text
stringlengths
3
7.38M
source_data
stringclasses
5 values
info
stringlengths
83
12.5k
Thursday, May 29, 2014 Russia and China block UN Security Council referral of Syria to the ICC On Thursday 22 May, the UN Security Council voted on a resolution to refer the situation in Syria to the International Criminal Court for possible prosecution of war crimes and crimes against humanity committed during the conflict. Vetoes by China and Russia prevented the UN Security Council from adopting the resolution. All the other 13 members of the Council, including the United States, voted in favor. France drafted the resolution and managed to generate the wide support of nearly 60 states through its skillful diplomacy. Its introduction of the resolution to the Council was powerful and directly addressed China and Russia and their refusal to act on the situation of Syria. France emphasized that the severity of Syria’s situation calls for a unified international response, where Russia and China are the only ones obstructing any such action. The statements by the other Council members confronted at length and in detail the horrors of the atrocities and suffering in Syria, all pointing to the shamefulness of the vetoes in this context. France hereby successfully achieved its objective to isolate and condemn Russia and China for their failure to act. Both Chad and Argentina who supported the resolution, also criticized the resolution in their statements. They pointed out that the resolution allowed nationals of other non-member states, such as the U.S., to stay immune from ICC jurisdiction over crimes committed on Syrian territory. Moreover, they highlighted that the resolution banned any UN funding of the costs for the Court from the referral. Had the referral been adopted, the Court might not have been able to afford the money to pursue the cases. Samantha Power, United States Ambassador to the UN, delivered a particularly strong and emotional statement. It included the story of one victim’s suffering, who was present during the meeting himself.  According to Russia and China, the statement by the U.S. was hypocritical because the U.S. had so far not continued to pursue a political solution to Syria’s situation. However, the other Council members mostly agreed that the effort for a political solution in meetings in Geneva had failed, and several cited the resignation statement of the UN Special Envoy for Syria. The emotional power of the Syrian situation evoked by Ambassador Power and most other Council members only enhanced the isolation of Russia and China and kept the debate almost entirely clear of any other political concerns. This was France’s main objective and its success was clear in the petulant tone of the closing statements by China and Russia. The full transcript of the UN Security Council meeting can be found here.   Written by Laura van Esterik
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.9638850688934326}", 'metadata': "{'Content-Length': '63749', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HVFT7CB6FGKVA4EY72C6PX5PPIDQSJBY', 'WARC-Concurrent-To': '<urn:uuid:1dc1be6c-9bab-4e46-a26b-87729a83e550>', 'WARC-Date': datetime.datetime(2022, 12, 8, 13, 27, 46), 'WARC-IP-Address': '142.250.31.132', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:MHQORINSBZUUU5SGICU57BOMNIHTAN22', 'WARC-Record-ID': '<urn:uuid:ffab763a-bd12-4550-b570-7f6b521ac54c>', 'WARC-Target-URI': 'https://amicc.blogspot.com/2014/05/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9ace6a0d-911c-4dc3-abdc-749fcc5d0f49>', 'WARC-Truncated': None}", 'previous_word_count': '453', 'url': 'https://amicc.blogspot.com/2014/05/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-70\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08590841293334961', 'original_id': 'f6bff93758dd052d25518876e900fe6a8b7ed3f8461c83e28ae6111c3068a4f4'}
CAVASOL® is the trade name of WACKER's cyclodextrin derivatives and covers a wide portfolio of α, β and γ derivatives. These derivatives are either methylated or hydroxypropylated, which further increases the solubility of cyclodextrins in aqueous media. CAVASOL®cyclodextrin derivatives are primarily used for controlled release of pharmaceuticals, and increase the solubility of the cyclodextrin/drug complex in the blood. They also increase its bioavailability – the speed and extent with which the drug is resorbed by the body. Apart from uses in the pharmaceutical industry, they also have industrial applications, such as in textile fresheners. Additionally, CAVASOL® cyclodextrin derivatives can also be used in polymer systems, for example as a process auxiliary in polymerization, for selective modification of thermal stability or as a rheology-control additive. We supply the products in both standard technical grade and pharmaceutical grade.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9281216859817504}", 'metadata': "{'Content-Length': '64218', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DMO372UNNJQSBDWNFPMFOB6Z24MWAHIQ', 'WARC-Concurrent-To': '<urn:uuid:ed1a3578-db75-473a-8cab-150fdff871ac>', 'WARC-Date': datetime.datetime(2018, 9, 23, 5, 22, 2), 'WARC-IP-Address': '188.40.17.146', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:MFGQHOG6NTPIH7EN6MDAE7GBQG2FUPYY', 'WARC-Record-ID': '<urn:uuid:9df5d934-57d6-4e6f-b8c0-671bbd1ea33c>', 'WARC-Target-URI': 'http://m.wacker.com/cms/en/products/brands/cavasol/cavasol.jsp', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:009654b9-6a68-4249-921a-609fcb8aeafd>', 'WARC-Truncated': None}", 'previous_word_count': '136', 'url': 'http://m.wacker.com/cms/en/products/brands/cavasol/cavasol.jsp', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-63-206-104.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17791950702667236', 'original_id': '16bf153480445041cd7113e4f20eebc7c0bbadd894b50952c5a93ccd2aa59c2b'}
Behind a Moonlit Veil by Tabetha Waite An evil lurks in the darkest corners of Victorian London… Amaris Maxwell has lived her entire life with ill health. As the daughter of a prominent doctor, it never occurred to her to question his abilities, nor his associate’s rather unorthodox treatments. But the life of a sheltered woman has its disadvantages. She yearns to be free, to live an existence outside the same four walls. It isn’t until fate thrusts her into the path of Mr. Jackson Moreland that she begins to question everything she’s ever known. As a mysterious killer begins to terrorize the streets of London, Amaris realizes that things are not always how they may appear… But how close is the true villain? Jackson Moreland has lived the last two years of his life in a personal hell after the brutal murder of his wife. Released from an asylum, he struggles to come to terms with his reality. When he is engaged by Scotland Yard to assist in learning the identity of the murderer of Whitechapel, everything changes the moment he meets Amaris. He knows something isn’t right and he’s determined to find out what it is. As things progress between them and secrets are revealed amid their growing attraction, they begin to fear that the true threat may not be the Ripper after all. Close Menu
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9650038480758668}", 'metadata': "{'Content-Length': '77208', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:B7OZMUZSVZBJVWLEUW6EJ6EBD3S46GOJ', 'WARC-Concurrent-To': '<urn:uuid:5c4934a2-9e9d-4c74-b679-d3ab815881b1>', 'WARC-Date': datetime.datetime(2020, 1, 18, 8, 52, 43), 'WARC-IP-Address': '37.60.240.106', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KRJSKLOKMKT2DMAFGEBJOYRSHSOXRHTT', 'WARC-Record-ID': '<urn:uuid:7c4e9448-6d0e-4347-acd2-62e8ebfe5406>', 'WARC-Target-URI': 'https://allthingsromance.com/behind-a-moonlit-veil-by-tabetha-waite/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:75330c92-26da-4c6a-a664-2279f7480d6f>', 'WARC-Truncated': None}", 'previous_word_count': '229', 'url': 'https://allthingsromance.com/behind-a-moonlit-veil-by-tabetha-waite/', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-163.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05778080224990845', 'original_id': 'f04202d5d087c6beee42b8f0d85c3865e8552c9576890b6e851aeafdaab308a8'}
Many types of commodities are today transported by underground pipeline. For example, water, crude oil, natural gas, ammonia, and numerous other substances are transported by buried pipeline. In order to prevent corrosion of buried metal pipe, and to extend its useful life, pipe to be buried is often coated with a protective primer or coating, or wrapped with protective tape, in the field just prior to laying it in the trench and backfilling over it. Installers of underground pipeline often have difficulty, however, with poor adhesion of coating, primer, or tape applied in the field, due to inadequate pipe surface preparation. For proper adhesion of coating or tape, the exterior surface of the pipe must be completely clean of any foreign substances, and preferably roughened by abrasion or by surface etching. Even newly manufactured and delivered pipe, however, is seldom in this condition at the time it is to be laid. New metal pipe typically is delivered with a coating of mill scale which inhibits good adhesion. New steel pipe also forms a surface layer of rust during transit and storage in the field. Environmental effects and exposure during transit and storage may leave dirt, oil, grease, asphalt, tar or a variety of other deposits on the pipe surface. Used pipe to be relaid may have previously applied coating, primer or tape that will require removal before reinstallation. Therefore, there is a need for an apparatus and method for removing previous coatings, deposits, rust, and mill scale from pipe in the field so that newly applied tape, coating or primer will properly adhere. In recent years, several devices and methods have been used for field cleaning of pipe. One such device is a pipeline traveling knife/brush machine, as manufactured by Eagle Manufacturing Company, model no. R.C.P.T. 6"-12", or by Remco Manufacturing Company, model no. SM-DR-2"-8". These machines have a hollow cylindrical body open on both ends to receive a pipe to be cleaned. The cylindrical body houses rotary knives or scrapers that encircle the pipe and scrape the exterior surface, and rotary wire brushes that vigorously brush the pipe surface. Another such pipeline traveling device is manufactured by Cups Company. The Cups device uses high pressure water spraying in an attempt to clean the exterior surface of the pipe. While these prior devices may be somewhat effective as a means of cleaning and preparing a pipe surface, they suffer from several inherent disadvantages. First, at best, these devices remove only approximately 70 percent of asphalt, tar, and certain types of prior coatings applied to the pipe. Second, these prior devices are relatively ineffective at removing mill scale or rust from steel pipe. The failure of these cleaning devices to completely remove these substances or deposits results in significantly reduced adhesion of field-applied tape and protective coatings, and ultimately, in reduced protection of buried pipe. Third, even when these cleaning machines are successful at removing all deposits from a pipe surface, the machines accomplish little or no surface etching of a smooth pipe surface, which is necessary to achieve lasting adhesion of tape or coating. The wire brushes in knife/brush machines tend to burnish the pipe surface, rather than roughening it. Fourth, prior cleaning methods are slow. For example, the Cups device can clean only about 2,500 feet of pipe per 8 hour day. Fifth, field cleaning by these prior devices is expensive. For instance, field cleaning a pipe with the Cups machine costs approximately $2 per lineal foot of pipe. Consequently, a need exists for a low-cost, high-speed apparatus and method for effectively and reliably field cleaning a pipe of mill scale, rust, prior coatings, environmental deposits, and also for abrading and etching the pipe surface to maximize adhesion of field-applied tape or coating.
mini_pile
{'original_id': '9f26ebd764c2a65396641035603707c871bd3613886f934ce04e94071da34471'}
federal spending A few ways government could, you know, maybe not waste your money. “If we can prevent the government from wasting the labors of the people, under the pretence of taking care of them, they must become happy.” ~ Thomas Jefferson, 1802, Letter to Thomas Cooper Our federal government is an all-consuming, gargantuan parasite growing ever larger with each passing day. Under the rubric of providing for our every need from cradle to grave, it consumes more and more of our labor. It is, to quote Reagan, “like a baby: An alimentary canal with a big appetite at one end and no sense of responsibility at the other.” Yet one organization has a blueprint for reining in this ocean of red ink; Citizens Against Government Waste. CAGW has compiled a list of wasteful government spending each year since 1983, and the incorporation of some of its recommendations for the federal budget has resulted in spending cuts of $1.4 trillion. A short sampling of potential taxpayer savings from this year’s report, Prime Cuts 2016, includes: - Reducing improper Medicare payments by 50% over five years ($4.3 billion), noting, “Medicare is plagued with the highest reported amount of improper payments of any federal program…Because of its chronic vulnerability to fraud, waste, abuse, and mismanagement, the [Government Accountability Office] has for 20 years designated the Medicare program as ‘high risk.’” - Eliminating federal subsidies for Amtrak ($1.4 billion in one year, $7.1 billion in five years). Amtrak, a government-run railroad, has been in operation for 45 years at a cost to taxpayers of more than $40 billion. It has never turned a profit and now costs taxpayers almost a billion dollars a year, leading Amtrak’s founder to call it a “massive failure”. Deficits to grow by $7.6 trillion over next 10 years The Congressional Budget Office expects budget deficits to grow by $7.62 trillion between 2015 and 2024 despite a rise in tax revenue. That, according to updated budget projections released yesterday. The nonpartisan fiscal research office expects budget deficits to hit $492 billion in 2014, or 2.8% of gross domestic product (GDP), and $469 billion in 2015 before beginning to rise again. By 2020, the budget deficit will hit $804 billion, or 3.5% of the economy. The main drivers of federal spending are entitlements, known budget language as “mandatory spending” or “autopilot spending,” and debt service. These budgetary items will consume nearly 74% of the federal budget over the 10-year budget window. Though tax revenues will eclipse $4.9 trillion, or 18.3% of GDP, by 2024, spending will continue to rise at an unsustainable pace. The federal government will spend nearly $6 trillion in that same year. The federal government will spend nearly $48.2 trillion over the course of this timeframe. Added together, taxpayers will be hit with $7.62 trillion in budget deficits over the 10 year budget window. The share of the national debt held by the public will eclipse $20 trillion by 2024. This, despite higher than average tax revenues collected by the federal government. The Congressional Budget Office warns of potentially dire consequences if federal lawmakers don’t act soon to deal with the threats to the United States’ long-term prosperity. CBO director warns of “unpleasant” choices on federal spending The growth of federal entitlements programs is the biggest fiscal issue facing the United States, says CBO Director Doug Elmendorf, and it’s one that is going to require Washington to make some “unpleasant” choices, preferably sooner rather than later: “So we have a choice as a society to either scale back those programs relative to what is promised under current law; or to raise tax revenue above its historical average to pay for the expansion of those programs; or to cut back on all other spending even more sharply than we already are,” Elmendorf said. “And we haven’t actually decided as a society…what we’re going to do. But some combination of those three choices will be needed.” Elmendorf said there are various ways to proceed: “But they tend to be unpleasant in one way or another, and we have not, as a society, decided how much of that sort of unpleasantness to inflict on whom.” Though there’s a lot of attention paid to short-term deficits, this is symptomatic of a much, much larger problem. It’s not a new crisis, and it’s one that most people in Washington realize exists. The CBO has been pointing out these concerns for some time, most recently its September long-term budget report. This analysis anticipated that spending as a percentage of GDP would rise to 26.2%, based on current law, and federal revenues will come in around 19.5%. The budget deficit as a percentage would be 6.4% and the public’s share of the national debt will hit 100%.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '85', 'language_id_whole_page_fasttext': "{'en': 0.9433009028434752}", 'metadata': "{'Content-Length': '46523', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NQWPIIN4ZRR7NIINHUIYZPZIB4DHNKE7', 'WARC-Concurrent-To': '<urn:uuid:028b0a7a-205e-4aba-b7f8-5607bafd540a>', 'WARC-Date': datetime.datetime(2019, 5, 24, 5, 0, 12), 'WARC-IP-Address': '192.237.213.248', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:WPCKX3VN2HIVD2TD2KMC6JBIF6F6FIEC', 'WARC-Record-ID': '<urn:uuid:3548c8db-7813-4df3-8099-cc6c69faf1e3>', 'WARC-Target-URI': 'http://imap.unitedliberty.org/tags/federal-spending', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:31e1dd83-3ba1-490e-8b5b-b320933ab4c7>', 'WARC-Truncated': None}", 'previous_word_count': '782', 'url': 'http://imap.unitedliberty.org/tags/federal-spending', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-146-226-231.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01934647560119629', 'original_id': 'ad2ec67f5161746c1c5d839d5df9e8974101f60e8f701ead1f49c47d5563beea'}
How to Naturally Repel Mosquitoes How to Naturally Repel Mosquitoes How to Naturally Repel Mosquitoes? Sure mosquitoes might be tiny, but they sure are mighty! Anybody living in mosquito prevalent areas has to constantly struggle with finding effective ways for mitigating them. And not just are these insects causing diseases like yellow fever, malaria, and the fatal dengue, people also suffer the usual symptoms that are caused by every mosquito bite. This is certainly irritating and annoying. Then what do we do? The mosquito repellents bought from the store might help in reducing the probability of you getting a bit. However, these have chemicals that are bad for you as well as the environment. Look no further if you are searching for "How to Naturally repel Mosquitoes”? We understand the difficulty of keeping insects and bugs away from your house. Try some of these methods when you see these mosquitoes in your environment! 1. Dry Ice: This is a method that's a bit time consuming but good. You have to place dry ice in a trap or container. Because of the carbon dioxide emission, the mosquitoes will get attracted. Then they get trapped and die in the container. Make sure that while handling dry ice you have gloves on. This is an extreme product and gets even harms your skin if handled for a long time. 2. Pinion Wood: You can begin burning some pinion wood and can be used for outdoors. The smell starts killing mosquitoes quickly. They are not able to handle their smell and start dying almost instantly. 3. Play Some Music: Now, this is a fun experiment to try. There is some worthy scientific research that backs up this claim. Research has shown that mosquitoes do respond to vibrations of low-frequency. So the scientists decided to introduce the mosquitoes to something that's a noise like a song scary monsters by Skrillex and dubstep. And it did work. The research published in Acta Tropica said that listening to the song made female mosquitoes less attacking.  4. Make Use Of Natural Repellents If Needed: So we understand that everybody is not a fan of market bought products, but sometimes while dealing with mosquitoes you just have to. It's known that mosquitoes get attracted to Carbon dioxide and heat from the human body. There are proven and effective mosquito repellents that work with the same concept in mind. So the product attracts mosquito towards it and overtime kills the mosquitoes. These need to be placed at some distance of your home, so that mosquitoes stay away. The Safe Way for Using Mosquito Repellents: 1. Never use repellent sprays on the face and mouth.  2. You can use them over your clothes.  3. Never use repellents over irritated skin, wounds or cuts.  We all are searching for How to Naturally Repel Mosquitoes over the internet constantly. There are some dangers caused by the toxic chemical-based products that you get in the market. It's better to refrain there usage. You can easily try the remedies that we mentioned above and they will surely work for you!  All Natural Fast Shipping Hassle-Free Refunds 100% Guaranteed
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9507560729980468}", 'metadata': "{'Content-Length': '262115', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QUM4NZP5KGA7B6Z7VCYWMW6KOLVIS27V', 'WARC-Concurrent-To': '<urn:uuid:6ecd153b-c572-4cbb-bc6e-50f6fb4b9db3>', 'WARC-Date': datetime.datetime(2022, 9, 29, 23, 10, 54), 'WARC-IP-Address': '23.227.38.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:GWVCXZW7ZDDX2AFIKZMHRA4DSSR4IQES', 'WARC-Record-ID': '<urn:uuid:a73b9d60-3368-4b17-9b1f-b9b088f84b12>', 'WARC-Target-URI': 'https://tougherthantom.com/blogs/protect-your-home/how-to-naturally-repel-mosquitoes', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:37706db2-c85a-496d-b779-f09f5b9184a2>', 'WARC-Truncated': None}", 'previous_word_count': '523', 'url': 'https://tougherthantom.com/blogs/protect-your-home/how-to-naturally-repel-mosquitoes', 'warcinfo': 'isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6209279894828796', 'original_id': '4fc39099dac4d535cb015bfb312e711e3dd603c57dc4c5fe293293e70763f4cd'}
import { Element } from '../shared' export function isComponents (ele: Element) { return /[A-Z]/.test(ele.name[0]) }
common_corpus
