2b. The 1820-1 Lectures 2c. The 1823-4 Lectures 2d. The 1827-8 Lectures 2e. The 1829-30 Lectures 2f. The 1831 Lectures BIBLIOGRAPHY OF HEGEL'S SOURCES FOR THE INTRODUCTION AND ORIENTAL PHILOSOPHY Robert Brown is Professor Emeritus at the University of Delaware. Hegel: Lectures on the History of Philosophy Robert F. Brown Brown Hegel: Lectures on the Philosophy of Art Robert. F Brown At the Edges of Thought Craig Lundy and Daniela Voss Chad Hillier and Basit Koshul Hegel: Lectures on Natural Right and Political Science J. Michael Stewart, Peter C. Hodgson, and Otto Poggeler Sikh Diaspora Philanthropy In Punjab Verne A. Dusenbery and Darsham S. Tatla Hegel: Lectures on the Proofs of the Existence of God Peter C. Hodgson Narrative, Identity and the Kierkegaardian Self John Lippitt and Patrick Stokes Indian Philosophy: A Very Short Introduction Sue Hamilton Robert F. Brown Kierkegaard: A Very Short Introduction Patrick Gardiner Return Statements Gregg Lambert Hegel:Lectures on the Philosophy of Religion Marx: A Very Short Introduction Counsel for Kings: Wisdom and Politics in Tenth-Century Iran L. Marlow Arts & Humanities > Philosophy > History of Western Philosophy > 19th Century Philosophy Arts & Humanities > Philosophy > Non-Western Philosophy > Arabic & Persian Philosophy
cc/2019-30/en_middle_0028.json.gz/line1594964
__label__cc
0.59551
0.40449
Talk:Oola's Lab On level 2 there are bosses like Malfunctioning Regulator etc. Can someone add them. - Sav 11:31, 3 September 2007 (CDT) I don't know if we are supposed to put hidden dwarven ghosts in the npc's list, but there's one by the second resurrection shrine on level 1 that can be revealed using Light of Deldrimor. --Loonsbury 09:27, 6 September 2007 (CDT) 1 SWEET 2 Iron Forgeman/Forgemen 3 Secret Passage 4 3 profession golems? 6 Through the water... 7 Bug? 8 Xian 9 To Make Life Easier.... 10 Eh? 11 No Key Drop 12 Ha ha 13 Hidden Treasure SWEET[edit source] I love how the matrix does 1337 dmg to foes in the area. Thats Leetness right there. As "leetness" is synonymous with "internet nerd stupidity", I'd have to say that I agree with you. Iron Forgeman/Forgemen[edit source] I think that the one in Sorrow's Furnace was created at that location; there are a number of random idle quotes in there that lend to that assumption. The Dredge slaves say "Beware the Iron Forgeman at the center of this place. He was created with the most foul and evil of magics" Or something like that. How would the Dredge know, if they didn't witness it being built with their own eyes? The Stone Summit sure wouldn't tell them about it. And, I doubt that they would go all the way to the Tarnished Coast to hire Oola to make one for them. They are "Xenophobic Dwarves" rememer? Why would they deal with Asura? (T/C) 20:57, 9 September 2007 (CDT) Also is it a play on the Four Horsemen(of Apocalypse)? Talos935 17:37, 11 September 2007 (CDT) Secret Passage[edit source] Found a secret passage on the second level. It had a hidden switch near the boss that had to be brought down with the matrix flux or whatever it was. Nothing but a nice trip there tho, no nice loot :( Shai Meliamne 16:42, 10 September 2007 (CDT) I suspect there is one on the first level too. If you approach the wall behind the first boss, you can see several thorn beetles beyond, but there doesn't appear to be a means of getting to them. There is the start of a hidden side passage in the last chamber, but it becomes too narrow to pass. SarielV 02:57, 13 September 2007 (CDT) see List of hidden objects -- Xeon 04:30, 13 September 2007 (CDT) 3 profession golems?[edit source] Just saw a malfunctioning golem casting in this order "Enraging Charge/Attackers Insight/Conjure Flame". Warrior/Dervish/Elementalist anyone? --Cosmitz 14:04, 15 September 2007 (CDT) I can confirm this with a second triple profession combo, "Blinding Flash/Mystic Twister/Desperation Blow". Which would also be the result of Warrior/Dervish/Elementalist. Questions[edit source] What does the ring around the golems do? (e.g. after you kill a regulator golem) Does the water comming down out of the pipe to the left as you go up the stairs at the boss extinguish you? Inquiring minds want to know. Bsinkk 23:21, 17 September 2007 (CDT) I think the rings provide protection against flame darts. I'm not sure, but I saw it during the TPS Regulator. Flame darts stopped when I killed off both Guardians, and we stood inside of the ring, and never got shot at during the whole time. Through the water...[edit source] In Level 2, we just ran through the water area. Does anyone know how you SHOULD do this? The destruction depths way did no work since the shield golem was malfunctional and attacked us. -- numma_cway 12:37, 18 September 2007 (CDT) Dunno how it SHOULD be done, but hugging the wall on the right will yield a dungeon map and very few missiles that hit Shai Meliamne 21:48, 16 October 2007 (UTC) Bug?[edit source] October 28. Our golem gets to the door, but does not open it. You talk to it, and you move to the sentry golem you just passed (by the door). "Invalid Command" is the answer. Bug? It is a bug I would say, as this just happened to my party. Had to return to Rata Sum and do it again. No idea what could cause this, but it really sucks when it happens. Jaxgreystar 20:15, 15 November 2007 (UTC) Just another bug, was in HM to do Oola's lab and there was no way to pass trough door of first level, not the slightest foe remaining and none dropped key !!! (NB. Blimm's quest was active, dunno if it's related). Anyway plain f****ng waste of time, thanks (once again) a.net... Xian[edit source] Xian is a boss but doesn't count for boss bounty, bug? Lyra Valo 17:48, 22 November 2007 (UTC) I think that's because you don't kill her/him. I did Oola's lab a while ago but from how I remember it, I thought we beat her/him down then they say something then just dies. However I could be wrong so take what I say with a grain of salt --Blue.rellik 03:39, 23 November 2007 (UTC) Unfortunately, you don't get to do the 'killing blow' in all fights with him; after taking his HP down to zero for the last time, he says something, turns non-hostile and *then* dies... since he's not flagged hostile at the point of death that can explain why no boss bounty -- Xiu Kuro (talk) 06:05, 28 November 2007 (UTC) To Make Life Easier....[edit source] Bring Sf ele with Meteor shower. Makes life much easier.Coolritualist 22:13 2 February 2008 (UTC) That never would have occurred to me. MS on a SF nuker in pve... wow. Hey, what about bringing two or three? Would that work too? 03:14, 3 February 2008 (UTC) Suppose you could bring SS necro too.Coolritualist 22:19 2 February 2008 (UTC) I think that bringing monks makes this mission much easier... --Cobalt | Talk 12:09, 3 February 2008 (UTC) I brought 4 hench monks. :p Coolritualist 07:54 3 February 2008 (UTC) liar, there's only 2 monk henchmen 81.79.13.78 16:55, 4 May 2008 (UTC) I detect a lot of epic sarcasm here MangleD 01:21, 29 July 2008 (UTC) Lina and Mhenlo, mrite? Don't confuse Henchman with Hero. --- -- (s)talkpage 01:42, 29 July 2008 (UTC) For anyone that needs help, I recommend bringing all three hero necros as minion masters, along with setting yourself up similarly. Four minion masters. It's Da Bomb!:oP --OBloodyHell 21:17, 28 January 2009 (UTC) Except that few mobs there have bodies :O75.92.46.118 22:38, 28 January 2009 (UTC) So, sarcasm and absurdist humor is lost on you, then? :oP Hint you probably should have picked up on: There probably isn't a single location in GW where there are enough corpses to use four minion masters sensibly. Certainly not enought to justify them instead of some other party build. ;-) --OBloodyHell 22:53, 28 January 2009 (UTC) Four minion masters is kind of overkill in Vizunah Square, but if you have enough players, you can get minions for all of them. Then again, if you have enough players that you can fill out everything else with heroes, the mission is pretty easy by a lot of different tactics. Quizzical 23:29, 28 January 2009 (UTC) Eh?[edit source] The golems drop a fairly large number of Golem Runestone in this dungeon, making it an excellent place to farm Granite Slabs, which they salvage into. --- changed away from: The golems drop a fairly large number of Golem Runestones in this dungeon, making it an excellent place to farm Granite Slabs, which they salvage into. I think the latter is correct, but I'll let someone else decide. NBD either way. —The preceding unsigned comment was added by OBloodyHell (contribs) . The latter is more correct. I overlooked that when I edited the article. (T/C) 23:43, 29 January 2009 (UTC) Of course it's correct, I made that edit myself :P King Neoterikos 00:54, 30 January 2009 (UTC) No Key Drop[edit source] Just had this happen on level 1! Pls add to bugs section. Phaw, peeefed resigner Klefer 07:36, November 9, 2009 (UTC) Ha ha[edit source] I quote from GWW: "On the second level, the Dwarven Ghost acquired from the first shrine will attack and kill fire traps. You can deal AoE damage to the fire traps after the Dwarven Ghost has begun attacking them." It truly is a new low. A F K When Needed 19:27, June 4, 2010 (UTC) Hidden Treasure[edit source] The level 3 hidden switch described as follows: *There is a secret switch behind the small lava pool directly in front of you as you enter the level. This opens a room behind the area map. This passage contains a Dwarven ghost and 1-2 hidden treasures. Opened a door that gave me 4 treasures and 1 ghost for my first run in the dungeon. Do repeated runs cause number of hidden treasures to diminish? Separ 21:09, 25 March 2012 (UTC) No, the number of available treasures is always the same. However, in the past, many possible treasures failed to ping or even appear, so people were unaware of them and the article was probably written before the LoD mechanics were adjusted. 75.37.21.54 08:08, 26 March 2012 (UTC) Retrieved from "https://guildwiki.gamepedia.com/index.php?title=Talk:Oola%27s_Lab&oldid=1626339"
cc/2019-30/en_middle_0028.json.gz/line1594969
__label__cc
0.645223
0.354777
Do You Know Oleg Losev? An Engineer Tragically Ahead Of His Time It is so often the case with a particular technological advance, that it will be invented almost simultaneously by more than one engineer or scientist. People seem to like a convenient tale of a single inventor, so one such person is remembered while the work of all the others who trod the same path is more obscure. Sometimes the name we are familiar with simply managed to reach a patent office first, maybe they were the inventor whose side won their war, or even they could have been a better self-publicist. When there are close competitors for the crown of inventor then you might just have heard of them, after all they will often feature in the story that grows up around the invention. But what about someone whose work happened decades before the unrelated engineer who replicated it and who the world knows as the inventor? They are simply forgotten, waiting in an archive for someone to perhaps discover them and set the record straight. [Oleg Losev] (Public domain) Meet [Oleg Losev]. He created the first practical light-emitting diodes and the first semiconductor amplifiers in 1920s Russia, and published his results. Yet the world has never heard of him and knows the work of unrelated American scientists in the period after the Second World War as the inventors of those technologies. His misfortune was to born in the wrong time and place, and to be the victim of some of the early twentieth century’s more turbulent history. [Oleg Losev] was born in 1903, the son of a retired Russian Imperial Army officer. After the Russian Revolution he was denied the chance of a university education, so worked as a technician first at the Nizhny Novgorod Radio laboratory, and later at the Central Radio Laboratory in Leningrad. There despite his relatively lowly position he was able to pursue his research interest in semiconductors, and to make his discoveries. Losev’s LED When experimenting with a point-contact semiconductor junction on silicon carbide and zinc oxide crystals, he observed a greenish light emission from the junction. This had been observed before but not characterised, and he was able to prove that it was not a thermal effect before postulating that it might have its source in a quantum mechanism. He continued to work on the effect, but because of the chosen semiconductor materials he was unable to significantly increase its light output. Without enough intensity to rival other lamps of the day it failed to attract enough interest despite his publishing multiple papers detailing his work and its applications. It was left to [Robert Baird] and [Gary Pittman] at Texas Instruments in the 1960s to pick up the baton with their infra-red LED, and for [Nick Holonyak] at General Electric to produce one with visible light shortly afterwards. Semiconductor Amplifiers And More An oscillator built to [Losev]’s zincite negative resistance diode design. Hugo Gernsback [Public domain] The detectors in many radio receivers of the day were simple “Cat’s Whisker” devices, point contact diodes where the junction was formed between a piece of wire and a naturally occurring crystal. It had been noticed that when a DC bias was used with these devices to overcome their forward voltage drop and make them more sensitive, it could occasionally cause the circuit to oscillate. [Losev] became interested in this phenomenon, and identified it as negative resistance, a semiconductor property whereby the curve has a region that behaves opposite to Ohm’s Law with current through it decreasing as voltage increases. He was able to make reliable negative resistance diodes using zinc oxide crystals, and to configure them as oscillators and amplifiers in the same way as we might now with a more recent tunnel diode. As well as oscillators and amplifiers he created solid state radio receivers, both regenerative and superhetrodyne, several decades before [John Bardeen], [William Shockley], and [Walter Brattain] invented the first transistor at Bell Labs in 1948. The Soviet authorities did not see the potential in this most exciting of inventions because [Losev]’s diodes could not replicate the performance of the tubes of the day, so given that the zinc oxide crystals were an expensive import from the USA the project was shelved. It was left to [Leo Esaki] at Sony in 1957 to rediscover negative resistance diodes with his discovery of electron tunneling, for which he later received a Nobel Prize. [Losev]’s tale is a succession of moments of what might have been. He found himself trapped in Leningrad, now St. Petersburg, when it was besieged by the Germans in 1942, and like many others in the city he died of starvation. It is reported that before his death he was working on a three-terminal semiconductor amplifier device, which might have delivered the transistor to the Soviets years before it was invented by the Americans. If [Losev]’s story has interested you, have a look at our profile of another largely unsung hero of early electronics: [Rufus Turner]. Posted in Featured, History, Original Art, Parts, SliderTagged led, Losev, negative resistance, Oleg Losev, Tunnel diode ← One Soldering Controller To Rule Them All Move Over Baofeng, Xiaomi Want To Steal Your Thunder → 72 thoughts on “Do You Know Oleg Losev? An Engineer Tragically Ahead Of His Time” nsayer says: This story reminds me of Ayn Rand’s novella Anthem. The protagonist lives in a society so socialist that their vocabulary has lost singular pronouns. The society is lit by candles and he goes off on his own (crime number one) and invents (crime number 2) a light bulb. He returns and shows his work to the leaders and their response is that the light bulb would ruin their candle industry, and that they can’t look past his crimes in coming up with it. afraid2poop@school (@a2pas) says: While his experiments may have been in keeping with the scientific journalism word game, his results weren’t practical. This story (scientist comes up with X years prior to the more recognized discovery of practical X) repeats itself in capitalist societies, mind you. Would probably blame timing and not some Ayn Rand delusion. Megol says: Yes that sounds like Ayn Rand. Don’t know what it have to do with this topic, I could find better likenesses in amateur Mary-Sue stories (and generally get a better story than the idiotic crap Ayn Rand produced). TheRegnirps. says: Smells like a virtue signal. Yeah. Living by reason is terrible when you can rely on the Force or STNG philosophy. She must have been a moron. The problem with anyone who declares themselves as “living by reason” is the verification of their own premises, which necessarily happens through a process of reasoning that your reasoning is reasonable. As you already declare yourself reasonable, you cannot come to any other conclusion than “I must be correct”. Ayn Rand never did solve the is-ought problem. She simply took the utility of absolute selfishess as an “objective fact”, ignored any contradicting evidence or argument, and turned it into a moral maxim as if it was a law of God. Then she wrote miles of boring prose for strawmen that expose why she is right – if everyone just behaved like sociopaths, like they should. Yes, I understand. Post-modern philosophers say it is all wrong with nothing to offer but relativism. And it isn’t so simple as “law of God”. There are crazy axioms like: existence exists and what is is, or A is A as the objectivists like to say. The rest you must be getting from the fiction or second hand from some professor. I don’t follow. The “sociopath” is apt if you mean anti-socialism. Otherwise, I assume it is a misrepresentation of “selfishness”. What used to be called enlightened self interest. Are you selfless? “Post-modern philosophers say…” You don’t have to bring postmodernism into it. Just observe points like the selfish gene: the individual person being the unit of evolution creates paradoxes and inefficiencies that, as they are attempted by organisms will simply get weeded out by natural selection. That has resulted in the evolution of unconscious altruism – not because it’s a universally correct state of being, but because it’s a possible state of being. That also means the preferences and attitudes and reasons we have are not our own doing and reasoning, but at least partially inherited from our biological past – and some we inherit from our culture – what people like Jung would have recognized as the “collective unconscious”. There’s scarecely an original idea in anyone, except by coincidence and accident. Ex nihilo nihil fit – you aren’t really the author of even your own thoughts. Then the question becomes, who is the self that is interested? Whose interest do you serve if all your reasons are not your own doing? You want to eat to survive, but why do you want to survive? What’s the point of it? Since you can’t ascribe your genes, the law of physics, or the immaterial phenomenon of culture any mind or reason, then you’re in trouble identifying the object of this “enlightened self-interest”. So am I selfless? Well, you tell me who exactly I am, and we’ll see. Mistaking the interested being to be the individual person like Ayn Rand does with her Rational Egoism, is not enlightenment but ignorance to the point of extreme narcissism – hence why the accusation of sociopathy. And there’s nothing wrong with relativism. Simply because something is subjective doesn’t make it unreal or something to be ignored. If it has an effect, it exists. We do not need to derive our morals from “objective” universal absolutes, moreso because it happens to be impossible thanks to Hume’s guillotine. Or to be more precise: Rand maintains that a rational man holds his own life as his highest value, rationality as his highest virtue, and his happiness as the final purpose of his life. She argued it is both irrational and immoral to act against this maxim, and this can be discovered by the rational observation of the nature of reality itself. Meanwhile Hume points out that you can’t actually draw any such rational conclusions – what is cannot dictate what ought to be, which makes Rand’s proposition thoroughly irrational. Wow. And that is why math works. You should have had some classes with David Berlinsky in your formative years. Or maybe not. Collective unconscious? Well, beards and goatees are back, so why not? >”Collective unconscious? Well, beards and goatees are back, so why not?” Of course course Jungian psychology is generally speaking bunk, but the concept remains: the collective unconscious is the set of instincts and attitudes which we inherit from other people, which combine with our direct personal experiences to ground the symbols that we use for rational thinking. Without that non-rational ground of the unconsious, all our rational thinking would be about nothing at all: just a mindless manipulation of symbols that refer to other symbols that refer to other symbols, and we would be like computer programs. Actually, we wouldn’t be at all because there would be no reason to act: without the “animal drive” we would not be making up symbols to manipulate in the first place. So when Rand is saying “a leaf can’t be all red and green simultaneously” to argue that all things are either this or that but not both, she’s using symbols that are grounded in her subjective experiences of color that makes those symbols logically exclusive. To her a leaf can’t be “green” and “red” at the same time because she cannot concieve the experience, yet without that special consideration there is no rational reason why “red” and “green” couldn’t apply at the same time. In fact a leaf can be simultaneously all red and all green – we call that experience “yellow” or “brown” – and in any case, colors do not actually exist. They’re not objective facts of nature. When you look at what’s actually -objectively- there, independent of your society, culture, your person, your sensory organs etc. almost everything about reality dissapears. In this way, Rand’s whole philosophy is elevating subjective experiences and inferences about the world into the status of objective reality, almost as if she didn’t consider or think it possible to have any other mind than her own – which is a classical sign of a sociopath. That was awesome. Best summary and insight, well done sir. JIm B says: “Smells like a virtue signal” Oh, boy. Nobody can sincerely disagree with you. They must not really mean what they say and are probably just saying it for effect. Is that your claim? Well, Spock, he who lives solely by reason, let me tell you you are unreasonable (and uncharitable) to assume you are the only person who has reasons for what they believe. Spock is an altruist, with the sacrifice of the few for the good of the many. He is also the figment of a writer’s mind. You can have reasons for “altruism” but they will be selfish. >”You can have reasons for “altruism” but they will be selfish.” You can also have no reasons for altruism, and yet it exists. Nature doesn’t do things for reasons, because it does everything that is possible – what remains is the result of that which wasn’t. This is precisely how socialism worked. In Poland under Russian occupation it was mandated by the party what you could do and how you did it. Some ambitious people tried to innovate, but they were simply crushed by the machine. Russians forced Comecon asset and industry segmentation on all occupied territories, everything managed by decrees. Computers – forced RIAD (ibm 360 ripoff/clones) and killed homegrown designs like mentioned last week K-202 (faster/smaller/cheaper, designer ended up raising pigs on a farm). Cars – again killed or stole good designs, Polish FSO Warszawa 210 prototype was shipped to Russia to become Volga GAZ-24… Soviet socialism was basically just pure machiavellism – its purpose was to prevent the accumulation and concentration of wealth and power in the Soviet vassal states that the Russian elite were using as their source of resources. They deported people across the union to break up national and ethnic identities, forced everyone to adopt the Russian language, destroyed culture and heritage, they murdered intellectuals, engineers, academics, philosophers, artists… all to break the spirit of the subjugated people and put them into a position where they had no individual power or collective organization to negotiate with the central government and threaten the elite rule. That’s why people complain that the Soviet Union wasn’t really socialism/communism, but simply fascism under another flag. Drone says: Gee, sounds just like the good old U.S.A. – today. Steven-X says: Sounds a lot like the snowflakes at our college campuses. And marx/English advocated things like genocide. Just because Hitler and Stalin used similar tactics didn’t make them mates Yep, and Lenin developed Marxism to the point of “vanguard communism” which finally turned it into the self-righteous elitist rule that ultimately doomed it to corruption. >”Just because Hitler and Stalin used similar tactics didn’t make them mates” True, but the Molotov-Ribbentrop pact did. rhyolite says: Had he been an inventor in the US, he would have probably ended up working for Edison or an industrial corporation and in either event would have signed away his rights for the invention to a corporation. At best, he would get a tie pin from corporate office, an award dinner and $250. He would be patted on the back, and told, “attaboy, back to the labs now sonny”. https://en.wikipedia.org/wiki/Oleg_Losev Winston says: “given that the zinc oxide crystals were an expensive import from the USA” Are zinc oxide crystals really that hard to grow? in sufficient size, yes. They probably imported zincite (is that the english term) from the US. It isn’t too common. Steve Greenfield says: No, it’s steam engine time. http://www.noahbrier.com/archives/2011/11/steam-engine-time/ Thanks for the link! Will remember! No it’s not about who invented it first – it’s about who had the money and Greedy Lawyers to PATENT IT FIRST! Just read up on the Leningrad siege. What a terrible crime by my German ancestors. Unbelievable. Did you read about the bombing raid on Germain cities during WWII? And also about those on Tokyo during the same war? Wars are always terribles crimes. Strange response. Aggressor versus defender. The one who initiates the use of force is in the wrong. Kris Lee says: Soviet Union was as much aggressor as was the Third Reich at time. Unfortunately they were allowed to keep their practice after the war and that took life of additional multiple millions through murder and slave labor. I still pity the innocent people both sides who were the receiving end of this terror. it wasn’t that simplistic, going by your own logic of aggressor vs defender: to understand WW II, and the interbellum period, you first need to understand how germany was treated after it’s defeat in WW I, and the exact cause of WW I is a lot less clear cut… I agree with jacques1956: “Wars are always terrible crimes” Troepje says: History is written by the victors. The lesson is, always fight until unconditional surrender. Still being learned quite regularly. nombondeye says: this seems comically simplistic, is it an objective truth? Some things are that simple. Can you think of an exception? “Wars are always terribles crimes.” WRONG Jacques. WAR is all about ONE thing – WINNING! Winning as fast as possible with minimal loss of life and treasure on either side. Anything in-between turns into a politically-correct endless source of suffering for all involved. At least that’s the way it used to be… dodoburdeo says: If it makes you feel any better..what Japan did to China was ‘worse (unit 731 etc)’, and i would say that to this day, Germany still gets painted as the worst(near only) criminal, for politcal reasons more than anything else.. dont you feel better already Jeremy Hong says: Without the US nuking Japan, I would not be here today. As the son of South Korean immigrants, I am eternally grateful the US for liberating Korea from Japanese rule. If the war was prolonged and ended in a conditional surrender, the Korean culture would cease to exist. US did NOT liberate Korea, Japanese withdrew after the peace treaty was signed. Japan capitulated after USSR declared war on it and liberated Manchuria. That, together with US killing about 150 000 people (mostly civilians) with 2 atomic bombs, compelled Japan to surrender. Reading Western sources you could really get the idea that Soviets and Chinese did not even fight, yet they are responsible for tying and destroying 80% of Axis forces. And for suffering most losses. dolphus says: I’m always mystified as to why Jung is credited with ‘synchronicity’ instead of Twain. Sure, he invented the word, but Twain beat him to the definition. https://books.google.com/books?id=GqulygpdlxoC&lpg=PP1&dq=The%20Science%20Fiction%20of%20Mark%20Twain&pg=PA96#v=onepage&q=mental%20telegraphy&f=false Brian Benchoff says: Oh cool, rutigrem changed his name. Wonderful. echodelta says: It could be common access on our innernet. Juris says: Although it might not be the case here, I m always reading historic revelations with certain portion scepticism. There always will be someone who did the thing even earlier or did the same thing even better. On other hand, there is this famous quote of Albert Einstein: “The secret to creativity is knowing how to hide your sources.” That quote is probably BS. http://quoteinvestigator.com/2014/06/01/creative/ +1 You do much better if you have a theory that others can expand on or use to explore. “It was left to [Robert Baird] and [Gary Pittman] at Texas Instruments in the 1960s to pick up the baton with their infra-red LED, and for [Nick Holonyak] at General Electric to produce one with visible light shortly afterwards.” Pick up the baton is pretty strong. It directly implies they read his papers and continued from there. Though, they certainly might have. If he made Superhet and Regenerative Rx’s (20 year old ideas by WWII) with his diodes, I’m really surprised they didn’t go anywhere. Were they delicate and could not be moved? Sad story, “people’s revolutions” often turn out to be self inflicted cultural and scientific lobotomies, the same happened in Asia in more than one country. If Losev had the opportunity to go West history could have been very different. Then again if he ended up in German and they got the transistor in the 40’s that could have been a very bad thing. Computer guided V3 missiles over London etc…. Depends. Kondrad Zuse built the first computer even before the allies did, using old propaganda film reels for the memory tapes, and used the machine to solve aerodynamics equations. Nobody on the German side took notice because they didn’t see the value of it. https://en.wikipedia.org/wiki/Z1_(computer) He was brilliant, but his inability to promote his work doesn’t prove that others would too. It is just as likely that the information would have fallen into the hands of somebody more industrious. Well, the German military funded the development of the Z2 and Z3 computers, which meant that people pretty high up the ladder were aware of the project, but it was eventually declared “strategically unimportant”. The Z3 prototype was destroyed in a bombing raid. Zuse also built the S1 and S2 computing machines which were used on guided glider bombs. I mean somebody such as Günther Quandt. One word, Lysenkoism, https://en.wikipedia.org/wiki/Lysenkoism It is now called Climate Change If you built it, they will come. V2 was directed by an analog computer doing inertial nav. Yup and that led to the USA space program, so I’m saying imagine Apollo level tech in the hands of Nazi Germany. See what I mean? Ostracus says: The plot for an alternative history book. That would be cool if you wrote it so that it had a tree structure, or multiple paths like a choose your own adventure. evad says: Revolution… another word for a circular path, to return right back to where you began. Bird with one wing is doomed to fly in circle. Why does that seem to be repeated again and again in the story and the comments, “There is no value to that”. Makes you wonder what “worthless” technologies are languishing in labs around the world because they are of “no value”? e says: Are you referring to the scientists and their work at the US EPA, or vaccine preventable diseases of early childhood and the review of immunization programs now underway in the US? or of concepts, inventions or ideas that simply needed material advancements or sufficient processing power to work. For an impractical example, most of the failed aircraft designs of old that we laugh at, could be made functional now with stronger materials, much higher density power sources and a few minor design tweaks. I bet there’s lots of mechanical oddities still that could be done electromechanically, or other concepts where the idea was useful but the implementation was way off base-like the gems dug up on The White Rabbit Project. We thought mobile phones would be long range radio but it was cell technology that changed things. Navigation straight outta the Batmobile has been common for decades thanks to GPS. I fly model aircraft that simply could not move under their own power without modern battery chemistries and lightweight plastics and foams. Ideas that “almost” worked in the dustiest bins of patent offices worldwide, should be reexamined. Oscar says: Wowww… The posts get deep… Anyway, has someone here heard of Leonardo Torres Quevedo? Is he that swordsman who is looking for the man who killed his father? notarealemail says: http://tvtropes.org/pmwiki/pmwiki.php/Main/MyNameIsInigoMontoya muhigs says: Hehehe, nice, man, very nice. The princess bride, I guess… Not too much time ago I watched again on tv. I remember well this character. Hehe, very nice. But, no, I made reference to a different guy, just because the topic was about being ahead of one’s own time. http://ieeexplore.ieee.org/ieee_pilot/articles/96jproc01/96jproc01-scanpast/figures.html Just to give an example. Maybe you know IEEE. Nonetheless, it is up to you to look on internet for more information about him and his achievements. The IEEE info is cool! ‘Course Tesla beat him to it in 1898, but synchronicity and whatnot :) He was also a pioneer in computing. distefanom says: To be a successful man, one have to make a 3 input LOGICAL AND: Be the RIGHT MAN (1), at the RIGHT MOMENT (2) in the RIGHT PLACE (3) If ONLY ONE of these inputs is 0 (zero), THEN the output will be ZERO sounds LOGICAL /NOT a similar story. Fascinating experiments using crude materials of the times. https://en.wikipedia.org/wiki/Jagadish_Chandra_Bose#Place_in_radio_development
cc/2019-30/en_middle_0028.json.gz/line1594971
__label__wiki
0.569512
0.569512
DEVELOPING: Governor Gavin Newsom Tells ‘Women Seeking Abortions’ to Come to California Far-left Governor Gavin Newsom “welcomed women seeking abortions” to visit California Friday after Louisiana became the latest conservative state to pass pro-life legislation that limits abortions after six weeks of pregnancy. “Newsom signed Friday what he calls a ‘Proclamation on Reproductive Freedom.’ He says it reaffirms the state’s commitment to protecting women’s reproductive choices, educates Californians about their rights to reproductive freedom, and welcomes women to the state to exercise that right,” reports CBS Sacramento. “Among other things, the proclamation talks about reproductive services already available to California women, including state-funded abortion services for low-income women,” adds the article. Newsom’s full proclamation can be found here. In addition, the Governor joined the leaders of Washington and Oregon and released a joint statement calling for the codification of “reproductive freedom” laws. “In the absence of federal leadership on this issue, states must step up and put in place their own protections – both in statute and in their state constitutions, and through the expansion of family planning and education – to defend every American’s right to reproductive freedom,” write California Governor Gavin Newsom, Oregon Governor Kate Brown and Washington Governor Jay Inslee. “Roe is settled law, but newly enacted and clearly unconstitutional laws in a handful of states compel our states to act now to reaffirm longstanding commitments to safeguard the fundamental rights of women.” “In California, the fundamental right to choose to bear a child or to choose to obtain an abortion is the official public policy of the State, protected in both our constitution and by statute. And today, we issued a California Proclamation on Reproductive Freedom, reaffirming our commitment to protecting women’s reproductive choices, educating Californians about their rights to reproductive freedom, welcoming women to California to fully exercise their reproductive rights, and acting as a model for other states that want to ensure full reproductive freedom for women,” adds the letter. Read the full report at CBS Sacramento. AMERICA FIRST: Trump Stands for 90 MINUTES to Shake Hands with 1,000 Cadets at Graduation NEWSOM’S NIGHTMARE: White House to ‘TAKE BACK’ $2.5 BILLION from California After Failed Rail Project NEWSOM’S NIGHTMARE: President Trump Claws Back $1 BILLION from California After Epic Rail Project Failure CALIFORNIA CHAOS: Gavin Newsom Calls for Free Healthcare for Region's ILLEGAL IMMIGRANTS
cc/2019-30/en_middle_0028.json.gz/line1594974
__label__wiki
0.532669
0.532669
#noregrets Kendall Jenner shares her favorite flirtation move and it's adorably old school Loreen Sarkis/Getty Images Pay attention guys…Kendall Jenner shares her favorite pickup move and it’s pretty much an old movie staple. Usually it’s male celebrities who share their favorite pickup lines, or the cheesiest things they’ve done to get a girl’s number, but Jenner is ready to share hers. Okay, technically it’s not her pickup line, and it’s a move, but she would like guys to know this about her. The 21-year-old model is one hot lady, but she’s not taken — at least not yet — so she has time to think about what move she’d want someone to try someday. Spoiler: it’s super easy and pretty cheesy. Recently the Keeping Up With the Kardashians star took to her blog and created a post titled, “The Cheesy Pickup Line That Would Work On Me.” So what is this line? Well, it’s a move and you already know it…we swear. "I know it’s super corny and not technically a 'line,' but I totally love the classic movie-theater-yawn-reach," Jenner revealed on her blog. "I would kind of love it if a guy did this to me, lol." Who knew the young starlet was so sentimental? It does work though, so who are we to judge?! Jenner even shared a clip from Grease, you know which one we’re talking about, to prove her point. It’s the “Sin Wagon” clip from the iconic movie when Danny and Sandy are at the drive-in and Danny just really goes for it. In his case it’s a bad call, but they end up together in the end, so it’s not all bad. Maybe this wasn’t the best choice to prove your point, Kenny, but we do like your classic retro movie style take on romance.
cc/2019-30/en_middle_0028.json.gz/line1594995
__label__cc
0.739465
0.260535
Home How To Increase VRAM without BIOS: Intel HD Graphics [No Need BIOS Access] Thomas - March 9, 2017 Install Android N Developer Preview on Nexus & Pixel Devices [How-To] Get Dark Mode for YouTube, Know How To [PC, Chrome] Install Galaxy S8’s brand new launcher on S7 or S7 Edge, How To How to Root Bluestacks {100% Working Method}: 2017, Latest Version How To Thomas - March 24, 2017 Bluestacks users are increasing day by day, and because of that, the demand of features on the software is also growing. I think most of you know the power of a... Smartest Way to Take a Screenshot on Windows 10 How To Thomas - April 29, 2017 Maybe all of your know how to take Screenshots on Windows 10. Taking screenshot is not a rocket science or even work, but the real question is do you all the... How To Thomas - June 10, 2017 ERR_SPDY_PROTOCOL_ERROR is a Google Chrome browser error which you can face for many reasons. Here I'm going to give you the exact cause of the issue and how to solve the ERR_SPDY_PROTOCOL_ERROR in Chrome... How To Thomas - April 7, 2017 We all love Dark or Black, here I'm going to introduce with something unusual. Today I'm going to introduce you with Dark Mode for YouTube. Before we begin let me tell you... How To Thomas - March 9, 2017 Some of the PC or Notebook by HP comes without Advanced Tab in BIOS and less dedicated video memory. In case you want to increase Video RAM of your PC, you... How to Check Your Credit Score – A Guide for better credit score How To Thomas - September 19, 2018 A credit score is mainly designed to show the risky factor of your credit risk. It is nothing but a three digit number which is represented between 300 and 850; this... How to Lock Android Apps with Fingerprint Scanner Most of knows how to lock our Android with fingerprint scanner instead of a pattern, pin or password. But do you know to secure Apps with fingerprint scanner also? Here I'm... Well, Android O is here. There are less than 2% of total Android devices are currently running on Android N (Nougat), and Google has already released the developer preview of Android... How to Uninstall Internet Explorer from Windows 10 How To Thomas - May 1, 2017 Microsoft replaced it's old and lazy web browser, i.e. Internet Explorer with the whole new Microsoft Edge web browser in Windows 10. But in some case, you can still find Internet Explorer installed... Microsoft Edge browser is the latest addition to the Windows 10, in place of Internet Explorer. But just like all other browser Edge is not also a perfect app. Many people...
cc/2019-30/en_middle_0028.json.gz/line1594997
__label__wiki
0.707046
0.707046
Daily Archives: 4 June 2008 IPL: Winners and Losers — II Posted on 4 June 2008 by mohankaus | 3 comments In an earlier article, we had written about “Winners and Losers” in the first edition of the IPL. In that article, we focussed on Chennai and Rajasthan. In this blog post, we concentrate on Punjab, Delhi and Bangalore. Bangalore: The Bangalore Royal Challengers was perhaps the team that performed worst of the 8 IPL Teams. If Bangalore did not have the Deccan Chargers bringing up the rear-end of the points table, Bangalore would perhaps feel worse than it must at this point in time. After Mumbai, it was the costliest franchise. And what they got for it was the “opening ceremony” and nothing much else! In terms of personnel, it had what everyone thought was a “Test Team” look about it. The owner and the CEO had a public spat midway through the campaign. Charu Sharma, its CEO was sacked to be replaced by Brijesh Patel (KSCA official and former Team India player). The season was going horribly wrong by then. After a few subsequent losses it was clear that the sackings and the public-finger-pointing-orgy that was being crassly played out had not stemmed the rot. This soon became a season from hell for Bangalore; an annus horribilis. Martin Crowe perhaps summed it up best when he said that Rahul Dravid had the seventh best team to work with! In our article written here on i3j3cricket, which was penned a day or so after the player auctions had taken place, these were our words on the Bangalore team, “Looks too uni-dimensional, staid and somewhat boring that does not quite fit the dashing Kingfisher brand! Needs a few more attacking middle order batsmen.” The team composition wasn’t quite right. And that was the start of the problem. However, the team limped to complete the journey with the biggest loser being Vijay Mallya in my view. Unfortunately, however, owners cannot be traded in the IPL system! As for the players, Bangalore did have some gains and losses. Rahul Dravid was certainly a winner. He was the 12th highest run getter in the IPL (371 runs at an average of 28.53 and a strike rate of 124.49), but he was like Atlas for Bangalore. He could not do everything for the team. Although times, maybe that was exactly what was needed! Mark Boucher had an “ok” season and Zaheer Khan ended up being the 13th highest wicket-taker (13 wickets from 11 games at 27.46). The “local” boys from the “local catchment area” did not do much to stake their claims. Players like Akhil, Chipli, Arun Kumar, Vinay Kumar, et al, came and went through a strange and magical revolving door! Older (much older) players like Sunil Joshi and Anil Kumble appeared for a while as if they had gate-crashed into the wrong party! And younger national recruits like Wasim Jaffer, Virat Kohli and Praveen Kumar did not fire up at all, although Sreevats Goswami impressed everyone in the few appearances he had. Sreevats Goswami looks like a good package and should have a long and fulfilling reign in Indian cricket! It looked like the team was trying everything it could to make things happen. All experiments fell flat like aged champagne. The team could not quite work out its overseas recruits and when all of them started to fail, the team management caught the rabbits-in-headlights disease! Although Dale Steyn tried hard till the end, the big losers were Cameron White, Shiv Chanderpaul and Jacques Kallis. One didn’t know what happened to Nathan Bracken. And my view is that Ross Taylor and Misbah-ul-Huq were not used properly. So, all in all, this was a forgettable season for Bangalore. So what can Bangalore do? It needs a team overhaul. Players like Sunil Joshi, Anil Kumble have to go. I do also believe that the team needs to trade Shiv Chanderpaul and Jacques Kallis for hard-hitting bowling or batting allrounders. If I were Bangalore, I’d give up the above-mentioned four players and splurge on Kevin Pietersen, Stuart Broad and Luke Pomersbach! Punjab: Punjab had a good season. The team was expected to do well in the bowling department. They played that part of the player auction really well. However, the real wins came from the two amazing overseas recruitments that this team made — both trades were from Western Australia. Shaun Marsh and Luke Pomersbach combined well with the rest of the team to deliver Punjab and Priety Zinta a memorable first season. The biggest loser, in my view, was Yuvraj Singh — as Captain! He came across as a petulant and irritable leader. Although he had a reasonable season with the bat and although it appeared as though his fielding was getting better with each game to get to the standards that he is probably capable of, his leadership under pressure got exposed quite rudely. At the time the team was announced, the i3j3cricket comment on the team was: “This looks like a terrific bowling unit! It needs a wicket-keeper and two opening batsmen! If they get good starts, expect this team to go far! An advantage is that this team has only 5 overseas players (4 can play in any game).” The team went ahead and recruited a few more overseas players (batsmen) and these were good decisions. All the overseas players did well for Punjab. Shaun Marsh, Luke Pomersbach, Kumar Sangakkara and Mahela Jayawardene did really well. Brett Lee bowled with fire in the initial 4 games that he played. James Hopes was steady without setting the world on fire although Ramnaresh Sarawan appeared a bit lost and not with it. The big overseas stories were, however, Marsh and Pomersbach. Both of these will have done their Australia T20 and ODI hopes no harm at all. They are two overseas players who will have gained maximally from the IPL. The Indians in the team fared really well too. The players who possibly made the biggest strides were, in my view, Piyush Chawla, Sreesanth and Irfan Pathan. Even V. R. V. Singh looked at ease and as though he belonged at the top level. A player that may have slipped under the radar a bit was Wilkin Mota. He looks to be a good player — in the one outing that he actually had a decent go in — and we should watch how he grows over the next year or so. Overall, this was a well-thought-out and well-balanced team in which more than 9 players had played 10 games or more (and 6 of these had played 13 games or more)! That, in itself, tells a story! Rajasthan had 10 players who played 11 or more games! These teams, therefore, had a more “settled” look from day-dot and that ought to be a take-home for other franchises. Apart from Yuvraj Singh’s captaincy, perhaps the only losers were Tanmay Srivatsa and Karan Goel who did not seem to make enough of the (albeit) limited opportunities that they got. But these are two exciting young players and we should maintain a watching-brief on them. So what should Punjab do? Punjab should try their hardest to ensure that their overseas players like Marsh and Pomersbach stay! They could do their chances no harm by trading in Mahela Jeyawardene and Ramnaresh Sarawan to the cash-rich Bangalore! (joke) Delhi: Delhi Daredevils had a terrific start to the season. Somewhere down the line, they perhaps got too cute for their own good! Perhaps they thought that they had made it to the finals already at the half-way point. Although they made the semi-finals (just), one would like to think that this team was capable of more than it actually achieved! One of the main problems here was Virender Sehwag’s somewhat misplaced faith on Shoaib Mallik! The Pakistan captain who did not deliver with either bat or ball was, unfortunately, persisted with! Moreover, because Virender Sehwag, Gautam Gambhir and Shikar Dhawan were so successful with the bat at the top, the middle order got rudely exposed in some of the games. The big winners were, Sehwag, Gambhir and Dhawan with the bat. Batsmen like Manoj Tiwary, Dinesh Karthik, Rajat Bhatia, Tilekaratne Dilshan and Shoaib Mallik did not do their form or their potential much good. One expected more from these guys. The bowling unit, however, was a solid one for Delhi. Led by the ever-strong Glen McGrath, the bowling held up well although it had a sameness look about it. McGrath, Mahroof and Mohammed Asif are bowlers of the same ilk. However, they seemed to gel quite well as a unit. Bowlers like Amit Mishra, Yo Mahesh and Pradeep Sangwan complemented the main bowlers really well. One would like to believe that the stocks of Mishra, Yo Mahesh and Sangwan have risen as a result. Delhi would do well to bolster their middle-order batting. Trading Manoj Tiwary for a better and, perhaps, more reliable batsman may not be a totally bad idea. The Delhi bowling unit is excellent and they should try and ward off any poachers! “Even my father’s name is Sachin Tendulkar…” A lengthy interview with Sachin Tendulkar by Anjali Rao from CNN Talk Asia on Rediff. Tendulkar says that, after 19 years in the business, “there is definitely cricket left in me. And I want to just go out and enjoy my game and not think about other things.” Tagged Cricket, India, Indian Cricket, Tendulkar
cc/2019-30/en_middle_0028.json.gz/line1595005
__label__cc
0.596162
0.403838
Daily Archives: 7 November 2010 When Selvi came alive Posted on 7 November 2010 by Kartik TS | 1 comment In his compelling collection, Lawley Road & Other Stories, R. K. Narayan narrates the highly poignant tale ofSelvi, the leading classical singer of her day. The subject is accustomed to the adoring applause of celebrity audiences, and yet immune to it through her piety to music. Following a renunciation of the spotlight, she restricts the expression of her art to a daily saadhana, witnessed & cherished by a handful of Malgudi commoners. The descent from exclusive chamber sessions at her estranged husband’s plush residence in upscale Lawley Extension, to impromptu rehearsals in the verandah of her late mother’s humble dwelling in decrepit Ellamman Street, fails to tarnish the quality of music. Art breathes in its own inspiration. Dispossess it of the big stage. Divest it of adulation. Yet it remains resplendent, adorned by its inherent effulgence. It was a happy coincidence that I read Selvi in the car on my way to watch 2 artists grace an occasion more modest than their habitual realm. It has been second nature for Rahul Dravid & V. V. S. Laxman to parade their gifts in the rarefied echelons of international cricket. It is also to their credit that their relationship with domestic cricket (since they graduated to higher honours) wears proud commitment and goes beyond random dalliances. It was one such tryst with the Irani Cup in 2003 that gave me an opportunity to watch them forge a memorable partnership in flesh – one that didn’t win them as many accolades as their triple-century heists at Kolkata & Adelaide against Australia, but no less memorable for me personally. It was a game that saw most of their peers follow their example and embrace domestic cricket. Indeed, Rest of India, led by Saurav Ganguly, was pretty much the Indian Test XI save for Sachin Tendulkar who captained the opposing team, the Ranji champions Mumbai. The first 3 days saw one of the most delicious contests possible – Anil Kumble bowling to Tendulkar – playing out to near empty stands at Chepauk. Neither man bested the other, but their gratitude for not having to lock horns in an international game was reinforced. Twin half centuries by Tendulkar & a substantial first innings lead for Mumbai meant RoI had to get 340 on a wearing wicket to lay their hands on silverware. They got 50 of those by stumps on day 3, but lost both openers Virender Sehwag & Sanjay Bangar. Dravid walked out the next morning amidst enthusiastic cheering from a healthier Sunday crowd for local boy L. Balaji, and quickly banished Ramesh Powar over long on for a couple of sixes. The nightwatchman’s resolute defiance nearly lasted through the session, but altogether progress had been relatively slow. Laxman took guard with the misery of a 53-ball 5 in the first knock hanging over his head. On the other side of the luncheon interval, both men blossomed. Leg-spinner Sairaj Bahutule looked to exploit the rough. In a twinkling exhibition of decisive footwork, Laxman repeatedly met him on the full and the expanses at extra-cover & midwicket lay enslaved to a sovereign whim. Dravid stayed crisp and efficient against the faster men Ajit Agarkar & Avishkar Salvi, combating the short stuff with the fierce cut and the regal pull in all his majestic glory. Powar came back for a new spell with an over that was bookended by 2 4s and 2 6s. The former brought Laxman his half century, both full tosses caressed away. The latter took Dravid from 88 to 100, in a manner that would go on to become synonymous with Sehwag. On each occasion he danced down the track flouting open impertinence to the challenge, and thundered the ball into the Royal Sundaram stand high over the bowler’s head. A stalwart of Indian cricket had shown an upstart his place. After tea, Laxman relegated even Dravid to spectator, uncorking one champagne stroke after another. The promise of a glorious hundred wasn’t honoured though, Bahutule pooping his party one short of the landmark. That was my cue to leave as I had to catch a train back to my college in Vellore. As I haggled with an autowallah near Buckingham Canal, Chepauk went up in a groan that could only have meant Dravid’s dismissal. With my hair standing on end, I wondered what the forthcoming season – featuring important tours to Australia & Pakistan – would have in store for the partners-in-crime. Dravid had started the season with a legitimate claim of being India’s finest. Six months later, he would end it undisputedly as the world’s best. 3 double centuries in 9 Tests, each one successively higher than the previous, would propel his Test average from 53 to 58. Laxman would also score 3 Test hundreds, and curiously, 5 ODI hundreds that winter. His 99 that day had been scored at nearly run-a-ball. I got an SMS from my father as the Yelagiri Express pulled out of Central Station. I learnt that Ganguly & Kumble had steered the Rest home after a mini-collapse. I was also informed that I had left Selvi behind, my copy of Lawley Road & Other Stories having been forgotten in the car. – Kartik Tagged Indian Cricket
cc/2019-30/en_middle_0028.json.gz/line1595006
__label__wiki
0.793369
0.793369
Tag Archives: Test India Vs Australia :: Test 4 :: Nagpur :: Day-1 Posted on 6 November 2008 by mohankaus | 6 comments Ricky Ponting may have a lot of luck with the Match Referee who has been blind to Australia’s over-rate recalcitrance in all recent Tests. However, one thing that Ricky Ponting has bad luck with is the recent run of tosses! He lost even to Anil Kumble, a man notorious for bad toss-luck! M. S. Dhoni won the toss and elected to bat. As expected, Harbhajan Singh replaced the retired Anil Kumble and M. Vijay came in for Gautam Gambhir who was rubbed out of this game without a proper appeal! The young opener from Tamil Nadu came in on the back of a double century in the Tamil Nadu game against Maharashtra. Indeed, that TN-Maharashtra Ranji Trophy game only concludes today! Vijay was pulled out of that game after scoring a record opening stand of 462 in the company of the immensely talented 19-year-old, Abhinav Mukund. Incidentally, Abhinav Mukund, a stylish left-hander and son of former TN player Mukund, went on to make a 300 in that game. I wrote in my preview of this Test match that Australia had to take Jason Krejza instead of Cameron White and perhaps, Peter Siddle instead of Shane Watson. Instead, however, Jason Krejza came in for Stuart Clark! Shane Watson and Cameron White remained in the side. This was, in my view, a strange tactic from Ponting. Only time will tell if it pays off for the Australians. Session-1: The pre-drinks session belonged to India. Australia started off with a Brett Lee wide — it ought to have been two wides in a row really, to match Steve Harmison’s start to the Gabba Test. India started off in a hurry. The rest of the first hour was roughly similar apart from a few false shots and inside edges from the Indian openers. I was particularly impressed with Murali Vijay. He played with utmost composure a cool head and a tight technique. When he came forward to meet the ball, he did so in an assured manner. When he rocked back, his balance was brilliant. Just before the drinks’ break, Jason Krejza came in for a bowl. Sehwag hit him for a 4 and a 6 in the same over. Perhaps this was a sign of things to come? However, there were a few good signs for the Australians. The pitch had bounce and offered some spin. However, most interestingly, the top soil was already starting to crumble! With the score on 98, Shane Watson bowled a few well-directed bouncers at M. Vijay who ducked easily into these. However, this was followed by another one closer to Mijay’s body. The ball squared him up and the resulting poke was taken by Brad Haddin. M. Vijay had made 33 off 53 balls and the score was 98-1! At the other end, Sehwag faced up to Jason Krejza who had figures at this stage of 3-0-32-0. However, he was getting some sharp spin and unnerving bounce! Sehwag’s strategy to the first ball he faced from Krejza was strange; he attempted a reverse sweep! At this stage, Sehwag had scored 63 off 58 balls! I didn’t quite see the need for a reverse sweep, but then that’s how the man plays! The fall of Vijay brought Dravid to the crease. Off the very first ball he faced from Krejza, Dravid lunged forward tentatively and poked the ball off the front foot. The ball bounced awkwardly, ripped and cluttered into his pads before travelling into the safe hands of Simon Katich at forward short leg! Dravid, after looking solid, but unlucky at Bengaluru, Mohali and Delhi, was out for a disconcerting duck off the second ball he faced! This was good bowling by Krejza and underlined the folly of Australia not including him in previous Test matches. Soon after, the score was 116-3 when Jason Krejza induced a lazy glide off the back foot from Virender Sehwag. With just 5 minutes to go for lunch, this was perhaps a play-for-lunch shot. The ball took the under-edge of the bat and crashed into the stumps. Krejza had his second wicket in Test cricket! Sehwag was out for 66 off 69 balls with 9 4s and 1 six!. India was 116-3 off 22.3 overs! V. V. S. Laxman, in his 100th Test match, caressed the first ball he received for an off-driven 3 runs. India found herself in a hole of her own making really! Jason Krejza was able to crowd the bat with 3-4 fielders now. At lunch, India was on 122-3 off 24 overs! Only 24 overs were possible by the Australians in a two hour session! But the Match Referee will continue to look to take candy money from a few Australians before training his sights on the over rate! India had an excellent start to the session, but blew it towards the end with about 25 minutes of madness. My Session by Session (SBS) scoring gives this session to Australia. The SBS Score reads: India-0, Australia-1.0! India started the 2nd Session on 122-3 (a run rate of 4.80) with Laxman on 4 off 5 balls and Tendulkar on 16 off 16 balls. I suspect Harbhajan Singh, Amit Mishra and Virender Sehwag would like what they saw of the pre-lunch session. Krejza was able to extract spin and bounce from the pitch! It would be an early call and it is potentially foolish to make a call on an Indian pitch, especially when one is a few thousand miles away and watching on TV! However, I have a feeling that a score of 400 or so in the 1st innings would be quite competitive! The surface was already crumbling and there already was a bowlers’ rough! And we have just completed the 1st Session of the match! Having said this, I realise Dravid got out to a poke and Sehwag got out to a lazy shot. Yet, what was disconcerting was the bounce and spin that Krejza was getting. Australia are in a good position despite the brisk scoring from the Indians. Despite going for nearly 8 runs per over at this stage (6-0-48-2), Krejza was actually bowling quite well. He was getting good spin and bounce. His top spin was also working for him and he was able to extract good bounce from it. I didn’t see anything that went on with the arm though and that may make him somewhat predictable perhaps. There was a pointer though for me that was good about the first session. India didn’t look like a team playing for a draw! This could play into Australia’s hands. Australia started off after lunch with Jason Krejza and Mitchell Johnson. Mitchell Johnson started off with a 7-2 off-side field. This meant a lot of off-side bowling! This was a somewhat strange tactic from a team that had to win the match! Agreed this was just Session-2 of a long Test match, but I couldn’t quite understand this from Australia. Sachin Tendulkar, who faced most of these balls, was having nothing to do with these. Perhaps Australia wanted to attack at one end and slow things down at the other end? Having said that, the first time Johnson strayed onto the pads, Tendulkar was able to whip it through mid-wicket for a four. Still, Johnson continued with a 7-2 field. Ponting’s approach was to give his pace bowlers short bursts of 4-5 overs. It was a hot day. Nine overs after lunch, Mitchell Johnson was replaced by Brett Lee. India had added 27 runs in the 9 overs after lunch. It was India’s turn to consolidate. The Australian pace bowlers continued to bowl outside off stump although Brett Lee did catch Laxman flush on the shoulder from a fast in-ducking bouncer! Krejza was bowling steadily and was getting some slow spin and bounce. His figures read a more respectable: 12-1-74-2! He even bowled a maiden over! The ball was 37 overs old now and was showing some signs of reverse swing. Brett Lee produced an in-swinging yorker, which Laxman kept out. This was starting to make the game just a little interesting. We had an off-spinner playing his first Test match, able to extract some slow spin and bounce from the pitch. We also had a paceman steaming in to bowl with fire at two well set batsmen who were quite intent on staying there. This was absorbing Test match cricket. The 50 of the partnership came off a strange, false shot from Laxman! A Jason Krejza ball gripped the surface, bounced and turned a bit. Laxman was into his trademark whip-flick shot before the ball arrived at him. The ball stopped a bit too. The resulting shot just lobbed agonisingly over the head of mid-wicket to reach the boundary fence. Tendulkar and Laxman had made their 50 runs from 14.3 overs at a rate of 3.44 rpo. Tendulkar was on 41 from 55 balls and Laxman was on 19 from 44 balls. Tendulkar was batting wonderfully. There were no histrionics or thumping off drives. This was a relaxed and in-the-zone outing for Tendulkar. He was looking good. Drinks was called at this stage. At this point, Jason Krejza had bowled unchanged since he was introduced! Although he had given away a few runs, it highlighted once again why Krejza’s absence from the team in the first three Tests was beyond belief. In Jason Krejza’s 14th over on the trot (39th over of the innings) he even bowled from around the wickets. I was getting more and more impressed with this Australian bowler. He wasn’t frightened of tossing it up. He wasn’t fearful of the reputations of the batsmen he was bowling to. Perhaps he had the “temerity” too huh? In Krejza’s next over, Tendulkar got his half century. He had had a wonderful landmark-loaded series without scoring a big one. This was his 52nd half-century, and with it, Tendulkar had scored his 91st score of 50 or more runs — the highest for any player in the world. The records continued to fall his way. However, he would perhaps agree that nothing would matter to him more than a big match-winning score here. In the 42nd over Cameron White came in for his first bowl of the match. At the other end, Shane Watson replaced Brett Lee. The ball was starting to “reverse” just that little bit. There was something in it for the pace bowlers now. Perhaps Stuart Clark will have made better use of the conditions? One will never know. Cameron White had figures of 3-1-3-0 at the end of his 3rd over. However, truth be told. He bowled nonsense really. Most of his balls were nearly a foot outside off stump. But perhaps he was part of the ‘holding pattern’ for this pair (Watson-White) of Australian bowlers. At Tea India was 202-3 off 51 overs at a rate of just under 4 rpo. In that session, 27 overs had been bowled for 80 runs. India hadn’t lost a wicket in that session in which its run rate was 2.96 rpo. It was a steadying session for India. India won the session and the SBS Score reads: India-1.0, Australia-1.0! Onto my pet peeve: Australia’s over rate Up until Tea on day-1 Australia had bowled 51 overs! Of these, 20 overs had been bowled by spinners! This was beyond sloppy territory. The was beyond unprofessional territory. This was even beyond recalcitrance. This was beyond thumb-nose-at-establishment territory even. I am thoroughly gob-smacked that Chris Broad will still do nothing about it! If Ricky Ponting is serious about getting even with the bowling rate, I’d expect Jason Krejza and Cameron White to do a large bulk of the bowling from overs 50-80 before the new ball is due. It will be interesting to see how this session plays out in this regard. But for me, it will be interesting to see when the Match Referee stops this blatant and continuous insult to the game of cricket itself! After Tea, Australia started proceedings with Cameron White and Shane Watson. Cameron White continued to bowl nonsense. The 100 partnership was soon secured. Laxman had 38 runs from 102 balls while 73 from just 103 balls! I hadn’t quite realised that at that stage these two had faced almost the same number of deliveries! Perhaps Cameron White had bowled more nonsense to Laxman than to Tendulkar. Soon after the century partnership, Tendulkar and Laxman attempted to run the worst run I have seen in a long time! Jason Krejza who collected the ball could have said a brief prayer and composed a song before throwing the ball at the stumps! Tendulkar would have still been out! However, Krejza’s snap throw was wide of the stumps. Tendulkar who had given up on the run arrived in the TV frame a few seconds later! This was the first wrong step that Krejza had made all day! As if to punish him for that, Ponting had him into the attack the very next over! Cameron White switched ends and bowled instead of Shane Watson. But it was a case of different ends, same nonsense from White though! Somehow in this session it looked as if the bite and fizz had been lost in this pitch for the spinners. Krejza wasn’t able to get the bite and purchase that he had received in the 1st Session. I did like how he bowled though. He wasn’t afraid to flight the ball and he copped the occasional hammering that he received. The two Indian batsmen had pitched their tents for the long haul. This was again an example of khadoos batting. The Australians looked a bit lost. But having said that, this did appear to be a pitch on which one wicket could lead to a clatter of them! It would be interesting to see Simon Katich in for Cameron White who, in my view, was wasting balls. In his 18th over, Krejza had given his 100th run for his 2 wickets. When on 85, with India on 241, Tendulkar miscued an off drive off Jason Krejza. The resulting skier seemed to stay in the skies for an eternity! Mitchell Johnson would have had ample time to say a prayer and compose a song before it landed down on him. Like Ishant Sharma had at Delhi, Mitchell Johnson had dropped an important catch. Had he drop the Border Gavaskar Trophy with it? Too early to tell really. But that was an easy catch if ever there was