{'identifier': 'https://github.com/Himself65/html-parser/blob/master/src/utils/helpers.ts', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '2019.0', 'title': 'html-parser', 'creator': 'Himself65', 'language': 'TypeScript', 'language_type': 'Code', 'word_count': '15', 'token_count': '42', '__index_level_0__': '24786', 'original_id': '677ce507daf3d67886f02494a363e9fe287bf7ade8d94d12b02e92c23a1bb366'}
- The Antique Chinese Porcelain Collectors Page Chinese Porcelain Marks The Qing Dynasty (1644-1912) and their reign marks Although they are now thoroughly identified with China, the emperors of the Qing dynasty were not Chinese but descendants of the Jurchen, a group from the far north-east of China who had abandoned the term Jurchen, associated with historical submission to Chinese rule, and instead called themselves Manchu. Their leader then proclaimed himself emperor of the Qing (pure, clear) dynasty and in 1644 replaced the Ming dynasty as rulers of China. During the seventeenth and eighteenth centuries, the problem of identity, of the balance between ancestral heritage and Chinese culture, was gradually resolved. In the early stages of Manchu rule, the emperors still encountered considerable loyalty to the Chinese Ming dynasty. The Aisin-Gioro clan, to which the Qing emperors belonged, had consolidated their power from the 1590s through the organization of the Eight Banners. The Banners, military groups named for their distinctive banners, also formed the basis of social organisations that had been in place before the Manchu conquest of China, where warriors" families were included in the groups and provided with educational opportunities and agricultural land. As the Qing moved southwards, the Banners incorporated many Chinese (who eventually outnumbered the Manchus) into the Banners, providing for them and their families and thereby instilling loyalty. These were the troops that the Kangxi emperor led against three rebellious Chinese generals, finally crushing their revolt in 1681. This chart shows the relative length and sequence of the various period during the Qing Dynasty (1644-1912) Much of the early part of the Kangxi Emperor's rule was spent in consolidating and extending his territory. The Qianlong Emperor also undertook major military expansion, north-east and north-west. Both emperors led extensive expeditions themselves. The Yongzheng Emperor by contrast centered his time on Beijing and is best known for his transformation of government Imperial marks from the Qing dynasty are mostly written in either Kai shu (kaishu) (normal script) or Zhuan shu (zhuanshu) (archaic seal script). It is worth noticing that kaishu is writing and is therefore subject to the differences in penmanship and is therefore more difficult to fake, while zhuanshu technically is drawing and is therefore easier to emulate. Sometimes a third Song style occurs, but so far only examples of the 'normal' and the 'seal script' versions are shown below. The 'seal script' is stylistically related to the interest in the archaic which not in this matter pre-dates the Yongzheng period, so I would personally feel uncertain about any seal script mark being older than the Yongzheng. All genuine Imperial marks occurs in several versions and are written by a limited number of different hands. It is therefore felt that the individual handwriting of those entrusted with this work are possible to recognize. From around 1995 there seems to have been a rise in computer aided designs while no marks can be trusted anymore as the single feature on which to base any judgement of authenticity while overall style and quality should be the true criteria. Jan-Erik Nilsson Shunzhi 1644-61 Shunzhi 1644-61 The Shunzhi Emperor's given name was Fulin. Born in March 15, 1638 he was the second emperor of the Manchu Qing dynasty and the first Qing emperor to rule over China proper. Only six when he ascended the throne the Shunzhi reign lasted from 1644 to 1661. The eighteen years of his reign brought great changes to China and its history. Genuine Shunzhi period marks are rare if they indeed exist at all. To the left: Kaishu (normal script) style, to the right zhuanshu (archaic seal script), possibly not occuring on any porcelain before the Yongzheng period. In the first year of Shun Zhi reign (1644), a peasant army led by Li Zicheng overthrew the Ming rule in Beijing, which was in turn betrayed by traitor Wu Sangui and the Qing Army defeated Li Zicheng and occupied Beijing. Shortly, Shun Zhi came to Beijing from Shenyang and made Beijing the capital. The 5th of February in the 18th year (1661) of his reign Shun Zhi (possible) died in Yangxindian (the Hall for Cultivating Character) in the Forbidden City. In the summer of the second year of Kang Xi reign (1663), Shun Zhi's coffin was buried in Xiaoling. However, a rumor has it that he instead, heartbroken by his young wife's death, had left the forbidden city to become a Buddhist monk. Xiaoling in located at Malanyu, northwest Zunhua, Hebei Province, 125 kilometers from Beijing and is the East burial complex of the Qing dynasty. Among the tombs are the Xiaoling of Emperor Shun Zhi, Jingling of Emperor Kangxi, Yuling of Emperor Qianlong, Dingling of Emperor Xianfeng, Huiling of Emperor Tongzhi and four tombs of empresses including Empress Dowager Cian and Empress Dowager Cixi. In 1928 some of the underground palaces were blown open by warlord Sun Dianying and looted, why the tombs have suffered severe damages. Kangxi 1662-1722 Kangxi 1662-1722 The Kangxi Emperors name was Xuanye AIXIN-JUELUO or Hiowan Yei AISIN-GIORO, in Manchu. He was born May 4, 1654 as the son of the late Emperor Shunzhi, who died in his early twenties and his mother, the 14 year old Imperial Consort Tong, a concubine from the Tongiya clan (1640 - 1663). He was the second emperor of the Qing dynasty to rule over all of China. His reign lasted 61 years, from February 7, 1661 until his death December 20, 1722, making him the longest-reigning Emperor of China in history. The Kangxi era, that is counted as full Chinese years, lasted from February 18, 1662 to February 4, 1723. The Kangxi Emperor succeeded the imperial throne at the age of seven, on February 17, 1661, twelve days after his father's death. Being too young to take power himself, the control over the empire was fulfilled by four guardians and his grandmother the Dowager Empress Xiao Zhuang, that the Shunzhi Emperor had appointed before his death to rule during Kangxi's minority. However, after a fierce power struggle one of them, Oboi, seized absolute power as a sole regent. In the spring of 1662 the Kangxi rulers ordered a massive attempt to gain control over the largely Ming loyalist southern China under the leadership of Zheng Chenggong (also known as Koxinga), something that involved moving the entire population of the coastal regions of southern China, inland. At age 15 the Kangxi emperor had Oboi arrested in 1669 and began to take control of the country himself. Of major concerns was the flood control of the Yellow River, the repairing of the Grand Canal and the Revolt of the Three Feudatories which broke out in 1673 in the south of China, and also the Chakhar Mongols rebellion in 1675. In 1673 the Kangxi government mediated a truce in the long-running war in Vietnam, which had been going on for 45 years with nothing to show for it. The Chakhar Mongols was incorporated in the 'Eight Banners' Chinese Army. In the South the incorporation of the region went so far that in 1684 the Qing Dynasty annexed Taiwan, the last outpost of Koxinga. Soon afterwards, the displaced families were encouraged to move back towards the coast. All these campaigns and many more took a great toll on the treasury. From Kangxi period's peak during the last decades of the 17th century the treasury shrunk to a tenth or less, by the end of his reign. Corrupt officials were also quite noticeable in the final years of Kangxi. The problem of dealing with this as well as the civil war in Tibet was left with some advices, to the future emperor. Eventually, through the long years of Kangxi's reign factions and rivalries had formed at the court. The Kangxi Emperor had 20 sons surviving into adulthood. Of these, his second son Yinreng was at age 2 named Crown Prince of the Great Qing Empire. After that his mother had died in childbed giving birth to him, he was brought up personally by the Kangxi Emperor to become the perfect heir to the Imperial throne. Yinreng did not however prove co-operative. Rumor had it that he had cruel habits; to beat and kill his subordinates, he was alleged to have had sexual relations with one of Kangxi's concubines, something that was defined as incest and a capital offense, and to purchase young children from the Jiangsu region for his pleasure. The heir apparent Yinreng gradually fell into disfavor and in 1708, on the semi-annual hunting expedition at Rehe, the Kangxi Emperor charged Yinreng with immorality, sadism, sexual impropriety, usurping power and treason, after which he was deprived of his position as heir apparent and imprisoned. His condition worsened and the Emperor became eventually convinced that he was insane. In 1712 he was placed in perpetual confinement to die in prison in 1725, not long after that his younger brother, the 4th Imperial Prince Yinzhen, had ascended the throne to become the Yongzheng Emperor. To this day, whom Kangxi actually chose as his successor is still a topic of debate amongst historians and is along with three other events, known as the Four greatest mysteries of the Qing Dynasty. In addition to his military prowess the Kangxi Emperor was famous for his scholarly abilities and his patronage of the arts. Left mark: Kaishu (normal script) style; Right zhuanshu (archaic seal script), as far as I have been able to confirm, not occurring on genuine Kangxi period pieces. Sir Harry Garner has suggested that Kangxi marks could be divided into three chronological groups on the basis of their calligraphy. Early period: bold Middle period: freely written marks, rather loose Late period: Precise, tight, rather small and less "free" than the other two groups. Occurs especially on small sized pieces of superb quality; for example the "peach bloom" pieces and the "month's cups". The Kangxi marks seems not to have been copied during the 18th century. One possibly explanation could be that both Yongzheng and Qianlong seems to have been busy being concerned with their own image and quite possible saw their own porcelain designs as superior to those of previous periods. In the early Kangxi period the six character Ming mark of Chenghua is seen and occasionally Jiajing, but towards the end of the reign the Kangxi six character kaishu mark is the one that is used. All genuine Kangxi period marks should be of six characters. The only genuine four character "Kangxi Nian Zhi" marks is done within a double line square border and used exclusively for palace workshop decorated wares, the highest level of Imperial porcelain. All four character Kangxi marks without borders are from and around the Guangxu (1875-1908) period when four character kaishu marks were widely used. Genuine Kangxi mark Kangxi 1662-1722. Imperial Kangxi mark. Middle period: freely written marks, rather loose. Genuine Kangxi mark Kangxi 1662-1722. Imperial Kangxi mark. Late period: Precise, tight, rather small and less "free" than the other two groups. Genuine Kangxi mark Kangxi 1662-1722, "Da Qing Kangxi Nian Zhi" mark. During the Kangxi period, the habit of adding reign marks on porcelain not commissioned by the emperor are known to have been addressed and forbidden by public edicts. It is likely that this is an example of one of these period but not Imperial marks that these regulations was aimed at quelling. It is also worth pondering of this mark is not written by the same person as the above, but just a little bit faster. Click here to see large picture. Genuine Kangxi mark with Artemisia leaf Kangxi 1662-1722, Artemisia leaf mark, and of the period. During the early Qing dynasty, up until the early 1680's conditions were unsettled in China and the existence of Imperial wares as well as the use of reign marks on porcelain was restricted in various ways. During this period a number of different marks came into use, as well as two empty rings which in a way could be considered a period marking if not Imperial. Genuine Kangxi mark with Lingqi fungus markKangxi 1662-1722, Lingzhi fungus mark, and of the period. During the early Qing dynasty, up until the early 1680s conditions were unsettled in China and the making of Imperial wares as well as the use of reign marks on porcelain was restricted in various ways. During this period a number of other marks came into use, as well as the drawing of two empty rings on the bases which in a way could be considered a marking of the Kangxi period. Also this practice was copied during the latter part of the Qing dynasty. Click here to see large picture. Yongzheng 1723-1735 Genuine Yongzheng mark Genuine Yongzheng mark Genuine Yongzheng mark Yongzhen period genuine mark Yongzheng 1723-1735 The Yongzheng Emperor (December 13, 1678 - October 8, 1735) was 44 years old when he ascended the Dragon Throne in 1722 and died two months before his 58th birthday. He reigned for 13 years. During the latter part of the Yongzheng period the zhuanshu seal mark is introduced. According to Manchu tradition, the Kangxi emperor was succeeded by his fourth son, the Yongzheng emperor (who ruled from 1723 to 1736). His imperial title, Yongzheng, means 'harmonious and correct', whilst his family name, Yinzhen, means "inheritance of luck". In some ways, his reign can be seen as a reaction against that of his father: where the Kangxi emperor was conciliatory, the Yongzheng emperor acted firmly against corruption, offering bonuses to demonstrably incorruptible officials and thereby greatly improving the flow of revenue. Capable of extremely hard work, he not only dealt with dozens of daily memorials (government reports) from all over the country, but he developed the system whereby "Palace Memorials" established by his father came directly to him, bypassing officials of the Outer Court and providing him with private information. It is clear that there was considerable rivalry between the Kangxi emperor's twenty sons (he had had thirty-six but only twenty survived), since on his accession the Yongzheng emperor imprisoned a number of his brothers, and remained touchy about accusations that he had usurped the throne. In order to control imperial heirs, he insisted upon their all being taught in the school inside the Forbidden City and instructed in Confucian morals by the best Chinese teachers. He also instituted the practice of concealing the name of the designated heir in a box kept in the Qianqing hall, to be opened only after the emperor's death. To the left: Kaishu (normal script) style mark, to the right zhuanshu (archaic seal script). Qianlong 1736-95 Qianlong 1736-95 The Yongzheng emperor nominated his fourth son, Hongli, meaning "Great Successor", as his heir and he ruled from 1736 to 1796 as the Qianlong or "eminent sovereign" emperor. He had been a great favorite of his grandfather, the Kangxi emperor, with whom he would go hunting as a boy. Some say that the Kangxi emperor chose Yongzheng as his successor so that he would eventually be succeeded by his grandson, although that would seem a rather risky prospect, as the Yongzheng emperor had ten sons (though only four survived into adulthood). When Qianlong was on the throne China was flourishing, but as he left the throne it was beginning to decline. The long reign of the Qianlong emperor (who retired in 1796, three years before his death) may be considered the height of the Qing. Though his Ten Great Campaigns were not all as successful as he claimed, he brought much of Central Asia under Qing rule, vastly increasing the size of his empire. The costs of his campaigns were met by an increase in cultivated land, with new crops, such as maize and peanuts, being grown and with firm controls on revenue collection. Well versed in Chinese culture, the Qianlong emperor is supposed to have written essays and as many as 42,000 poems. He developed the imperial collection, commissioning paintings and artefacts from Chinese and foreign artists, as well as collecting ancient Chinese objects and ordering the cataloguing of palace paintings and calligraphy. Like his grandfather Kangxi, the Qianlong emperor made five great tours of inspection of southern China, reversing the tradition of the Ming emperors who only left the Forbidden City to visit the imperial altars but did not venture outside Peking. His daily routine was described in detail by the Jesuit priest Fr Benoist. He rose at six, ate alone at eight (his meal taking about 15 minutes) and then read reports and memorials, discussing them with his ministers. He held an audience for newly appointed officials and had another brief solitary meal at two. Then he would read, write verse or paint and perhaps take some 'light refreshment' before bed. Unlike the Chinese, the Qianlong emperor took milk in his tea, with special herds of dairy cows providing the Manchu imperial family with milk. A menu for one of his meals in 1754 included a dish of fat chicken, boiled duck and bean curd, swallows nests and shredded smoked duck, smoked chicken, shredded stewed chicken, Chinese cabbage, salted duck and pork, bamboo-shoot steamed dumplings, rice cakes with honey and side dishes of pickled eggplant, pickled cabbage and cucumbers in soy sauce In the 60th year of his reign (1796), the Qianlong Emperor enthroned his son and became overlord for four years. In the 4th year of the Jiaqing reign (1799) the Qianlong Emperor died at age 89. During this period the archaic zhuanshu seal mark is by far the most common, largely ousting the regular kaishu script. It is thought that the few genuine kaishu marks dates to the two first years of the reign before the official seal mark of the Qianlong period becomes standardized by an official decree. Seal marks are often written in iron-red but under glaze blue or gilt can occur as well as incised, stamped or molded in relief. On a small group of porcelain genuine marks in raised blue enamel can appear. Seal marks from the period can also be written in a cartouche or with the seal broken up, and on the base of stem-cups written in a horizontal row from right to left. On later Qianlong copies the seal mark in red enamel is something of a favorite. Jiaqing 1796-1820 Jiaqing 1796-1820 During this period most imperial wares are marked with the zhuanshu "archaic seal", a continuation of its popularity from the Qianlong period. Daoguang 1821-50 Daoguang 1821-50 Genuine Daoguang mark Genuine Daoguang mark Xianfeng 1851-1861 Xianfeng 1851-1861 The Xianfeng was proclaimed in March 1850. The first year of his reign was 1851. Died in August 1861 during the eleventh year of his reign. The Xianfeng (Universal Prosperity) Emperor, name was Yizhu AISIN GIORO. He was born in July 17, 1831 at the Imperial Summer Palace Complex, 8 kilometers northwest of the walls of Beijing as the fourth son of the Daoguang Emperor. His mother was the Imperial Concubine Quan, made Empress in 1834. Chosen as the Crown Prince in the later years of the Daoguang reign, Yizhu had reputed ability in literature and administration which surpassed most of his brothers. At age 19 he succeeded the throne, in 1850, left with a crumbling dynasty facing challenges internally and also from Europeans. In 1851 the The Taiping Heavenly Kingdom Rebellion (1851-1864) began, spreading to several provinces with amazing speed. Xianfengs attempts to crush the rebellion was met with limited success. In 1855 several Muslim rebellions began in the southwest. Western forces, led by France, after inciting a few battles on the coast near Tianjin, attempted "negotiation" with the Qing Government. Under the influence of the Concubine Yi (later the Ci Xi Dowager Empress) Xianfeng believed in Chinese superiority and would not agree to any western demands. In October 18, 1860, the Imperial Summer Palaces of Qingyi Yuan and Yuanming Yuan was looted and burnt by the Western forces. Emperor Xianfeng and his Imperial entourage fled to the northern traveling palace in Jehol. While becoming more physically ill, Xianfeng's ability to govern deteriorated, while two competing ideologies in court formed two distinct factions, one under the rich Manchu Sushun, Princes Yi and Zheng; and one under the Concubine Yi, supported by Gen. Ronglu and Yehenala Bannermen. In August 22, On the 11th year of his reign (1861) at age 30 Yizhu died at the the imperial Summer Resort in Chengde, Hebei Province, (Jehol Travelling Palace), 230 km northeast of Beijing. One day before his death the Xianfeng emperor had summoned a group to his bedside, giving them an Imperial Edict to rule during his only surviving son, Prince Zaizhun minority, at that time barely 6 years old. By tradition, after the death of an Emperor, the body is to be accompanied to the Capital by the regents. Concubine Yi however traveled to Beijing ahead of time, staging a coup that would make her the acting ruler of China for the next 47 years, under the title of Empress Dowager Cixi. During Xianfeng's reign the Qing government was on the verge of collapse. In the 4th year of the Tongzhi reign (1865), Xianfeng was buried in Dingling. Tongzhi 1862-1874 Tongzhi 1862-1874 The Tongzhi (To Rule Together a State of Order) Emperor, born Zaichun AISIN GIORO in April 27, 1856, became emperor at the age of five as the only surviving son of the Xianfeng Emperor and the Noble Consort Yi (Empress Dowager Cixi). He was the ninth emperor of the Manchu Qing Dynasty, and the eight Qing emperor to rule over China. During his period in practice his mother, the Empress Dowager Cixi, wielded the real power, ruling sitting behind a curtain in the audience hall. Under his reign some attempts to political reforms was made, which are know as the Tongzhi Restoration. In January 12, 1875, the Tongzhi Emperor died at age 19 of small pox without a son. It has been rumored that his cause of death was actually syphilis "due to his excessive and bizarre sexual appetite and alleged affairs with prostitutes outside of the palace". Empress Dowager Cixi Empress Dowager Cixi After the death of Xianfeng in 1861, Zaichun, Nalashi's six-year-old son, succeeded to the