one! The very next ball, on his 100th Test match, Laxman had a half-century. Australia needed a wicket badly at that stage and Mitchell Johnson had let the team down. Just as he brought Jason Krejza to bowl after being the the culprit of a Tendulkar run-out let-off, Ponting now got Mitchell Johnson in for a bowl. He replaced a listless Cameron White. The catch drop seemed to have sapped the energy of the Australians. Heads drooped. Shoulders dropped. But there was hope. All Australia needed was a wicket or two, one felt. Wickets would always fall in a heap on this pitch, I felt. Krejza continued to bowl well at both batsmen. However, for both batsmen the field was well spread. So, they were able to pick the singles and rotate the strike reasonably easily and soon Tendulkar stepped into the 90s for the first time in the series. Against the run of play, V. V. S. Laxman tried to play a cut to a ball from Jason Krejza that just gripped, turned a bounced a bit. The resulting edge got stuck between Haddin’s legs and India had lost the 4th wicket at the score of 262. Laxman was out for 64 off 141 balls with 5 boundary hits. The partnership was worth 146 runs off 46.1 (at a rate of 3.16 rpo). Laxman will have wanted a century in his 100th Test and like Sehwag, looked set for it. But like Sehwag, he too was out in the 60s! Sourav Ganguly came out to play in his last Test match. When on 96, Tendulkar was let down again off Jason Krejza. An off-drive hung in the air for a long time long time. Brett Lee dropped the resulting hard chance. Given his recent trend of getting out in the 80s and 90s, perhaps Tendulkar was looking a bit nervous and edgy out there? But then, perhaps this was Tendulkar’s day after all? My question was whether Ponting would bowl Brett Lee now! He did not. Mitchell Johnson continued to bowl. He bowled a maiden over to Tendulkar. Twice against Jason Krejza, Tendulkar had tried to hit a six on the off-side — perhaps following his sons’ advice — and twice he had been lucky that his miscue wasn’t pouched. Clearly this was a very important century for this champion player. The runs dried up for a few overs. Tendulkar was stuck on 99 for 10 balls. It was as if the game stood still for this great player. Ponting had conversations with Jason Krejza to build the psychological pressure on the man. In the end, Tendulkar got his 40th century; his 10th against Australia. He had come close to century number 40 on several occasions in the recent past. This time, even though he tried very hard to give it away, he got there. His century had taken 166 balls and came with the help of 12 4s. India had reached 277-4 off 75 overs. Simon Katich then replaced Mitchell Johnson — perhaps this was Ponting’s bid to up the over rate, which continued to be shameful. At exactly 3 minutes to 10pm AEST (4.30pm IST), exactly 80 overs had been bowled. Of these, spinners had bowled 41 overs! And still, Australia was 9 over short of where it needed to be! This was outrageous! Nothing else. Australia took the new ball immediately when it was available. India reached 300 of the first over with the new ball. India’s 300 runs had come in in 81.5 overs (3.69 rpo). Of the very next over, Sachin Tendulkar’s innings came to an end. He was LBW Mitchell Johnson for 109. Sachin Tendulkar, who was dropped twice in this innings, was out to one of the Australians who had dropped him earlier on when he was 85! This wasn’t really great bowling. Nor was there movement off the pitch. It was a decent ball. However, even with about 11 overs to go for the end of days’ play Tendulkar was already playing for the close. He had pulled down the shutters for the day and that caused him to play with a negative mindset. Just as he had got out to the new ball at Mohali after doing all the hard work earlier, here too, Sachin Tendulkar had fallen with just 20 minutes or so left in the days’ play. Australia had been let back into the game really. Not once, but several times in the day. First by Virender Sehwag’s lazy shot, then by Laxman’s lazy shot and then by Tendulkar’s shut-shop negative-mindset. India was 303-5 off 82.5 overs. Tendulkar was out for 109 off 188b with 12 4s. The partnership was worth 41 runs from 14.1 overs off a run rate of 2.89. India got to 311-5 off 87 overs when the end of the days’ play was called. Australia ended the day bowling 3 overs short despite the extension of play by half hour. So what is the Match Referee doing about this? Although India had batted well, I can’t help but feel that this was a day of missed opportunities and one concern for India. Missed opportunities because I feel Sehwag, Laxman and Tendulkar could have gone on to make more. One concern is the form and the mental state of Rahul Dravid. I am not sure what Paddy Upton is doing in/for this team. But he does need to work on Rahul Dravid to prepare him for the 2nd Innings. The way this match is shaping up, it could be a very important 2nd Innings for India and for Rahul Dravid. Australia will feel pleased. It was a solid effort from Jason Krejza. If Australia can take the remaining Indian wickets for just 50-60 runs, Australia will be well ahead in this match. The first session of play tomorrow will be crucial for both teams! I give the last session to Australia and so, the SBS Score reads: India-1.0, Australia-2.0; A crazy coincidence: At Mohali on day-1, India finished at 311-5! Tagged Australia, Cricket, Dravid, Gambhir, Ganguly, India, Krejza, Laxman, Ponting, Tendulkar, Test, Vijay, Watson India Vs Australia :: Test 3 :: Delhi :: Day-3 After putting on a mammoth score in the 1st Innings, India are most probably safe in this match. With three days left, unless India do a very bad “Australia’s 2nd Innings in Adelaide in 2003” (all out 196 in 56 overs), an India loss could (perhaps should) be ruled out at this stage. Australia has its work cut out to save this game. For this, Australia’s 1st Innings will be crucial. This is because the pitch will get worse and worse to bat on as the match progresses. If Australia bats well in the 1st Innings, there will be a case for a draw. Of course, as they say, “funnier things have happened in cricket”! With that in mind, the 1st Session of day-3 becomes crucial for Australia. Australia started off well after India played grinding cricket. Cricinfo has called it khadoos cricket with a view to shutting Australia out of the game; in much the same manner as Australia played in the 2nd Innings at Sydney, 2008. In Australia’s 1st Innings, after a mammoth effort in the field, Matthew Hayden and Simon Katich started well and played the 15 remaining overs competently. However, there were danger signs as Amit Mishra and Anil Kumble turned a few balls in viciously into the left-handed openers after hitting the rough outside the left-handers’ off stump. This could be a very interesting days’ play. What will be interesting will be the captaincy today. Ricky Ponting made some strange decisions on the field. Peter Roebuck talks about just that including a reference to throwing out the new-age strategy as well as its author out of the Australian dressing room! Anil Kumble will find it easier to captain a team that has made 613. Yet, it will be interesting to see what Anil Kumble does. Zaheer Khan came out fresh and strong. He bowled two terrific bouncers that had Matthew Hayden hopping around. There was a bit of a haze about that may have made the ball move around just a little bit. Anil Kumble started off with a somewhat defensive field with four players spread out on the off-side to prevent a big shot being played! This was more khadoos cricket perhaps! It had Sunil Gavaskar wild and angry in the commentary box (pointer to those that think that Gavaskar can find no wrong with the Indian team or her tactics)! The second over was bowled by Anil Kumble and, although the turn out of the ‘rough’ was slow into the left handers, it provided a blue-print for the rest of the day. There was spin in this pitch and it would get sharper and faster as the game progressed. Hayden and Katich were playing sensibly. There was none of the mindless aggression that we saw in Mohali. They played sensibly to good balls and put the bad balls away. This was good, steady — and more importantly, ego-free — batting by the Australians. One or two of Anil Kumble’s balls hit the ‘rough’ and spat/stung. One of these balls went right through the flayed bat and Dhoni’s gloves for 4 byes. This was good Test match cricket and the Australian batsmen were proving equal to the task. Katich reached his 50 off 91 balls with 8 fours. Australia had reached 88-0 at this stage off 24.3 overs. Ishant Sharma was brought into the attack, but he could not make much of a dent either. The Australians had pitched their tents for the long stay on this pitch. Despite the odd ball kicking from the rough, Kumble wasn’t really bowling all that well. He had gone over 70 overs without picking up a wicket in Test cricket and the signs of frustration were there for all to see. He seemed to be rushing things through rather than let the ball do the work off the pitch. So it wasn’t surprising to see Amit Mishra being brought in. However, with two left-handers at the crease it was surprising not to see Virender Sehwag in operation. Soon, Amit Mishra came on to bowl instead of Kumble. In his very first over, Matthew Hayden hit a huge six to bring up the Australian 100. Australia had moved to 105-0 off 29 overs in the first over when drinks were called. India had bowled 14 overs in the first hour — better than the Australian 13, but only just! The Australians were looking quite assured and this was a worrying sign for India. Neither Hayden nor Katich were being either overly-defensive or overly-offensive. They were playing focussed cricket and were hungry for runs. They were also not bothered about the huge mountain that had to be climbed. They were playing over-by-over cricket. This was good, responsible batting by the Australians. Ishant Sharma and Amit Mishra were not making much of a difference. It won’t be long, I thought, before we saw Ishant Sharma bowling an outside off-stump line with the spinners attacking at the other end. It would be good to see Sourav Ganguly and Virender Sehwag have a bowl, remembering (a) the impact Ganguly had in the match against Pakistan here at the Kotla last year, (b) we had two left-handers in the middle. But it was Amit Mishra who broke through first. He got it through between an advancing Simon Katich’s bat and pad to bowl the advancing batsman off the ‘rough’ for a well made 64 off 115 balls. Australia was 123-1 off 34.1 overs and Ricky Ponting came to the middle with Ishant Sharma in the middle of a good spell of bowling. This was a good bit of bowling by Mishra. He had got Katich out bowled for the second time off the ‘rough’ (the 1st innings at Mohali was Mishra’s first wicket in Test cricket) — although in Mohali, the ball hit the stumps off Katich’s bat, glove, pad, helmet, pad, elbow, shirt pocket, helmet visor, and anything else that the ball wished to be introduced to! However, it was a terrible piece of batting by Simon Katich. He closed the face of the bat to eke out a single to mid-wicket when what he ought to have done, once he reached the pitch of the ball, was to either play it with a straight bat or even pad up to it! Hayden soon reached his half-century. This was a terrifically controlled innings by Hayden. He had 53 off 96 balls with 9 4s and a six in an Australian score of 143-1 off 37.2 overs. The somewhat worrying thing for the Australians was that there were edges flying off the edge of the bat. The worrying thing for the Indians was that the field placing did not mean that the right fielders were in the right place to take these edges! Kumble was perhaps too absorbed with this conservative “choking” cricket that he is sold on. Anil Kumble came in for Ishant Sharma at this stage, with a few minutes to go for lunch! Virender Sehwag came in for a bowl for the last over before lunch and immediately, he was getting purchase and turn form the pitch. It was an excellent over by Sehwag to Hayden. India had missed a trick by not bowling him earlier on in the session. Lunch was called with Australia on 151-1. Despite the loss of the wicket, I make this Australia’s session; one in which 101 runs had been scored. The over rate was a worry, since only 12 overs had been bowled in the second hour! Perhaps the Match Referee will wake up today to the over-rate negligence? The odds are that he will suddenly wake up because India has offended, especially since news also filtered through at this stage that Gautam Gambhir has been banned for 1 Test match! Bring in more Asian Match Referees I say! The SBS score reads: India 3.75, Australia 3.25! As you can see, by my reckoning, Australia aren’t really too far behind the 8-ball! The Gautam Gambhir verdict had been handed down by Chris Broad prior to the start of the game. It is likely that the Indians were disheartened by the verdict. The players did look flat on the field and even the wicket of Katich did not fire them up as much as it may have on another day. They need to re-group and focus on the task on hand. Gambhir has a day to appeal the verdict handed down by Chris Broad. I personally think that Gambhir ought to have been fined. However, there is no point in doing this mid-way through a Test match. What point does it serve anyway? In general, the ICC, I think needs to review the entire Match Referee thing. I am not sure why the ICC can’t go for a yellow-card, green-card, red-card deal with the umpires and 3rd umpire? This Match Referee thing is a bit of a joke, in my view. But that’s another debate for another day. Right after the lunch break, when just two balls had been bowled, a swarm of bees attacked the ground. Players lay flat on the ground covering their faces in the expectation that the bees would fly away. Apart from giving Conn another opportunity to get stuck in, and apart from delaying the game by 2 minutes, all was well and the game commenced. Ponting commenced with a 4 off Kumble. India started with Sehwag who had bowled a splendid over just prior to lunch. Ponting was already on 22 of 32 balls with 5 boundary hits. I wasn’t totally comfortable with Kumble’s bowling at this stage. He was bowling too flat and just back of a length. The ‘rough’ outside Hayden’s off stump was hardly being exploited. This was a sign that Kumble was trying just that little bit harder than necessary. There was a lot of pressure on him to take wickets. My feeling was that if he took his first wicket, we’d see a very different Kumble. The Indian energy on the field was lacking. I could be wrong, but my feeling was that they were stung by the Chris Broad verdict. The team needed to lift from that and get on with it as big boys must! Having said that, Ponting and Hayden were playing exceedingly well. They just didn’t look like getting out. Ponting, in particular, wasn’t committing too early to his stroke and was playing late, off the pitch. What’s more important was that the two batsmen had, through their confident playing, spread out the field to all parts. The score had moved to 173-1 with Ponting on 29 off 43 balls (6 fours) and Hayden on 66 off 128 balls. Their 50 partnership between Ponting and Hayden was brought up at that score. India needed to do something different. With the score on 174-1, Hayden had a bit of a reprieve. What seemed like a bat-pad off Anil Kumble lobbed up to Rahul Dravid at 1st slip. Dravid caught it cleanly. But umpire Billy Bowden was unmoved. It was a tough call, because the ball seemed to hit the back of the bat after hitting pad first. Anil Kumble, who had had dreadful luck with his appeals in Bangalore, continued to rue his decision-misfortunes. One another day, he may have got that decision. But when one’s luck is down, it rarely rains; it pours! So, Kumble continued to search for that elusive first wicket; and also continued to drag the ball down! After bowling 4 overs after lunch, Amit Mishra came in to bowl, replacing Virender Sehwag. Immediately, there was more flight, more bite and more spite. But the well-set batsmen were able to negotiate him, despite Ponting having a wild hoik falling in desolate territory. At this stage, India needed a few tight overs and this is where Harbhajan Singh would have been handy. Instead we had two attacking leg-spinners in action. On this pitch, the batsmen were able to push the ball for singles and put the bad ball away for a boundary. At 187-1, Kumble dived full length at short mid-wicket to a fierce drive from Matthew Hayden off Amit Mishra. He stopped the ball like an 18-year-old soccer goal keeper, stopped the ball and lunged again to make a second attempt to catch the ball. Unfortunately, he dropped the catch after a valiant effort. In the process, he acquired an injury on the little finger of his left hand. As a result, Kumble had to leave the field. India was a bowler short, but had gained an aggressive captain instead! Matthew Hayden lived to fight another day! In general, even though batting was somewhat easy, the two batsmen were making it look easier. This was a top effort from Ponting and Hayden. Let’s put this in context! Although the score was 197-1, Australia was still 417 in arrears! So although the pitch was easy-ish to bat on, to put the arrears out of your mind can’t have been easy for the Australian batsmen. Yet, they put it all away and slowly accumulated the runs in a bid to run down the mammoth India total. This despite the odd edge flying through and the odd ball kicking up from a length — including a Hayden edge off the bowling of Sehwag just falling short of Dravid in the slip area. At the drinks berak, Australia had moved to 199-1 off 57.0 overs. This meant that 16 overs had been bowled in the hour from Lunch to drinks — and that with about 2 minutes lost to bees! Unfortunately, this would mean that Chris Broad may have to look for other work to do until India offends in some manner again! Immediately after the drinks break, Sehwag bowled a beauty to have Matthew Hayden trapped in front of the stumps for 83 off 153 balls with 13 4s and 1 huge six. Australia was 202-2 off 57.2 overs and the partnership between Hayden and Ponting was worth 79 runs off 23.1 at a rate of 3.41 rpo (of which Hayden had made 35 and Ponting 40). Sehwag had made a very important breakthrough; one that would bring a new batsman to the crease on a pitch that was staring to play a few tricks. Moreover, it would provide the Indians just the lift they were looking for on the field. The new batsman, however, was Michael Hussey — and they don’t make cricketers more consistent that this man! Hayden, like Katich was looking to close the face on a ball that was sliding on to him. Perhaps not the best shot selection there. At 222-2, Ponting survived a huge shout for caught-behind. Ponting had stretched forward and the ball seemed to kiss the outside edge to lodge in Dhoni’s gloves. Aleem Dar did not see it and Ponting lived to fight another day. Perhaps Dhoni’s mistake was in taking off the bails simultaneously — possibly an auto-reflex reaction. The umpires may have thought that the Indian acting captain was making a bet-each-way appeal and turned him down! Later on, Snickometer showed nothing at all. Interestingly umpire Billy Bowden had an unusually lengthy conversation with M. S. Dhoni after that appeal. Ponting soon reached his 50. It was a gritting/fighting innings. The Australian score was 226-2 Ishant Shrma replaced Virender Sehwag, who had analysis of 12-2-37-1. Top figures for a part-timer. Ishant Sharma bowled as well as he has bowled all series. His length and lines were immediately spot on and he was getting just a hint of reverse swing going. It was as if he had been bowling all day. It is fair to say that, in him, India had unearthed a terrific bowler! At the other end, Sachin Tendulkar came on for Amit Mishra with some 9 minutes to go for Tea. Australia went to Tea on 237-2 off 70 overs. Ponting was on 61 off 116 balls and Michael Hussey was on 13 off 39 balls. 55 overs had been bowled in the day thus far — still some 5 overs short of where India needed to be. 86 runs came in that session off 29 overs. Australia was still 376 runs short of India’s total. Given that Australia lost a really well-set and that really important cog-in-the-wheel Matthew Hayden, I give this as an even and the SBS score reads: India 4.25, Australia 3.75! The BCCI has decided to appeal Gautam Gambhir’s 1-Test ban. The ban judge will be appointed by the ICC in 2 days and the hearing will be conducted some 7 days later. This will mean that Gambhir will play the next Test against Australia. In all likelihood, this heavy-handed ban will be over-turned. After Tea, Australia — no, Ricky Ponting — survived a hostile spell of accurate pace bowling from Ishant Sharma and Zaheer Khan. Unlike the Australian bowlers, who mainly bowled wide of off-stump for much of their spells, these two Indian spearheads, attacked the stumps and were making Ponting in particular jump and hop around. However, Ponting was up to the task and motored along. Inshat Sharma and Zaheer Khan were getting some reverse-swing. Ishant Sharma was making the ball jag back in sharply as he had at Mohali. Somehow Ponting survived this spell and hung in there. Sespite his mounting score, you could say that Ponting survived, at best. Unlike, Hayden, who looked very much in control till he got out, Ponting appeared to just hang in there, until he lost control. He had made an 82-run partnership with Hussey when he stepped out to a Virender Sehwag delivery to be bowled by a ball that spun viciously after pitching. The new ball was taken by Ishant Sharma only after 98.1 overs. Interestingly, Sehwag bowled at the other end and in his second over with the new ball, had Hussey clean bowled to a flighted ball that pitched on Hussey’s middle-and-leg stump and turned sharply to break the off stump! Australia was 326-4 at that stage with Hussey gone for a carefully constructed 53 off 146 balls (7 4s). In the very next over, Mishra should have had Watson out LBW. That ball was going on to hit the stumps before it hit anything else! But the umpire thought otherwise. Australia completed the day on 338-4 off 105 overs. Clarke was unbeaten on 21 off 45 balls and Watson was on 4. In the 90 overs bowled in the day, Australia had made 288 runs (at 3.2 rpo). Incidentally, 90 overs had been bowled in the day, perhaps for the first time in this match. The Match Referee is perhaps disappointed that India completed its quota of overs for the day — he must be disappointed that he could not ping and Asian player/team today! Even though India were without the services of Harbhajan Singh and Anil Kumble, Amit Mishra and Virender Sehwag had shown plenty of guile and mustard to have Inida slightly in the drivers’ seat. India has its hand on the steering wheel last night. Tonight, while India is still in the drivers’ seat, its hand is not quite on the steering wheel. It was an absorbing days’ cricket. Australia are still 275 runs behind with 6 wickets in hand. I gave India the last session, just marginally because of the two wickets (Ponting and Hussey) that had fallen. The SBS score reads: India 5.0, Australia 4.0! Tagged Australia, Cricket, Haydeny, India, Katich, Kumble, Ponting, Test India Vs Australia :: 2nd Test :: Mohali :: Day-1 After the drawn Test in Bengaluru, much was said and written in the three-day gap to send bloggers, TV reporters and print media into a bit of a spin. From Anil Kumble, who retorted angrily to uncharitable comments written against him to “The Australian” who write as only “The Australian” can, everyone chipped in to claim psychological victories, despite empty couches at psychiatric clinics! Thankfully, the match commenced to put an end to speculations and barbs. As expected, Anil Kumble did the right thing and sat out the Test match. He said that he would not play if he was 100% fit and that’s what the thorough gentleman did. I sometimes think that players like Anil Kumble and Rahul Dravid are misfits in India. Despite playing with a fractured jaw at times and despite always doing the right thing over 20 years or more in the cricket spotlight with nary a black spot on their proud record, they are still come up against the Dilip Vengsarkars of this world. While it is understandable that the Vengsarkars of this world are there to create ink-space on paper when there would be vacuum otherwise, I am sure they could do it without knocking their own! Politics of envy does run deep in India. Unfortunately, their vile feeds off and affects independent thinkers too, like some who contribute to this blog! Anil Kumble was termed a show pony by one gentleman. Another blamed him for carrying an injury into the Bangalore Test. Sigh! Amit Mishra was chosen ahead of Munaf Patel as Kumble’s replacement in the team. At first I thought that this was a somewhat strange move for three reasons. (a) Mishra would be making his debut and hence, perhaps this would not make for a strong bowling combination, (b) Munaf Patel is really at the top of his game these days, (c) Mohali does offer something to the pace bowlers. However, after having seen the 1st Day’s play, I think the option of having a leg spinner is not such a bad option. Mishra is an orthodox give-it-plenty-of-flight type bowler and could trouble the Australians on a 4th day pitch with some bounce. Meanwhile, Australia’s injury-woes continue. After Bryce McGain, Phil Jaques has succumbed to his back injuries and will be flying back to Sydney. His replacements have not been named, but the names David Hussey, Brad Hodge and Shaun Marsh appear to be doing the rounds! 1st Session: M. S. Dhoni, Team India captain, won the toss and had no hesitation in batting first. If there was any movement on this track, that was extinguished in the first ball of the Test match! After that, it was pretty much up-and-down stuff. So this was a crucial toss to win, especially since Dhoni said his reading of the pitch was that it would take spin as the match progresses. The idea would have been to occupy the crease, bat positively and bat once! The only way the Indians could get out on this track would be through laziness, bad-strokes or bad-luck. And that is pretty much what happened during the day! A combination of laziness (Gambhir), bad-stroke (Dravid) and bad luck (Sehwag, Laxman) and a stunning catch by Matthew Hayden (Tendulkar) meant that India finished the day 5 wickets down. The Indians started off with terrific intent and without taking too many risks, had moved to 70 before Virender Sehwag fell to a faint tickle down the leg side. This was the first of two thin edges during the day. Brad Haddin, who kept well on what was more of a true-bounce Australia-style pitch, pouched both of these catches. Gautam Gambhir, who has this wonderful ability to rotate the strike in the short form of the game, should re-think his approach to Test cricket. In the first half of the first session, runs flowed off his bat quite freely. He scored some spectacular boundaries, particularly on the off-side. Several of his off-drives would have sent the current owner of that stroke, Sourav Ganguly, back to the nets to correct technical flaws! He was in cracking form. Yet, when the field spread, Gambhir seemed to struggle to pick up the singles and twos. Gambhir has made 1052 runs in his 18 Test matches. Indeed, on a day of landmarks and milestones, the fact that he had crossed a 1000 runs in Tests may have been missed by commentators! His milestone would have added to the milestones of Tendulkar (crossing Lara’s tally, scoring his 50th half-century and crossing 12,000 runs) and Ganguly (crossing 7000 runs). And if that wasn’t enough, Ishant Sharma crossed 100 runs in Tests too! Gambhir’s 1052 runs have come at a somewhat disappointing, but acceptable average, of 36.27. However, the pain point is that it contains only one century — and that against Bangladesh! Since he forced his way back into the Test side, on the back of his superlative ODI form, Gautam Gambhir has been in cracking form. He has been at the very top of his game. In 5 Tests this year he has scored 427 runs at 47.44 with a high-score of 74. Somehow, Gambhir needs to find that switch inside him that enables him to convert these terrific starts into big ones. All he needs to do is walk down the pitch and talk to Virender Sehwag! Rahul Dravid, meanwhile, left his slow-gear back in the dressing room! He walked out, at the fall of Sehwag’s wicket, with purpose and determination. The moment he commenced with a confident straight drive down the track for a well-hit boundary, I thought this was a different Dravid that we were seeing. India finished the 1st Session at 104-1 off 25 overs! Yes, just 25 overs were bowled in the 1st Session which clearly belonged to India. I scored the SBS as [India 1.0, Australia 0.0]. 2nd Session: This was a crazy session, if ever there was one. This was also a session in which Australia was gifted a return-to-the-game ticket by the Indians! And perhaps this is being a bit uncharitable to the Australians who really sweated and fought it out. Ricky Ponting set innovative fields and tried to choke the run-flow. The bowlers bowled to these fields. But with the pitch doing absolutely nothing, batsmen who did not kick on the make a big score ought to be kicking themselves. At least, I hope they are! When the session commenced, Rahul Dravid was on fire. He played some exquisite leg-side flicks and on-drives. He was back to his very best. And before anyone realised, India was at 146-1. A score of about 500+ was definitely possible and the “bat long, bat once” theory was starting to take shape. Suddenly, against the run of play, Dravid under-edged a delivery from Brett Lee that was too close to his body to cut! He was bowled off the inside edge for a well-made 39. A few balls later, with the India score still on 146, Gautam Gambhir, whose runs had somewhat dried up, played a tired shot to a delivery outside off stump for Brad Haddin to accept the nick! That bought Sachin Tendulkar and V. V. S. Laxman to the crease. Both were looking somewhat composed and ready for a big score. When Laxman had made 12 off 19, he was the second thin-edge of the day to head back! Mitchell Johnson was almost embarassed to accept the wicket — this was his 3rd wicket for the day! The delivery was wide down the legside. Laxman didn’t need to play it. But the opportunity to get a boundary was there. So it was fair enough that he, like Sehwag earlier in the day, played at it. However, what resulted was a thin edge in both cases, and Brad Haddin did the rest. India was 163-4 and suddenly a score of 300 was looking good! Sachin Tendulkar and Sourav Ganguly had other ideas though. They settled things down and took India to Tea at 174-4 in 51 overs. Just 70 runs had been scored in that session. India lost 3 wickets. Australia had bowled just 26 overs. This was clearly an Australia session. The SBS at this time was [India 1.0, Australia 1.0]. 3rd Session: The stage was set for this to be the Sachin Tendulkar session! Tendulkar started the session just a few runs short of Brian Lara’s record for the most Test runs. Shortly after resumption, at 2.31 pm, to be precise, Sachin Tendulkar steered a Peter Siddle delivery to third-man for three runs. There was relief on his face and just as he was running his 3rd run, the fireworks went off at the Mohali stadium! The fireworks didn’t stop for nearly 3 minutes! It looked like the Mohali organisers had taken control of the game and had held a gun to the games’ head! While it is ok to celebrate a milestone… 3 minutes of non-stop fireworks? The cricketers on the ground had a bored look on their faces! The umpires wore frowns. Even Sachin Tendulkar appeared to be embarassed — the game has always been bigger than the individual! Indeed, the fireworks could have distracted Tendulkar and Ganguly from a task that was much more important than the milestone that the organisers were intent on celebration. Tendulkar and Ganguly had to get India out of a slippery slope and instead we had the organisers taking center-stage in that midst of what was a tense Test cricket match! This was totally insane! It turned out that the organisers had planned to have 11,954 crackers go off! In his post match interview, Tendulkar said, “The duration [of the fireworks] was bit worrying. Eventually I figured out it was 11,954 crackers or something like that.” I shake my head in dismay! Only in India! Brian Lara’s record — he overtook Allan Border’s long-standing record at Adelaide — had stood for nearly three years (and stood for 2 years after Lara had played his last Test). In what was a milestone-break session, Tendulkar also scored his 50th half-century and he also became the first player to cross the 12,000-run mark. From here on in, he is in his own space in terms of aggregates and records! For a while, that is… By my reckoning, unless catastrophe strikes, Ricky Ponting will overtake him one day. How long Tendulkar holds this record depends on how long he plays for and how long his body allows him to keep playing. Of the players in the 10,000+ Runs Club, only Rahul Dravid (10,341 from 127 Tests) and Ponting (10,239 from 121 Tests) are still playing. At the rate at which he is going right now, I do think that it will be a matter of time before Ricky Ponting catches up to Tendulkar. In the session, Tendulkar also missed on on his 40th century in Tests! After crossing Brian Lara’s milestone, Tendulkar played more freely. Indeed, he played exquisitely in my view. There was timing, placement, power and art in his playing. Apart from one false stroke against Cameron White when he danced down the wicket to play a lofted shot that ought to have been caught in the deep, there was nothing wrong with his batting today. Here was a master at work. In my view, it was fitting that Tendulkar reached this milestone against Australia. Gavaskar crossed Boycott’s record against West Indies, the best team of that day. Lara and Tendulkar had created their records against Australia, the most dominant team of their times. But records apart, there was a job to do for both Ganguly and Tendulkar. They focussed on that in the post-Tea session and played with alacrity and application. This was a flat track on which the bowlers had to toil. Cameron White, who had been held back for much of the day — Ricky Ponting preferred to bowl Michael Clarke as his first-use spin bowler in what was perhaps Ponting’s only captaincy blemish of the day! The fields that Ponting had set right through the day were innovative and inventive. He led effectively and ran in the changes frequently. He did not let the game meander too much. But there were two question marks, in my view. One was the over-rate. The other was the under-utilisation of Cameron White (and the preference for Michael Clarke over Cameron White). More on the over-rates later. Sourav Ganguly was somewhat lucky to still be there though! There was some doubt in a stumping appeal that Rudi Koertzen did not refer to the 3rd umpire. It was hard to say from replays whether Sourav Ganguly had brought his foot down before Brad Haddin had whipped the bails off. I’d like to believe that the 3rd umpire would have given the benefit of the doubt to the batsman. However, it does puzzle me to see umpires not using the video-umpire option more often in such close calls. We saw Steve Bucknor not refer what was a clear stumping decision in Sydney — we, of course, also saw one that was referred in Sydney that was out but not given by the Australian 3rd umpire on that day! But that is another story altogether. Close calls just have to be referred upstairs! It seemed that Tendulkar was destined for a century. He had made 88 off 11 balls. With 3 overs left in the days’ play Tendulkar seemed to play late at a delivery from Peter Siddle that was just outside off-stump. Matthew Hayden swooped low to pull off a truly amazing slips catch. Just as Tendulkar had gifted Cameron White his first Test wicket at Bengaluru, here at Mohali, Tendulkar made another debutant Victorian bowler happy with his first Test scalp! India was 305-5 then. At the end of the days’ play, India reached 311-5 off 85 overs (at 3.65 rpo). Play had already been extended by the maximum allowable half hour at that point in time. Ishant Sharma, who had come in as night-watchman, was not out on 2 and Ganguly was not out on 54. I score the last session as 0.75 in India’s favour because Tendulkar got out. So the SBS score reads [India 1.75, Australia 1.25]. Final Points: I must say that India let opportunities slip on this opening day. After winning the toss, a score of 311-5 would be a bit of a disappointment with not much batting to come after Sourav Ganguly. M. S. Dhoni hasn’t done much with the bat in recent Test matches although captaincy does bring out the best in this young man. Although Zaheer Khan and Harbhajan Singh did bat well in Bengaluru, I am not sure if we can expect the lower order to fire every time they go out to bat. Amit Mishra is no mug with the bat either (he has a highest score of 84 in first class matches). However, I can’t see India doing a “bat long, bat once” in this Test match. Australia is very much in the game. In that sense, Australia will consider themselves lucky. If Australia can take the remaining Indian wickets for 90 runs or so, they can bat long — they bat deep — and be the ones that have last use of this wicket! Something must be done about the pathetic over rates that Australia bowl. To end the day 5 overs short even after play had been extended by half hour is a terribly poor show. All through the last summer, we at i3j3 carried stats on the pathetically poor over rates of Australia and compared this with the Indian over rates — after all Channel-9 seem to pick up only too readily Indian over rates when, if they could look beyond the end of their noses, they would see that there is a world out there! I do wish the match referee censures Ricky Ponting for this bad showing. Even considering the 5 minutes that was lost to the fireworks and celebrations, this is a poor show by a proud cricketing team. Tagged Australia, Border, Cricket, Dravid, Gambhir, Ganguly, Gavaskar, India, Lara, Ponting, Sehwag, Tendulkar, Test This is “new age cricket”? I thought that totally naff phrases and silly tags were mothballed in cricket after the departure of John Buchanan. But no, Australia has continued its recent proud tradition of producing naff tags — and this latest pearl may be from the Guru Greg Chappell stable — to come up with “new age cricket“. They were going to try out new-age-cricket (NAC) in the ongoing series against India! It basically involves hassling the opposition continually for runs — presumably because the opposition is old or unfit or lazy or all of the above! NAC also means setting innovative fields so that the opposition’s run rate dries up — presumably because the opposition is too old, fat, lazy and unfit to run singles and depend on 4s to keep the scoreboard ticking! So this is what NAC is. Firstly, what’s wrong with just plain cricket? Second, this NAC stuff does not appear to be working! Early signs are that it has bombed in the face of Ricky Ponting! After the Australian 1st innings (a report on the 2nd day has been compiled by Mahesh) an admittedly early review of NAC indicates to me that naffness is not restricted to the term — the theory is as naff as the term! Australia wanted to hustle the old-fat-lazy Indian fielders when batting and restrict the scoring rate of the opposition when fielding. Results show that Australia scored at 2.81 runs per over and are giving away runs at about 4 an over right now. Yes, it is early days, but will someone tell the Australian team that it is time to mothball this NAC stuff? As an admirer of Australian cricket, it was painful for me to see Australia crawl at 2.8rpo through the innings. This is not the Australia I know. And if this is what new-age hustling of old-fat-lazy fielders results in, give me the old-age stuff any day! Another facet of their cricket that I did not like much was the way Ricky Ponting and Michael Hussey played. They were just too cautious. They gave the conditions and the opposition bowlers way too much respect. If an Indian batsman had played the way Ricky Ponting, most newspaper analysts (ok, I use that term very lightly), bloggers and TV anchors would have termed it a “selfish” approach that put self ahead of the team! Homer alludes to this in his blog post. Ponting made 123 runs off 331 balls and Hussey made 146 off 402 balls at batting rates that would have made Anshuman Gaekwad and Chetan Chauhan proud! This wasn’t Australia, was it? Or was it the NAC Australia? Moreover, Australia should continue to play the way Australia plays best. To get on top of the bowling. To keep the scoreboard ticking. To keep the foot on the pedal and to not let the opposition back into the game. That’s the way Australia has won over the last 10 years or so. And that’s the only way this team will continue to produce results as impressively as it has. These theories are good for the paper they are written on. They give people like Buchanan and Chappell something to do when they are in the dressing room and when sleep threatens to overtake them on a hot summer day! However, cricket is played by able bodied men who do things the way they have been doing. For some time now, we have been critics of India trying to play the “Australian Way” — in your face, aggressive, high-adrenaline cricket, when it doesn’t quite come naturally to them! Similarly, it is time to question this new approach that Australia seems to have adopted — a very Indian way of playing grinding cricket on dust bowls. A style of game that comes quite naturally to the Akash Chopras and Rahul Dravid’s of the world. In my view, this over-cautious approach of eking out runs and looking for singles all the time in a bid to wear out the opposition is very un-Austrlian-like. Moreover, it is this very facet that kept India in the game right through the Australian 1st innings! If I were an Indian bowler/fielder and if I had been on the pitch for 5 sessions (approx 150 overs) against Australia and if I had looked at the scoreboard to see the score read only 400 for 6, why would I not launch into a wild dance? Why would I allow my shoulders to droop? Why would I allow my spirits to flag? In previous Tests gone by, after 5 sessions against Australia, the scoreboard may well have read 615 for 6! When batting, Australia kept India in the game through over-cautious NAC and while fielding these supposedly innovative field-settings are leaking runs at nearly 4rpo — admittedly things may be different if/when Sehwag departs. And admittedly this is all early days yet. But in my view, if it ain’t broken there’s no need to fix it! Tagged Australia, Cricket, India, Test India Vs Australia :: 1st Test :: Bangalore :: Day-1 Posted on 9 October 2008 by mohankaus | 21 comments After Ricky Ponting had claimed overnight that he was insulted by Virender Sehwag’s comments about the captain’s pact and the Sydney Test, Ponting won the toss and elected to bat. If there was drama off the pitch overnight, there was drama on the pitch in the first over itself. Ponting said overnight, “That’s fairly insulting. In the first innings [at the SCG] I didn’t claim a catch because I wasn’t 100% sure. It’s amazing how they’ve picked out a lot of negatives from that game and don’t seem to be speaking about the Perth Test [the third match of that series, which Australia lost], where we probably had the same things happen to us. Not one member of the Australian team has spoken about it. We go about our cricket in different ways.” A few things to seek clarifications on: Firstly, the issue I always have with Australian cricket is about how they play when the chips are down and they have their backs to the wall. So, Ponting’s 1st innings call-back in Sydney just doesn’t rate, in my view. Secondly, what happened at the Perth Test where Ponting had the “same things happen to” Australia? Is he dreaming up stuff? Or was there a Test match in Perth that I missed? And thirdly, what is it about Australian cricket that gets Ponting to say “We go about our cricket in different ways.” Is he referring to that piece of paper called the spirit of cricket (or some such nonsense) that Australian cricketers signed up and seem to tear up the moment they cross the white line? The last time Australia toured India, the series started with a loud shout for LBW. There was little doubt in the minds of the TV commentators at that time that Justin Langer was out LBW off Irfan Pathan’s first ball of the series. Who knows what would have happened to the series had that decision gone India’s way! Pre-Lunch Session: So, there was drama on the field in the very first over and then again in the 9th over. Off the very 3rd ball of the innings, Matthew Hayden jabbed at a ball from Zaheer Khan that moved away a fraction. As he jabbed at the ball, his bat clipped his pad. The ball slipped past very close to bat and umpire Asad Rauf gave him out. Snickometer suggested that if we had had a referral system in play for this Test match, Hayden would have been given not out. Ishant Sharma continued his duel with Ricky Ponting. He bowled splendidly really. Off the 1st ball of the 9th over, Ricky Ponting did not offer a stroke to a beauty that came in sharply from outside off stump. It looked very very close and indeed, Hawk Eye showed that umpire Rudi Koertzen would have been over-ruled if we had had a referral system in place. So make the Bad Decision Score (BDS) 1-1 in the bad decision stakes! Harbhajan Singh was introduced in the 13th over, just before the drinks break. After spearing in his first ball at 96.3kmph, he bowled a beauty to Simon Katich that was almost a bat-pad catch at forward short leg! At the drinks break, Katich and Ponting had pulled Australia to 34-1 off 13 overs. But there weren’t really any gremlins in the pitch. It seemed to me to be a flat track. So as long as the Australians settled down into a nice rhythm, one could see several of them make big scores here. The best bet for Australia would be to make a huge 1st innings total. Off the second ball of the 21st over, Simon Katich came charging down the wicket and padded up to a faster one from Kumble. Now, I am not sure why Rudi Koertzen is reluctant to give padded-up deliveries out. Although Katich was well advanced down the pitch, that ball was going to be intercepted by the middle stump and nothing else! The BDS reads 2-1 in favour of Australia. Despite losing that early wicket, Australia played with intent and desperation to finish strongly. At lunch, Australia were 75-1 off 27 overs with Ponting on 41 and Katich on 28. Ponting was playing really well and was looking set for a big score here. I’d give the Session-by-Session Score (SBS Score) to Australia. With Cameron White batting at #8 and with the pitch being a flat and stone cold wicket, I’d put Australia in the drivers’ seat! Which brings me to an important question: Given that many Indian curators are easily able to produce a flat, dead wicket, do we need a Kiwi in Bangalore to do the same? What’s the point? Will someone tell me please? We have seen many pitches like this in India in the past. Why get a Kiwi in as curator to produce exactly that kind of pitch again? There were some ominous signs. The last time Australia played in India in 2004, the tour commenced at Bangalore. Australia was 70-1 off 26 overs at lunch on day-1 with Hayden out and with Langer 27* and Katich 9*! The parallels here are eerily similar! Post-Lunch Session: Ponting and Katich commenced from where they left off and batted confidently. Ponting got his half century — a carefully and very well compiled 50 it was too. At 94-1, Katich survived a huge LBW shout off Anil Kumble. Umpire Asad Rauf gave him not out and under a referral system, he would have had to walk. This then makes the BDS score 3-1 in Australia’s favour! Clearly a referral system would change the dynamic of any match and I can’t wait for it to be introduced in all Test matches. Australia, meanwhile moved on steadily to 99-1. There was nothing flashy about the Australian approach. The usual flamboyance was eschewed and, in its place, was a staid and solid approach on a flat and mostly dead pitch. It didn’t help that both Kumble and Harbhajan Singh were bowling a bit flat. They were both firing and spearing it in. A sign of Ricky Ponting’s growing assurance and confidence was a hoik over cow-corner for a huge six that he played against Harbhajan Singh, the moment Singh came around the wicket to bowl to him. This six helped take Australia to a score of 104-1 and also took Ponting to a score of 60, equalling his best ever effort in India — made in 1998 in Kolkata. Australia kept going from strength to strength and moved to 166-1. Katich was playing some glorious off drives and Ponting was looking quite assured in his batting. Suddenly Ishant Sharma bowled a beauty to get Katich caught behind. The ball moved just slightly off the pitch and Katich played an aggressive off-drive to be caught behind quite well. Australia was 166-2 with Ponting on a superbly compiled 94. This bought Michael Hussey to the crease. What was surprising to me was the under-utilisation of Virender Sehwag, Sachin Tendulkar and Sourav Ganguly in the bowling. At Tea, all the bowling (57 overs) had been shared by Zaheer Khan, Ishant Sharma, Harbhajan Singh and Anil Kumble. It seemed to me that Kumble should have used at least Sehwag. His variety of off-spin may have found some spin on this somewhat dead track. At tea, Australia was 166-2. I give this session to Australia too, thereby making the SBS Score 2-0 in Australia’s favour with Ricky Ponting leading the way. Ponting was playing really brilliantly. He batted with soft-hands, few loose shots and waited for the ball, rather than lunge for it as he has in the past. As he said before the tour, India was one place where his CV had a rather desolate look to it. This innings was an attempt to redress that imbalance. He was taking this game slowly away from India and had Simon Katich for company. Post-Tea Session: The final session went the same way as Session-2. Anil Kumble did not pose any threats. Australia marched steadily and slowly. There were no heroics and no fears either. The run-rate hovered around the 3rpo mark which wasn’t great. The Australians continually rotated the strike and didn’t allow the Indian bowlers to get on top. About an hour into the final session, there still was no sign of Sehwag or Tendulkar. This first day pitch wasn’t doing anything at all for the regular bowlers and it may just have been a good idea to break up the monotony. Zaheer Khan and Kumble bowled the occasional good ball but there were no gremlins at all. Ponting had moved sedately to 110 off 214 balls and Hussey had, without any dramas, moved to 18 off 43 balls. Suddenly, at 201-2, Anil Kumble shouted for a huge caught-and-bowled off Ricky Ponting. Amazingly, Rudi Koertzen said not out! To the naked eye, watching it on TV, one could not understand why Rudi Koertzen, who was having quite a nightmare day thus far, did not ‘go upstairs’! That was out and Boycott’s dead great grand mother would have called it from her grave! The commentary team indicated that Koertzen did not give him out because Kumble was the only one that appealed! Surely, that can’t be right! If that is the case, we may as well have people jump up and down like school kids all the time! The BDS now read 4-1 in Australia’s favour! Once again, I ask why the ICC did not have a referral system in place for this series? At drinks, Australia was 211-2 off 71 overs! Kumble was having a particularly unlucky day. Apart from the bizarre caught-and-bowled decision that was not given, earlier in the post-tea session, Dhoni had dropped a tough catch off a faint edge. The bowler to suffer there was Kumble. Just after the drinks break, an outside edge off the bat of Hussey went screaming past a diving forward short leg. Things were just not happening for the Indians and a few heads were starting to droop. At the other end, Harbhajan Singh was continuing to have an ordinary day at the office. He continued to toil manfully though. It was a tough pitch to bowl on and the Australians were playing with tight defence. At 215-2 Kumble was to suffer again at the hands of his nemesis, Rudi Koertzen. A huge shout for LBW was once again turned down! Hawk Eye showed that the ball was hit in line and that it would have hit off stump. A frustrated Kumble appealed for what appeared for a second longer to which Umpire Koertzen pursed his lips and shook his head sternly like a firm school master! Well, this umpires’ nightmare day at the office was continuing. Of extreme worry for the Indians was that the Bad Decision Score (BDS) had mounted to 5-1 in Australia’s favour. Ironically, it was a really doubtful decision that got Ricky Ponting out! It all started with Virender Sehwag coming into the bowling attack. This change was long overdue. Suddenly, Sehwag was finding more grip and purchase from the track. He put a seed of doubt in the mind of the batsmen. Hussey wasn’t playing particularly confidently. At the other end, Harbhajan Singh pushed a fuller ball into Ponting, who tried to sweep it. Hawk Eye suggested that it may have hit Ricky Ponting slightly outside the line of the off stump! Moreover, the ball turned so much that it may have missed leg stump! Umpire Asad Rauf gave Ponting out when he should have been ruled in! The men in white continued their horror run and the BDS read 5-2 in Australia’s favour. Another marquee series was being ruined by officiating incompetence. Australia, wh weren’t really scoring with freedom and abandon was 226-3 off 79 overs. A team that regularly travels at 4 runs per over (or more) was suddenly travelling at about 2.85rpo. This was a gritty, stoic and very un-Australian like performance. Ricky Ponting had departed for a really well made 123 off 243 balls before getting out to Harbhajan Singh for the 9th time in Test matches! Anil Kumble came on for just one over — in which he conceded 13 runs, the most expensive over of the innings — before continuing with Sehwag. This was turning out to be a strange session. Australia hadn’t really pulled away with any authority. But for that one bad over from Kumble, they hadn’t really tried to dominate or dictate terms. So, in some sense, due to the slow, low score, Australia left India hovering in the game. One or two quick wickets would set the cat amongst the pigeons. So this was a somewhat strangely careful game that Australia was playing. Suddenly, Harbhajan Singh was bowling better. He had slowed his delivery pace and was also tossing the occasional ball up in the air. He was prepared to come around the wickets to the left-handed Hussey, who had quietly moved to 40 runs off 107. India took the new ball with three overs left in the days’ play. A few quick runs resulted and Australia moved to 254-3 off 89 overs. Off the penultimate over, Michael Clarke took a quick single off the last ball of the over. Off the very second ball of the last over, Clarke was out LBW to a low shooter off Zaheer Khan. Clarke was out LBW for 11. I was tempted to give that last session to Australia. However, because the Aussies did not press on and move on, and because of the last ball wicket of Michael Clarke, I call this an India session. The SBS score reads 2-1 in Australia’s favour. It was a dull but eventful days’ cricket: Eventful because of the men-in-white. Dull, because of Australia’s over-cautious approach; dull because of the nonsense of a pitch that the Kiwi curator had prepared for the Bangalore public. If I were KSCA, the state association that owns the Bangalore ground, I’d be looking at the Kiwi curators’ employment contract! Tagged Australia, Bangalore, Harbhajan, Hayden, Hussey, India, Ishant Sharma, Koertzen, Langer, Ponting, Rauf, Sehwag, Test Flab Four about to hand over series to Sri Lanka This may be a headline that is written too soon — and I agree that it is the person who lives dangerously that writes off a Dravid-Laxman-led revival. However, I would be most surprised if India wins this Test match from here. India go into day-4 just 14 runs ahead and with most of their recognised batsmen back in the hut. Dravid and a limping-Laxman would perhaps need to live in Harry-Porter-Land to pull this one off. Harbhajan Singh is looking for a miracle from Dravid and Laxman! He said, at the conclusion of the 3rd days’ play, “We are looking to have good partnership in the morning. I hope Laxman and Dravid play what they played in Kolkata (in 2001) and put us in a good situation. And from there if we win the game it will be a great win for Indian cricket.” He then went on to have a dig at the batsmen, when he said, “Obviously, it is a little disappointment that as a batting unit we did not perform what we should actually have. These are the guys who have won games for India. It is just a matter of not clicking perhaps.” The peach, however, was when he attributed Ajanta Mendis’s phenomenal rise to luck! “I wish I could pick his luck, the wicket taking luck. We all bowl the same sort of delivery. Obviously he is new in international cricket. The more the people play him the more they will get to see him. More people will learn about him. Obviously he got some variation and every ball have variations. Basically I would like to steal his luck. Wicket taking luck!” Hmmm! That explains a lot then! Harbhajan Singh puts down his own miserable run with the ball to lack of luck! It is not about bowling tripe. It is not about the miserable fielding that the Indians have displayed in this series. It is about wicket-taking luck! For the state that Team India finds herself in, one can blame the fielding — and it has been bad. But then, one could mount an argument that it has always been bad! So, whats’ new? One can blame the bowling — and it has been inconsistent and insipid. But then it always has been an inconsistent area for India! For me and my money, the Team India state is reflected by its middle order batting. It is the insipid middle order batting that has made the difference in this series. India’s middle-order was its strength. It is not at this current point in time. Time after time, good starts have been squandered by acts that remind us of rabbits and headlights! There is a certain nervous tentativeness about the middle order batting that does not bode well for Indian cricket. Although Muthiah Muralitharan and Ajanta Mendis have bowled splendidly, I am convinced that India’s much celebrated “F(L)ab Four” haven’t contributed to the series situation. As Dileep Premachandran said in his piece in Cricinfo, there has been a muddle order about the Indian middle order in this series. India went into this series against Sri Lanka with a much-celebrated middle order. They are returning from the series with more questions than answers. I am sure that the call for the slow (perhaps forced) retirement of the celebrated four will only grow to shrill-pitch when the team returns to India regardless of the outcome of the current Test match! Tagged Cricket, Dravid, Ganguly, Harbhajan Singh, India, Laxman, Sri Lanka, Tendulkar, Test Anil Kumble: The perfect man for the job… Posted on 7 August 2008 by mohankaus | 1 comment Contributed by CWO A couple of years ago, I came across an article about a corporate business man and his leadership skills. Although I do not remember the article’s name or the person who was quoted in it, a certain aspect of that article stays with me even today. The six qualities that he listed as imperative to define a good leader were: A deep understanding of the business Willingness to admit a mistake The ability to listen Let us set our sights on Anil Kumble and see how he measures up against the above criteria. His is a hard gig. After all, he has, as Team India’s Test Captain, one of the most challenging assignments in International cricket! Anil Kumble started his career seventeen years ago, at the age of twenty. He has played under five captains; including Sourav Ganguly — India’s most triumphant Test captain. After seventeen years in the game, at the ripe age of thirty-six, Anil Kumble became India’s 30th Test captain in Team India’s 76-year history of playing Test cricket. Anil Kumble always had integrity, but he had to prove this under the pressures of leading. Being the captain of India brings more pressure than any other Test cricketing