throne under the reign title of Tongzhi (1862-1874) so Nalashi was promoted to Empress Dowager with her honorary title Cixi. In the 11th year of the Xianfeng reign (1861) she worked hand in glove with her brother-in-law Yixin, launched a coup d'etat, wiped out her political enemies and commenced directing state affairs from behind a screen. Thus, she became an unofficial empress during reigns by Tongzhi and Guangxu during 48 years. Cixi died in 1908. Three years after she died, the Qing Dynasty came to its end with the Revolution of 1911. Cixi's tomb was exquisitely constructed in a unique style. It ranks as the best for building details among the tombs of the Qing Dynasty. Railings around Long'en Palace are replete with carved motifs of roaring waves, floating clouds, dragons and phoenixes symbolizing auspicious omens. The stone steps in front of the palace are carved with three dimensional phoenixes and dragons flanking the pearl. Carved on walls are intricate designs marking happiness, prosperity, and longevity. On the arch beams and ceilings are gilded golden paintings such as a golden dragon coiled around all exposed pillars. These kinds of designs are not seen in other mausoleum palaces. The tomb was plundered in 1928. The time when the Empress Dowager Cixi ruled China has among us at the site been named the Kangxi revival period since there was an obvious vogue for Kangxi style porcelain at this time. Not only blue and white pieces and enamelled porcelain in famille verte enamels were produced but also replicas in monochrome enamels such as Sang-de-Boef or Ox-blood. The good part with these early copies is that they are pretty easy to recognize since they were not really trying to produce perfect fakes, but appears to have more wanted to continue to make pieces in the Kangxi period style and tradition. Now that turned out quite difficult. Many processes and traditions were never written down and had been lost and forgotten. Sources for paste and glaze had changed. While the blue and white porcelains turned out pretty good, the red ox-blood monochromes got a too thick glaze that ran and often needed to be ground off of the foot rim. For other style replicas there were other problems making them distinguishable. Another aspect is, that there was indeed a great interest in the West, in particular among American collectors, for antique Chinese porcelain at this time. Prices at auctions were soaring. So, there was a ready market for antiques, even newly made ones. I don't think this was among the main reasons why the Kangxi period was revived as a whole, but it was a part of the picture why so many grand pieces was made. Guangxu 1875-1908 Guangxu 1875-1908 The reign of the Guangxu (Glorious Succession) Emperor lasted from 1875 to 1908. His name was Zaitian AISIN-GIORO. He was born August 14, 1871 and ascended the throne in 1875 at the age of four as the tenth emperor of the Manchu Qing dynasty and the ninth Qing emperor to rule over China proper. He was adopted by the Empress Dowager Cixi as her son. Until age nineteen, in 1894, the Guangxu Emperor was "aided" in his rule by the Empress Dowager Cixi. Four years later, in 1898 at age 23, he initiated the Hundred Days' Reform in an attempt to modernize China which was abruptly stopped same year by Cixi, after which he was put under house arrest until his death in November 14, 1908. The cause of his death remains a mystery until this day. He was succeeded by Empress Dowager Cixi's hand picked heir, his nephew Puyi, who became the Xuantong Emperor. Genuine Guangxu Imperial markGuangxu 1875-1908, mark in regular, kaishu, script. Accepted by Christie's as genuine in 2013. Demonstrates clearly a feature that is often called hollow or fractured, line. Notice the marks slightly elongated - high and narrow - shape with more space between each pair of character. Click here to see large picture. Xuantong 1909-1912 Xuantong 1909-1912 Puyi (Wade-Giles P'u-I), also called Henry Puyi, reign name Xuantong, was the last emperor (1908-1911/12) of the Qing (Manchu) dynasty (1644-1911/12) in China and pro forma emperor of the Japanese-controlled state of Manchukuo (Chinese: Manzhouguo) from 1934 to 1945. He was born Feb. 7, 1906, Beijing, China. His father was the second Prince Chun, brother of the Emperor Guangxu and nephew of the Empress Dowager Cixi, who had been the de facto governor of China for many years; her son Guangxu being mostly isolated from all governmental and family affairs. Puyi died October 17, 1967, Beijing. In 1909 Puyi succeeded to the Manchu throne at the age of three, when his uncle, the Guangxu emperor, died on Nov. 14, 1908 and reigned under a regency for three years. In 1911 the Qing dynasty was overthrown and China declared to be a republic. When the republicans occupied Peking they required the abdication of Puyi but guaranteed his title, safety, income, etc., in the Articles of Favorable Treatment which was accomplished on February 12, 1912. Thus the Republic of China despite many competing warlord armies came into being, with the recent Imperial general Yuan Shikai, becoming President. Puyi continued to live in the palace in Beijing and chose 'Henry' as a given name. From this, he became known as Henry Puyi in the West. After a coup in November 5, 1924 by General Feng Yuxiang Puyi was made a regular citizen of the Republic of China and the same day expelling him from the Forbidden City. Thus, Puyi was ruling emperor until February 12, 1912 (and also briefly between July 1 and July 12, 1917), and non-ruling emperor between February 12, 1912 and November 5, 1924. In 1924 he left Beijing to reside in the Japanese concession at Tianjin. In March 9, 1932-1934 Puyi was put in place as the leader of the Japanese-controlled Manchukuo in Manchuria (China's Northeast) under the reign name Datong and in 1934 to 1945 made 'emperor' of the same region under the reign title of Kangde. His autobiography, From Emperor to Citizen, was published in English in 1964-65, and he was the subject of the movie The Last Emperor (1987). Genuine Kangxi mark with Lingqi fungus markXuantong 1909-1912, kaishu mark in regular script. Accepted by Sotheby's as genuine in 2013. Demonstrates clearly a feature that is often called hollow or fractured, line. The decoration of the piece, iron red bats among clouds is in a distinctly different style as compared to similarly decorated pieces of the previous reign. Click here to see large picture. Hongxian (Yuan Shikai) 1915-16 Hongxian (Yuan Shikai) 1915-16 Pictures and pieces making up this section are from my personal reference collection and are not for sale. Pieces have also been donated by Simon Ng, City University of Hong Kong, N K Koh, Singapore, Hans Mueller, USA. Hans Slager, Belgium, William Turnbull, Canada and Tony Jalin Zhang, Beijing. Readers are encouraged to contribute any insights or further information you might have. Any and dated Chinese Porcelain for sale can be offered to the reference collection by e-mail to Web page © Jan-Erik Nilsson, 2004 - 2013.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '61', 'language_id_whole_page_fasttext': "{'en': 0.9762202501296996}", 'metadata': "{'Content-Length': '52647', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2KPE7DQXX5JQN57FCX466WTM3SWXQ4UY', 'WARC-Concurrent-To': '<urn:uuid:10a29dcb-f088-4ddf-bb60-cf8105bc79e0>', 'WARC-Date': datetime.datetime(2017, 10, 23, 8, 4, 2), 'WARC-IP-Address': '195.35.83.234', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3NSNV3AAFKBRBYNJNMI6SU2ECJJ67HCG', 'WARC-Record-ID': '<urn:uuid:5df1c3d8-dc62-404b-867f-c1da2a5e4f52>', 'WARC-Target-URI': 'http://gotheborg.com/marks/qingmarks.shtml', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2e7b4547-c170-45de-81b3-5fb7560389c6>', 'WARC-Truncated': 'length'}", 'previous_word_count': '4817', 'url': 'http://gotheborg.com/marks/qingmarks.shtml', 'warcinfo': 'robots: classic\r\nhostname: ip-10-137-158-248.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.028266191482543945', 'original_id': '6b5efd91aa35bc6f1d638a3c6b3a51464fbe9edd659e63971d94556950d99830'}
DICKENS' 44 ir 1 11 stems of the flowers, but usually the lVlltCilCll apitcli. supply of moisture is too great for them when closed from the air, and j! [TEM-:LL, DAKOTA. Biar, Kyk is a kind, obliging man. Somebody wrote to him for his autograph, and received in reply the following note from the humorist: "Dear Sir—In the absence of my amanuensis, will you kindly excuse me if I write my autograph myself? Yours, Bill Nye." A Cui jeweler has invented a self-winding watch. By an arrangement something like the carefully balanced lever of a pedometer, the watch is wound by the motion of the wearer when walking. A walk of seven minutes will wind the watch to go for forty two hours. C. P. HENTINGTON says this good word for his fellow railroad manipulator: "I am not interested in any of Mr. Gould's lines, and we have nothing in common, but I will say this much about him, that in all my dealings with him I never dealt with a square man, though there are many people who have a different opinion of him." AN Iowa clergyman regulates his marriage fees by weight, the rate being four cents a pound for the groom and three cents for the bride. This might do for lean people, but two hundred and fifty pounders would kick against such a rule as unjust. It is true that there is more of a big man to marry, but you can tie a little fellow just as tight as a big man. One, and it takes the same number of words. WHY is it, when the publishers of a magazine change the design of the cover they always seem to change it for the worse instead of the better? The Harper's have displayed good sense in never changing the cover of their monthly magazine from what it was when they first started it in 1850. It still bears the title, Harper's New Monthly Magazine, although it is thirty-six years since it was new. THERE is in existence a letter of Thomas Jefferson, written to a distinguished Frenchman who contemplated a tour in this country, and desired to know where he could find the author of the Declaration of Independence, in which letter Jefferson told his correspondent that if he came before the 1st of June he could find him in Washington after that date it would be necessary to seek him in the mountains, for no white man could live on the banks of the Potomac between May and November. Old Curiosity Shop," where Little Nell immortalized herself, is now supposed to be the structure at No. 14 Portsmouth street, Lincoln's Inn Fields, London, occupied by a dealer in waste paper. The neighborhood is one that Dickens often visited. Another of its attractions is Quilp's wharf, which exists under the name of Butler's wharf. Quilp himself is well remembered by a few of the oldest inhabitants, and the latest investigations increase the evidence that Dickens liked to chronicle what his own eyes had seen. THE nineteenth century is growing old indeed in a little more than thirteen years it will expire. Poor old Century! how much it has seen and how many. Trial has it passed through. "When it began our Republic was but a child, as it were. Almost its whole life has been coexistent with the century now drawing toward its close. There was a question at one time whether the century would not outlive the Republic, but the indications now are that the latter will survive and be able to close the eyes of the nineteenth century as it welcomes the advent of its successor. The alleged limited area covered by Noah's Hood is a favorite subject of debate. The discussion is, perhaps, illustrated by a letter written by a characteristically provincial Frenchman to his son in Paris, in which he says that at Mont de Maison—his place of residence—the end of the world has been announced. As, however, he does not know whether the announcement applies to Paris, he writes to the son to explain to him the exact position, in a chest of drawers, of a cotton nightcap, within which is a sum of money sufficient to make the son independent for the rest of his life." The following characteristic anecdote about the Comte de Paris is going the rounds of the clubs: The Comte was receiving his friends at Ec on the eve of his departure, when a well-known Orleanist nobleman, in making his adieu, observed: "I will say an revoir, monsieur, because I hope that you will graciously permit me to pay my respects to you every year of your exile, wherever you may eliance to be." "Every year!" exclaimed the Comte de Paris, in an emphatic tone. "No, no glad as I shall be to see you, mon ami, I sincerely hope you will have the opportunity of coming only once." LOWERS to be sent by mail should be cut in the morning before the sun has had much effect on them. The best packing material is their own foliage, or instead of that any good foliage. The best package is a tin box or case. Place a bit of moist brown paper at the bottom, lay in the flowers so that they will snugly fill the box, put another piece of damp paper over all, and in close with the cover. If oiled paper is at hand the box can be lined with it, and no damp paper will then be needed. A paper wrapper about the box, securely tied, completes the package. Jap cotton is often tied about the stems of the flowers, but usually this for and causes decay. DICKENS has been much criticized for his apparent acceptance of the fact of human spontaneous combustion, but Sir W. Gull lately testified to a surprising case before the Committee of the House of Lords on Intemperance. A large, bloated man, who was suffering from difficulty of breathing and great distension of the venous system, died at Guy's Hospital. At the post mortem of the following day there was no sign of decomposition, and the body was believed to be distended with gas. "When punctures were made into the skin," said Sir William, "and a lighted match applied, the gas which escaped burned with the ordinary flame of carburetted hydrogen. As many as a dozen of these small flames were burning at the same time." Hutte are a few specimens from Miss Cleveland's books: The abyss of theological pedantry. The subtle equities of this silent reciprocity. The integral designation of this Trinity. The eternal irresponsibilities. The distracting impotence of invalidism. Verdant with perennial resurrection. Luminous nuclei, raying illimitably. Momentary seeming arises to evanescent views. The same saturation of imagination. An especial refined exploitation of soul. Fruitful contemplation, grandly genial, of mind. Capacious curiosity. Yawned with irreconcilable divergence. The thunderous vociferations. A shower of auspicious portents. Selfish aggregations of the cliques. The vain folly of unselfish subjectivity. The intrinsic, immutable, indestructible element evaporated. That excessive elaboration. That excessive elaboration. A sensation which is the inevitable precursor of corruption. A sensual sophistry emasculating ideal knighthood. A matter of tenuous reciprocity. During the days of the Commune in 1871, a company at Bourg-la-Rie, under a young lieutenant, was ordered to carry with the bayonet a barricade which commanded the Paris road. The men were out of cartridges, and the officer knew that the deed when done would be rewarded by the cross of the Legion of Honor. The lieutenant in falling in his men was disconcerted to find his colonel come on the scene, but he was in undress, with a cane in his hand, and only attended on amateur. It was the dusk of the evening, and the little party advanced stealthily, taking advantage of cover until within range of the Communists. Suddenly the sentry at the barricade challenged "Qui va la?" "We must rush on them now," said the lieutenant to the colonel, "but we shall lose a number of out men." "No occasion," replied the commander. "I'll rush forward myself they'll fire at me and miss me, probably, and before they can reload, take your men up at the double." This brave officer exposed himself to the rifles of the Communists, and, as he predicted, their volley missed him. Before the smoke cleared the lieutenant was through the barricade, which he carried with the loss of one man. The colonel spoken of is now General Boulanger, French Minister of War. Employment for Women. The agitation again of the question of providing employment for the great number of women who are obliged to seek their own living, and the occurrence at the same time of the periodical complaint about the difficulty of securing, in the West particularly, capable domestic service, calls attention to a significant connection between the two facts. While there are hundreds of women looking for the means of making a livelihood, there are at the same time hundreds of employers looking for competent assistants in the conduct of their household affairs. If peculiar notions of false pride did not prevent most of these unemployed women from accepting positions as housemaids, cooks, housekeepers, and so on throughout the range of domestic service, the cause of complaint concerning servant girls would soon disappear. Instead, however, of accepting a position which would insure her at least a comfortable living and home, the modern girl prefers to occupy some petty clerkship which barely affords her an income sufficient to keep body and soul together, overcome with the idea that such employment is more respectable than domestic service. Frequently it leads to a state of affairs just the contrary. No labor is degrading, and there is every possibility that the self-respecting girl who "lives out" will be more contented and happy as a housemaid than as a factory hand or ribbon-seller. The experiment is at least worth trying, and she will lose nothing by it. A change from the existing order of things is certainly much to be desired. —St. Paul Globe. Love's Gratitude. Intimate Girl Friend (to young bride)—"You never told me how you became acquainted with Sydney." Young Bride—"Didn't I? How funny! A well, you see, I first met him in the country on a lovely June day. I was visiting Mrs. Motherly—dear me! I can smell the roses in her garden yet—and she said: 'I've invited a young man, a favorite of mine, to call here this afternoon, because I want to introduce him to you. He's such a nice fellow. And it was Sydney and so that June day proved to be the most fortunate of my life." Intimate Girl Friend—"And why wasn't Mrs. Motherly at your wedding?" Young Bride—"Good gracious! We never thought of her. She wasn't invited."—Harper's Bazar. A Junior 102 American iron steamers of over 3,000 tons, capable of running fourteen knots an hour, and fitted for auxiliary cruisers in case of war, had from the port of New York. THE CHILDREN. A Department in Which Will Be Found Much of Interest TO AMUSE AND INSTRUCT THEM. Stick to Your Bush—Where the Soap Went To—A True Story of a Kitten —A Curly-Headed Boy. Stick to Your Bush When I was but a tiny boy, And went to a village school, I thought myself, as boys will think, That I was no man's fool. But in the village there was one Who was the fool of all Poor fellow, he was Crazy Bon, A man both lithe and And tall. But Bon was gaunt and gray, a fool, The village Solone cried He'd been so, thus they told the tale Kon Gince his true loved. But Bon was kind, I not afraid, And Bon became my chum Kon though at times poor Ben took freaks, His idiot tongue was dumb. One day that tongue unloosed a truth That made me then to win, And though it came from idiot lips, Has never left me since. That day we berrying had gone, And Ben had gotten along, And, boy-like, I from bush to bush Had wondered with the throng. Ben Buck, in silence, to one spot, And whispered this to me: "Stick to you, bush if you of fruit A basketful would see." And so I did, and proved the fact, While through the world we push, There's nothing better to be learned Than this: Stick to your bush. -J. ir. Here the Soap Hunt To, Some years since some friends of mine living at 15 in Lancashire used, like many country people, to wash their hands just outside the back door. The soap used to be put in a wooden bowl on a tressel, but it constantly disappeared and who the thief was they could not discover, until one day they saw a magpie flying off to its nest in the garden with a piece of soap in its beak. A ladder was procured and placed against the tree where the nest was, and on being examined the missin pieces of soap were discovered in the nest, and along with them were two pairs of scissors and several thimbles. I think the soap was a very funny thing for the magpie to take. We know they always like bright articles, but I have never before heard of their taking soap. - 77/e Little Gleaner. A True Sufferer of a Kitten It was the sweetest kitten that anyone ever saw: it had the cutest pugnose and such pretty, lovable ways. It was decided that "Trix" was by far the prettiest mite of a kitten that ever came from "Kittendom." Noll hunted around among the old playthings and brought out a doll's cradle, and it was the funniest sight imaginable to see Trix curl up in the cradle, with her head on the little pillow, for all the world like a good-natured fat baby. One day there was a great commotion in the family, and the cry, "Trix has a fit!" brought everyone to the spot where the poor little thing was struggling to climb the outside of the house. Suddenly she began to race around in a circle, and before anyone could prevent it she ran into the closet, and in the twinkle of an eye was down the drain pipe. All the children, big and little, ran up and down, each one asking the other what they should do. It was decided that the kitten was well on her way to the sewer, and it was suggested that the water had better be turned on and allowed to run, so that poor Trix could be drowned quickly, thus ending her misery. The water was permitted to flow for a long time, and the whole family finally went to bed in a depressed state of mind, from papa and mamma down to Blanche, the baby. About 10 o'clock the next morning one of the children heard a faint murmuring. It appeared to come from under the ground. Finding to the hydrant, she removed the piece of perforated iron. Some one called her at that instant and when, a moment later, she returned to the hydrant, there sat, poor Trix. That precious kitten had found her way through the pipe that communicated with the drain from the hydrant, and when she saw daylight through