nation. The watchful eye of one billion passionate fans dissects every decision made, scrutinises every loss, and rewards every achievement. Indian cricket fans are among the most — if not the most passionate fans in the world. The perfect opportunity for Anil Kumble to show his integrity came after the second Test at Sydney against Australia in 2008 where India suffered a very controversial loss in a Test that was boiling over with controversy. It was Anil Kumble’s second Test series as a captain, and perhaps his hardest Test. It was up to him to decide what route to take: whether defend his player, his country, his loss; whether to demonstrate restrained integrity or petulant anger. Anil Kumble epitomized the definition of integrity when he revealed his apology to Ricky Ponting over the Harbhajan Singh controversy. He even pointed out that Australia had not played that Test in the right spirit, and addressed the umpiring controversy. He said what had to be said without offending his hosts. He made up his differences with Michael Clarke and Ricky Ponting; and withdrew charges against Brad Hogg. Does Anil Kumble have a deep understanding of the business? Of course he does. He has played in over one hundred Test matches, and based on his experience, he quickly embraced the Team India Test captaincy. He won the first Test series he captained against Pakistan. He then went on to achieve a phenomenal victory against Australia in India’s 3rd Test against the Australians at Perth. In doing so, he had conquered the lion in its own den! He also denied Australia a new record in the number of consecutive Test wins. He also helped redeem India’s honour. Anil Kumble has shown a great understanding of Test cricket. This is the reason why many Test captains fail. They tend to lose the consistency of their own performances when they become captain! Partly, this could be ascribed to them caving under pressure. Partly, this is justifed by the distractions that one has when one is a player as well as captain. Unlike a soccer captain, say, a cricket captain makes many on-field tactical decisions and the focus on this can often take consistency away from their own game. However, Anil Kumble has not caved. In fact, he has done quite the opposite. Since becoming captain, he has taken 46 wickets in 11 matches. He has been India’s lead wicket taker as well as a match winner. For years, many an Indian victory has resulted from great performances by Anil Kumble. Since becoming captain he has not disappointed. Anil Kumble is as consistent as ever. Anil Kumble has always made it a point, since his reign of captaincy started, to take the blame and admit his mistakes. He berated himself for his poor performance in the first Test against Sri Lanka where he went without a wicket. He showed this in his post game interview where he blamed himself by saying, “I take it [my lack of form], but we all tried hard”, and supported the efforts of India. There is no greater example of his ability to listen than when India played Australia for the Border-Gavasker Trophy. It was the third Test at Perth. Ishant Sharma was at the conclusion of a huge spell where he had bowled seven overs on the trot on a hot and sticky day! He was bowling a terrific spell and had Ricky Ponting in all sorts of trouble. Anil Kumble was about to take him off. Just then, Virender Sehwag talked to Anil Kumble and suggested that he allow Ishant Sharma bowl another over. Anil Kumble was receptive to the suggestion and let Ishant Sharma bowl another over. Ishant Sharma did not miss the opportunity! He dismissed Ricky Ponting in that over. So far we have seen every quality of a leader encompassed in Anil Kumble. The final and the most important quality, perhaps, is decisiveness. Has Anil Kumble been decisive, and has he shown us that he can win games with smart decisions on-and-off the field? It may be a little early in his captaincy-career to decide if he has made many correct decisions or not, but his Test match results so far show us that he has indeed made many correct decisions. His decisions have led him to one series win, one series loss, and one series drawn. When Rahul Dravid resigned, after taking the Indian Test team to new heights, the leadership responsibility was placed on the shoulders of Anil Kumble. According to many experts and media outlets, Mahendra Singh Dhoni was the leading candidate at that stage. However, it boiled down to a decision around what was best for Indian cricket; especially for Test cricket. While M. S. Dhoni has had a lot of success in other forms of cricket as a captain, when it came to Test cricket, Anil Kumble was always the perfect man for the job. — CWO Tagged Cricket, Dhoni, India, Kumble, Test
cc/2019-30/en_middle_0028.json.gz/line1595007
__label__wiki
0.610683
0.610683
Fonterra Confirms Dispute Resolution Process with Danone: Fonterra today confirmed that it is in a dispute resolution process with Danone following the whey protein concentrate precautionary recall initiated in August this year. The discussions between Fonterra and Danone had been confidential with a view to reaching a mutually acceptable commercial outcome however some aspects of these discussions have been made public this morning in the press. Fonterra confirms that the discussions remain ongoing but strongly denies any legal liability to Danone in relation to the recall. Wool Expo Shows the Way to ‘Rest in Fleece’: A coffin, handbags, pet rugs and digitally printed fabrics made from wool are among exhibits that feature in Wool Expo 2013 that takes to the road this month. A partnership between the Campaign for Wool, PGG Wrightson Wool, and Massey University’s College of Creative Arts, the expo begins in Gisborne in two weeks and works it’s way down the east of the north island to end in Masterton in the middle of November. Some revolutionary and innovative woollen concepts are explored, exhibited and demonstrated in the expo that will be based in PGG Wrightson’s retail stores in the six centres where the road show stops. A coffin made of wool is featured. The idea isn’t new – back in the 1600s, in a bid to bolster Britain’s textile industry the British parliament passed a law requiring all corpses to be buried in a woollen shroud. Spin forward to 2009 when a prototype and sturdier wool coffin led to the present version. . . Speech to the Primary Growth Partnership expo – Nathan Guy: . . . Innovation has been a hallmark of our primary industries for well over a century. To become a world leader, the sector has always made great use of science, technology – and innovation. Just consider the dramatic shift in the way the sector produces, processes, markets and transports food products compared to even a few decades ago. For example, we now produce the same amount of sheep meat today as we did in the early 1980s but with around half the number of sheep. The global food market of the 21st century is changing rapidly and there are great opportunities for our food sector, particularly in Asia. . . Martyn Dunne welcomed as new MPI Director-General: Federated Farmers is pleased to welcome Martyn Dunne CNZM as the new Director-General of the Ministry for Primary Industries (MPI). “Martyn Dunne brings a completely new dimension to the leadership of the MPI,” says Dr William Rolleston, Federated Farmers Vice-President. “Mr Dunne brings a huge wealth of experience being New Zealand’s current High Commissioner in Canberra, the immediate past Comptroller of Customs and Chief Executive of the New Zealand Customs Service and before that, a Major-General in the New Zealand Army. . . Federated Farmers builds talent with new appointments: Federated Farmers policy resource is being built up by several new appointments including a new dedicated regional policy advisor to be based in its Invercargill office. “Federated Farmers is serious about meeting the needs of our members and is investing is capability where it is needed,” says Conor English, Federated Farmers Chief Executive. “We have excellent and well qualified staff and I am pleased to announce two new policy staff. . . Farm with royal connections goes on the market: A history-rich farm once visited by Prince Charles for a private day’s trout fishing has been placed on the market. Macdonald’s Farm near Galatea in the Eastern Bay of Plenty is a sprawling 907 hectare sheep and beef breeding/finishing property. The Whirinaki River, which runs rich with rainbow and brown trout, is on the western boundary for the farm. Prince Charles was flown into the farm during the royal family visit here in 1970 to celebrate the bicentennial discovery of New Zealand by Captain James Cook. . . Synlait Milk supports AgResearch’s approach to campus development: Canterbury milk nutrition company Synlait Milk is supportive of the investment by AgResearch in its campus infrastructure. Synlait Milk Managing Director Dr John Penno says there is recognition of the growing importance of Canterbury as an agricultural powerhouse. “Canterbury is New Zealand’s fastest growing milk supply region, with production growth at an average 11% per season for the last 12 seasons. We acknowledge the technical challenges this growth brings, in particular farmers ability to manage their environmental footprint. . . New Zealand wine industry participates in national sustainability project: The wine industry is the first to trial a new national environmental, economic and social performance Dashboard system. Led by The Agribusiness Group Ltd and funded by government and industries, the $11 million New Zealand Sustainability Dashboard project will provide a sustainability assessment and reporting tool for the primary industry sectors. The Dashboard project will deliver tools that provide farmers and growers with crucial information on the environmental, economic and social performance of their vineyards or farms. Information from key performance indicators will be used to improve results in areas such as energy use, nitrogen loss, carbon footprint and maintenance of biodiversity. . . Prestigious Awards Reflect Heritage for Johanneshof Cellars: Another two Gold Medals and a Trophy for Johanneshof Cellars at the recent New Zealand International Wine Show held over the weekend, reinforces the opinion that this Boutique Winery is on a record breaking streak. Just six weeks ago Wine Makers Edel Everling and Warwick Foley were on the winners podium at the 2013 Spiegelau International Wine Competition, accepting four medals and 3 trophies, including joint ‘Champion Producer of the Show’. This time the Johanneshof Cellars 2011 Noble Late Harvest Riesling and the 2012 Marlborough Gewürztraminer received Gold Medal honours with the Gewürztraminer being awarded overall Trophy. How does this unique winery, nestled in a tiny valley on the outskirts of the seaport town of Picton on New Zealand’s South Island, continually have the spotlight shined on them? . . . Prized Clayvin Vineyard signs lease with Giesen Wines: One of the oldest and most prized vineyards in New Zealand, Clayvin Vineyard in Marlborough, has signed a long-term lease to Giesen Wines. The coveted vineyard, which is more than 20 years old, covers 13.4ha in the sought after Wairau Valley, and has supplied grapes for a string of award-winning wines over the years. Developed in 1991, Clayvin was Marlborough’s first commercial hillside vineyard. Wholly organic, the block comprises 7.8ha of Pinot Noir vines, 3.36ha of Chardonnay, 1ha of Syrah, and another hectare of younger Sauvignon Blanc vines that are not yet in production. . . Cloudy Bay 2013 Sauvignon Blanc Released Worldwide Today: The 2013 vintage of Cloudy Bay’s international benchmark wine is now available to fine wine lovers worldwide from today Tuesday October 1st. An outstanding summer with excellent growing conditions has enabled Cloudy Bay winemakers to craft New Zealand’s most precious summer flavours into their Sauvignon Blanc 2013 vintage. Widely regarded as the quintessential expression of the acclaimed Marlborough wine region – which enjoys the longest hours of sunshine of any place in New Zealand, Cloudy Bay’s Sauvignon Blanc is noted for its vibrant aromatics, layers of pure fruit flavours and fine structure. . . Leave a Comment » | business, Farming, rural | Tagged: AgResearch, Agribusiness Group, Clayvin Vineyard, Cloudy Bay, Conor English, Danone, Dr William Rolleston, Federated Farmers, Fonterra, Giesen Wines, Johanneshof Cellars, Macdonald’s Farm, Martyn Dunne, Nathan Guy, NZ Sustainability Dashboard, Synliat Milk | Permalink $65 million early windfall for Ballance farmers: More than 18,000 New Zealand farmers are in for some good news this week, as Ballance Agri-Nutrients delivers support for cashflows at the start of the spring season with an early record rebate payment. Ballance’s record rebate and dividend will start arriving in shareholders’ letterboxes this week as the co-operative pays out $65 million to shareholders six weeks ahead of schedule. The co-operative announced a rebate and dividend averaging $65 a tonne last month and advised shareholders it would pay out earlier than usual to help shareholders with early season cashflows. The rebate averaging $60.83 per tonne and a fully imputed dividend of 10 cents per share represents an average $6,500 return to a fully paid shareholder. It follows the record trading result of $92.6 million delivered by the co-operative. . . Farmer development programme benefits sector: Following a successful pilot during 2012, Beef + Lamb New Zealand is now rolling out a development programme for farmers on B+LNZ farmer councils and those involved in project farms. Facilitated by the Agri-Women’s Development Trust (AWDT), the programme covers three broad topics: governance, communications and decision-making, and leadership. Each topic is covered in a two-day module in Wellington. Wairarapa farmer George Tatham was one of 12 farmers from across New Zealand involved in the pilot. George, who has since become chair of the Eastern North Island farmer council, says the skills he picked up over the three modules have benefited his farm business, as well as his council work. . . . Changes expected to have major impact on dairy farmers – Crowe Horwath, The Inland Revenue Department (“IRD”) has announced that fundamental changes are going to be made to the National Standard Cost (NSC) valuation methodology for dairy cattle that will increase livestock values commencing from the 2014 income year. While there are a variety of livestock valuation methods available to farmers, the valuation methods most commonly used are NSC and the Herd Scheme. As a result, the changes will have a wide ranging impact on dairy farmers. You might be thinking, well why do I care about a change in valuation methodology? The reason why this change is important for dairy farmers using the NSC valuation method is that any increases in value arising under the NSC valuation method are taxable income to the farmer. This will see an increase in taxable income for all dairy farmers using the NSC valuation method. . . Top ram producers recognised: New Zealand’s top ram producers were toasted on Wednesday night at the Sheep Industry Awards in Invercargill. About 300 farmers and industry people attended the awards run by Beef + Lamb. George and Kathryn Smith from Tamlet stud, near Wyndham, won the Alliance Group Terminal Sire gold award. They run 300 recorded Texel ewes, 500 recorded Coopworth and 500 Romney ewes. The Blackdale Sheep Industry Supplier of the Year Award went to Hugh and Judy Akers of Broadlands Station, who supply ANZCO. . . Grass alone won’t grow the economy: The fruits of a literary collaboration on innovation between the late Sir Paul Callaghan and award-winning science communicator Professor Shaun Hendy will be unveiled at Victoria University tonight. The two physicists are authors of Get off the Grass, which will be launched in Wellington tonight (Thursday 15 August) and follows on from Sir Paul’s earlier book, Wool to Weta, which was published in 2009. Get off the Grass argues that innovation in high-tech niches is the key to increasing New Zealand’s prosperity and that New Zealand needs to export knowledge rather than nature. . . Entries open for international wine competition: Entries are now open for the 2013 Avenues International Aromatic Wine Competition. Hosted by the Canterbury A&P Association in conjunction with the Canterbury A&P Show, the competition has been running for eleven years and is supported by competition naming rights partner Avenues – the magazine Christchurch lives by. “Avenues is delighted to again be a sponsor of the International Aromatic Wine Competition. Nearly three-quarters of Avenues readers enjoy wine as part of their lifestyle, so it is fitting for us to support an event that toasts the best aromatic wines and their producers,” says Avenues Sales Manager Craig du Plooy. . . Johanneshof Cellars Top Honours and Three Trophies at Spiegelau International Wine Competition: Four medals, 3 trophies including joint ‘Producer of the Show’; not a bad effort for only entering five wines. Johanneshof Cellars, a small boutique winery in Marlborough, New Zealand, has taken top honours in the 2013 Spiegelau International Wine Competition. Not only did the winery’s haul of accolades capture a cross section of their handcrafted wines including sparkling and dessert wines, but the two Gold medal winning wines went on to receive the Trophy for Champion Wine in both categories. The rare success of winning two trophies in one Show culminated at the end of the evening in Johanneshof Cellars being awarded the joint Trophy for ‘Champion Producer of the Show’. . . Leave a Comment » | business, Farming, rural | Tagged: Agri-Women’s Development Trust (AWDT), Avenues International Aromatic Wine Competition, Ballance Agri-Nutrients, Beef + Lamb NZ, Broadlands Station, Crowe Horwath, George Smith, George Tatham, Get Off The Grass, Herd Scheme, Hugh Akers, Johanneshof Cellars, Judy Akers, Kathryn Smith, National Standard Cost (NSC), Professor Shaun Hendy, Sheep Industry Awards, Sir Paul Callaghan, Spiegelau International Wine Competition, Tamlet stud | Permalink
cc/2019-30/en_middle_0028.json.gz/line1595009
__label__wiki
0.78447
0.78447
Home | News | Amazon Original THE BOYS Gets Spicy in new NSFW Trailer Amazon Original THE BOYS Gets Spicy in new NSFW Trailer AMAZON ORIGINAL THE BOYS GETS SPICY AS THEY PLOT TO TAKE DOWN THE CORRUPT HEROES OF THE SEVEN IN NEW NSFW TRAILER Amazon Original The Boys Will Be in More Than 200 Countries and Territories on July 26 on Amazon Prime Video The Boys, launching July 26 on Amazon Prime Video, is a fun and irreverent take on what happens when superheroes – who are as popular as celebrities, as influential as politicians and as revered as Gods – abuse their superpowers rather than use them for good. It’s the powerless against the super powerful as The Boys embark on a heroic quest to expose the truth about The Seven, and Vought – the multi-billion dollar conglomerate that manages these superheroes and covers up all of their dirty secrets. The Boys are Billy Butcher (Karl Urban, “Star Trek”), Hughie (Jack Quaid, “The Hunger Games”), Mother’s Milk (Laz Alonso, “Detroit”), Frenchie (Tomer Capon, “Hostages”), and The Female (Karen Fukuhara, “Suicide Squad”). Simon Pegg (“Mission: Impossible – Fallout”) guest stars as Hughie’s father. The Supes of The Seven are led by Homelander (Antony Starr, “Banshee”) who is joined by Starlight (Erin Moriarty, “Captain Fantastic”), Queen Maeve (Dominique McElligott, “House of Cards”), A-Train (Jessie T. Usher, “Independence Day: Resurgence”), The Deep (Chace Crawford, “Gossip Girl”) and Black Noir (Nathan Mitchell, “Supernatural”). Academy Award® nominee Elisabeth Shue (“Leaving Las Vegas”) stars as Madelyn Stillwell, Vought’s Senior VP of Hero Management. Based on The New York Times best-selling comic by Garth Ennis and Darick Robertson, “The Boys” was developed by showrunner Eric Kripke (“Supernatural”), who also serves as writer, executive producer and directed the season finale. Joining Kripke as executive producers are Point Grey Pictures’ Seth Rogen (“Preacher”), Evan Goldberg (“Preacher”), and James Weaver (“Preacher”), Original Film’s Neal H. Moritz (“Prison Break”), Pavun Shetty (“New Girl”) and Ori Marmur (“Preacher”), as well as Ken Levin and Jason Netter. Ennis and Robertson also co-executive produce. The pilot episode was directed by Dan Trachtenberg (“10 Cloverfield Lane”). The eight-episode Amazon Prime Video original series is co-produced by Amazon Studios and Sony Pictures Television Studios with Point Grey Pictures, Kripke Enterprises and Original Film. SOCIAL MEDIA HANDLES: Instagram: @TheBoysTV Twitter: @TheBoysTV Facebook: /TheBoysTV Hashtag: #TheBoysTV Tags THE BOYS
cc/2019-30/en_middle_0028.json.gz/line1595011
__label__wiki
0.726559
0.726559
Home | News | Arrow Video US – July 2019 Release Schedule Arrow Video US – July 2019 Release Schedule New from Arrow Video US and Arrow Academy US FM [Blu-ray] (7/2) THE LOVELESS [Blu-ray] (7/9) HOLD BACK THE DAWN [Blu-ray] (7/16) THE CHILL FACTOR [Blu-ray] (7/16) WEIRD SCIENCE [Blu-ray] [Steelbook] (7/23) via MVD Entertainment Group This July Arrow Wants to Help You Chill While Making Things Weird With the dog days of summer upon us, Arrow continues to provide plenty of reasons to stay inside and beat the heat. This July, Arrow brings home four new titles that will help make this summer vacation the best one yet. On July 2nd, Arrow is proud to bring home the late ’70s rock-n-roll comedy, FM. Oscar-nominated John A. Alonzo directs this story of radio station mutiny. After being forced to play more commercials, including military recruitment ads, DJs and other employees take control and fight their corporate bosses by playing as much music as possible. This new HD release, transferred from the original camera negatives, features a rocking collection of special features including a brand new interview with the film’s star, Michael Brandon. Kathryn Bigelow’s debut feature (co-directed by Monty Montgomery), The Loveless, comes home on July 9th. Set in the ’50s, The Loveless is the story of a motorcycle gang heading to the races in Daytona. Along the way they stop in a small southern town, leaving the locals less they pleased. Willem Dafoe, also making his debut, stars. The Loveless is presented fully restored and in HD for the first time, with a new transfer approved by Montgomery and director of photography, Doyle Smith. On July 16th, Arrow offers up two releases on complete opposite sides of the spectrum. First up is 1941’s Hold Back the Dawn. Directed by Mitchell Leisen, and nominated for six Oscars, Hold Back the Dawn is the story of one man’s hope of making it to the U.S. by marrying a citizen. The plan is to leave his would-be bride upon making his way into the country, but the plan has a few hiccups thanks to a determined immigration officer and a true love that begins to blossom. Hold Back the Dawn is presented in HD for the first time. The second release coming July 16th is The Chill Factor. This early ’90s effort, also known as Demon Possessed, is the only film directed by producer Christopher Webster. A group of friends out on a snowmobile trip seek refuge when one of them gets knocked unconscious following an accident. They locate an abandoned cabin to take cover, but this particularly cabin happens to hold a number of bizarre religious artifacts and they mistakenly awaken a terrible evil. This rare horror oddity, which didn’t see much of a release beyond a small VHS run, gets a brand new 2K transfer and comes fully loaded with an avalanche of special features. Rounding out the month is the July 23rd release of Weird Science, one of the greatest films the ’80s has to offer. Coming in a totally awesome steelbook, this John Hughes classic about a pair of nerds that attempt to create the perfect woman via their computer is a must for any collection. This release from Arrow features a brand new 4K restoration from the original negatives and includes the original theatrical release as well as the extended version. As an added bonus, a standard definition transfer of the edited-for-TV release is included. Additional special features include an archive documentary and a number of new interviews. COMPLETE DETAILS, SPECIAL FEATURES, and HI-RES ART BELOW Michael Brandon (Four Flies on Grey Velvet) stars as Jeff Dugan, the ultra-cool program director at Q-SKY Radio, LA’s number one rock station. The airwaves crackle with the delectable sound of smooth rock in FM, a riotous comedy about the heady world of late-70s US radio. SKU: AV206 SRP: 39.95 Street Date: 07/02/19 PreBook Date: 05/28/19 Label: Arrow Video High-res Cover Art (JPG) » The Loveless A motorcycle gang roars into a small southern town en route to the Daytona races, unnerving the locals with their standoffish attitude and disrespect for social niceties. When one of their number, the charismatic Vance (Dafoe), hooks up with sportscar-driving Telena (Marin Kanter, Endangered Species), he incurs the wrath of the girl’s father, setting the gang on a collision with the town. The Chill Factor The Exorcist meets the Winter Olympics in this tale of demonic possession and snowbound slashing from director Christopher Webster, producer of Hellraiser and Hellraiser II: Hellbound. Hold Back The Dawn Charles Boyer (Gaslight) gives an enthralling performance as Georges Iscovescu, a Romanian-born gigolo who arrives at a Mexican border town seeking entry to the US. Faced with a waiting period of eight years, George is encouraged by his former dancing partner Anita (Pauline Goddard, Modern Times) to marry an American girl and desert her once safely across the border. SKU: AA049 Label: Arrow Academy Perenially picked-on high school nerds Gary (Anthony Michael Hall, Sixteen Candles) and Wyatt (Ilan Mitchell-Smith) are sick of their status at the bottom of the social food chain. Using Wyatt’s computer, the two hatch a plan to create their dream woman – and following a massive power surge, that woman unexpectedly appears in the form of Lisa (Kelly LeBrock). Weird Science (Steelbook) WWW.MVDB2B.COM | 800.888.0486 | Fax: 610-495-1545 Arrow Video Official Channels www.facebook.com/ArrowVideo twitter.com/ArrowFilmsVideo http://www.youtube.com/arrowvideouk www.instagram.com/arrowvideo Tags Arrow Video Arrow Video US – June 2019 Release Schedule Arrow Video US – April 2019 Release Schedule Arrow Video US – February 2019 Release Schedule Arrow Video FrightFest Announces Glasgow Film Festival 2019 line-up Arrow Video US – January 2019 Release Schedule Arrow Video US – December 2018 Release Schedule
cc/2019-30/en_middle_0028.json.gz/line1595012
__label__wiki
0.877738
0.877738
GOV NEWS Latest Laws News Michigan court mulls legality of weaker wage, sick time laws LANSING, Mich. (AP) — Michigan Republicans' maneuver to weaken voter-proposed laws to raise the minimum wage and require paid sick leave was "outright unconstitutional," a top appellate lawyer said Wednesday while urging the state Supreme Court to stand as a "last line of defense" against the unprecedented... New law grants farm workers right to unionize, get overtime ALBANY, N.Y. (AP) — New York farm workers have the right to unionize, get overtime pay and take at least one day off per week under a labor law signed Wednesday by Gov. Andrew Cuomo. The Farm Laborers Fair Labor Practices Act eliminates an 80-year-old provision in New York state law that prohibits... Legislator says law limiting state auditor is a 'mistake' BISMARCK, N.D. (AP) — A Republican lawmaker who backed a new law that requires the state auditor to get the North Dakota Legislature's approval for conducting performance audits said Wednesday he will introduce legislation next session to overturn it. Approval of the measure to clip the auditor's wings,... Jul. 17, 2019 8:01 AM EDT If you are saving for retirement, you probably know about the 401(k) and the Roth IRA too. But are you familiar with a Roth 401(k)? It's a bit of a mashup — a Roth product available through your traditional 401(k). It allows people to save after-tax money through their workplace plan that can then be... The Latest: Immigrant advocates sue over new asylum rule WASHINGTON (AP) — The Latest on the Trump administration's effort to end asylum protections for many migrants (all times local): 4:40 p.m. Immigrant advocates are suing the Trump administration over its move to end asylum protections for most migrants who cross the southern U.S. border. The American Civil... Hong Kong protests expand to oppose China, with no end near HONG KONG (AP) — Colin Wong has come to know the sting of pepper spray well. After more than a month of demonstrations in Hong Kong's sweltering heat, memories of the burning sensation are a constant reminder of what protesters call an excessive use of force by police. Each time he felt the now-familiar... Prosecutors stake opposite positions in death penalty appeal HARRISBURG, Pa. (AP) — Philadelphia's top prosecutor and the state district attorneys' association have staked out opposing positions in a case that will determine if Pennsylvania's death penalty will remain in effect. Philadelphia District Attorney Larry Krasner said Tuesday his own review found the... State officials update Idaho's 50-year-old mining laws BOISE, Idaho (AP) — State officials on Tuesday approved a rewrite of Idaho's 50-year-old mining law, but they still have work to do. Republican Gov. Brad Little and other members of the Idaho Land Board voted to adopt rules intended to give mining companies the financial leeway to mine but also avoid... Florida sued over sanctuary policy ban MIAMI (AP) — The city of South Miami and a coalition of immigrant advocates sued Florida Gov. Ron DeSantis on Tuesday over a new law that forces local law enforcement agencies to cooperate with federal immigration officials. Activists representing farmworkers, Haitian immigrants, and asylum seekers warned... Murphy signs bill aimed at making smart guns available BERKELEY HEIGHTS, N.J. (AP) — Gov. Phil Murphy on Tuesday signed into law a measure to make so-called smart guns available in the state, reversing his predecessor's vetoes of similar legislation. Murphy, a Democrat, signed the bill at Governor Livingston High School alongside Attorney General Gurbir...
cc/2019-30/en_middle_0028.json.gz/line1595013
__label__cc
0.5087
0.4913
SemoSearch semo.jobs BC-US--Congress-Russia Probe,11th Ld-Writethru Inside a strange scene at the White House: Trump bails on meeting Trump demands Democrats drop probe, won't negotiate infrastructure until they do Trump rules out working with Democrats while under investigation Trump fires back, cuts off negotiations with Democrats during investigations The Latest: Striking back, Trump says 'I don't do cover-ups' Trump fights back, said no infrastructure talks while Democrats investigate him President Donald Trump delivers a statement in the Rose Garden of the White House, Wednesday, May 22, 2019, in Washington. (AP Photo/Evan Vucci) Speaker of the House Nancy Pelosi, D-Calif., center, Senate Minority Leader Chuck Schumer, D-N.Y., right, and other congressional leaders, react to a failed meeting with President Donald Trump at the White House on infrastructure, at the Capitol in Washington, Wednesday, May 22, 2019. From left are House Majority Leader Steny Hoyer, D-Md., Sen. Ron Wyden, D-Ore., House Transportation and Infrastructure Committee Chair Peter DeFazio, D-Ore., Pelosi, House Majority Whip James E. Clyburn, D-S.C., and Schumer. (AP Photo/J. Scott Applewhite) President Donald Trump walks off after delivering a statement in the Rose Garden of the White House, Wednesday, May 22, 2019, in Washington. (AP Photo/Evan Vucci) House Judiciary Committee Chairman Jerrold Nadler, D-N.Y., speaks during a hearing without former White House Counsel Don McGahn, who was a key figure in special counsel Robert Mueller's investigation, on Capitol Hill in Washington, Tuesday, May 21, 2019. (AP Photo/Patrick Semansky) Rep. Steve Cohen, D-Tenn., speaks to reporters following a House Judiciary Committee hearing without former White House Counsel Don McGahn, who was a key figure in special counsel Robert Mueller's investigation, on Capitol Hill in Washington, Tuesday, May 21, 2019. President Donald Trump directed McGahn to defy a congressional subpoena to testify but the committee's chairman, Rep. Jerrold Nadler, D-N.Y., has threatened to hold McGahn in contempt of Congress if he doesn't appear. (AP Photo/Andrew Harnik) FILE - In this May 16, 2019, file photo, President Donald Trump speaks in the Rose Garden of the White House in Washington. A judge is poised to hear oral arguments Wednesday, May 22, 2019, over Trump's effort to block congressional subpoenas seeking financial records from two banks. The hearing occurs after congressional Democrats sought the information from Deutsche Bank and Capital One. (AP Photo/Manuel Balce Ceneta, File)
cc/2019-30/en_middle_0028.json.gz/line1595014
__label__wiki
0.501012
0.501012
Videowalls Enhancing the Fan Experience Through Digital Signage by Natalie Zfat digital signage content, IT Strategy, Infocomm, Sports Venue, Attractions I don’t know about you, but when I think about sports, digital signage isn’t the first thing that comes to mind (with the possible exception of menu screens at concession stands. Yum!). But at InfoComm 2018, I learned that digital signage is not only ever-present — it’s actually improving fan engagement. I spoke with BJ Vander Linden, CIO of the NBA’s Utah Jazz, about how displays in arenas and stadiums can create a better experience for fans of all ages. “The fans come for the content that’s on the floor or on the field,” Vander Linden explained. “But the screens and the information … enhance the overall experience, whether it’s highlight videos or directions to find their seat or the closest hot dog.” And the evolution of digital signage in the sports world has come a long way in the last few years. “We’ve gone from posters, static content and physical signage to dynamic products with new features,” Vander Linden added. “It changes the overall experience so the fan can better engage with all there is to offer in the arena.” Now that’s something I’m willing to root for. Discover Samsung’s full line of display solutions, from high-brightness digital kiosks to massive LED videowalls. The Ultimate Guide to LED Signage Deployments From design to viewing distance and content development, learn how to create immersive installations of direct-view LED signage. Business Buildings Display the Future With Digital Signage With 8K Displays, It’s All About the Details Dual-Sided Displays Optimize Window Marketing Innovation Highlights Samsung’s Executive Briefing Center Samsung Awards Shine Light on Best of Best in Smart Signage Natalie Zfat Natalie Zfat is a social media entrepreneur and Forbes Contributor who has partnered with some of the most iconic brands in the world, including Rolling Stone, Food Network, American Express and Levi’s. Curating original content and videos, Zfat gains millions of impressions for the brands she advocates for. When she's not engaging with her half a million followers, Zfat loves sharing her entrepreneurial thought leadership at conferences and universities, including Carnegie Mellon, NYU Stern School of Business, The Harvard Club of New York and Internet of Things World. Follow Natalie on Twitter: @NatalieZfat View all posts by Natalie Zfat
cc/2019-30/en_middle_0028.json.gz/line1595020
__label__wiki
0.591261
0.591261
Has Donald Trump Appointed Madam Maryam Rajavi As Foreign Minister Of Albania? by Olsi Jazexhi7 months ago2 comments The news of the expulsion of two Iranian diplomats caught everybody by surprise in Tirana on December 20. The Iranian embassy and its ambassador Gholamhossein Mohammandia have kept a very low profile in Tirana in the past months. While Iran has been very upset with Albania, which since 2013 is hosting on its soil a violent Iranian jihadi organization, the Mojahedin e Khalq (MEK), its embassy and ambassador who understand that Albania is not an independent state, but a puppet of the U. S., has kept a very low profile. The most that the embassy has done is to politely ask Albania to respect Iran which has always respected Albania, to distance itself from MEK’s terrorism and to warn Albania about this terrorist organization. The Iranian Mojahedin who started to come to Albania as war refugees since 2013, have since the election of Donald Trump in the White House become very aggressive in the country. The MEK which runs a paramilitary camp in the village of Manza outside Durres, have been accused by various Albanian and Western media outlets of running illegal activities in Albania. MEK, which breaks many Albanian and international laws, calls on a daily basis for violent jihad against Iran. They keep many of their members in slave-like conditions, who are brainwashed and radicalized with the idea of violent jihad. If an Albanian were to do in Albania what MEK and their cult leader Maryam Rajavi does, he or she would have ended up in jail as a terrorist and imprisoned for up to 15 years. However, Albania does not implement its laws on MEK, since they are ordered not to do so by the Americans. From its paramilitary camp in the village of Manza, MEK carries out daily twitter attacks, fake news production and espionage against Iran, but not only this. The people who are familiar with their websites and publications know that MEK attacks even Albanian and Western media outlets which do not support the stance of the Trump administration regarding Iran or question the ‘democratic’ credentials of this terrorist jihadi organization. Through its paid writers MEK has attacked in recent months many Western news outlets, like the MSNBC, Al-Jazeera English, Britain’s Channel 4 News, The Guardian, and The Independent. It has also attacked many media and personalities in Albania, including Albania’s former president, Rexhep Mejdani, by claiming that they work for Iran against the ‘democratic opposition’ of Madame Maryam Rajavi. MEK which does not use and does not accept democracy and criticism has never accepted a public debate about its past and present crimes, its cultish organization and the enslavement of its members. Anyone who dares to criticize them is viciously lynched and attacked as an Iranian agent, advocate of the Mullahs of Tehran or as someone who is part of Tehran’s influence operations. Thanks to the total American control over Albania, MEK has established a state within a state. In its paramilitary camp in Manez, MEK keeps many of its members as slaves, does not allow them to walk out of the camp, talk to their families, marry, have families, find a job and live a free life. By psychological coercion and brainwashing it threatens anyone who dares to question the existence of this violent paramilitary cult with either direct violence as they did with the journalist of Channel 4 or the Canadian Mostafa Mohammadi, the father of Somayeh Mohammadi (a radicalized jihadi woman whom they keep in isolation), or else they launch slander and verbal attacks. Thanks to the total American control over Albania, MEK has established a state within a state. The verbal and slander attacks that MEK conducts against the free media in Albania, have created a climate of fear in the country. In July 2018 when Mostafa Mohammadi was in the country and sued MEK for abduction and radicalization of his daughter who has abandoned Canada and joined the jihad of MEK, few Albanian media outlets dared to publish his story. Stories have emerged of how MEK paid many media outlets in the country in order to buy their silence regarding the abduction of Somayeh Mohammadi. MEK commanders like Behzad Saffari, Farid Totounchi (Mahoutchi), Jila Deyhim visited all major media outlets in Albania to ‘convince’ them not to publish anything against MEK and their ‘holy’ supreme leader, Maryam Rajavi. MEK has managed to terrorize not only the media but even many Albanian MPs. An Albanian MP who takes part in the meetings that MEK and Maryam Rajavi holds every year in Paris under the banner of Free Iran, told the writer of this article that “We know who the MEK are. They are a terrorist organization, whom the Americans killed themselves. But the Americans have told us to protect them, and we are protecting them.” Since their arrival in Albania in 2013, MEK which acts like Al-Qaeda in the Taliban’s Afghanistan, has continuously asked the Albanian government to close the Iranian embassy in Tirana and expel the ‘Mullah’s diplomats’, since according to MEK the government of Iran is not the one based in Teheran, but is Maryam Rajavi and her jihadis. The Albanian government which was forced by the Americans to host these ex-terrorists as war refugees has found itself in a very difficult position in the last years. The Iranian refugees of MEK are not acting like the refugees from Syria, Palestine, Iraq and Afghanistan to whom Albania has offered asylum. They do not integrate but dictate their own policies to their host country. The Albanian government which has dealt with the issue of violent extremism in the past is very upset to see how MEK breaks many laws in Albania, keeps their members as slaves, beats their opponents in the streets of Tirana, harasses journalists, and according to an Albanian police report they harass, blackmail and can even kill their own members. The pro-MEK MP who sits on Albanian National Security Council with whom I spoke in August 2018, told me: “We are in a very difficult position with MEK. We go to Paris to support Maryam Rajavi, because our British and American friends tell us to do so. MEK is very unhappy with the Rama government because they are not doing what MEK is asking him to do. But the opposition (Democratic Party) MPs are supporting them. We make sure that they do not keep guns in their hands. I told them to open their camp and deradicalize, but on the other hand we have the Iranian embassy here. With MEK, we do what the Americans tell us to do. I have told MEK that they must integrate themselves into Albanian society, open their camp but I do not know if they will listen to me.” While Albania is in very difficult situation with the MEK and Albanian public opinion is very upset with the Edi Rama government for bringing these terrorists in the country, MEK are offered a high class treatment by the Trump and Israeli administrations and are used as a major carrot by the U.S. administration against the European Union and its policies towards Iran. The E.U. and many other governments are upset with Albania for hosting MEK, but they do understand the difficult situation of the corrupt government of Edi Rama which is accused of cooperating with major drug trafficking organizations. The announcement on Twitter by John Bolton, the U.S. National Security Advisor of President Trump, that the Prime Minister of Albania, Edi Rama had expelled the Iranian ambassador from Albania caught everyone by surprise in Tirana. Edi Rama, who most probably was not aware of what the Americans were up to, has not made a single statement about this event and it seems that he did not know what was going on, until Bolton communicated to Tirana and the world the news on December 19. When MEK organized a propaganda meeting in Manez on December 15, they asked Pandeli Majko, Minister of the Diaspora in the Rama government ‘why does Albania still host an Iranian Embassy in Tirana’. Majko who is a major supporter of MEK and has previously supported the Bush administration in its rendition and torture programs in Afghanistan and Iraq, told the MEK that we keep the Iranian embassy in Tirana because of international law. Albanian government officials, contrary to what John Bolton claimed, had not expelled any Iranian diplomat and had no idea what was going to come. The Iranian embassy did not know anything as well and had not received anything from the Albanian government. When news of the expulsion of the Iranian diplomats broke, many Albanian journalists who deal with issues of security, terrorism and crime contacted the Albanian Foreign Ministry to ask what was going on and who were the people that Albania was planning to expel. The Foreign Ministry had no answer since they did not know. PM Edi Rama, who is facing major scandals and public protests in the country, also seemed confused by the expulsion story. A parliamentary delegation from Albania meets with Maryam Rajavi The whole history of the expulsion of the Iranian diplomats from Albania seems like a Trump – Netanyahu desperate affair which uses poor, corrupt and obedient Albania for their global confrontation with the European Union and other major world powers against Iran. The Americans and Israelis know that Edi Rama and his corrupt government will not dare to say no to the Americans. After the announcement, Rama was congratulated by the Israeli PM Benjamin Netanyahu, Donald Trump and others in the U.S. administration for the ‘brave act’ that Albania and he probably did not know was coming. Israeli and U.S. media outlets are producing amazingly outrageous fake news stories about the expulsion of the Iranian diplomats. They now are accusing Iran for planning an attack on the Israeli football team which played in Albania in 2016, even though the Israelis and the Americans back in 2016 accused ISIS for this falsely claimed attack. Back in 2016, the government of Edi Rama, which does anything to appease Israel and America, created a major embarrassment against the Muslim community in Albania by detaining and terrorizing 200 Muslims throughout the country, while the governments of Albania and Kosovo jailed dozens of Muslims and Imams without any proof. These people who have been held in incarceration without any facts for more than two years for their alleged plan to attack Israelis, up to this moment have not been convicted, since Albanian prosecutors have not managed to find a single piece of evidence of the intended attack that Israel claimed in 2016. The fantastic fake news story that the Israeli Mossad produced in November 2016 against the Muslims of Albania and Kosovo is now being twisted again. The Trump administration and their Israeli friends, who for some very strange reasons ordered the Albanian government via Twitter to expel two Iranian diplomats, are now accusing Iran of planning to kill the Israelis in 2016. Shpend Kursani, a Kosovar deradicalisation expert and Fatjon Mejdini an investigative journalist who were commenting on Tim Judah’s Twitter account on 20 December 2018 wrote: Which would mean, charges against those who were locked in the prison because, as their court proceesings suggest, of their links to ISIS, should be dropped, and prosecution should restart, perhaps by replacing "ISIS" with "Iran" in charges. What a contradiction would that be 🙂 — Shpend Kursani (@ShpendKursani) December 19, 2018 I would suspect so for MEK as well. Now they can twist if they way not us to know otherwise they. But the citizens in Albania alao have the right to know the truth. So look fwd if you learn smth new The comments of Kursani and Mejdini above show the confusion and amazement that exists in Albania regarding the expulsion of the Iranian diplomats and the claim that Iran and not ISIS planned to attack the Israelis back in 2016. Albanian journalists, many of whom were trained by the Americans and Israelis themselves on issues of extremism and violent jihad are shocked by what they read from the U.S. administration and Israeli officials. Every decent human being on this planet knows that Iran has nothing to do with terrorism in Albania and its ambassador has been expelled not by Albania but by the American dictate. The request for his removal is a fulfillment of the demands that MEK has been making to Albania and many European governments for many years. While MEK and the Americans have been unsuccessful in forcing the Europeans to join John Bolton and Netanyahu’s crusade against Iran, the removal of the Iranian ambassador from Albania seems like a last desperate attempt by Trump administration against the EU. PM Edi Rama, who should feel very nervous about the way that Israel, the U.S. and MEK have taken control over the foreign policy of his country, has not commented on the event yet. He understands that the old terrorist lady Maryam Rajavi and her jihadi soldiers whom Edi Rama welcomed generously in Albania in 2015, have now managed to take hostage the foreign policies of his country. Edi Rama whose government has voted against Israel and Trump in the United Nations on the question of Jerusalem, in order to appease the Europeans, knows that the Europeans are angry about what is going on with his country’s foreign policy. The expulsion of the Iranian diplomats will not sound good in Brussels. MEK, Israel and the U.S. are using Albania as a prostitute in their confrontation with Europe and Iran. However, Madam Maryam Rajavi, who claims to her jihadi radicals that she is the president-elect of Iran, should be smiling now. The Americans and Israelis have now set her to act as the Foreign Minister of Albania even though Edi Rama welcomed her in Albania in 2015 as a war refugee and not as a member of his government. Olsi Jazexhi Olsi Jazexhi is a Canadian-Albanian historian who is specialized in the history of Islam, nationalism and religious reformation in Southeastern Europe. His interest covers nationalism, radicalism, religious and ethnic identities in the Balkans. Officials: US Warplanes Will Stop Bombing Syria After Troops Leave Germany To Ban Iran’s US-Sanctioned Mahan Air Alexander Hanely Olsi Jazexhi is a notorious paid agent of the Iranian Ministry of Intelligence and Security. If trying to bomb a gathering thousands of civilians during a March 2018 Nowruz celebration is keeping a low profile, one wonders what keeping a high profile would have meant. You Must Be Logged In To Vote10You Must Be Logged In To Vote Reply Olsi Yazeji Dear jihadi and terrorist commanders Ali Safavi, Behzad Saffari, Jila Deyhim, Farid Toutonchi and other ex-terrorist trollers from Manza paramilitary camp. Since you claim that I am a paid agent or Iran, I challenge you to come at any place and TV station of your choosing to have an open debate of who I am and who are you. I am not an agent like you are. I am not a terrorist like you are. I have not killed people, I do not keep hostages, I am not an agent you old maniacs. I am a scholar of Islam and… Read more » You Must Be Logged In To Vote2-1You Must Be Logged In To Vote Reply
cc/2019-30/en_middle_0028.json.gz/line1595028
__label__wiki
0.964627
0.964627
A brilliant surgeon pushes the boundaries of medicine, morality and race relations at a New York City hospital at the turn of the 20th century in Season 1 of this Cinemax drama series. Throughout 10 episodes--all directed by filmmaker Steven Soderbergh--the show follows Dr. John Thackery (Oscar®-nominee Clive Owen) and his groundbreaking work at the Knickerbocker Hospital (a.k.a. "The Knick") which faces a major upheaval due to an exodus of affluent patrons, an infusion of poor patients, and gross mismanagement of its finances. As he searches to solve a plethora of medical mysteries and develops a cocaine habit, Thackery must deal with a variety of co-workers and patients, including driven new arrival, Dr. Algernon Edwards (Andre Holland) and the wealthy and influential Cornelia Robertson (Juliet Rylance). Also with Eric Johnson, Michael Angarano, Eve Hewson, Cara Seymour, Jeremy Bobb and Chris Sullivan. The Knick, Season 1 © 2014 Home Box Office, Inc. The Knick, The Complete Series True Detective, Season 3 Boardwalk Empire, The Complete Series Banshee, Season 4 The Wire, Season 4 Hunted (US), Season 1 Fargo, Season 3 Top Drama Shows Yellowstone, Season 2 Suits, Season 9 Grantchester, Season 4 Heroes: The Complete Series
cc/2019-30/en_middle_0028.json.gz/line1595034
__label__cc
0.538239
0.461761
Home Popular IT expenditure trends that will rule IT expenditure trends that will rule In its annual report regarding the state of worldwide IT spend, Forrester Research concluded that there would be an expenditure of at least $2.06 trillion throughout the realms of IT service, software and hardware by governments and enterprises in 2013. The United States would supposedly spend the biggest by a long shot apps would be the single biggest spending category of all times. Few weeks earlier Gartner had also released its IT spending estimates which were assumed to gather at $3.7 trillion. Like Gartner, Forrester had also put in a condition that the currency fluctuations were having an impact, especially because of the power and stature of the U.S. dollar in comparison to other currencies. Having been measured in U.S. dollars, growth had more or less been lowered down to 2.3%; and in local currencies to a mere 4.6%. The Software monopoly Forrester’s enormous research analytics reports on expenditure have put software as a giant in the general category for investments, secured at $542 million for 2013. Forrester Research analystAndrew Bartels wrote that software was where most of the big changes in technology were taking place. That is to say, that while legacy, on-premise investments were pining away, the ones that focused on cloud-based implementations such as “smart computing” and SaaS; and were moreover booming in context of big data analytics and mobile apps. Tablets to take over? Looking at the generic IT expenditure wheel, one could clearly say that PCs have been the single-biggest group for computer equipment, sitting at $134.2 million. But practically speaking, the general market notion is that PCs are a shrinking market. Bartels also writes that traditional PCs would be witnessing a mere 3% rise, in spite of the launch of Windows 8 operating system. So now the question that hung above was that what indeed was actually growing? The answer to that would be tablets, and especially the iPad. Forrester reports that the sales of various tablets to government and business would rise up by 36% to $21 billion and as expected the big winner here would also continue to be Apple, as it would take $14 billion from that mentioned share. The self anointed king. The United States; the strength of whose dollar is a bright example of how the country has been and continues to impact global IT expenditure and the other would be the fact that it indeed is the biggest IT consumer, taking in account $819 billion this year. The figures according to Forrester’s estimates say that it would rise up to $875 million in 2014, gearing up to be nearly the size of Asia and Western Europe combined with respect to IT spend. From ITvoir News Desk/Darab Bakhshi Previous articleFacebook is all set to expand its wings beyond social networking Next articleAsia Powercom Unveils India’s Slimmest Powerbank – AP4000A – Portable Power Chinese Hackers are using WhatsApp groups to hack Indian systems: Indian Army Here’s what Apple CEO Tim Cook told PM Modi regarding iPhone SE Airports Authority of India selects Tata Elxsi as design consultant for airports Online retailers clearing up smartphone stocks via pre-GST sales WannaCry ransomware cyberattack fails to paralyse India: some businesses hit Microsoft PowerPoint Adds Real-Time Speech-to-Text Translation
cc/2019-30/en_middle_0028.json.gz/line1595035
__label__wiki
0.697253
0.697253