the small hole at the top, erawled up on a surface as smooth and slippery as glass. When Blanche saw that the kitten was safe, she said: "We had our cry for nothing." She was very glad that the kitten had come back again, but she would have been better satisfied if the tears had not been shed. She evidently considered it a "waste of material." Philadelphia Call. Curly-Headed Boys "Mother," little Robert said, as he trudged along by her side, "where are you going? Are we going to Mr. Caldwell's today?" "Yes," said the mother. "He has a book for me and some little tracts that I'll read to you—nice stories my boy will like them." Robert pushed the black curls back from his forehead, and said nothing, only trotted on the faster, for he liked to be read to. When they arrived at the minister's house, Robbie said he would wait in the garden, for he wanted to see how the potatoes were doing. The truth was, his mother and Mr. Caldwell sometimes had long talks about things he did not understand, and he grew tired of trying to listen. So he went to the garden and walked about and waited, but came back in time to have the minister pat his head and call him his curly-headed little boy, and ask him what he meant to be when he was gone. He was a man. Then home again, and the book and the tracts were read to Robbie. Much of them he did not understand, but he asked many questions, and his mother explained as well as she could, and it was a very happy childhood. The years passed, and by and by Robert was a big boy, old enough to go away from home to earn his living and as he had been fond of the garden when he was a little fellow, he was fond of it still, and went to work under a gardener. It was the night before he was going away his mother came to his room for a little talk. "And, Robert," she said, as she was going, "there is one thing I want you to promise me, will you?" "I don't know about that," said Robert. "I must know what it is first." "No," said the mother, "I want you to promise first, and then I will tell you." "But, mother, a boy must promise a thing until he knows what it is about. I can't do that." "It is a good rule, generally," she said, "but don't you think a mother is different from other people? You can trust her." "That is true," her son said, after a thoughtful pause. "I can trust you, mother, where I can't myself well, go ahead. I promise: now what is it?" "I want you to read a few verses in the New Testament, and pray to God for his blessing, every day of your life, wherever you are. And remember, my son, you have promised." Robert was not the boy to break his word if he had been he would have been more careless in passing it. Often he was tired and sleepy, and sometimes he felt like anything else rather than reading the Bible and praying but there was his promise he never broke it. Not so very long after that, though, he grew to loving the reading and praying so that he felt he could not do without them. Soon afterward he was walking through the street one evening, and he saw a hand-bill which told about a missionary meeting. It was an old bill, and the meeting was over, but something about it interested Robert. Ho wanted to know more. He studied the name on the bill, and finally made up his mind that he would go to the man's house and find out all he could. The man was a minister. Away rushed Robert, but by the time he had knocked at the door he began to wonder what he would say, and what, the minister would think of him. He had half a mind to run away but the door was opened, and he went in. There is a long story between that and the next two years, but it was just two years from that time that the London Missionary Society sent. Robert to Africa. That was the year 1822. Eighteen years afterward he came home to make a visit he had become a very eloquent speaker, and great crowds of people gathered to hear him tell about missions in Africa. At one meeting there was an old minister, who listened with great interest, and was finally invited to meet the missionary at a friend's house and have a talk with him. When they met in the parlor, almost the first words the old man said were: "Your name reminds me of a good woman I used to have in my church in Cambridge. Her name was the same as yours. She used to come to my house for books and tracts, and I had long talks with her. She was a very good woman. She had a little curly-headed boy, in whom I was much interested. I have often wondered what became of him." "Oh," said the missionary, his face aglow, "it can't be that you are Mr. Caldwell! Why, I ought to know you, and you ought to know me. I'm the little curly-headed boy. I remember your house and the garden, and the corner where the potatoes grew, and everything." I wonder how many of my pansies guess that have been telling them about the great missionary to Africa? If you want to be better acquainted with the "curly-headed boy," and the great things he did for Christ, you must read the life of Dr. Robert Maffat. — Pansy. TWO FAMOUS HUSBANDS. The writer once accompanied Nellie Hazeltine in a visit to Adelaide Neilson, who was found surrounded by bevy of callers. She received the St. Louis beauty, who was already personally known to her, most warmly, and holding her hand, said in a low tone, "Stay until these people are gone, please," and the belle staid. Hardly had Neilson bowed the last calier out of the reception-room before she bouuded to the sofa - where our home beauty was seated, and, seizing both hands, she said: "I want to look deep into your eyes, for men tell me here that mine are like yours, and you know men read us through our eyes." And those two sat, half laughing, and gazed for a minute into each other's eyes - such glorious eyes as both proved - with looks that had all the earnest innocence of children who seek for "wells" in each other's eyes. "I only see that yours are the most beautiful orbs I ever looked into," said Nellie, at the end of a minute. "And I understand why men think mine beautiful, if they look like yours," answered Neilson, and they relaxed their "regards," as the French would say, but seemed to have found each in the other a source of great interest. — HI. Louis Republican. HIS EDVATION NEARLY FURNISHED. Mrs. Grundy—So your son is being educated? Dear me! How popular he will be in society when he returns. Mrs. Toady—Yes, the dear boy. I told him not to come back until he was perfect in the English accent. "And he is by this time, surely?" "Not quite, he writes that his pronunciation is correct." But he hasn't got the catarrh yet."— New York Mail and Express. A LOVER'S STORY. The Thrilling Experience of a Literary Mail While Hitting in Paris. "I suppose," said a New York reporter to a Chambers street hardware salesman, a modest man of about summers, "that in the course of your career as a traveling man you have narrowly escaped instant death several hundred times." "No, sir," he continued, emphatically, "although I have been twenty years on the road, of serious accidents I have known very few. I had one rather thrilling experience coming out of Chicago once in a long train of fourteen cars filled with sufferers after the second fire. We were sweeping across the prairie at the rate of thirty-five miles an hour, when a coupling broke between the second baggage car and the smoker. The engineer felt the shock, and, looking back, saw the trouble. He gave a wild shriek on his whistle for down brakes, threw wide open the throttle, and sped away down the track as if the furies were after him. The conduct or happened to be sitting just in front of me at the time. He opened the window at the locomotive's screech, looked out, but instantly drew in his head, and, dropping his lighted lantern (it was at night), stood up in the aisles bracing himself between two opposite seats. I tell you the chalky whiteness of his face was reflected in every countenance in the car. There was no outcry, but everybody clutched something and waited for the shock. It never came. We ran along two or three minutes, which seemed interminable, and then the train began to answer the steady pull on the brakes and gradually came to a halt. Every man was out of the car while the wheels were still spinning at a lively gait. It was bright moonlight, and we could see the track stretching ahead in a straight line for a long distance, but of the engine and forward cars there was not a trace. They were miles ahead, and the engineer was in no hurry to slacken speed. You see it was down grade, and you can't blame a man for wanting to keep well out of the way of a dozen loaded cars thundering after him. We had time to see about all there was of that particular moonlit prairie landscape before our engine took us in tow again, but nobody complained, you can guess. That engineer's quick judgment and prompt action averted a big wreck. "Another time when my hair refused to retain its normal position and rose at right angles with my scalp was an occurrence on the Erie road. I had managed to get on the engine as a novel experience. I first discovered that the motion was really appalling. The engine throbbed and trembled as it ran, rocking and plunging on the rails as if every moment it would leave them. The din, too, was frightful. The fireman and engineer yelled at each other whenever they attempted to speak, which was not often, and I simply could not gather my voice in sufficient volume to overcome that pandemonium of sound. "It was dark, about 8 o'clock of a late November evening. We were climbing the mountain, and the grade was heavy and the curves many. As we thundered along comparatively slow, I could see huge rocks towering close to the track on one side, while from the other dark chasms, their depths hidden in gloom, yawned away. It wasn't cheerful, and the outlook forward wasn't much better. The first time I strained my eyes ahead, I drew back with a sudden start and clutched the window frame with both hands, expecting my hour had come. To my uninitiated eyes, there lay apparently between the rails a huge boulder of whitish rock, against which we must instantly crash, but we didn't, and after waiting to discover that we were only thrashing around the usual way, I took courage to look again. The fireman was stolidly feeding the insatiable furnace with tons of coal! I looked at the engineer, he was out on the engine with his oil-can." Stepping along as composedly and easily as if he were walking a country turnpike; then I looked ahead. We had just rounded a curve, and at the end of the stretch of track before us I saw a lot of lights, some on the track and some moving alongside. The sight startled me, and I touched the fireman, printing through the window. He looked quickly, then seized the rope and blew a short, sharp blast on the whistles. The engineer heard, glanced down the track then sprang inside to the lever, which he reversed with all his might. "Meantime, the fireman on one side and I on the other were on the lowest step ready to swing off at the last moment. The engineer seized my shoulder and tried to pull me back, but I jumped just as the engine crashed into the caboose of a freight train, which, too long for the siding, had tailed over on the main track. My extra second or two of warning had been of immense value, our train had slowed up enough to make the shock a slight one. The passengers got nothing more than a good shaking up, and only the caboose was smashed on the freight train." A LUCK VICTORY ASIAXOXS. These Piedmont folks are an intelligent, although unlearned, and an industrious race, as a whole, writes a Burke County, North Carolina, correspondent of the New York Commercial Advertiser. Their children are all brought up to work. The girls can hold the bow and wield ax or hoe as well as their brothers. They are as agile, as muscular, and as healthy. It is an everyday occurrence to see three or four girls, their heads shielded with calico sun-bonnets, their arms and hands protected with home-made woolen mitts, helping their father and brothers "lay by" the corn or weed the sweet potato patch. About their homes they water the stock, chop and carry in the wood, and do many other chores that at the North are considered men's work. But this coarse work does not make coarse women. On the contrary, they are pure, gentle, and hair a natural refinement unknown to many of their sisters in the great cities, who have enjoyed what are popularly called superior advantages. I have seen young women of this country who have done their share of field work every season since they were 8 years old, who were up in Tennyson and Longfellow who had read "The Rise and Fall of the Dutch Republic," and who were better posted in English and American history than three-fourths of the Vassal-graduates. Of course, they were exceptions to the rule, but there are countless Maud Muller among these Piedmont wives and mothers who, had they been called into the social circles of the cities, would have taken their place among the most dignified and accomplished matrons. In the narrower sphere of their homes, they are to their husbands and children what the mother of Garfield was to her household. In most of the new houses, it is noticeable that the servants' rooms are much more attractive and better arranged than the rooms or servants' quarters in old houses. Once a corner of the unfinished attic was thought, sufficiently appropriate for the servant, and there was no inducement for even a tidy maid to take pride in her domain and have pleasure in making it neat and pleasant. Now, the rooms are well painted, prettily papered, furnished with a closet, and made as homelike as possible. If the servants are disorderly, the housekeeper is apt to protest that she is not responsible for the results in the servants' own apartments, for she has furnished pretty rooms and cannot be expected to detect their possessors in untidiness. Although the result may be the necessity of expensive renovation upon each change of occupant, the mistress has no thought of educating the new servants to greater neatness. A writer in Good Housekeeping has made some excellent suggestions upon the subject. She says: "Don't forget each day to allow a servant some little time to make and keep order in her room. Insist from the first on the extreme care of the bed. Never allow soiled clothing to be hung up in a bedroom till a convenient time comes for washing it. Tell the girl to keep her door open when she is out of the room." These rules are excellent, and if the mistress is able to control her servant, as she should, her directions will be educational and of great value upon the character of the servant. Many mistresses will be often discouraged. A lady who received a bright Canadian French Girl, who was accustomed to field-work instead of house-work, was surprised to find that the girl's bed had not been used, after a week had passed. Upon questioning, she found that the girl had slept upon the floor each night, because she had never slept upon a bed. The educating of such servants to habits of personal neatness is more difficult. Some English housekeepers advertise for servants with "no bangs," and many American housekeepers are obliged to make rules upon dress, some having dresses and aprons made for their servants. The insisting upon cleanliness and order of the servants' apartments is one of the most delicate tasks of the mistress, but its necessity is imperative for the comfort of the household. If the girl is bright, she unconsciously becomes more and more refined by simple association with a cultivated family, and when she begins to imitate the young ladies of the family, a natural course of education will progress rapidly.—Buxton Journal. A FERXCH WITNESS. A curious witness recently made her debut in one of the Paris police courts. A woman and her husband were summoned before a justice of the peace for the non-payment of a bill for £1 francs. The wife alone put in an appearance. She admitted the indebtedness, and it only remained to decide as to the mode of payment. The following colloquy then took place between the magistrate and the defendant: "Well, my good woman, how can von pay this debt?" "1. cannot give much." "But you are married. Are you the legal wife of M. Debaux?" "Yes, he married me but the char coal was very poor." "W hat di.i you do before vour mar riage "I was unmarried." "No doubt. But tell me, how much does your husband earn a month?" "He is sick now." "But when he is well "He has no work." "My good woman, you don't under stand me. What does your husband do generally What is his trade "He looks for work." "And you?" I wail while he is looking for it." "Have you any family "Yes, six children." "Are they dependent on you "No, they are buried." The magistrate gave up the task of eliciting information from the woman despair, but pitying her evident im pecunious condition, decided that the debt shonhlbc.pai^ h^all,nen^. --v Ai-iltoi-iu..,r,c S J-HKSKxr. A popular young Baptist minister rlUei. IlliU,ri'Hl, and several young ladies were in a quandarv as to SSL* J. have it," exclaimed one. 3?° WlmtV" ed'ocd tho others. -'us' "le proper caper." Vou mean the proper present?" Just the thing to present to a 1W tist minister." "And what is it?" asked her com panious. *.uin "A water service."—Xatiolln, CiRot:MsrANci:s alter eases, particu larly reduced circumstances. PLAYERS' MELANGE. "All the World's a Stage: the Men and Women Merch/ Players." A GREEN-ROOM NOTES AND AXr* DOTES. Fresh JVCH'.V, Idle Gossip, and /IJ. I.V Stones About Actors and tlu Histrionh Art. Js the Staoe Immoral* All arts, all professions, arc rmw. generously treated (perhaps I should say) than the stage its tractors are legion. For a few seem to have thought for themselves upon the subject all-appear cramped and enveloped in the opinion of others. Daily hear the question, "Is the stage immoral and upon this subject have been tempted to fly to the ink-bottle, and put upon paper my humble opinion is the stage immoral? So! Are thus, upon the stage immoral? Some are, perhaps, as in every other calling or art under the sun but are all to be condemned for the sins of the few. That the stage breeds immorality most emphatically denies. The vicious person will develop vice quickly in other professions I am prepared to say, but that there is real immorality upon the stage than in many other callings I have no hesitation in saying. A report foolishly invented, perhaps as an advertisement, is circulated. It is of some very popular actor, whose name is in every one's mouth the report is repeated until it is perverted, altered, and condemned to such a degree that the original would not recognize it as his own. The public is ever eager to hear of its favorites, and—I regret to say cruel, evil report, is more readily believed than a kind one— Slunder lives upon association— Forever housed where it gets possession. Reason and common sense are seldom called upon in judging an actor's personal character. It It is not long since an artist visited our country of whom the most vicious stories were told—stories of nights and days of dissipation and wrong-doing. Yet this artist's daily life gave the impression. To these slanders, she was in the theater from 10 in the morning until 12 at night, with but an hour or so to rest, and prepare for the night's labor. Certain it is that if an actress would conscientiously during the time she is in the theater, she has no time either for silly nothings, dissipation, or nonsense. An actress who loves her work, and has reached the pinnacle in her art, will not for one instant forget it, or lose one step that she has proudly attained. No one who has won fame and fame honestly, and possesses talent, could retain her if her nights were passed in dissipation and her days in bed. I believe that why the stage is called immoral is because those that call it are ignorant of it. If the foundation, progression, and gradual development of the stage and drama were taught, our schools, as other branches of history, are taught—teaching all the good that has been in it—to the pupils, and showing how its light has been a steady one, shining forth through all these years, enlightening, amusing, and cultivating it, this were done, time would soon efface bigotry, and the stage would be judged as other arts and callings are judged. Because a minister sins, is the Church condemned? Because a drunken captain loses the souls under his care, and sea, are ships condemned? Because a lawyer is a rogue and runs away with his neighbor wife, is the law forever lost. And because an actor uses, his, the stage be forever persecuted? Shall all vines be destroyed because some men become intoxicated with the juice of the grape? An ill use has been made of most sacred things, yet should we condemn sacred things for this reason? How many entering the profession, enjoying reputations apparently virtuous, have in a short time developed into characters both immoral and sinful? They but needed the opportunity, and brought into the profession the badness within them. Let the drama second the efforts of the pulpit, and it will be found an active, powerful ally in the cause of virtue. It is the public who can do this. Let those who are all-powerful resent vice and drive it from the stage. As in your churches, you would not entertain guilt, so in the theater condemn it not. By slander and talk, but by acts, which ever speak the londest. That the stage has defects, crying ones, I frankly admit but they are not irremediable, they disgrace, but cannot destroy the trunk. Paul Davenport, in Brooklyn Magazine. Rosix Wires' real name is Mrs. Ella Clay. Her husband claims relationship with the famous Kentucky family of the same name. Mr. Eowis BOOTH'S present tour is the most successful that he has ever had. In Chicago, the receipts for two weeks were nearly $42,000, and in St. Louis, hundreds were turned away from the theater at every performance. THE Duchess of Buccleuch as Miss the Robes to Queen Victoria, and eight other peeresses as Ladies of the Bedchamber, receive $2,500 each, from the British Government. A hired girl at $15 a week could do all the work. MARYLAND HARKLAND conducts a household department for fifteen papers, on A baby's shop and is now completing a novel and a household manual. All this while the lords of creation go countryside and Bavine.
common_corpus
{'identifier': 'sn2001063112_1886-11-12_1_2_1', 'collection': 'US-PD-Newspapers', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1886.0', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '6626', 'token_count': '8594', '__index_level_0__': '3461', 'original_id': 'fe600ffbc3a11b187d38ec4d39bbf0ad9d5df9fb9aa9d94720f3f6fe28babbb5'}
Jimmy, Donkey of the Somme (Ignite II Book 1)  Ignite II is a series of books written specifically for struggling readers. This title is a true story of war, courage and kindness. Geordie is an 18 year old boy fighting with the First Scottish Rifle Regiment at the Somme, one of the most unforgiving battlefields of World War I. In the heat of fire and destruction, he notices a German pack donkey in labour. Risking his life in a temporary truce, Geordie saves the new born foal and raises him to be a favourite among the troops. Defying the odds of survival, this story tells the tale of two unlikely friends depending on each other to get through the Great War. © 2023 by My site name. Proudly created with Wix.com
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9249302744865416}", 'metadata': "{'Content-Length': '290229', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KOLAGMITUHJTDP4DHQGKN5QZNVBKUCEY', 'WARC-Concurrent-To': '<urn:uuid:8942bbc7-c6b2-4135-9caf-2b61b09c2d2a>', 'WARC-Date': datetime.datetime(2020, 1, 29, 3, 34, 1), 'WARC-IP-Address': '185.230.60.195', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YNVREYLS53NIA7AT6F6TR3DOY2JNUMVZ', 'WARC-Record-ID': '<urn:uuid:51d5aa65-93c7-45c5-9510-0c6d55de3666>', 'WARC-Target-URI': 'https://www.clarelawrenceautism.com/jimmy-donkey-of-the-somme', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:514e06ff-17ed-46fe-8a02-c6795e9aea41>', 'WARC-Truncated': None}", 'previous_word_count': '129', 'url': 'https://www.clarelawrenceautism.com/jimmy-donkey-of-the-somme', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-181.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02531123161315918', 'original_id': '0dfb3312f76bcd7015b5525a706e838d07a2d7b12f70538b7ea5e9a554313657'}
Q: Restricting routes to nested resources in Rails I am trying to create nested resources where the sub-resource doesn't have an existence of its own. e.g., an Address resource which is linked to a Person. My route declaration looks like so: map.resources :persons, :has_many => :addresses This gives me the following routes: person_addresses GET /persons/:person_id/addresses {:controller=>"addresses", :action=>"index"} formatted_person_addresses GET /persons/:person_id/addresses.:format {:controller=>"addresses", :action=>"index"} POST /persons/:person_id/addresses {:controller=>"addresses", :action=>"create"} POST /persons/:person_id/addresses.:format {:controller=>"addresses", :action=>"create"} new_person_address GET /persons/:person_id/addresses/new {:controller=>"addresses", :action=>"new"} formatted_new_person_address GET /persons/:person_id/addresses/new.:format {:controller=>"addresses", :action=>"new"} edit_person_address GET /persons/:person_id/addresses/:id/edit {:controller=>"addresses", :action=>"edit"} formatted_edit_person_address GET /persons/:person_id/addresses/:id/edit.:format {:controller=>"addresses", :action=>"edit"} person_address GET /persons/:person_id/addresses/:id {:controller=>"addresses", :action=>"show"} formatted_person_address GET /persons/:person_id/addresses/:id.:format {:controller=>"addresses", :action=>"show"} PUT /persons/:person_id/addresses/:id {:controller=>"addresses", :action=>"update"} PUT /persons/:person_id/addresses/:id.:format {:controller=>"addresses", :action=>"update"} DELETE /persons/:person_id/addresses/:id {:controller=>"addresses", :action=>"destroy"} DELETE /persons/:person_id/addresses/:id.:format {:controller=>"addresses", :action=>"destroy"} Now I want to make sure that a person's addresses are read-only, i.e., I only want the show and index actions for an address. I tried this: map.resources :persons, :has_many => :addresses, :collection => { :addresses => [ :show, :index ] } and got this error: (in /home/rmk/app) rake aborted! Invalid HTTP method specified in route conditions: {:method=>:show} (See full trace by running task with --trace) Is there any way I can achieve this? EDIT: My main problem was that I was not using the code block properly (I wanted to use has_one etc. as much as possible). So my persons routes look like this (somewhat contrived example): map.resources :persons, :has_one => :ssn, :except => [:new, :edit] do |person| person.resources :addresses, :only => [:index, :show] end A: Is this what you're trying to do? map.resources :persons do |person| person.resources :addresses, :only => [:index, :show] end This creates addresses as a nested resource of persons, but only makes the index and show views available.
mini_pile
{'original_id': '0cef3218eba49452568e8c1ab35ee3ddfbaaaf5dbb63ef10a4108a2b50d87188'}
Q: Why isn't the browser respecting the Cache-Control header? I've got an image on S3, that has a Cache-Control header set to public, max-age=3600. So, downstream systems (proxy, browser, etc) should cache it for 1 hour. I can see the browser returns 304 (not modified) after subsequent requests. I've then gone and updated that image on S3 (the resource isn't versioned..the URL hasn't changed, just the _content), but the browser went and got the new version. (e.g HTTP 200). Here's the chrome network traffic: Requests: 200 (ok) 304 (not modified) ~ image changed behind the scenes ~ 200 (ok) 304 (not modified) Here's the response header: How is this possible? Am i not setting the correct header? Two things are confusing me: The response should still be 304 (not modified)? How did the browser know to go and get the image? max-age hasn't been reached? Shouldn't chrome show "from disk cache" or whatever? (and not actually go to the server?) My guess is - i'm not setting the right cache-control header or something. So can someone please shed some light on this behaviour, and let me know what i need to do to cache resources for 1 hour :) Thanks! A: There is ETag specified in the response. The ETag is explained as such in the spec An entity-tag can be more reliable for validation than a modification date in situations where it is inconvenient to store modification dates, where the one-second resolution of HTTP date values is not sufficient, or where modification dates are not consistently maintained. so browsers prefer it over the date-based expiration. Hence, your browser makes a request every time, and unless the content has changed - http 304 is returned. Otherwise - it's http 200. If you only want time-based expiration - remove ETag. References: https://tools.ietf.org/html/rfc7232#section-2.3
mini_pile
{'original_id': 'e114b80e56cc36b537ac7971dbf522143a572c65be2ad1a70780a92d30acad7b'}
Q: JsonConvert unable to parse I have a json string earlier it was working fine. Now its not parsing when I have added the nested items. I want to parse the json array in c#. Here is my json code. { "Type": "Hotel", "myArray": [{ "id": 0, "time": ["1", "2"], "index": 0, "picked": [{ "id": 1, "oc": "1" }, { "id": 2, "oc": "1" }] }, { "id": 1, "time": [], "index": 1, "picked": [] }, { "id": 2, "time": [], "index": 2, "picked": [] }, { "id": 3, "time": [], "index": 3, "picked": [] }, { "id": 4, "time": [], "index": 4, "picked": [] }, { "id": 5, "time": [], "index": 5, "picked": [] }, { "id": 6, "time": ["3"], "index": 6, "picked": [{ "id": 3, "oc": "1" }] }] } I want like this JsonConvert.DeserializeObject<MyObject>(abovejsonstring) Anybody help me out. Current Class structure is public class MyObject { public string Type { get; set; } public List<MyArray> myArray { get; set; } } public class MyArray { public string id { get; set; } public string[] time { get; set; } public string index { get; set; } public List<Picked> picked { get; set; } } public class Picked { public string id { get; set; } public string oc { get; set; } } Error was : Cannot deserialize the current JSON object (e.g. {"name":"value"}) into type 'System.String[]' because the type requires a JSON array (e.g. [1,2,3]) to deserialize correctly. To fix this error either change the JSON to a JSON array (e.g. [1,2,3]) or change the deserialized type so that it is a normal .NET type (e.g. not a primitive type like integer, not a collection type like an array or List) that can be deserialized from a JSON object. JsonObjectAttribute can also be added to the type to force it to deserialize from a JSON object. A: I Tried with http://json2csharp.com/ http://jsonclassgenerator.codeplex.com/ Superb. working. public class WeekArray2 { [JsonProperty("id")] public int id { get; set; } [JsonProperty("time")] public string[] time { get; set; } [JsonProperty("index")] public int index { get; set; } [JsonProperty("picked")] public Picked2[] picked { get; set; } } public class MS { [JsonProperty("year")] public string year { get; set; } [JsonProperty("month")] public string month { get; set; } [JsonProperty("currentmonth")] public string currentmonth { get; set; } [JsonProperty("community")] public string community { get; set; } [JsonProperty("WeekArray")] public WeekArray2[] weekarray { get; set; } }
mini_pile
{'original_id': '81a3b5e68e8d1bda65a7d0ab14c085699c421484e9383013416cf5ce47ac6000'}
Crystal structure of the lactose operon repressor and its complexes with DNA and inducer. The lac operon of Escherichia coli is the paradigm for gene regulation. Its key component is the lac repressor, a product of the lacI gene. The three-dimensional structures of the intact lac repressor, the lac repressor bound to the gratuitous inducer isopropyl-beta-D-1-thiogalactoside (IPTG) and the lac repressor complexed with a 21-base pair symmetric operator DNA have been determined. These three structures show the conformation of the molecule in both the induced and repressed states and provide a framework for understanding a wealth of biochemical and genetic information. The DNA sequence of the lac operon has three lac repressor recognition sites in a stretch of 500 base pairs. The crystallographic structure of the complex with DNA suggests that the tetrameric repressor functions synergistically with catabolite gene activator protein (CAP) and participates in the quaternary formation of repression loops in which one tetrameric repressor interacts simultaneously with two sites on the genomic DNA.
mini_pile
{'original_id': '06211a4db9c662a4f688e5f3d4a3c525982b0bb0001756723bece0de3178e693'}
project navigator "1.0" 2011-10-10 +1m task "foo" navigator menu textreport "top" { header '<[navigator id="menu"]>' textreport "Navigator-1" { title "One" center "one" formats html } textreport "Navigator-2" { title "Two" center "two" formats html } textreport "Navigator-3" { title "Three" textreport "Navigator-4" { title "Four" center "four" formats html } textreport "Navigator-5" { title "Five" center "five" formats html } } }
mini_pile
{'original_id': '1c81c96e3797ea5f1488eab20f01e141b1fdab5764927de46f9549a2ac34820f'}
Call to make ex-addicts magistrates Click to follow The Evening Standard Former drug addicts should be appointed lay magistrates to sit in specialist courts dealing with substance abuse-related crimes, a think tank said. Policy Exchange said the experiences of individuals who had turned their lives around could not be put to good use because of a ban on ex-offenders. It also called for magistrates to be forced to step down after ten years in a bid to reduce the average age of a group which remained "overwhelmingly white, middle class and old". An expansion in the number of "problem solving courts" dealing with drug addiction, alcoholism and mental health would form part of a reform agenda published next month, the think tank said. They would provide a "personalised approach" for non-violent minor offenders - seeing them regularly to check on compliance with drug treatment, alcohol monitoring and community service requirements. And allowing ex-addicts who had become "respected role models" by not offending for five years and carrying out voluntary work or other public service to sit in the courts would make them more effective. Under the present rules, criminal convections including minor traffic offences are a bar to becoming a lay magistrate, potentially included crimes committed by a would-be candidate's partner. Among other reform proposals are ending the default of magistrates serving to the age of 70 in favour of a 10-year maximum term to " inject greater innovation and dynamism into the courts system". Max Chambers, the head of crime and justice at Policy Exchange, said: "Magistrates could be the key to making it happen. They've been the pillars of our communities since their creation 650 years ago, but in today's world whether you're allowed to become a magistrate has got to be about more than whether you move in the same social circles as other magistrates. "We need to open this system up to those with first-hand experience of what addiction and the criminal justice system are really like. "Who better to help turn offenders' around and make our streets safer than someone who's been through it, come out the other side and is now making a positive contribution to society?" He went on: "Even though money is tight, we want to see more courts adopting this innovative approach to dealing with crime. "Tackling offenders' issues in court and holding them accountable for their progress is about moving from assembly-line justice to problem-solving justice." The idea received the backing of Matthew Perry - the American former star of sitcom Friends - who has spoken about his own battle with drug and alcohol addiction and supports similar policies in the US. "The Obama Administration is investing heavily in these court models in the United States because they are proven to work, and we are increasingly seeing the use of former addicts as magistrates and judges in helping to turn people's lives around," he said. "It's simple - drug courts and sobriety courts save lives and taxpayer dollars, and that's why I'm so committed to seeing more of them get off the ground." A Ministry of Justice spokesman said it was right to bar people "in whom the public is unlikely to have confidence" from being a magistrate but insisted decisions were made on a case-by-case basis. "A criminal conviction does not automatically disqualify someone from being appointed as a magistrate, nor does a previous addiction to drugs or alcohol," he said. "But the public has a right to expect that magistrates will be people of integrity and good character. "For that very important reason, it will remain the case that anyone in whom the public is unlikely to have confidence will not be appointed to the magistracy."