Quick Links Embassy Consulate in France in India French Embassy in New Delhi Discover the Embassy Indo-French relations Embassy sections 4 Consulates across India 14 Alliances Françaises across India Club Young Leaders Get a visa Visit France Doing business with France Economic team Financing Sustainable development and Climate Change: AFD Indo-French Chamber of Commerce and Industry (IFCCI) Discover French culture and language French cinema All about France Press Section : contacts and presentation Pictures to download (copyright free) on Flickr French Honours for Eminent Persons Bilateral visits News & Archives Official statements and documents for India & France Home > Press & News > Climate > Paris Climate Agreement > Official statements > Climate pledges an "important stage" on road to Paris Bigger font Climate pledges an "important stage" on road to Paris Climate disruption/Green Climate Fund – Joint communiqué issued by M. Laurent Fabius, Minister of Foreign Affairs and International Development, Mme Ségolène Royal, Minister of Ecology, Sustainable Development and Energy, M. Michel Sapin, Minister of Finance and Public Accounts, and Mme Annick Girardin, Minister of State for Development and Francophony Paris, 20 November 2014 At the pledging meeting, 21 countries promised to contribute a total of $9.3 billion to the Green Climate Fund, the new international financing tool for the fight against climate disruption. The Fund must support developing countries in their transition towards trajectories compatible with the goal of limiting global warming to 2ºC. France contributed to the positive momentum through the commitment the President made, at the United Nations climate summit in September, to contribute $1 billion to the Green Climate Fund. This momentum will have to be continued further. Several countries have indicated their intention to contribute soon. France specified that its contribution will be made up of a gift of €489 million and an interest-free loan of €285 million. As early as 2015, armed with its new resources, the Fund will be able to help developing countries finance the reduction of their greenhouse gas emissions and, in particular for the most vulnerable, support their policies for adapting to the effects of climate change. This initial capitalization is an important stage before the COP20 in Lima, on the path to the 2015 Paris Climate Conference, where a new, ambitious, universal agreement on combating climate change must be concluded under the auspices of the United Nations./. Last modified on 08/09/2015 COP23 - France committed for the implementation of the Paris Agreement Laurence Tubiana: Pre-2020 action of developed nations is essential to limit the global average temperature rise - The Times of India Laurence Tubiana: India could lead on Climate Change - The Hindu France first G20 nation to ratify Paris Agreement Ratification of the Paris agreement by the French Parliament India and France lead $1 Trillion Solar investment drive President tells world "time is running out" for the climate Climate deal a framework for future action - Minister Entire section Frequently Asked Questions – Consular Section French Ministry for Europe and Foreign Affairs
cc/2019-30/en_middle_0028.json.gz/line1595046
__label__cc
0.53583
0.46417
1993, Arch Patton, Chapter 1 It Was 1993 By James Strauss Arch was on the beach across from Hanalei, kicking sand, and listening to a small battery powered radio belt out House of the Rising Sun, when his life came apart at the seams. Fired from the CIA for cause, again. Unable to pay for the room he was in at the Hanalei Resort and scared the old German who owned the place would find out the check getting him in was bad before nightfall. No credit cards. No cash. Blowing wind and uncommon blustery sky and surf. Down a one-way road in life that dead-ended right there. He looked up past some sand plants to see a house with its glass windows gaping open. He walked up a narrow path and stepped through one of the windows. Huge green drapes were blasting out all over the place. He stepped in to help out. He stepped in to close the damned window and be on his way. He stepped in and saw a classified file sitting alone on top of a coffee table. That could not happen in real life. It would have been better to see a UFO or a real Zombie. He should never ever have walked over to see whether the document was real or not. Never ever. The bottom of the pit in his barren life went downward when he did. Arch was trying to write his first novel about success when he was coming down one side of life’s precipice called utter failure. The haven that is Hawaii, a far-flung island getaway. Pre-9/11, when you could still run. Even from them, for a while. Writing away out of life’s hole deeper than any depression. Lie because there was no truth. Nobody to tell the truth to, if there was any. Truth, like leprosy, because anyone foolish enough to internalize it would slowly begin to have parts of mind and body fall off. No sharing of such disaster. The opposite of selfishness when selfishness would so have served to at least get through one night, instead of Bacardi rum with a can of sliced pineapple chaser. Rum robbed from under the bar over at Charro’s place next door, allowed only because of her ridiculously misplaced trust. Arch wrote in the room diary, left there by the strange German owner, because no novel can ever be held together with rum. He would have to sober up to write and that wasn’t happening. Arch knew he’d have to come back for the diary just because of what he was putting in it, but that would be later, if there was to be a later. The strains of the song House of the Rising Sun played again. More pineapple. He’d kept the Top Secret file stolen from the blowing drape house. It lay there atop his chest, spattered with fruit juice and rum. Somebody would be coming. Somebody would have to come. Arch needed someone to come. The room’s diary demanded truth or the best he could do. So he gave it what it seemed to demand. He wrote into the night, waiting for whoever was not coming, or was coming, because if someone wasn’t coming then something was. Mission Impossibles had been his game, one after another, except without the great companions, the experts, the money, the toys or even care pouring in behind to get them done or recover from the doing. There had been a grim expectation that he’d find a way, because Arch was all of that. A way finder. Nothing macho. Studied cowardice and applied deceit were better more survivable tools. The very small icepick under a wonderfully targeted occipital of life. Oh, a partner all right, for the supposed adventures. It is never the same partner, because no partner would ever work with Arch more than once. House of the Rising Sun kept coming back over the little radio, as if played by some Wolfman Jack kind of deejay who didn’t speak. Arch identified with the drunken, trunk traveling and sick gambling father in the lyrics, instead of the poor kid the song was really about. He dozed into a semi-stasis of jungle-driven sleep, his eyes like cat-eyes, half open, blurred only by large amounts of sliced pineapple and rum. Waiting for whoever or whatever was coming, while writing for the German. He continued to wake and write in the house diary into the night. How could humans do that to other humans, the things he’d had to do? How could those with that kind of power use that power to kill and eat their own? How was it that one can be trained to such a fine honed point to do violent things for grand causes and then have the causes dissolve in front of you? How could all his missions be discounted and swept away like they were and meant nothing? Arch’s life had become all the things he did not do, had not done, could not have done. All the things the truth could not be told about to anyone, ever. He wrote that truth into the damned diary because the diary could lose all the leper parts it had and nobody would give a tinker’s damn, or believe it was in any way real. He wrote that life didn’t suck, but humans living in and controlling it sure as hell did, for the most part, and the parts that didn’t suck were off limits to him. What was he going to be in a world so embalmed in boring mediocre survival movements that drinking Drano would be as palliative and welcome a beverage as Hemlock, compared to the awful life he’d had? Awful but totally alive. What could he be? A Barnes and Noble retail clerk? Maybe a motorcycle mechanic? How about an adjunct professor of nothing, using one of his fake identities supported by real records and credentials? Or would they come at all for the Top Secret document, as real as the tropical rain pounding down on the roof, the acrid burning of the remaining rum going down, and the tinny taste of the final pineapple slices? Would they come? Arch lay there without much awareness but deep in thought. Nobody would come until very deep in the night. Technology owned the night. Players used the highest and most expensive technology and a player had to be involved. Regular citizens, even police or military, did not act so stupidity as to remove Top Secret stuff from a registered publications custodial facility, like had gone missing from one obviously nearby. Secret stuff, maybe. More likely, the player had tons of authority, not to over-ride security protocols, but to get away with getting caught if he was caught doing it. Yes, he would be coming and he would be a he. If the file had been left as bait, then it was the most obscurely placed bait any agent had ever placed. No, it wasn’t bait. Just more bad fortune. If the player was a player of high caliber then he’d figure it out, figure me out, and quickly come to know where Arch was. The top secret file remained on my chest unread. Nothing in the file mattered if I didn’t survive the coming encounter. Awareness returned. He would be come after dark. Long after dark. Getting sober would be hard. Bothering to be sober, even harder. There was only getting sick not really getting sober. Arch went from a functional sick to a not-so-noisy-sick state. The player was coming in the night and it was night. The player could see in the dark and Arch was dark in every way. There was no waiting for the nocturnal beast, not in a staked and waiting to be found place. The bushes in the sand just down from the lanai would have to do. Patton could not go far in his state. The rain came down hard, surf spindrift added to it by filtering through the many leaves. Huddling in damp sand under wet bushes was miserable as hell but there was nothing to be done for it. Being sick inside the bushes helped only because any discomfort at all was a distraction from the conditions he was in. The player would be dressed, cool, elegant, and surgically equipped. He would not be a mudder. His house had not been a mudder kind of house, only his gaping drapes left flapping to denote his power to ignore the rest of humanity on this earth. The file was stuck in Arch’s pants, shoved down his front. So it got wet? So what? The file itself was a reason to die. Maybe what was in it was a reason to live. With that thought on his mind Arch watched him come to the Hanalei Resort. His old cheap electric Rolex told him it was three. He looked up and the man appeared. Invisibly dark against the surf spume, like a black hole you can only see around the edges of. The man was too tall. He was too thin. Too fluid. Everything Arch wasn’t and probably not the least bit sick, lost, fired, dumped, hiding or any of those. They only one thing in common. They were both alone. The man went right through the double glass doors Arch had left open for him, like his own. A fair exchange of unwelcome entry. The man went in like some movie wraith. Arch was gone. The file was gone. But the German’s diary was setting open on the table, waiting for him. A primer. A message, if such a dedicated predator could understand the teaching message. “Come my pretty.” “Come unto me.” “I have nothing.” “You are something.” “I may have you.” “Come my pretty.” It was 1993, and Arch had less than nothing to lose. Arch Patton, It Was 1993 Home | Next Chapter… Cliff on October 7, 2017 at 10:20 am Never heard a Doors cover of HOTRS. Animals? James Strauss on October 7, 2017 at 3:21 pm Did you like it Cliff? Cliff on October 7, 2017 at 7:01 pm James Strauss on October 9, 2017 at 7:34 am Thanks Cliff for coming back on here….and the support that illustrates…. Cliff on October 9, 2017 at 9:15 am Waiting with great anticipation for the next installment of 30 Days, I thought to try one of your other endeavors & chose Thunder Marine due to my familiarity with South Florida, not realizing it was in process. Have now started 1993. I love the way you bring the songs into each chapter. 30 Days is hard to put down & sometimes hard to pick up. Keep up the good work! The next segment should be up tomrrow as we head toward the end of the second ten days. The Bering Sea novel will go up either later this week or next too. Thanks for checking me and my stuff out… Means a lot, especially saying so on this public forum… Rob Smith on July 4, 2016 at 9:23 pm It needs some closer proof-reading to fix it to before publishing! James Strauss on July 4, 2016 at 10:47 pm Appreciate your keen eye. This is only second iteration. Also gearing toward the screen play to start filming, maybe late 2017 NVA A Shau Valley Arch Patton Adventures Hawaii Short Stories by James Strauss Arch Patton Vietnam Vietnam War Marine Corps USMC
cc/2019-30/en_middle_0028.json.gz/line1595050
__label__wiki
0.783162
0.783162
Autosports 2011 FIFTH GEAR Live Action Arena, Autosports 2011 exhibition A Jands Vista T2 console running the new v2 software was specified by lighting designer Nathan Wan to control all lighting in the FIFTH GEAR Live Action Arena at the Autosports 2011 exhibition, staged in Hall 5 of the National Exhibition Centre (NEC), Birmingham, UK. The desk was controlling nearly 500 lighting fixtures, including 30 Robe ColorSpot 1200E ATs, 18 Robe ColorBeam 2500E ATs, 12 Robe ColorSpot 2500E ATs and six Robe ColorWash 700E AT moving lights, 100 JTE PixelLines, 300 PARs and six 4-lite Moles. It’s the third year that Nathan has designed the lighting for the event, which is notoriously challenging to light, with sound and lighting equipment supplied by rental company Network Productions. The Jands Vista console was supplied via exclusive UK distributor, A.C. Entertainment Technologies Ltd. The Vista console is Nathan’s favourite desk for this type of show and he used the version 2 software to pixel map the PixelLines and run low resolution graphics through them. He likes the new Selection tool with v2 – allowing lights to be selected as a pen line is drawn across the rig, “This is great for making up shape & effects chases,” he enthuses. He also likes the console’s timeline options. With up to six 55 minute shows a day in the Live Action Arena, all the cues could be stored on a cuelist and activated just by pushing the Go button, which is an ideal way to run this style of show. He thinks being able to dip in and out of the console’s Play List for editing is extremely useful, and says, “The Smart Effects on v2 means you can load effects onto each fader and edit the speed and size live, which is also ideal for improvisational work.” The Live Action Arena – one of the largest indoor tri-oval racetracks in the UK – took up the entire hall, with a performance area of approximately 120 metres wide by 100 deep, and was the focus of the exhibition for the most serious petrol heads, speed freaks and performance car enthusiasts. They were treated to a series of hair-raising races and stunts by some of the fastest vehicles on four – and three – wheels for 55 minutes of burning rubber, screeching brakes and adrenalized excitement. The five show-a-day schedule on the two public days attracted up to 4,700 people per session, packing the grandstand to capacity! Vista lights the action at Autosport International Motorsport Show A Jands Vista T4 console has provided lighting control for the “Live Action Arena” event at the Autosport International motorsport show. Held at the NEC in Birmingham, Autosport International is a highlight of the annual motoring calendar. A star-studded line-up of guests included Formula One‘s top British scoring driver David Coulthard and Alan McNish, winner of the Le Mans 24 Hours race. Forming the centrepiece of the event was the “Live Action Arena”, an action-packed show performed in front of 4,700 people six times a day. The show featured a spectacular range of demonstrations, breathtaking wheel-to-wheel racing and record-breaking stunts. Lighting designer Nathan Wan has used the Jands Vista console on a variety of concerts and exhibitions in 2008, so had complete confidence in the console making light work of the impressive rig, which featured over 80 moving lights, various pyro flame effects and 72 ways of dimming. The brief was to create a dynamic light show choreographed to music and 14 different car races. The performances lasted 90 minutes on the arena‘s oval track and included video links from Formula One‘s David Coulthard and commentator Louise Goodman. The Vista‘s intuitive interface allowed Nathan fast and easy access to his rig, in addition, the console‘s innovative timeline editing proved a powerful time-saving feature for coping with last minute changes to the show‘s running order and tidying up programming. Hire company Network Productions Ltd. supplied the Vista console and lighting rig. Fixtures included Robe ColorSpot 1200 & 700 EAT’s, Robe ColorWash EAT’s and ten Safex Flamejett used for various racing sequences. In addition, 72 ways of conventional dimming provided source lighting for the racing drivers. Summarising his experience with the Vista, Lighting Designer Nathan Wan commented: “I loved using the Vista because it enabled me to generate a dynamic show in less than a day. Also, the Vista‘s Smart FX allowed me to create striking custom colour intensity and movement effects. The console‘s playback controls and timeline really impressed me on this type of choreographed event, especially when the show director changed the order of the performance, and I was able to deal with it without a headache. I‘m already planning to use the Vista on various installations and gigs confirmed for 2009.”
cc/2019-30/en_middle_0028.json.gz/line1595051
__label__cc
0.612502
0.387498
US: National Academy of Medicine should revisit issue of fetal alcohol exposure (Commentary) ➡ From Child Welfare Information Gateway US: National Academy of Medicine should revisit issue of fetal alcohol exposure (Commentary) Ob. Gyn. News - December 08, 2017 More than 20 years ago the Institute of Medicine (recently renamed the National Academy of Medicine, or NAM) issued its … [Read more...] US: Immigration From Mexico Drops, but Increases From Central America ➡ From Child Welfare Information Gateway US: Immigration From Mexico Drops, but Increases From Central America Courthouse News Service - December 08, 2017 Immigration to the United States from the so-called Northern Triangle of El Salvador, Guatemala and Honduras rose by 25 percent in eight … [Read more...] US: Connie Hickman Tanner, National Council of Juvenile and Family Court Judges ➡ From Child Welfare Information Gateway US: Connie Hickman Tanner, National Council of Juvenile and Family Court Judges Northern Nevada Business Weekly - December 08, 2017 Connie Hickman Tanner has been appointed chief program officer, Child Welfare and Juvenile Law at the Reno-based National … [Read more...] US: Immigration-rights advocates say Homeland Security is using minors as ‘bait’ (Commentary) ➡ From Child Welfare Information Gateway US: Immigration-rights advocates say Homeland Security is using minors as 'bait' (Commentary) Global Sisters Report - December 11, 2017 The complaint is on behalf of the approximately 400 people arrested this summer in an Immigration and Customs … [Read more...] PA: PROTECTING OUR CHILDREN: Safety worries spawn variety of bills against child abuse ➡ From Child Welfare Information Gateway PA: PROTECTING OUR CHILDREN: Safety worries spawn variety of bills against child abuse Tribune-Democrat - December 11, 2017 The struggle to help the state's child protection safety net cope with the increased demands placed on it by the opioid crisis has … [Read more...] PA: PROTECTING OUR CHILDREN: Despite scrutiny, counties still struggling to relieve overworked caseworkers ➡ From Child Welfare Information Gateway PA: PROTECTING OUR CHILDREN: Despite scrutiny, counties still struggling to relieve overworked caseworkers Tribune-Democrat - December 11, 2017 There is broad consensus that the state needs to fix the child protection system as it strains under the … [Read more...] PA: Heroin crisis turns back clock on grandparents, making them struggling parents again ➡ From Child Welfare Information Gateway PA: Heroin crisis turns back clock on grandparents, making them struggling parents again Penn Live - December 11, 2017 In Pennsylvania, about 88,000 grandparents are raising 195,000 grandchildren. In about 40 percent of those cases, drug or alcohol … [Read more...] Australia: Pedophile Barred From Leaving Australia as Sex Tourism Law Takes Effect ➡ From Child Welfare Information Gateway Australia: Pedophile Barred From Leaving Australia as Sex Tourism Law Takes Effect New York Times - December 13, 2017 An Australian law barring registered child sex offenders from international travel had an immediate impact when it took effect on … [Read more...] US: Indian Child Welfare Act under attack again as conservative group submits appeal to Supreme Court (Commentary) ➡ From Child Welfare Information Gateway US: Indian Child Welfare Act under attack again as conservative group submits appeal to Supreme Court (Commentary) Indianz - December 12, 2017 The conservative Goldwater Institute is attacking the Indian Child Welfare Act again. The group has asked the … [Read more...] US: How is the opioid crisis affecting children? (Commentary) ➡ From Child Welfare Information Gateway US: How is the opioid crisis affecting children? (Commentary) Associated Press - December 12, 2017 Public attention to the historic wave of opioid addiction gripping the U.S. has focused mostly on its effect on adults and the thousands who have died of … [Read more...]
cc/2019-30/en_middle_0028.json.gz/line1595061
__label__wiki
0.552279
0.552279
Chapter 24: Kiss When Nan Zhi heard Lan Yanzhi's voice, her head whipped around to face the door and she realized that she was facing the man's crotch. Her fair and beautiful face flushed immediately. Her skin was much whiter compared to other women, and tender like an egg with its shell peeled off. With her face red, it was like a ripe fruit, a thin layer of pink and overflowing with a womanly fragrance from the inside out. It called to him like the tantalising appeal of a forbidden fruit. Mu Sihan narrowed his eyes slightly. While Nan Zhi was still trying to figure out how to untie his belt, he grabbed her arm and lifted her up, pulling her to her feet. Before Nan Zhi could react, she was thrown to the french window. The man's tall and cold body pressed itself over her. She subconsciously lifted her head, the man's face was handsome and indifferent face, enlarged in front of her eyes, she opened her mouth wanting to say something but a pair of thin and powerful, yet soft lips fell on her lips with a force that made her shudder. Her slender waist was held tightly by the man's strong grip, so she was trapped between the french window and the man's chest. The lips pressed down on hers did not stop but crushed her lips with a strength that was strong and wild. It happened so quickly that Nan Zhi stilled in bewilderment, without any reaction, until the man hardened his grip on her waist. She opened her mouth from the pain and the man took the opportunity, reaching in with his burning hot tongue. Her tongue was entangled by him and she had nowhere to escape. Her hair stood on end and her heart was flustered. She couldn't care about anything else and kicked and hit him, trying to push him off with all she could. But he was like a huge mountain. No matter how she thrashed, he wouldn't move. On the contrary, her slender wrists were pinned and brought above her head. Their bodies were closer, moulded together in a writhing fit of undesirable passion that she wanted no part of. He gnawed at her lips like a crazed wolf and kissed desperately with a wildness she couldn't fathom. Nan Zhi glowered at him hatefully as she struggled, feeling sick to death. Although she had been in… intimate relations with a man four years ago and kissed him, it was under the influence of that drug. She had never kissed a man like that while she was clear-headed. What was more unacceptable was that he put his tongue in! It was disgusting! Her tongue had become numb and there was the copper-metallic taste of blood spreading through both of their mouths. The fury that had been suppressed by Nan Zhi tonight could no longer be controlled and lashed out like a wild, raging beast. The moment he let go of her, she raised her hand and slapped his handsome face. Slap. A crisp and sharp sound. It made her palm numb in a tingling, prickling pain, not to mention the person she slapped. "Jerk! Shameless!" Nan Zhi used the back of her hand to rub furiously at the lips that were kissed swollen by him, feeling infuriated. How dare he! Mu Sihan stood motionless, five red fingers appearing on his fair face in the shape of an inflamed palm, but he did not seem to feel pain, nor frown. The eyes that were looking at Nan Zhi were getting darker and colder. "Woman, do you know what the consequences are for this slap?" He spoke in a low voice that was slow and eerily calm, it was not like that of an annoyed person, but the deadly chill in his tone revealed that he was infuriated. Nan Zhi wanted to reason with him but her neck was in sudden pain and she gasped in shock. The man reached out a hand and gripped her neck in a strong vice. She couldn't breathe and struggled violently. She couldn't reach anything that could help. She used the moves she had learnt in Taekwondo but in front of this strong man, she could not shake him at all. She felt pathetic and useless, and rage poured out but she was unable to do a thing. His fingers were like steel and tightened slowly. For a moment, Nan Zhi was unable to take in air. She was terrified and her eyes bulged out as she clawed out, trying to escape. The eyes that were looking at her over the top of her head were extremely ruthless. His gaze was chilling, predatory and transfixed only on her.