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9710057377815248}", 'metadata': "{'Content-Length': '65931', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:P7XPMUCTGWNL6LKK6X24XFPTHT7ZUOI6', 'WARC-Concurrent-To': '<urn:uuid:24e8a85a-f3f3-4b03-9d8f-2de87c10950d>', 'WARC-Date': datetime.datetime(2017, 3, 25, 2, 46, 17), 'WARC-IP-Address': '151.101.33.95', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:CGMDBJATBOS5LPQM7LSXSAXWPUELOXXL', 'WARC-Record-ID': '<urn:uuid:2fde5156-35df-45af-beed-f84e8ccd978c>', 'WARC-Target-URI': 'http://www.standard.co.uk/panewsfeeds/call-to-make-ex-addicts-magistrates-9009494.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:06a16f20-c06d-4c13-b3df-74082c4b52ed>', 'WARC-Truncated': None}", 'previous_word_count': '599', 'url': 'http://www.standard.co.uk/panewsfeeds/call-to-make-ex-addicts-magistrates-9009494.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024557769298553467', 'original_id': 'be271aee7f07bd145085806c26e42ecf58829c70cd0a29c975ef6dfc045d69d2'}
import { api } from "./my-fetch"; export const Game_Server = { Get_Hand(amount = 7){ return api('hand') }, Flip_Picture(){ return api('picture/flip') }, Get_State(){ return api('') } } // Just to remind us the shape of a player export class Player { name; points; captions; }
common_corpus
{'identifier': 'https://github.com/wokpalanma2020/Web-Programming/blob/master/Downloads/2019Fall_WhatDoYouMeme-master 3/client/src/models/Game.js', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '2020.0', 'title': 'Web-Programming', 'creator': 'wokpalanma2020', 'language': 'JavaScript', 'language_type': 'Code', 'word_count': '44', 'token_count': '112', '__index_level_0__': '19075', 'original_id': 'c54f78c5d14c8210f08f7df21109dcaef7e70abadc1e2abfda645325b3033087'}
A+ A A- 4 people who died in Benghazi were murdered, it wasn't war To The Editor, Henry Osmer, in his last jumble of words, took me to task for my numbers pertaining to the country's debt. Henry, the national debt when G.W. Bush took office was $5.73 trillion and it increased by $4.9 million during his eight years. in office. Obama has been in office for four years and nine months., not six years, as you stated, and in that four years and nine months, the national debt has increased by over $6 trillion and is still climbing. I have to say that math must not be one of your strong suits. I also have to remind you that we were at war during the majority of Bush's eight years in office. Think back Henry, Sept. 11, 2001. Do you remember what happened on that day? So to use war as the reason for Obama's increased spending is a little hypocritical, don't you think? People that died during war time, including collaterals, are deemed killed because we are at war. Other than war time, when someone dies at the hands of another it is deemed murder because it is an illegal act. The people that died in the Benghazi attack were murdered because we weren't in a legitimate war with their attackers. I hope that clears that up for Henry. The scandal about Benghazi is the fact that Obama's gunslingers went on numerous news programs after the attack and proclaimed that the attack was the result of a negative to Islam video that was on the www prior to the attack when it was proven that the Obama administration knew it was an attack by jihadists. Obama himself stated it was the video that caused the attack and Hillary Clinton, who at that time was Sec. of State, while being questioned about the murders of four Americans at a congressional hearing, one our of whom was our ambassador answered "at this time what difference does it make?" The military was ready and willing to go in with whatever aid they could give to the ambassador and the three navy seals who died during the attack but were told to stand down by their higher ups. Henry, that's what makes it a scandal, one of the Obama administration's many, and if that isn't enough do a little of your own research and you'll find more. This will be my last response to Mr. Hosmer's letters because, and I'm using some of Winston Churchill's words here, I feel it is unfair and even a little mean to continue in a battle of wits with an unarmed man. Dave Schwotzer The Laconia Daily Sun - All Rights Reserved Privacy Policy Powered by BENN a division of the Pittsburgh Post-Gazette Login or Register
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9905239939689636}", 'metadata': "{'Content-Length': '36876', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WVYS7NVJWEJNZGSVI5LR4STSCQ4J6YXJ', 'WARC-Concurrent-To': '<urn:uuid:54f524ab-6e57-417e-b66a-0451d8857e20>', 'WARC-Date': datetime.datetime(2015, 1, 25, 3, 48, 46), 'WARC-IP-Address': '66.228.47.209', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:GZMYLG35IDCIIW4BRYQNRQ7QDJIDVR7Y', 'WARC-Record-ID': '<urn:uuid:ba281d97-38ac-4991-9c12-276655a9bb2b>', 'WARC-Target-URI': 'http://www.laconiadailysun.com/index.php/opinion/letters/71389-dave-schwotzer-9-5-430', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:06c5c44c-af17-4c15-bb7f-17243e16a79a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '468', 'url': 'http://www.laconiadailysun.com/index.php/opinion/letters/71389-dave-schwotzer-9-5-430', 'warcinfo': 'robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12465876340866089', 'original_id': 'a689f19d61333060642283bd8b94c36cc49cbb9ab89d9e9ef6a5316e720ca33d'}
Maki Inada Maki Inada Assistant Professor, Department of Biology Faculty, School of Humanities and Sciences Faculty, Biochemistry Specialty:Molecular Biology Phone:(607) 274-1274 Office:156 Ctr for Natural Sciences Ithaca, NY 14850 The major goal of my research is to understand one of the most fundamental problems in molecular biology today: how do organisms regulate the expression of their genetic material or how are genes turned on and off?  Whereas many mechanisms of transcriptional control are well characterized, we are focusing on the role of pre-mRNA splicing in regulating this process.  Since most eukaryotic genes are interrupted by noncoding sequences called introns, proper gene expression requires the removal of these introns in a process called pre-mRNA splicing.  More recently, pre-mRNA splicing has been suggested to play a role in regulation of the gene expression pathway.  By changing the order in which the coding regions of genes are spliced together, a process termed alternative splicing, a significant amount of genomic and therefore proteomic diversity can be generated.  If you interested in conducting research in my lab see details below: If you need more information on the procedures to enroll for research credit then follow this link: Information on the procedures to conduct research. Other Involvement: Fun Facts:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.8765835762023926}", 'metadata': "{'Content-Length': '16595', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NUPDASDZOYNSTKFFSNGO26RBK374UWM5', 'WARC-Concurrent-To': '<urn:uuid:3bfe275e-4692-4289-8f14-684e09010bc4>', 'WARC-Date': datetime.datetime(2014, 7, 24, 14, 22, 32), 'WARC-IP-Address': '147.129.56.54', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:YB2PUMYWPW7FEFZUMDFEP5DCB2IA264Q', 'WARC-Record-ID': '<urn:uuid:68ee5325-cd44-4199-b369-f817bd99abbd>', 'WARC-Target-URI': 'http://faculty.ithaca.edu/minada/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3a505298-3148-4370-925d-d5f980f609b8>', 'WARC-Truncated': 'length'}", 'previous_word_count': '216', 'url': 'http://faculty.ithaca.edu/minada/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-131-23.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.026385784149169922', 'original_id': '10692c6907ef3a72b154995eea0ed06c75eb202ac30439403fdac4247be9a7eb'}
Buy Centrifuges from Makwana Chemi-Equip Private Limited- WorldOfChemicals Centrifuges is widely used to separate substances of different densities. The centrifuges have been fabricated using high grade raw material. Further, an extensive quality management program is made to ensure compliance of the range with various international quality standards. The range of centrifuges offered is renowned for its noiseless and effective performance, and is widely used in chemical as well as pharmaceutical industries. Makwana Chemi-Equip Private Limited
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '49', 'language_id_whole_page_fasttext': "{'en': 0.8814464211463928}", 'metadata': "{'Content-Length': '147217', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IS6SL5BF72SW2HQN5GWLP4C66VNEWZLD', 'WARC-Concurrent-To': '<urn:uuid:ee8358cc-8c0a-4706-879b-16ea8064eea2>', 'WARC-Date': datetime.datetime(2019, 10, 24, 5, 21), 'WARC-IP-Address': '23.21.139.68', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:IXRFVH227DPT2ZOHDV2OHMU64DBL6VEK', 'WARC-Record-ID': '<urn:uuid:1d9c82a8-6e15-4881-9df8-6317ca55fe48>', 'WARC-Target-URI': 'https://www.worldofchemicals.com/chemical-equipment-enquiry/centrifuges/2694/4918.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f9d498b4-fcf7-4392-9e26-65d1304ee168>', 'WARC-Truncated': None}", 'previous_word_count': '131', 'url': 'https://www.worldofchemicals.com/chemical-equipment-enquiry/centrifuges/2694/4918.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-173.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04325801134109497', 'original_id': '51eda544e60a664e4bec12145fa4cdbbf7a3948344a245a93047ba4ef40c0d1a'}
\section{Complex Conjugation is not Linear Mapping} Tags: Complex Conjugates, Linear Transformations \begin{theorem} Let $\overline \cdot: \C \to \C: z \mapsto \overline z$ be the complex conjugation over the field of complex numbers. Then complex conjugation is not a linear mapping. \end{theorem} \begin{proof} {{begin-eqn}} {{eqn | l = \overline {i \cdot 1} | r = \overline i \cdot \overline 1 | c = Product of Complex Conjugates }} {{eqn | r = - i \cdot \overline 1 | c = {{defof|Complex Conjugate}} }} {{eqn | o = \ne | r = i \cdot \overline 1 }} {{end-eqn}} By definition, it is not a linear mapping. {{qed}} \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '53b7f6cc4daebb68521a68fb285c290e4d53c7fed5bc153493ee8229c5d23fd5'}
Project Octant Part 2: Octree By Shamus Posted Wednesday May 2, 2012 Filed under: Programming 85 comments Step one of this project is to bootstrap myself up to the point where I can start doing some 3D programming. If I was working in my familiar environment this would be about ten minutes, but now that I’m using Qt it takes me a couple of hours to get a sense of what I need and how I get it working. (Incidentally, Qt is pronounced “cute”, if you’re one of those people who likes to read my blog aloud.) There are example programs, but they’re usually demos of “OpenGL and some other concepts” and it’s not clear what parts of the code are the demo, what parts are infrastructure, and what parts are cruft. Eventually I get a bare-bones application working that creates a simple scene with a checkerboard ground. Something like this is always step 1 for me. I learned a long time ago that you should have a simple, reliable, non-textured, orient-able object in the scene at all times. The reason for this is that early in a project, you can often find yourself in a situation where you’re looking at a blank scene and you don’t know why. I start up the program and I’m looking at a solid color. Did I accidentally type a wrong number and move all the scenery 1,000Km to the right, instead of one meter? Or maybe the scenery is where it’s supposed to be, but the camera has been placed far off? Did I mistakenly apply a transparent texture to the scene, thus making everything invisible? Is it even drawing the world at all? Or is everything fine, I’m just looking straight up at the sky? Actually, is the camera moving? Maybe the scenery is just off to one side but I’ve broken the controls so that I can’t move? After a few minutes of waving the mouse around and staring at a blank screen, the wise programmer will see the value of having a handy marker nearby. If something goes wrong, the checkerboard can help me know where to look for the problem. (If I wasn’t lazy, I would have drawn this checkerboard so that the four corners were all different colors, or done something else to ruin the symmetry. Several times while working I’d get disoriented because I couldn’t tell which way was north, south, east, or west. Instead of paying the time up-front to do it right, I spent it in many small doses as I fumbled around, looking at the wrong bit of scenery because I’d lost my bearings. Live and learn. Or don’t, in my case.) So my basic Qt application is working. I won’t do my full write-up on Qt now. I will say that after a few hours with the platform, I am not a huge fan. It has distinct advantages, but some non-trivial costs. (Not talking about money, mind you.) I’ll get into this more later, but for now let’s just move on and work on this octree stuff. Octree is named for “Oct” + “tree”, meaning a tree with eight branches. Yes, most sensible people can see that it’s shaped like a cube and not a tree. It’s called a “tree” because programmers tend to name things after how they behave in memory, not how they look in 3D space. In the code, an Octree is conceptually tree-like in that each cube can be divided into smaller cubes, each of which can be divided into eight smaller cubes, each of which… you get the idea. Let’s start with a cube: Pretend this is a section of a cubist quasi-Minecraft world. This area is sixteen meters on a side. Now, the brute-force solution is to represent this as a 16x16x16 grid. That is a LOT of cubes. 4,096, actually. Perhaps a frame of reference would help. In Minecraft, at maximum settings you can see 256m in every direction. When you look to the horizon, the most distant visible block is only 256 meters away. That means there are also 256 blocks behind you that you’re not seeing right now. Which means the area around you is 512×512 meters. It’s also 256 meters from the top of the world to the bottom. Which means that at any given time, the game has 512x512x256 cubes in memory. That’s 67,108,864 cubes. This is do-able on modern hardware, but horribly inefficient. That’s a great big rolling sea of data. Just passing over it to do calculations would be murder. Moreover, if we’re talking about something Minecraft-y then we’re dealing with a situation where a vast majority of the data is either solid stone or empty air. In this case, an octree can help. So back to our 16x16x16 cube. If this is solid stone, then we can just have this one cube that represents 16x16x16 meters of solid stone. If the game says, “what is the block in-such-and-such a place?” we don’t need to go fishing in a big soup of data. We see the coords fall inside of our cube here, so we just say, “stone”. It’s all stone. But what if it’s NOT all stone? What if one little block at the very bottom is different from all the others? Well, that means we subdivide our cube into eight smaller cubes by cutting once along each axis: It’s a bit like the Rubik’s Cube from yesterday. Our cube is now broken up into eight sub-cubes. Each of these sub cubes is 8x8x8 meters. Most of them are still solid stone, but the one at the bottom front needs to be divided again: Now these new cubes are 4x4x4 meters each. We keep dividing until we get down to the level where we have just 1x1x1 cubes, and we can at last set our one lone cube at the bottom to be different from the others. Note that originally this entire block of stuff would have taken up 4,096 worth of cubes in memory. Using an octree, we now have: 1 cube of 16x16x16, which contains: 8 cubes of 8x8x8, one of which is divided into: 8 cubes of 4x4x4, one of which is divided into: 8 cubes of 2x2x2, one of which is divided into: 8 one-meter cubes. So we have 33 cubes instead of 4,096. Even better, if we need to do a lot of processing looking for particular blocks (perhaps we’re looking for blocks of air so we can make polygons and do lighting calculations) then we have a super-fast way of eliminating huge areas in our search. In a brute-force system, if I was looking for air blocks I’d have to pass over each and every one of these 4.096 cubes and ask, “Is this air? No? Okay, moving on.” But here I won’t need to make more than 25 moves. There is a slight cost to doing things this way. In a brute system, if I want to look at a specific block I can do so directly. If the player destroys the block in row 4, column 2, layer 7, then I can go to 4,2,7 and change it to air. In an Octree, I have to start at the top level and step down. If I want to find Jimmy, I have to ask his great-grandfather, who will tell me where I can find Jimmy’s grandpa, who will tell me where Jimmy’s dad is, who can point me to Jimmy. The upshot is that when I need a particular block it can take me a few hops to get there, but when I need to see every block it can save me orders of magnitude of time. If I throw in some basic “hills”, here is what it looks like: And here is how that same scene looks on the octree: The huge white cubes are blocks of air. You can see how the top and bottom of the image have lots of big, consolidated cubes, while the center has lots of tiny little cubes where the air and ground meet. This is how it works: Lots of detail around areas with diversity, and lots of simplification in homogeneous areas. So that was relatively painless. Next time we’ll be talking about things that are less not painful. Also: I’ll be releasing the source to Project Frontier at some point this week. What is the go-to place for doing that sort of thing these days? Github? Google Code? Facebook? Geocities? Anything else to say about it before I make the source public? From The Archives: 85 thoughts on “Project Octant Part 2: Octree 1. Suraj says: Put source on GitHub (Google Code is also OK) please and do add a licence file. I am awaiting eagerly for the QT related post. 1. Chris says: Yes, GitHub please! And good idea about adding a license file. 2. Primogenitor says: GitHub is where the cool code is at. Documentation is also useful, especially UML or similar. And bundling copies of the blog entries with it counts as documenting it. 3. Nathan says: Yeah, you probably want to go with Github. 4. Mad says: gitorious.org is also rather nice if you want to work with git. ( And Qt lives there as well ) 5. Sean Hagen says: I’m throwing in my vote for GitHub. HUGE fan of Git in general, and I love how GitHub has made the tool even more usable ( and social, even ). 6. Chargone says: lesson learned in recent times: it doesn’t matter what you’re doing, who your target audience is, or any of that. ALWAYS release your files to multiple locations. because you Will lose some of them for reasons that don’t make a damn bit of sense. 7. psivamp says: I am also looking forward to your opinion on Qt. I downloaded it for two OS’s, but I don’t really have time during the last two weeks of semester to be messing around with large coding projects. Also, yay, Project Frontier source. And, now, an actual question/comment. As recently as Project Frontier I believe you said you were still working with the OpenGL fixed pipeline (i.e. OpenGL 2.1) vice the newer programmable pipeline (OpenGL 3+). Is that still the case? Edit: You also seem to have some transparent GUI elements already, is that part of Qt? 1. Shamus says: I actually have some shaders in PF. (Note to self: Include those!) I don’t remember if I wrote about them or not, but the trees and grass wave in the wind, the surface of the world appears to curve, and so on. All done with shaders. Of course, this project is still fixed function. Heck, it barely even draws anything yet. :) 1. Exetera says: My vote says Github. Also: I’m glad to hear you added shaders to Frontier, but… why did you add them at the end of the project, rather than when you were busy sorting out that bizarre hack for coloring the grass and the flowers? I mean… that would be so easy to fix if you were doing your own lighting. And that’s not that hard. (That said, I’m coming from a lot of WebGL experience, where you always need to use shaders.) 1. Shamus says: It’s not that hard… once you have the libraries added. Like I said: “If I want a lighting system that incorporates polygon coloring, I'll have to make my own. I can either do that with vertex shaders or by turning off all OpenGL lighting and doing all of the lighting calculations myself. Both of these steps are complex and time-consuming, and might require changes to the low-level bits of my engine. (Including the terrain system, which I just resolved to leave alone for a bit.) Can I use vertex shaders when I'm using OpenGL through SDL? Wait, now I have to read up on what functionality is available with SDL. Oh, there's a beta version of SDL that might offer… No. No no no no. I will take this step eventually, but this is NOT the right time for it. I started this project because I want to experiment with my ideas for procedural content, not so I can muck out implementing my own lighting model. That will be a time-consuming distraction, and will lock me in to certain decisions that I'm just not ready to make yet.” 1. Exetera says: But… you did decide to figure out your library issues and get shaders added. You took that step eventually, so… why not take it when you’d get something out of it? (And, for that matter, after you decided to use a nasty hack specifically to get out of implementing shaders… why would you go ahead and use them anyways for some minor visual improvements?) I guess my perspective on this is not the best, having used APIs which require shaders for a while… Semi-related: When the source is released, I’m totally going to try porting it to WebGL. 1. Sumanai says: From what I’ve understood, it wasn’t the time. The main purpose for Shamus wasn’t related to how it would look but how it would function. If you do the wrong thing at the right time you can lose the wind from your sails before you get to the important bit. For instance: I know I need food. I have food in the freezer. It’s impractical to use it frozen, so I have to take it out before I need it. Yesterday I knew I would need meat from the freezer for tomorrow. Why didn’t I take it out yesterday? Because it would’ve been spoiled by tomorrow, when I actually needed it. I knew I wasn’t going to cook today, simply because I’ve learned to, roughly, predict when I’m in the mood for making food. Today was simply not going to be that day, so there I would’ve had to force myself and when I do that I’m less inclined to cook another time and my diet goes worse than it already is since I end up eating microwave dinners. For you the important bit is the shaders, so to you it would’ve been the right thing at the right time. 2. Blake says: I’d say because coding for yourself is a lot different to coding for work. If the shader work wasn’t what he was interested in, there would be a great risk of him just dropping the project before he got to the stuff he wanted to be working on. Working on procedural stuff immediately was worth more than having everything done quicker. 