cc/2019-30/en_middle_0028.json.gz/line1595062
__label__cc
0.645545
0.354455
The Complete Mystery of Madeleine McCann™ :: Research and Analysis :: Maddie Case - important information Re: 50 facts about the Maddie case that the British media are not telling you by Alba1 on 20.05.17 0:24 Thanks for the links Get'emGonçalo Alba1 by Loving Mom on 29.05.17 14:27 @Tony Bennett wrote: Get'emGonçalo wrote: @Alba1 wrote: In fact number 5, what is a CATS file? Hi Alba1, here's a couple of links: http://www.mccannpjfiles.co.uk/PJ/MCCANNS_BACKGROUND.htm http://goodqualitywristbands.blogspot.com/2012/01/did-jim-gamble-sanitize-gerry-mccanns.html A CATS (Registration of Child Abuse: Case Administration and Tracking System) file, numbered 19309, was found when background checks of the McCanns were made. It has never been made public on what precise date that file was opened, and why. Operation Task was the operation set up by Leicestershire Police to deal with the UK arm of the Madeleine McCann investigation back in May 2007. It is said that to complement Operation Task, a Case Administration and Tracking System (CATS) file was set up, “in case any investigation by Childrens or Social Services was needed”. It is said by some that the file on the McCanns, CATS 19309, once contained material which has since been removed. AFAIK there is no evidence that this is the case, but then again there is no absolute proof that this didn’t happen. Leicestershire Police claimed that the McCanns were not known to the police or social services before they reported Madeleine missing. Wondering if CATS changed names, nothing is coming up when I google CATS. It has probably been checked but I was wanted to see if it is possible to get some idea of when other nearby CATS case numbers may have been reported (to help get an idea of when Gerry's was reported... Loving Mom I just googled the CATS system and got this http://www.wpcsoft.com/business-areas/cats/?cookieOptIn=1 Then I went to the "about us/Partners" tab and got this http://www.wpcsoft.com/about-us/partners/ Scroll down too see why I gave up at that point Bumping for new members by Baffled on 26.11.18 7:01 Could I intrude and ask some questions about these facts please? The problem is that I have come across a site that thoroughly debunks them. It claims: How accurate is the 50 Facts Leaflet? Following a thorough analysis of the 50 "facts", our fully sourced rebuttal proves the following:- 27 (54%) of the "Facts" are false. 11 (22%) of the "Facts" contain significant misquotations. 16 (32%) of the "Facts" are misleading or contain misrepresentations of the facts. 1 (2%) of the "Facts" is a rumour - even the source claims it to be so. 4 (8%) of the "Facts" are Irrelevant - unfortunately, three of these are the only claims which happen to be true! 2 (4%) of the "Facts" contain unsubstantiated claims. 3 (6%) of the "Facts" are based upon quotes which have been taken out of context. Many of these are also MISquotes. It also claims: Conclusion - Facts that the media aren't telling us? We are told by the MMRG - which have "close links" with the Madeleine Foundation - that this leaflet contains "50 facts about the Maddie case that the British media are not telling you". In fact, we have proven that the media (and mainly the British media) was the source for 68% of these "facts". The home page lists your 50 facts and the text on each fact can be clicked to take you to a full rebuttal of these facts. It's very convincing. http://madeleinemythsexposed.pbworks.com/w/page/39076140/Main%20Page Your views please? by Jonal on 26.11.18 19:48 @Baffled wrote: Convincing only to the naive. When you have been around the case for a while you will become aware of what are known as 'antis' and 'pros'. Sometimes those pretending to be 'anti' turn out to be 'pro'. Have you heard of a person called Clarence Mitchell? Kate was very taken with him. His job - full-time, for many years, paid by a benefactor to the McCanns - was to promote the McCanns to the media in the best light and try to debunk anything that threatened this promotion. Such as the 50 facts. It's not unimaginable that he (or others like him, family members perhaps) would set up a website that pretends to be impartial but those with experience of this sad case can see is not. I would like to suggest you stick around CMoMM, there are members who will do their best to unbaffle you. Search threads related to whichever facts are giving you the problem. Did you read Dr Amaral's book? Jonal by Baffled on 26.11.18 20:38 Thanks for your reply, and I would certainly like to become unbaffled! This is the only place on the net where someone who is neutral can ask questions without getting caned if they go against the grain. The problem I'm having with this is that site doesn't seem to have anything to do with Clarence Mitchell, and seems to be very accurate. It sources all it's rebuttals and shows the sources of the MMRG, which turn out to be dubious, so without anyone refuting it's content I'm stuck with facts over hearsay. Will no one have a look and refute even one of it's rebuttals so that I can see a different reality? I've read some of Amarals book and did watch his documentary a few years back, and I wasn't very convinced. He's certainly very genuine and believes his conclusions, but I feel these are more opinions than facts. That rebuttals site also lists many, many inaccuracies in a book by Pat Brown, that was banned. That too is fully sourced and shows all the mistakes that Pat Brown made. So on one hand I've got almost everyone believing Amarals version that Maddie died in the aprtment, but when I look at their sources of information, they turn out to be dubious, and on the other hand I've got a fully sourced website that actually makes a lot more sense. The MMRG basically claim to have listed 50 facts but these facts have their sources in Media. The way I see it is that BOTH the MSM AND the Alternative media have done a lot of harm to this case. Could I perhaps get a comment on fact 1 of the MMRG: The McCanns originally claimed they found the shutters and window of the children’s room open. They ’phoned relatives that night saying: ‘An abductor broke in and took Madeleine’. But when police and the managers of the complex declared there was no sign of forced entry, they changed their story, saying they must have left the patio doors open. The windtow had been cleaned the day before. Only Kate McCann’s fingerprints were found on the window. And the fully sourced rebuttal here: http://madeleinemythsexposed.pbworks.com/w/page/39077415/Rebuttal%20of%20%22Fact%22%201 I would appreciate it, thanks. @Baffled Are you, or are you representing, the venue you are so anxious for members of CMoMM to read - or are you here just for fun? A serious question. Serious answer: I'm trying to establish a balanced view on the Maddie case, but there is so much disinformation across the net. One of the biggest sources of this disinformation seems to be those 50 'facts'. And it becomes even more curious when nobody wants to address this. Look at it this way...the MMRG have stated that these are 50 facts, but they haven't provided sources for those facts, and another site has refuted those facts AND provided sources, not only of their rebuttals but also of the most likely source that the MMRG got their information from. So it can't be considered unreasonable of me to ask how the MMRG established their facts. At the moment I have 50 'facts' that no one wants to provide sources for, and 50 rebuttals that no one wants to address. Does the MMRG wish people to accept their word despite evidence to the contrary? It's not an unreasonable request. Perhaps you might be prepared to answer? ps: Regarding Anti McCann or Pro McCann, I am neither, but I am pro truth and I am pro Maddie. If we are expected to accept information at face value, without question, then we can't have Maddies best interests at heart. Also, if those 50 facts are indeed facts, then all I'm asking for is the proof. Why the relluctance to provide it? @Verdi wrote: @Baffled Verdi, Further to my previous response: I've had a think about this and I find your answer quite sinister and disturbing. It seems you're happy to allow people to present data as facts, but when asked to substantiate those facts, you come out with a response like that. Why is it so difficult, and why are you so reluctant to substantiate what you believe to be facts? They are either facts or they aren't. If they are facts, then you won't have any difficulty in substantiating them, but if you know that they cannot be substantiated, then you are willfully disseminating hatred. Which one is it.....can you substantiate those 'facts' or not? I thought this was a fair forum, but that response of yours has just shown it up in a different light. Is this an honest forum or not? Is it's purpose to spread lies and hatred or not? I am not anxious for people to look at that other site, but it would take up too much space to present their facts here, so it's far easier to have you look at what they have already written elsewhere. By giving a response like you did, it seems that you do not want other members to have even an inclination that those facts may be wrong. I feel that you are being dishonest. @Baffled wrote: Verdi, Further to my previous response: Firstly I will point out, I played no part in the in the production of the '50 facts about the Maddie case that the British media are not telling you' so I'm in no position to satisfy your concerns one way or the other. The site you link to has been in existence for a very very long time, if you carefully observe you will realise it was created by a force (or source if you prefer) close to the McCann faction. It is designed to provide that proverbial 'explanation for anything the police might find' - in the infamous words of the government media monitor extraordinaire! It therefore doesn't, in it's own right, warrant close scrutiny - or indeed, notice of any description whatsoever. As I say, the site has been there forever (I'm astonished you've only just stumbled upon it) and now, should any reader not already have seen it, you have now provided the link which gives all and sundry the opportunity to read and judge for themselves. If however you, as an individual and forum member would like to take issue with the content of this thread yourself, then feel free so to do. Personally, I don't have a great deal of time for semantics, so much evil can be woven by word play. In Verdi Veritas ! by Phoebe on 27.11.18 11:42 @ Baffled. Can I suggest you read the Tapas 9 statements in the files and then compare to the "rebuttals" offered by the S.T.M.s (Save The McCanns aka Stop The Myths) The very first rebuttal re. how the "abductor" got in should result in a cacophony of warning bells. S.T.Ms. claims that the McCanns immediately admitted leaving the patio door unlocked. One quick read of Gerry's 1st statement will show this is nonsense and that he claimed to have entered by using his key to unlock the front door. Why would he do so if the patio door was open. He then changed his story when it became obvious that no intruder had come through the bedroom window. Still on point 1 - There is ample video evidence of the Portuguese C.S.I. team dusting the outside shutters for fingerprints. What, are we to believe they neglected to check the outside of the window at the same time - despite claims that this was how the intruder gained entry!!!! I could go on, and on, and on, to "rebut the rebuttals" but, strewth, give me patience!!!! by Tony Bennett on 27.11.18 13:40 In all the long, 9-year history of CMOMM, it is hard to recall one previous instance of a person hostile to this forum, and all it stands for, to have been quite so transparent in his malign intentions towards it, as is the case of ‘Baffled’. His mask is so transparent, it may as well be made of clear glass. Let us call a spade a spade. Baffled is an out-and -out liar. He writes: “This [CMOMM] is the only place on the net where someone who is neutral can ask questions…” There’s one lie. Baffled is not ‘neutral’. Baffled writes: “I've read some of Amaral’s book and did watch his documentary a few years back, and I wasn't very convinced…he believes his conclusions, but I feel these are more opinions than facts”. So why does Baffled bother to come here? He writes: “When I look at the sources of information [of people like Amaral, MMRG and Pat Brown], they turn out to be dubious”, but of the ‘Stop the Myths’ site, he tells us it is “a fully sourced website that actually makes a lot more sense”. It is pretty clear where Baffled is coming from. There is no more ‘fully sourced’ analysis on the internet than the e-book by former Police Superintendent PeterMac. Peter is renowned for referencing precisely every fact and every point he makes. Baffled knows of its existence. But he chooses not to mention it. He writes: “The MMRG’s facts have their sources in media”. Hmm. Some possibly, but most of them are sourced from the PJ files, Amaral’s book and other written sources. If we look at Baffled’s post today, we can see the venom dripping out of his pen as he writes to Verdi: “Your answer quite sinister and disturbing…if [MMRG’s facts] are facts, then you won't have any difficulty in substantiating them, but if you know that they cannot be substantiated, then you are willfully disseminating hatred. Baffled claims: “I thought this was a fair forum…your response has just shown it up in a different light. Is this an honest forum or not? Is its purpose to spread lies and hatred? From your response…it seems that you do not want other members to have even an inclination that those facts may be wrong. I feel that you are being dishonest”. Baffled refers to the ’50 Facts rebuttal’ on the Stop the Myths site as “a fully sourced rebuttal”. So let’s now examine Baffled’s claim that the rebuttal is “fully sourced” and therefore accurate. He asks us to look at the rebuttal to Point 1. Below is Point 1 and the Stop the Myths rebuttal: 1. The McCanns originally claimed they found the shutters and window of the children’s room open. They ’phoned relatives that night saying: ‘An abductor broke in and took Madeleine’. But when police and the managers of the complex declared there was no sign of forced entry, they changed their story, saying they must have left the patio doors open. The window had been cleaned the day before. Only Kate McCann’s fingerprints were found on the window. Verdict - False and misleading. The McCanns didn't change their story. Kate's fingerprints were on the inside of the window; it's not known what was found on the outside. Also, MMRG failed to mention the inclusion of the unidentified partial fingerprints which were found on the shutters. Source - Media articles and police files. Responding now to each statement in the Stop The Myths rebuttal. STM CLAIM: “The McCanns didn't change their story”. RESPONSE: I refer to these two references: YouTube video by Lizzy HideHo: https://www.youtube.com/watch?v=0XhNk2Lz594 CMOMM (extract from PeterMac’s ebook): https://jillhavern.forumotion.net/t13415-chapter-1-changes-in-story Moreover, on 18 October 2007 the Dispatches programme aired ‘Searching for Madeleine’, a programme which effectively proved that there was no way anybody could break into the apartment and leave no forensic trace or damage to the lightweight aluminium shutters, which are covered with a fine coating of polyurethane paint which marks extremely easily. Of course, Stop The Myths failed to mention this programme and its devastating conclusions for the McCanns. Let it be noted that in this programme, David Barclay, former Head of Physical Evidence UK National Crime and Operations Faculty, said, quote: “We must be very careful that we're not saying this is actually staging, but it is difficult to see how anybody could have interfered with those shutters from the outside without leaving some trace. In fact, having looked at them, I think it's almost impossible.” During the week following the Dispatches programme the McCanns’ official spokesman, Clarence Mitchell, announced that the McCanns now reversed their previous stance on the break-in story (also NOT mentioned by Stop The Myths). In an interview, as set out in the media but is sourced from an actual interview in this link above: https://www.youtube.com/watch?v=0XhNk2Lz594 “The spokesman for the family of Madeleine McCann has reversed a statement made in the early days of the search for the missing child…However, in the early part of the hunt, friends and family members told journalists that the shutter on the apartment where the McCanns were staying had been broken. "There was no evidence of a break-in," said Mr Mitchell. "I'm not going into the detail, but I can say that Kate and Gerry are firmly of the view that somebody got into the apartment and took Madeleine out the window as their means of escape, and to do that they did not necessarily have to tamper with anything. They got out of the window fairly easily.” STM CLAIM: Kate's fingerprints were on the inside of the window; it's not known what was found on the outside. RESPONSE: So STM admit that MMRG was right; the only fingerprint found on the window was that of Kate McCann. STM make a huge song and dance about the fact that no-one could be sure whether the window was actually cleaned on Wednesday when the cleaner came. As if that makes any difference! Thursday was the SIXTH of the holiday. As STM concede, only Kate McCann’s fingerprints were found on the window. The window was said by Kate McCann to be open when she ‘found’ Madeleine was missing. The most likely conclusion by far is that STM CLAIM: Also, MMRG failed to mention the inclusion of the unidentified partial fingerprints which were found on the shutters. RESPONSE: Why should MMRG need to mention the shutters? MMRG was merely talking about the window. Partial fingerprints on the shutters could have got there from all manner of people, maintenance met, cleaners etc. Baffled chose to zoom in on Fact No. 1. He has an answer from me. I won’t be devoting time to explaining the other 49. The MMRG leaflet has been uploaded to YouTube, accompanied by a large series of photographs to illustrate each point, LINKS here: https://www.youtube.com/watch?v=gnXtYSeXSiw 121,661 views to date https://www.youtube.com/watch?v=6x7ryFkR8w4 Dr Martin Roberts: "The evidence is that these are the pjyamas Madeleine wore on holiday in Praia da Luz. They were photographed and the photo handed to a press agency, who released it on 8 May, as the search for Madeleine continued. The McCanns held up these same pyjamas at two press conferences on 5 & 7June 2007. How could Madeleine have been abducted?" Amelie Mcann (aged 2): "Maddie's jammies!". Location : Shropshire Thank you Tony, obviously more patience than me. I know Textusa’s not everyone’s cup of tea, with their usually verbose posts and underlying beliefs, but this schematic from 3rd May 2012 has always appealed to me, whether ‘they’ came in through the front door (first story) or through the patio doors. Shall we go out quietly the way we came in or make things difficult, climb out the window and raise suspicions on ourselves should anybody see us? Either way, it’s all McNonsense. http://textusa.blogspot.com/2012/05/do-ask-yourself.html This response is to Verdi and Tony. Verdi, I found your response sinister because it was accusative, when it would have been just as easy to refer me to some accurate data, and when people start throwing accusations I tend to feel they are trying to cover up something. If this forum has confidence in those facts it should be more than willing to provide it's members with sources of those facts. Tony, well you've made quite an accusation yourself while accusing me of hostility to this forum you are the one portraying hostility. I only become hostile towards people who expect me to take their word for it, then get defensive when I ask how they arrived at their conclusions. I have made it clear from the very start that I am here because I like the fourm, because I think it is non accusative, and that I am only on the side of Maddie. As Verdi will know, I have stated from the start that I do not believe Maddie is dead, and have questioned why this forum comes from the starting point that she is. I find information all over the internet, some of which is fully sourced and some of it which isn't. Although I am not a member of any pro McCann forum, that's mainly because I haven't found one that allows sign ups. And if I were able to sign up to one, it would not be to be pro McCann, but to ask them questions too, just like I do here. It is sinister to try to cover up facts, so by getting so defensive simply because I ask for sources, is suspicious, it's as if you don't have any facts and are frightened other members will come to realise that. Such a song and dance should not have been made, just to get an answer. Thank you for your references which I will check out in good time, why was it so hard to do that? Why was it done with accusations, hostility and unwillingness? The credibility of this forum is fast dwindling, let's see if your links can redeem it. The site has as it's title The truth of Madeleine McCann, yet it seems everyone clams up when I ask for that truth, that to me is not honesty, nor is it a fair investigation...what is the difference then between Operation grange and this forum, if they both start from a biased viewpoint? Both viewpoints are flawed, and I am trying to separate fact from fiction, I have been fully transparent from the start and will always be so. If you have a problem with that, it indicates that you're not really interested in truth yourself, but more interested in what you can convince others of. Tony Bennet, a few more points: 1.) "Baffled is NOT neutral" Yes I am, you're not. And it has become apparent that no one here is. If you were neutral, you would not have a starting point that Maddie was dead, you would open to all possibilities, without accusations. 2.) "If he does not agree with Amaral's book, why does he bother to come here?" Because the forum is entitled The Complete Mystery of Madeleine McCann, not 'The works of Goncalo Amaral' 3.) "The MMRG leaflet has been uploaded to YouTube, accompanied by a large series of photographs to illustrate each point, LINKS here: 106,258 views to date" This is precisely the reason why members should not be objecting to publishing the sources of their facts. By not publishing your sources so that they can be verified, you're admitting to having influenced 121,661 people on one video and 106,258 views to date, on another while refusing to substantiate yourselves. That is no neutral, that is spreading hatred. I have every reason to ask you to substantiate yourselves. It's not hostility, it's a quest for truth. Claiming something to be a fact while refusing to substantiate it, is in fact hostility. 4.) The fully sourced rebuttals may in themselves be false, I do not know. But what I do know is they provide sources, the MMRG don't. Who is to be believed? What am I to believe? Those who are not afraid to open themselves to scrutiny or those who are? Baffled: ‘I find information all over the internet, some of which is fully sourced and some of it which isn't. ‘ I’m sorry Baffled, but you clearly don’t. Having looked at the ‘50’, you then progress to STM. Absolutely fine, but then do a bit of investigation yourself and don’t expect it to be handed to you on a plate. You’re not going to just accept it anyway, so why even ask? ‘50’ is fine as far as it goes, not perfect, and if re-written today, no doubt amendments and corrections would be made. STM was set up as one of the many branches of the pro-McCann propaganda machine. You can find answers and discussions to pretty much everything you say you want, both ‘pro & anti’ with a bit of ‘googleing’ and searching and if, once you’ve done that you have a specific question to ask, you may get a more positive response. However, once you’ve been through the T9 statements and done your investigative homework, if you still want to go with STM’s, good luck to you. Clarence may even have some paid ‘twitter’ work for you. Replying to Baffled REPLY: Were Martin Grime’s dogs barking up the wrong tree? Was the smell of cadavers scent caused by dirty nappies or rotting meat? Did part-time Dr Kate McCann certify six corpses in a fortrnight before she went on holiday? Did she carry Cuddle Cat around while certifying deaths? Thank you for your references which I will check out in good time, why was it so hard to do that? REPLY: Maybe because I have a few other things to do with my time? The credibility of this forum is fast dwindling REPLY: Not according to the 400-plus who have joined it in the last 2½ months, carrying the forum’s membership over 9,000. You're admitting to having influenced 121,661 people on one video and 106,258 views on another while refusing to substantiate yourselves. That is…spreading hatred. Claiming something to be a fact while refusing to substantiate it, is in fact hostility. REPLY: Have you contacted all the dictionary editors to advise them of your novel interpretations of the words ‘hatred’ and ‘hostility’? I have been fully transparent from the start and will always be so. Who is to be believed? What am I to believe? Those who are not afraid to open themselves to scrutiny or those who are? REPLY: By posting in my own name I have subjected myself to intense scrutiny over the past 10 years. Open yourself to scrutiny and disclose exactly who you are, like I have done @ Baffled. You say you don't believe that Madeleine is dead, ergo you must believe that she was abducted or given away by her parents. If you believe either scenario is true, why join any group which explores the mystery of her disappearance. If you think she was abducted then there IS no mystery - you have found your answer, so - why bother with TCMOMM. @Baffled wrote: Verdi, I found your response sinister because it was accusative, when it would have been just as easy to refer me to some accurate data, and when people start throwing accusations I tend to feel they are trying to cover up something. You could have saved yourself a whole lot of trouble and all that fabricated waffle if you'd just asked me. Suffice to say, the thing is without seeming to blow my own bugle, I can sniff out a trouble maker from the word go - usually the first post is enough. I'm seldom if ever wrong, although I say so myself. I'm sure one of your faithful associates will pass this message onto you ! @Verdi wrote: Yes baffled - Verdi can sniff out a trouble maker every bit as good as Eddie and Keela can sniff out cadaver and blood. And, just for the record, all 3 has never given a false alert Just for the record, the Baffled one was referring to a site titled 'madeleinemythsexposed' - not 'Stop the Myths' as has been presumed. The two are entirely separate although I can't vouch for the identity of that behind the former.
cc/2019-30/en_middle_0028.json.gz/line1595067
__label__wiki
0.978773
0.978773
DRC train derailment kills 24, mostly children, near Kananga – Al Jazeera English By admin On Már 18, 2019 At least 24 people have been killed and 31 injured in a train accident in the Democratic Republic of Congo (DRC), according to police and medical services. A freight train was carrying stowaways on Sunday when it derailed in Bena Leka settlement, 140km north of Kananga, one of Kasai province’s main towns. “We have retrieved 24 bodies, mostly children. It is a provisional toll because the wagons are still overturned,” a railway police official in Bena Leka told AFP news agency. “Most of the passengers are stowaways because it is a freight train. We have suspended the search because night has just fallen in the area,” said the source, who was at the site. “Several wagons have fallen into the water at the bridge over the Luembe River and five more wagons are still overturned.” Derailment confirmed Casualties with severe injuries were taken to the hospital in nearby Kakenge settlement. “We are overwhelmed by the number of injured. We are working urgently. We have already admitted 31 injured,” said Dr Jean Claude Tshimanga of Kakenge hospital. The national rail company confirmed the derailment. It is the third rail accident in about a month in central DRC. Five people were killed in a passenger train accident last month at the station in Kalenda. Rail accidents in DRC are frequent and often deadly because of decrepit track and ageing locomotives dating from the 1960s. Two killed, 10 injured in Multan traffic accident – Samaa Digital News Japanese record-breaking free diver Sayuri Kinoshita, 30, dies after fall from… 6-year-old girl killed in freak golf course accident – Fox News Six animal accidents in New Forest in worst week for months – Daily Echo From the Archives: Kennedy to face court after Chappaquiddick Island accident –… Rail track worker received ‘life changing injuries’ after accident on… Crime Mental health issues at center of latest police… Over a Thousand UK Accidents Reported in 2018 – The… Mental health issues at center of latest police shootings… Kasim Lewis: &apos;Wicked&apos; sex predator who murdered… Wembley shooting: Third man charged with murdering stadium… Man charged with murder in shooting deaths of woman, 2… Youth arrested for alleged burglary and vehicle taking… Scooter Braun’s Co. Claims Lady Gaga’s… Countess becomes patron of air ambulance service that helped… Canada Becomes Highest-Profile Country to Legalize Pot
cc/2019-30/en_middle_0028.json.gz/line1595073
__label__cc
0.520086
0.479914
Chic Chats #23 – A Place to Heal by Arrigo Charlotte Unsworth Fiona Arrigo, the internationally acclaimed British Biodynamic psychologist and founder of The Arrigo Programme, is bringing her unique brand of deep healing and life transformation to London. A Place to Heal by Arrigo launches in Holland Park and here we talk to Fiona Arrigo about the new project. What was your inspiration in establishing A Place to Heal by Arrigo? Now more than ever, we need teachers we can trust, practices that really work, places in which we can feel at home and safe communities of like-minded people. My aim is to cut through the often-bewildering field of psychology, healing and self-transformation. It is from this vision that A Place to Heal by Arrigo was born. In my experience, each individual has unlimited potential for health, well-being and happiness. However these are deeply challenging times and we need a new paradigm for healing; new ways for living in a troubled world with resilience and heart. A Place to Heal by Arrigo will offer an inner-city sanctuary – a hub of learning, healing, inspiration and community. The West London clinic will host a deep programme of events, lectures and workshops alongside life-shifting one-to-one consultations. What makes A Place to Heal by Arrigo different to competitors in the market? My consultants are peerless and the curation of events at A Place to Heal by Arrigo is designed to stretch the mind, soothe the body and heal the soul. My most trusted team will be available in London, including Mary Molloy, the founder of Biodynamic medicine, and psychotherapist Simon Heathcote. Both will be joined by a select band of psychotherapists, healers, mentors, natural health practitioners, and visiting clinical psychologists and consultants, including Gaylin Tudhope and Dr Ana Aquirregabiria. What do you wish you had known before you launched A Place to Heal by Arrigo? What difficulties did you experience along the way? The Arrigo team sees transformational change as an opportunity and worked closely to make the launch of A Place to Heal by Arrigo a success. Obviously when you start there is a mass of things to do, so pre-planning and never under-sourcing yourself is important. Always allow for more time and ensure you have more support than you think you need. We have been very lucky with the team that have worked tirelessly on launching A Place to Heal by Arrigo in an effort to create a true community-based program that means team members, practitioners and consultants are working together and are treated equally. Fiona Arrigo, founder of A Place to Heal by Arrigo What advice would you present to female entrepreneurs who are looking to set up their own business in the industry? Live with heart, passion and dedication. Be true to your intention and follow your dreams with practical application. What motto do you live by? Follow an inspired life. Be kind. Add value. Ask for help. Be humble.
cc/2019-30/en_middle_0028.json.gz/line1595084
__label__wiki
0.557239
0.557239
LS GS GS F ES IS CT LC RC RC F LFA LX RX NX UX LM Reviews Rumors Spy Shots Videos Renderings Photo Galleries Features Everywhere This blog Lexus GS: Fourth GenerationRumors Rumor: Is Lexus Planning to Cancel the GS Sedan? Posted by krew on March 15th, 2017 According to the January issue of Japanese magazine MAG-X, the Lexus GS may be cancelled after the current generation. Here is a translation courtesy of Lexus Enthusiast member White Beach, though I should point out that this rumor is unsubstantiated and possibly untrue: And this time again we have the news about the development freeze of the vehicle of TMC. Our scoop department found out that TMC decided to suspend the development of the next generation Lexus GS…But after the close consideration/examination of its image and positioning in the lineup, TMC came to a conclusion that the GS doesn’t/won’t play a desired role in the lineup. In fact, it is the next generation LS that caused TMC to make this decision. As we have reported, next gen LS has its engine down-sized; the V8 engine to the V6 engine. This means that both the LS and the GS have V6 engine, which causes product overlap in the Lexus’ own lineup. So TMC decided to kick the GS out of the lineup and to fulfill the demand of the customer looking for a large sedan with the LS alone. When turning to the whole Lexus lineup, all new UX crossover is waiting its debut, so it is possible that they are now sorting out its lineup (in order to concentrate its resources on the new model). We also hear the rumor that TMS is trying to figure out whether it is possible to produce another all new model in exchange for the GS, so there is some chance that they will bring the new vehicle which has a completely new approach/concept. The next generation GS were planned to debut in 2018, so at least Lexus won’t drop the existing model until 2018. It’s possible that Lexus will extend its model cycle, but it is now unlikely that we will see the next generation GS. Before the release of the current GS, the model was almost cancelled by Akio Toyoda — here’s a couple quotes from a 2011 interview with Automotive News : “I didn’t want this car,” Toyoda said at the debut of the GS, which goes on sale in early 2012. But Lexus’ regional management teams “fought me like crazy.” “There were some executives, including Akio, who thought, in terms of our priority list, that the GS should be delayed or canceled,” said Andrew Coetzee, now U.S. vice president of Lexus Brand Development. Eventually, the decision was made to proceed with development, and the fourth-generation GS 350 & GS 450h was released in 2012. Despite the new spindle grille design and stronger performance credentials, the GS never really built up any momentum in North America — it’s been one of the weakest selling models in the lineup since its introduction. Some of this can be attributed to the ES, which provides a similar size while undercutting the GS price by a significant margin. Even so, the GS should be an important element in the lineup. The midsize sedan segment lies at the intersection of performance and luxury, and fits perfectly with the brand focus Lexus has been cultivating over the past five years. According the MAG-X story, Lexus hopes to fill the gap with the V6 LS 500, but there are fundamental differences between the models — never mind that the LS looks to be aiming upmarket rather than downmarket. Over its past two generations, the GS has been the vanguard of new design directions for Lexus — first with the 2006 introduction of L-Finesse, followed by current 2012 spindle grille phase. This has given the model an unfinished presence, one that peaks well before the rest of the lineup. The GS would benefit from following the lead established by the LC & LS, both in terms of platform and styling. This rumor of the GS cancellation ignores one critical element — what happens in regional markets that don’t offer the ES? Regardless of the global push towards SUVs, can Lexus really only offer two sedans outside of North America? Can anyone see the ES succeeding in Europe? Do you think Lexus should cancel the GS, and if not, what should be done to fix its position? PrevPrevCar & Driver Preview: 2018 Lexus LS 500 First Drive NextNextMore Details on the Lexus LS Glass & Origami Silk Interior Trim Follow Lexus News Facebook Twitter Instagram Newsfeed
cc/2019-30/en_middle_0028.json.gz/line1595093
__label__wiki
0.685999
0.685999
Military Divorce, Admiralty & Maritime, Veteran's Benefits, Government Agencies & Programs Lansing, Charlotte, Holt, East Lansing, Okemos Language French All Grand Ledge Top Grand Ledge Military Lawyers - Michigan Nearby Cities: Lansing, Charlotte, Holt, East Lansing, Okemos Related Practice Areas: Military Divorce, Admiralty & Maritime, Veteran's Benefits, Government Agencies & Programs The Law Office of Stephen P. Karns Military Lawyers Serving Grand Ledge, MI (Nationwide) Former JAG. Aggressive, Military Defense, Worldwide Availability. Over two decades experience. Our goal is to provide a comprehensive set of miltary law resources ; however, no online guide can replace the services of an experienced military lawyer . If you have a specific question regarding military law, including Court-Martial and Administrative Separations, we strongly urge you to contact military lawyer Stephen Karns or another attorney experienced in military law. Your Rights Under... Murphy & Spagnuolo PC Military Lawyers Serving Grand Ledge, MI (Okemos) Murphy & Spagnuolo PC (M&S) takes pride in maintaining a personal relationship with each client. While the firm maintains a strong litigation practice, we offer a wide variety of specialties, as each attorney has developed and excelled in different areas of legal practice. Some of our attorneys are leaders in their areas of expertise and have published and lectured to colleagues and lay... Fausone Bohn, LLP Military Lawyers Serving Grand Ledge, MI (Northville) Providing Aggressive Criminal Defense in Southeastern Michigan Maybe you made a mistake and need help getting back on track. Perhaps you were accused of something you did not do. Either way, you need an experienced lawyer on your side. Anytime you or someone you care about is facing criminal charges in Michigan, turn to the zealous defense attorneys at Fausone Bohn, LLP . We are committed to... Goldman & Associates Law Firm Military Lawyers Serving Grand Ledge, MI (Livonia) Get Legal Advice - Free Consultation - 24 Hours (24/7) with an expert Legal Adviser. Our Lawyer in Michigan can help you. Call today for your 24/7 FREE CONSULTATION (248) 588-3333 or (877) 737-8800 (toll-free) 24 hour legal advice phone number. We have a successful track record of aggressive legal representation. Let us use our strengths to your advantage. For additional... Jackman & Kasody PLLC Military Lawyers Serving Grand Ledge, MI (Bingham Farms) With over 40 years of combined experience, Attorneys Wade Jackman & Patricia Kasody-Coyle have developed a first rate practice that is sharply focused on domestic and family law issues. Jackman & Kasody PLLC handles all kinds of divorces -- from the friendliest, uncontested divorce where they represent one of the parties whose spouse participates without an attorney, to the most serious of... Springstead Bartish & Borgula Law, P.L.L.C Military Lawyers Serving Grand Ledge, MI (Fremont) If you are arrested, you can hire a lawyer with a diverse practice. You would be wiser, however, to hire a lawyer who does nothing but fight to minimize the pain of prosecution — like those at Springstead & Bartish Law P.L.L.C., serving people like you in Grand Rapids and Fremont, Michigan. We can truthfully claim to be one of the top criminal defense firms in West Michigan. Gary Springstead... Military Lawyers Serving Grand Ledge, MI (Troy) Need help with a Military Law matter? You've come to the right place. If you are an active-duty military personnel, military reservists, or former military personnel with “veteran” status, a military law lawyer can help with your legal matters. Use FindLaw to hire a local military law attorney to help you with matters like court-martial proceedings under the Uniform Code of Military Justice and re-employment rights of reserve military personnel who are called to active duty. Need an attorney in Grand Ledge, Michigan? Use the contact form on the profiles to connect with a Grand Ledge, Michigan attorney for legal advice.
cc/2019-30/en_middle_0028.json.gz/line1595102