1. Jeramie says: Sorry about a year-old reply, but I just gotta agree completely with Blake here. When it’s a personal project, do whatever is fun, efficient, and comfortable for your coding style, and whatever keeps you moving forward with it. 8. Kdansky says: I’m more of a .hg user, which goes to bitbucket. But I guess github will work. 1. Simon Buchan says: I too really like Mercurial, but github is just too ridiculously good. I’ve not been brave enough to try Hg-Git yet, but it might be good enough to split the difference. 2. Jacob Albano says: Yep, I was going to say the same thing. Bitbucket has been very good for me and my team. 9. Vorp says: If you want to speed up the single-block operations, I found an interesting solution. If you map block positions to the range[0, 2^n], with the world origin at (2^n)/2, the bits in the integer index will give you the exact path to the target node. For example a one-dimensional tree 16 wide, if you want the node at position 6, 6 = 0110, so the path would be left-right-right-left. 1. Mephane says: But that does not yet say anything about the memory layout of the octree. Probably the nodes are connected through pointers, which means one would still have to traverse that path from pointer to pointer. So your method tells the program to go left-right-right-left, but as far as I understood the problem mentioned in Shamus’ post, actually going traversing that path is what makes it slower and indexed-array-access. 10. Jonathan says: Your Rubix cube photo is only a 2x2x2 cube…normal cubes are 3x3x3. 1. Shamus says: Correct. I Chose the 2x2x2 because it illustrated the Octree division, not because it was the more common kind of puzzle. 1. noahpocalypse says: Would there be any benefit to a 3×3 tree? (Dodecatree?) My novice coder’s mind can’t comprehend how that would help, or really how that would work, but it sure sounds cool. 1. Piflik says: The tree would be shallower, but wider. Also you’d end up with more small cubes (instead of dividing one cube into 8 smaller ones, you’d divide them into 27 smaller ones). So it would be worse. From a 9m³ to a 1m³: 1x9m³ divided into 27x3m³, one of which is divided into 1. Deoxy says: Depends on the final size you want – if you start with a fixed area and need it broken down to a fixed size (or smaller), the 3x3x3 could achieve that with fewer steps, which would result in both fewer cubes and a shorter traverse. The problem there is not that you have more or less cubes, it’s that you’ve gone from binary to trinary, and binary has some really, REALLY serious advantages, not the least of which is that it’s native to the hardware. 2. Abnaxis says: I don’t know what the correct answer to the question is, but I’m 99.9% certain it is way more complicated than that. The optimal number of divisions depends on a lot of factors, like how often you have to know what a particular blocks neighbors are vs how often you have to single out a particular pixel. Again, I might be blowing smoke out my rear, but I don’t think eight equal divisions is so much the optimal way of doing things, but rather the convenient way. Using eight divisions keeps stuff in powers of 2, which are way more convenient when programming. 2. Zukhramm says: That’d be, I don’t know, a “viginti-sept-tree”. 3. hewhosaysfish says: To compare with Shamus’s description: “The upshot is that when I need a particular block it can take me a few hops to get there, but when I need to see every block it can save me orders of magnitude of time.” With a 3x3x3 tree it would take you less hops to get to a particular block (because with each hop you’re dividing the search space by 27 rather than by 8) but when you need to see everything then it won’t necessarily give you the same time savings (for the same reasons; dividing by 27 will give you more, smaller cubes which will waste memory where you have large areas of the same composition). And, of course, a 3x3x3 tree wouldn’t use powers of two – programmers have to do things in powers of two. 1. AnZsDad says: Programmers do it in pairs? (I’m so sorry…) 4. Zak McKracken says: A Dodecatree would be a 12-tree … that’s like … 3x2x2? If you went for 3x3x3, you might as well take it on step further and use 4x4x4. And … ohh wait, that’s just eight times 2x2x2, except of course that now one subdivision of one leave means 64 new leaves and not just 8. Less memory efficient. Also, there are some really cool adressing and storage management tricks for octrees that only work in binary. I’m not far enough into CS to know this properly, but in essence, you can describe the position of one leave in space with just three bits of data per tree level. (three bits is what you need to represent a number up to 8). So if we take the approach to put two of these numbers in one 8-Bit-Byte, then we’ve got two levels in only one Byte! Mind you, that’s just the leave index, but there are some really cool tricks to find this leave in memory extremely quickly and at the same time waste very very little memory storing it. I’d love to point at a proper Paper on the topic, but I’ve no idea where to find it and what that method was called. I’m working (as a user) with software that uses more than 30 levels of octrees (which gives a scale factor of 1 (US-)billion, and manages to fill your complete 24GB of RAM with it… There’s a way to save extreme amounts of space, but as I said, I’m not one of the coders, so I’ll just revel in the vast performance improvements we can achieve with some cool tricks and hope that someone else can shed light on how it actually works. There are also some very inefficient ways to implement octrees. And I hope Shamus manages to present us with one of the better ones, because I’d like to know this too. 5. Kdansky says: No, because generally speaking, what you save in work for less tiers, you pay again for having way more complex comparisons. Plus power of two means the hardware likes you more, see the other comments. 2. It’s funny. Part of my brain said “that rubix cube looks weird,” but the rest of it say “move on, not the point of the article.” So it wasn’t until you pointed it out that I realized WHY I thought it looked weird. 1. Vipermagi says: To me the cube picture was weird because I initially interpreted the C as an L. 1. Sumanai says: I’m afraid to think how impractical Rubik’s Lube would be. And what it would do to the user. 11. nmichaels says: If you used mercurial to track your progress, bitbucket is the place to put it. If you used git, github is happier. If you didn’t use source control while working, both are good and provide free stuff for open source projects. 1. Mark Erikson says: If he DIDN’T use source control… shame on him, he should know better :) On that note, I’m curious to hear Shamus’s take on version control systems, just on general principle. 2. GardenNinja says: For what it’s worth, Bitbucket has git support now, though I imagine git is better supported on github. 3. Zak McKracken says: I wonder in which case sourceforge is the go-to place. Lots of good projects on there, too. But I’ve no idea why any project would go to one or the other site. 1. DrMcCoy says: SourceForge used to be the go-to place, years ago. It’s the MySpace of code repository sites. A lot of projects are still there because it’s tedious work to move, it’s not neccesarily gaining them much to do so; and, if done completely, they’d lose information still sitting in SourceForge’s bug/patch trackers. And one thing GitHub is still missing that SourceForge provides is mailing lists. 1. Zak McKracken says: Ohh, Mailing lists, those poor poor replacements for proper newsgroups or fora:( (except if you actually have to tell something to a number of people, that is) Otherwise: I was completely unaware of SF’s status. Thanks for enlightening me. Been getting a bunch of good software from there, though. 2. WJS says: I don’t know if it’s gone to hell over the years, or if it’s just outdated, but I always find it really unpleasant whenever I need to download something hosted on Sourceforge. 12. Rohit says: Can’t wait for the source. 13. As an artist trying to learn how to code I am really excited to open up the source code…. Then look at it. Not know what it does. Close it. And, finally go back to trying to learn the basics of C++. 1. MichaelG says: Start with something more forgiving. In C or c++, memory errors are the bane of your existence. Learn Javascript and WebGL or Java. 1. I actually know a bit of python and I really like that language. Before that I learned Action Script 3.0 . C++ is actually a hobby for me and I find that the more I learn about the low level mechanics of a game engine or a rendering pipline the easier it is to make art for those specifications( Z sorting was not explained in any art tutorial but in a brief overview of how a renderer functions). For instance, I don’t want to just learn how to make shaders. In Unity (I use it at work) there is the Strumpy Shader Editor, which is a visual shader creation suite. I can get around it just fine but for me to get full use out of this tool I think that I would prefer to learn the mechanics of “why,” underneath the pretty interface. 1. Dasick says: The way I learn most programming languages is I sit down, make up a simple project to do (low level games are the best I find, because games tend to need almost all of the aspects of programing) and try to implement it. I break down the game into manageable tasks, then go ahead and research each one, build it up the way Shamus describes in the second paragraph and mush it all together. The idea is that a project that you’re building up to gives everything you’re coding a sense of purpose, and the fact that it’s a big-ish project means you will run into unexpected errors and problems sooner or later and be forced to solve them using everything you’ve got. Like an Octree really. It sounds cool, but you don’t really understand it’s full utility unless you’ve made one and had to use it somewhere. P.S.I’ve yet to have a complete game, but in the process of doing that I’ve learnt Turing (text-based galaxy-spanning free-form space-opera RPG) Java (rogue-like platformer… I want to remake it as a Diablo clone), C# (RTS. I don’t want to program in C# any more, but I’ve made so much progress I don’t wanna start from scratch either) and C++ (A top-down path finding program for someone’s game. My most finished project to date). 1. Yep, that’s my plan for now too. I picked up a “simple” engine to start out with( softpixel) just so that I don’t have to do all of the lower end work. This way I can still come to grips with the language and make something “cool” rather than just a boring console program. Now it’s just a matter of making a, sphere based, twin stick shooter. Hopefully I will learn: Pathfinding, file IO, a little dip into some procedural stuff, and everything else. Yay! face to keyboard times await. At least I like puzzles. 1. MichaelG says: Best of luck, and I’m not arguing against getting down in the weeds (see my project blog http://sea-of-memes.com ) What I’m warning you about is C++ debugging. If you do something as simple as overwrite an array, or continue to use a pointer after you’ve freed it, the program can break in some completely different area, much later. You can go insane trying to find those bugs, and the debugger doesn’t help. Any of the interpreted languages would avoid this problem. Graphics programming will be the same with any language that has an OpenGL binding. Most of the work is in the shaders now anyway. 1. DrMcCoy says: “and the debugger doesn't help” Seriously, if it were physical possible, I’d carry valgrind’s children. 1. Deadfast says: This so much. Writing beyond an array, reading the value of memory that was previously deallocated and failing to deallocate the array: [email protected]:~/C++$ valgrind –leak-check=full ./a.out ==10731== Memcheck, a memory error detector ==10731== Copyright (C) 2002-2010, and GNU GPL’d, by Julian Seward et al. ==10731== Using Valgrind-3.6.1-Debian and LibVEX; rerun with -h for copyright info ==10731== Command: ./a.out ==10731== Invalid write of size 4 ==10731== at 0x40074B: main (test.cpp:10) ==10731== Address 0x5971064 is 0 bytes after a block of size 36 alloc’d ==10731== at 0x4C2864B: operator new[](unsigned long) (vg_replace_malloc.c:305) ==10731== by 0x40071C: main (test.cpp:7) ==10731== Invalid read of size 4 ==10731== at 0x400770: main (test.cpp:12) ==10731== Address 0x59710b0 is 0 bytes inside a block of size 4 free’d ==10731== at 0x4C27FF2: operator delete(void*) (vg_replace_malloc.c:387) ==10731== by 0x40076B: main (test.cpp:11) ==10731== HEAP SUMMARY: ==10731== in use at exit: 36 bytes in 1 blocks ==10731== total heap usage: 2 allocs, 1 frees, 40 bytes allocated ==10731== 36 bytes in 1 blocks are definitely lost in loss record 1 of 1 ==10731== LEAK SUMMARY: ==10731== definitely lost: 36 bytes in 1 blocks ==10731== indirectly lost: 0 bytes in 0 blocks ==10731== possibly lost: 0 bytes in 0 blocks ==1 0731== still reachable: 0 bytes in 0 blocks ==10731== suppressed: 0 bytes in 0 blocks ==10731== For counts of detected and suppressed errors, rerun with: -v ==10731== ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 4 from 4) Such awesomeness comes with a price though. Valgrind is only available for Linux, OS X and Android. There is an alternative called Dr. Memory which is also available on Windows. I haven’t had the chance to try it myself and there doesn’t seem to be really that much info about it out there. Does anyone have any experience with it? 2. Blake says: My progression was ActionScript->Java->C++. ActionScript got me to understand object oriented concepts, Java was where I learnt to write a stand-alone app (and messed around with pathfinding and such), then C++ is what I use for work. Java gives really nice error messages, a lot of C++ compiler errors even make no sense at first, and you pretty much just have to learn what they mean (“What do you mean you wanted a semi-colon before this first line of my file!? Oh, the last file I included was missing a semi-colon”). If you’re learning C++ on your own, my advice would be to read lots of code. For instance when Shamus releases the source, don’t just go “aaah I don’t understand this!?”, keep following it down to the lowest levels, work out why each part is doing what it’s doing, and as you get to higher levels it’ll start to make sense. 2. Sumanai says: I thought Javascript fell into the same hole as PHP, CSS and HTML in that it brings with it insanity for those trying to learn it. 1. Blake says: My impression was it seems usable on the surface, but the deeper you dig the more you want to poke your own eyes out. 14. Steve says: Github please. It is the easiest to clone (Checkout) from. 15. ctrees says: You should really just tweet that code. 1. Scott (Duneyrr) says: I can see no reason not to do this. 16. Cybron says: Geocities, obviously. 1. Dave B says: No, post it on a BBS! 1. neolith says: 1. Sord says: IBM 5081 format please! 1. bucaneer says: Get one of the novices to transcribe and illuminate it on parchment. 1. Mephane says: Real men carve everything in granite. 1. Moridin says: Written language? Get off my lawn! Real men teach their words to others so that storytellers can keep them alive as oral tradition. 1. Sumanai says: I just wait for the universe to procedurally generate and then compile the code. 2. Zak McKracken says: Real programmers… I had to do this. 2. Shamus says: Too late. I already uploaded it to my AOL page. It took forever. I mean, it’s almost five megabytes! 1. Blake says: Man, that’s gonna take a lot of 5 and a quarter inch floppies. 17. Fenix says: In Minecraft the max view distance is actually 256(ish (It’s more like 280)) block diameter, not radius. So the world rendered is 256(ish)x256(ish)x256 currently. 18. Dasick says: Funny thing about pronunciation… I thought Qt was pronounced “cutie” or “cootie” (calling someone the former is a symptom of the latter. unless you’re being ironic. because everything is better when it’s ironic. like these brackets). 19. mneme says: Qt is pronounced as “Q, T” (in your local language) a lot more often than the British pronunciation of “cute”. I prefer “cutie” myself (which is how I pronounce Q. T.). An yeah, githut is the obvious (although git is easy enough to push from that you could trivially mirror to multiple repos). 20. BeamSplashX says: Shamus, I think you meant for your title to say “Quad Tree”. Thank me later. 1. Alex says: Maybe his goal is now to create a horrible fusion of Octopus and Tree? An “Octotree”, if you will. Like “The Giving Tree“, but less horrifying. 2. Drew says: Perhaps I’m missing something…why would he mean Quad Tree? 1. BeamSplashX says: He mentioned in his previous post on Octant that he’s used to using quad trees, so he often types that instead of octree. I’m being a facetious bastard, is what I’m saying. 3. Jake Albano says: That’s incorrect. It’s physically impossible for a quadtree to represent 3D space. Octrees are quadtrees^2. 21. Alex says: Have you tried using Unity? What are your thoughts, if you have? How does it compare to something like Qt? 1. Shamus says: Unity is a great tool for people with the opposite of my skillset: Lots of art, little programming. Generally, full-featured game engines do not play well with procedural content. They’re built around loading stuff from disk and displaying it in the world, and some of them don’t even have systems that allow you to create textures and models and scenery in memory. 1. Piflik says: People like me…Yay!… I have to agree. Unity is perfect for people with an art background. There still is some programming with C# and/or a Javascript derivative, but that’s more scripting than programming. The framework for rendering, animation, sound, physics, etc is all already there. If you need more exotic stuff (or simply want to), you can of course write your own components to replace the existing ones, but you don’t have to have the ability to write a whole game engine on your own to start working. You can focus on the creative part. The one thing that makes it perfect for me is the instant gratification. If I didn’t see progress constantly, I would probably loose interest very quickly. I can’t imagine myself write a codebase for a week or so before I see how well (or if at all) it works. 22. Brandon says: Historically, I’ve done most of my coding on Unix based systems using text editors and compilers rather than any kind of IDE. I’ve been wanting to switch over to coding on my Windows machine because my Unix machine is slowly dying (It’s a really old laptop. I don’t want to put Unix on my desktop), so I’ve been looking into some IDEs. I hadn’t heard of Qt though, very interested to read what you have to say about it. I love reading your programming posts by the way. It always inspires me to start coding in my free time again. :) 23. Tharwen says: I’d heard of octrees before, but just sat slack-jawed and nodded my head whenever it came to having them explained to me. Now, I’m pretty sure I’ve got it (I expect there’s more to it than just in your description, but I’ve got over the first Hurdle of Understanding (heh, that sounds good. I should make a blog to write all about it so that people can solve forum disputes for years to come by simply linking to it)) Anyway, yeah. Shamus, you are amazing at explaining complex things simply. Thanks. “If you can’t explain it simply, you don’t understand it well enough” – Albert Einstein 1. MatthewH says: I would second this. I haven’t the foggiest idea what he’s doing, but I feel more informed at the end of it. Not that I think I could pass a test on the actual procedures. Out of curiosity, if most programing is done in an environment like Qt, how is Qt written? Basic command prompt, or is that “burned into the chips” I keep hearing about? 1. Sumanai says: It’s the same thing as with physical tools. Build basic tools out of rocks, sticks and so on, then use those for better tools, go on until you start cursing about the youngsters and their “power drills” and “nail guns” and whatnot. Then you can use those tools to make more tools. 2. WJS says: Development of tools doesn’t have to be done at a lower level than the tools operate on. It wouldn’t surprise me in the slightest if the Qt IDE was developed using the Qt IDE. Obviously your first version has to be made with something else, but once you’ve got past that point nothing stops you from writing Qt 1.1 using Qt 1.0. 24. harborpirate says: Another vote for GitHub. Its so easy to use, forking projects is a breeze, and the project repository is stored locally so its extremely fast to work with (no more waiting eons to do checkins/checkouts). You can enclose spoilers in <strike> tags like so: You can make things italics like this: You can make things bold like this: You can make links like this: You can quote someone like this: Leave a Reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '102', 'language_id_whole_page_fasttext': "{'en': 0.9407934546470642}", 'metadata': "{'Content-Length': '171750', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3F3RUV2VHFXFQ2Q6GBBAN7BFO2XI4ZR4', 'WARC-Concurrent-To': '<urn:uuid:5fb80b92-e267-4f45-a897-6963889046af>', 'WARC-Date': datetime.datetime(2020, 2, 20, 21, 31, 25), 'WARC-IP-Address': '104.28.23.52', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KMKDKXIUHHJJKNJYDY547GGGG76DAZUE', 'WARC-Record-ID': '<urn:uuid:6f98c8b1-5249-4989-a3dc-0897abfc6f0a>', 'WARC-Target-URI': 'http://www.shamusyoung.com/twentysidedtale/?p=15751', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e09ea44d-4f69-4b59-8fae-232fdf640219>', 'WARC-Truncated': None}", 'previous_word_count': '6179', 'url': 'http://www.shamusyoung.com/twentysidedtale/?p=15751', 'warcinfo': 'isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-15.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09183800220489502', 'original_id': 'b313cbf612fbe942e5d6fb0df7192e81aaff08356ff0efce29395bb24720111a'}
Conjunctions, the celebrated literary magazine published by Bard College, has been awarded a 2020 Whiting Literary Magazine Prize. Since 2018, a total of 13 literary magazines have won this prize for excellence in publishing, advocacy for writers, and a unique contribution to the strength of the overall literary community. Conjunctions has propelled literature forward for four decades by publishing groundbreaking fiction, poetry, plays, and creative nonfiction. More > Christian Crouch Named Dean of Graduate Studies at Bard College Bard College announces the appointment of Professor Christian Crouch as the incoming Dean of Graduate Studies, beginning July 1, 2021. Professor Crouch has been Associate Professor of History and Director of American Studies at Bard since 2014. Her work focuses on the histories of the early modern Atlantic, comparative slavery, American material culture, and Native American and Indigenous Studies. Professor Crouch succeeds Professor Norton Batkin, who stepped down on September 1 after 15 years as Dean of Graduate Studies. During his tenure, Norton Batkin oversaw the growth and success of Bard’s graduate programs. More >
mini_pile
{'original_id': '431324a78d6b808b03e196dfde57f74183e4687cc78ed44e7c8653b7335e9df0'}
460 B.R. 749 (2011) In re Jeffrey THOMS, also known as Jeff Thoms; Sue Thoms, Debtors. Van Daele Bros., Inc., Plaintiff-Appellant, v. Jeffrey Thoms, Defendant-Appellee. BAP No. 11-6043. United States Bankruptcy Appellate Panel for the Eighth Circuit. Submitted: November 18, 2011. Decided: December 22, 2011. *751 David Hamilton Skilton, Christine Bishop Skilton, Nashua, IA, on brief, for Appellant. Brian W. Peters, Dubuque, IA, on brief, for Appellee. Before SCHERMER, VENTERS, and SALADINO, Bankruptcy Judges. VENTERS, Bankruptcy Judge. The Plaintiff, Van Daele Bros., Inc., appeals the order of the bankruptcy court[1] determining that debt owed to it by Debtor Jeffrey Thoms is not excepted from discharge under 11 U.S.C. § 523(a)(6). For the reasons stated below, we affirm the bankruptcy court's decision. BACKGROUND Because we find that the bankruptcy court's decision was supported by the wealth of the evidence, we adopt with few modifications the factual background set out by the bankruptcy court. In February 2008 Jeffrey Thoms approached Jerry Van Daele, a principal of Van Daele Bros., Inc., to refinance the debt secured by Thoms's cattle herd.[2] Thoms proposed to sell his herd of 24 cows and 5 yearling heifers to Plaintiff for $75,000 and then to lease them back for five annual lease payments of $18,784.23. Thoms would retain possession and responsibility for the cattle, which would be kept on a lot owned by Thoms's neighbor. Thoms prepared the documents for the sale and leaseback. Neither party was represented by an attorney. To finance the purchase, Van Daele obtained a loan from Kerndt Bros. Savings Bank through his company, Van Daele Bros., Inc. Van Daele testified that he continues to make payments on that loan. The transaction was finalized on March 1, 2008, and Thoms used the $75,000 payment from Plaintiff to pay off a loan with Community Bank. At the time of the transaction, Thoms was employed as a loan officer at Kerndt Bros. Savings Bank. He had been Van Daele's lending officer at the bank for approximately ten years. Van Daele testified that he was willing to help Thoms because he considered Thoms a friend and he trusted Thoms because of Thoms's position at the bank. He also testified that he understood that he was purchasing the cattle for $75,000 and that the Debtor would lease them from him and keep them at his property. Van Daele maintains that Thoms made oral assurances and agreed to notify Van Daele of any changes in the number of cattle. In August 2008 Thoms lost his job at the bank. He testified that he initially believed that he could make the first annual payment under the lease the following March by finding a job at another bank. As it turned out, Thoms was only able to find part-time jobs and his income dropped to approximately $40,000 per year, before *752 taxes. Thoms defaulted on the first annual payment due March 1, 2009. Just over 30 days later, on April 3, 2009, Van Daele picked up twenty 20 cows and 7 calves from Thoms's cattle lot. Thoms was not aware of the repossession until later; apparently, no one was around when the cattle were picked up. Thoms's father, Fred Thoms, claims five of the cows were his, not the Debtor's or Van Daele's. Fred Thoms has filed two replevin actions against Van Daele based on the removal of his five cows. He dismissed the first action just before trial and the other remains pending in the Iowa District Court in Fayette County. A few days after the repossession, Thoms attempted to pay the 2009 annual payment with a check written by his daughter, Emily. Thoms testified that Emily obtained a loan from a friend of his, Gary Zimmerman, to help Thoms make the payment. Zimmerman loaned Emily $20,000 in the belief that she was going to use the money for college expenses. Van Daele refused to accept the check and apparently told Thoms that if he wanted the cattle back, he would have to pay off the whole debt as set out in the documents Thoms had prepared. Apparently, the next time the parties discussed the matter was in August or September 2009 when Van Daele saw Debtor at the fairgrounds and told him he was going to have to sell the cattle because it was too costly to keep feeding and caring for them. Thoms testified that he responded: "You've got to do what you've got to do." Van Daele sold a majority of the cattle in September 2009, and by the end of 2009 or early 2010 he had sold all the cattle, receiving approximately $20,000 to $23,000 in total proceeds. He estimates that he spent approximately $10,000 for the feeding and care of the Cattle from the time he repossessed them until they were sold. STANDARD OF REVIEW We review the Bankruptcy Court's factual findings for clear error and its conclusions of law de novo.[3] The Plaintiff does not assert that the bankruptcy court erred in its application of § 523(a)(6); rather, it asserts that the court's factual findings were clearly erroneous. "A finding is `clearly erroneous' when although there is evidence to support it, the reviewing court on the entire evidence is left with a definite and firm conviction that a mistake has been committed."[4] If the Bankruptcy Court's account of the evidence is plausible in light of the record viewed in its entirety, we may not reverse merely because we might have decided the issue differently.[5] "Where there are two permissible views of the evidence, the factfinder's choice between them cannot be clearly erroneous."[6] DISCUSSION Section 523(a)(6) excepts from discharge debts for an injury that is both willful and malicious.[7] In this context, the term "willful" means that the injury, not merely the act leading to the injury, must be deliberate or intentional;[8] and a "malicious" *753 injury is one that is targeted at the creditor, in the sense that the conduct is certain or almost certain to cause financial harm.[9] Distilled to its essence, the Appellant's argument is that the bankruptcy court should have found Thoms's debt to the Appellant nondischargeable under § 523(a)(6) because the evidence allegedly showed that: 1) Thoms and his father were partners in the cattle business, 2) Thoms failed to adequately explain a decrease in the number of cattle, 3) Thoms failed to adequately disclose on his bankruptcy schedules and statement of financial affairs the Appellant's repossession of the cattle and Thoms's debt to the Appellant, and 4) Thoms lied to Gary Zimmerman to get a $20,000 loan to try to make the first lease payment. Putting aside that there was little or no evidence that Thoms and his father were partners[10] and that the bankruptcy court found Thoms's explanation of the decrease in herd size—apparently several cows were lost to sickness and disease—credible,[11] none of these facts, alone or together, is sufficient to warrant a finding that Thoms's debt to the Appellant is nondischargeable under § 523(a)(6). The existence of a partnership between Thoms and his father does not, by itself, create any inference that they conspired to defraud Van Daele. The record is devoid of any affirmative evidence that Thoms sold or otherwise disposed of the missing cattle with the intent to harm Van Daele (personally or Van Daele Bros., Inc.), which evidence is necessary to except a debt from discharge under § 523(a)(6).[12] The alleged omissions from Thoms's schedules included the debt to Van Daele, which omission would undermine—rather than support—the Appellant's contention that Thoms intended all along to discharge his debt to the Appellant. And, finally, the fact that Thoms was willing to go to great (albeit dishonest) lengths to borrow money to repay the Appellant weighs strongly against a finding that Thoms conspired with his father to defraud the Appellant. As noted above, a factfinder's choice of one of two permissible views of the evidence cannot be clearly erroneous.[13] Here, the Appellant has presented an interpretation of the evidence which is less plausible than the bankruptcy court's interpretation, which attributed Thoms's failure to repay the Appellant primarily to Thoms's unanticipated loss of a higher-paying job. Therefore, we must affirm the bankruptcy court's determination that Thoms's debt to the Appellant is not excepted from discharge under 11 U.S.C. § 523(a)(6). *754 CONCLUSION For the reasons stated above, we affirm the bankruptcy court's decision. NOTES [1] The Honorable Paul J. Kilburg, Bankruptcy Judge for the Northern District of Iowa. [2] Although the named Appellant is Van Daele Bros., Inc., all of the acts upon which the Appellant bases its § 523(a)(6) claim were allegedly directed at Jerry Van Daele personally. [3] See Floret, L.L.C. v. Sendecky (In re Sendecky), 283 B.R. 760, 763 (8th Cir. BAP 2002). [4] Id.; Anderson v. Bessemer City, 470 U.S. 564, 573, 105 S.Ct. 1504, 1511, 84 L.Ed.2d 518 (1985). [5] See Anderson v. Bessemer City, 470 U.S. at 573-74, 105 S.Ct. at 1511. [6] Id. [7] 11 U.S.C. § 523(a)(6) (West 2010). [8] Kawaauhau v. Geiger, 523 U.S. 57, 61-62, 118 S.Ct. 974, 977, 140 L.Ed.2d 90 (1998). [9] In re Madsen, 195 F.3d 988, 989 (8th Cir. 1999). [10] At most the testimony showed that Thoms's father occasionally covered purchases of supplies which Thoms repaid and Thoms once mentioned trying to settle his and his father's disputes with Van Daele together. [11] Deference must be given to the bankruptcy court's evaluation of the credibility of witnesses. Fed.R.Civ.P. 52(a). See also Lanear v. Safeway Grocery, 843 F.2d 298, 301 (8th Cir.1988). [12] See, e.g., Werner v. Hofmann, 5 F.3d 1170, 1172 (8th Cir. 1993) (holding that failure to return the correct number of cattle upon termination of a dairy cattle lease did not constitute a willful and malicious injury under § 523(a)(6) in the absence of evidence that the discrepancy resulted from a deliberate attempt to cause financial harm). [13] See supra n. 6.
mini_pile
{'original_id': 'c4a909df9554a672ea7a7084df927e25b88196fc7fe98704ddd7cf2baca8928e'}
Climate Science Glossary Term Lookup Enter a term in the search box to find its definition. Term Lookup Home Arguments Software Resources Comments The Consensus Project Translations About Donate Twitter Facebook YouTube Pinterest RSS Posts RSS Comments Email Subscribe Climate's changed before It's the sun It's not bad There is no consensus It's cooling Models are unreliable Temp record is unreliable Animals and plants can adapt It hasn't warmed since 1998 Antarctica is gaining ice View All Arguments... Keep me logged in New? Register here Forgot your password? Latest Posts Climate Hustle The Greenhouse Gas Effect All-Star Fan Club Posted on 5 December 2012 by Daniel Bailey The greenhouse effect is standard physics and confirmed by observations.  We only have to look to our moon for evidence of what the Earth might be like without an atmosphere that sustained the greenhouse effect. While the moon’s surface reaches 130 degrees C in direct sunlight at the equator (266 degrees F), when the sun ‘goes down’ on the moon, the temperature drops almost immediately, and plunges in several hours down to minus 110 degrees C (-166F). Since the moon is virtually the same distance from the sun as we are, it is reasonable to ask why at night the Earth doesn’t get as cold as the moon. The answer is that, unlike the Earth, the moon has no water vapour or other greenhouse gases, because of course it has no atmosphere at all. Without our protective atmosphere and the greenhouse effect, the Earth would be as barren as our lifeless moon; without the heat trapped overnight in the atmosphere (and in the ground and oceans) our nights would be so cold that few plants or animals could survive even a single one. The most conclusive evidence for the greenhouse effect – and the role CO2 plays – can be seen in data from the surface and from satellites. By comparing the Sun’s heat reaching the Earth with the heat leaving it, we can see that less long-wave radiation (heat) is leaving than arriving (and since the 1970s, less and less radiation is leaving the Earth, as CO2 and equivalents build up). Since all radiation is measured by its wavelength, we can also see that the frequencies being trapped in the atmosphere are the same frequencies absorbed by greenhouse gases. Disputing that the greenhouse effect is real is to attempt to discredit centuries of science, laws of physics and direct observation. Without the greenhouse effect, we would not even be here to argue about it. Don't believe me?  Here's some testimony from the side of the "skeptics" (a veritable "baker's dozen" Who's-Who): The GHG Effect All-Star Fan Club Membership 1.  Christopher MoncktonCM "Is there a greenhouse effect? Concedo [concedo / concede]. Does it warm the Earth? Concedo. Is carbon dioxide a greenhouse gas? Concedo. If carbon dioxide be added to the atmosphere, will warming result? Concedo." 2.  Roy Spencer RS"infrared-absorbing gases warm the surface and lower atmosphere" "I have not yet seen any compelling evidence that there exists a major flaw in the theory explaining the basic operation of the Earth’s natural Greenhouse Effect." "Imagine you find yourself lost in outer space, floating aimlessly, with your warm skin exposed to the cold background of the cosmos.  Sure, keep your clothes on.  There is no sun or nearby stars to add much energy to your body. Your skin would gradually cool by losing IR radiation. (Of course, if the lack of air didn’t kill you first, you would freeze to death. Bear with me here…) But now imagine you then surround yourself with a blanket. We won’t even use a fancy, NASA-invented, IR-reflective “space blanket”…just a woolen one. And let’s even assume the temperature of the woolen blanket was extremely low — just above absolute zero.  Some of the IR radiation you emit, instead of being lost to the depths of space, would then be intercepted by the blanket. This would raise the temperature of the blanket. As that happened, the inside of the blanket would begin to emit some IR energy back toward your body, while the outside of the blanket would emit energy to outer space. As a result, the temperature of your skin would remain higher than it would without the blanket — even though the blanket would remain at a lower temperature than your skin.  So, contrary to what some would intuitively expect, the introduction of a cold object has made a warm object warmer than it would have otherwise been. But it didn’t actually RAISE the temperature of your skin. In this example, all we have done is slow the rate of cooling of your body, and you would eventually freeze to death anyway.  But if you had a continuous supply of energy available (like the Earth does with the sun), and had reached a steady state of shivering and discomfort and THEN added the blanket, your skin would indeed increase its temperature, compared to if the (colder) blanket was not there. Of course, this example is just an analog to the Earth in space.  The Earth has an energy source (the sun), and it has a “radiative blanket” (greenhouse gases) enveloping it."" 3.  Richard LindzenRL "There is a greenhouse effect" 4.  Roger Pielke, Sr. 5.  Fred Singer FS"One of [deniers'] favorite arguments is that the greenhouse effect does not exist at all because it violates the Second Law of Thermodynamics...One can show them data of downwelling infrared radiation from CO2, water vapor, and clouds, which clearly impinge on the surface. But their minds are closed to any such evidence." 6.  Jo Nova JN"Technically, strictly, greenhouse gases don’t “warm” the planet (as in, they don’t supply additional heat energy) but they slow the cooling, which for all pragmatic purposes leaves the planet warmer that it would have been without them. It’s a bit like saying a blanket doesn’t warm you in bed. Sure, it’s got no internal heat source, and it won’t add any heat energy that you didn’t already have, but you sure feel cold without one. Instead of calling it “global warming”, I guess they could have called it “less-global-cooling”. I can’t see it catching on." 7.  David EvansDE "The serious skeptical scientists have always agreed with the government climate scientists about the direct effect of CO2. " 8.  John Christy JC"carbon dioxide is a thermal gas so it will cause warming to some extent...that's one about which there really is a consensus about [with] most people." 9.  William KininmonthWK "The greenhouse effect is real, as is the enhancement due to increasing carbon dioxide concentration." 10.  Richard Tol 11. Judith CurryJC "Tyndall proved in 1861 that both water vapor and CO2 were greenhouse gases." 12.  Pat Michaels PM"It's hardly news that human beings have had a hand in the planetary warming that began more than 30 years ago.  For nearlly a century, scientists have known that increasing atmospheric carbon dioxide would eventually result in warming that was most pronounced in winter, expecially on winter's coldest days, and a cooling of the stratosphere.  All of these have been observed." "Pretty much every serious student of climate change agrees that carbon dioxide, which is the product of the respiration of our civilization, is a "greenhouse gas."  Everything else being equal (which never holds), increasing its concentration should result in some rise in temperature in the lower atmosphere." 13.  Anthony WattsAW "I suppose that because I agreed that global warming occurred over the last century, and that CO2 plays a role (though isn't the only driver) that he [Spencer Michels, PBS Newshour correspondent] was surprised that he didn't have a "denier" soundbite to work with." "I'm saying that the data might be biased by these influences  [urbanization's buildings and streets]  to a percentage.  Yes, we have some global warming, it's clear the temperature has gone up in the last 100 years.  But what percentage of that is from carbon dioxide?  And what percentage of that is from changes in the local and measurement environment?" For any remaining hold-outs, Skeptical Science answers the most commmon objections that have been used by skeptics in opposition to basic GHG theory.  Of more general interest, the history of climate science is largely the history of what we've learned about CO2. Further Learnings Skeptical Science Science of Doom (Warning: for readers who enjoyed physics class) Experiment showing the absoption of infrared radiation by carbon dioxide. From the BBC 2 program "Earth: The Climate Wars"X 0 0 Bookmark and Share Printable Version  |  Link to this page Comments 1 to 40: 1. Amazing how the non-scientists among that august gang, can't *quite* bring themselves to unequivocally state the greenhouse effect actually exists: Monckton's "concedo" is one of the more stilted ones, reflecting his inability to just speak in plain language, ditto Jo Nova. Funny how Monckton "concedes" that the past 150+ years of research actually *might* be right! Thanks, Daniel, for a excellent, well-organized post. 0 0 2. Of course we hate to make predictions, but based on this emerging trend of concessions about the greenhouse effect surveyed here, I'd like to predict that the grand philosophical tradition of 'Climate Change Skepticism' will melt away at the same rate as the multi-year Arctic ice, and be all gone by the end of this decade. I can't wait to hear them denying their denial. 0 0 3. Definitely a keeper ;) Will use this one ;) I don't think the "skeptics" will ever give up, they will deny and deny, somewhere in 2025 we will still be discussing with some "skeptic" that there has been no statistical significant global warming since 2018 0 0 4. I'm sorry, but just because you've got a lot of people agreeing, that doesn't make them right. I remain absolutely convinced that there is no greenhouse effect because it contravenes the 2nd law of thermodynamics. Now I don't really know what the 2nd law of thermodynamics is, but I've hung my hat on it, and there it will stay. You can't convince me I'm wrong, because I have no idea why I'm right. So don't even try, or I'll create this great big fog of words, so that no one can see what my position is at all. And more than that, I'll get indignant and abusive. So there! 0 0 5. Well played, John Brookes. Well played. 0 0 6. @John, reading your post at work was a rather terrible idea. Trying to stifle the resulting laughs took far more effort than this cold morning warrants. This post is definitely a gem, and it will be put to good use. I've been in an online fued of sorts with a pseudoskeptic in online debates for more than a year now who often claims there is no evidence for the greenhouse effect and that CO2 is such a small trace gas that increasing amounts have negligable effects. Given that Spencer, Christy, Lindzen and Singer are his favourite sources, this should be a real treat to see 0 0 7. Son of Krypton@6, *please* keep me informed of your pseudoskeptic's responses! harwig57 at gmail dot com. 0 0 8. I am a newcomer to your blog and just read the article claiming that persons who are not convinced of catastrophic global warming believe that the greenhouse effect of atmospheric water vapor and other trace gases does not exist. You then list experts in the field who believe as I do (that there is no looming global warming catastrophe that will destroy mankind) who plainly state the greenhouse effect does exist. I am confused as to the point of the article. What ignorant small minority believes that there is no greenhouse effect and why do you address them? What does a reference to these inconsequential people have to do with the work of highly qualified individuals asking legitimate scientific questions about the data and the science behind the claims of the climate alarmists? I am also surprised by your statement, A more accurate statement would be, “Of more general interest, the history of climate science is largely the history of what we have learned about the chaotic behavior of the ENSO and the redistribution of Pacific Ocean heat into the atmosphere.” CO2 by comparison, is inconsequential in moving heat into the atmosphere. 0 0 9. Aaron Edwards @8, the "ignorant small minority" represents a sizable fraction of AGW deniers on the internet including many regular readers of, and even guest commentators at AGW denial sites such as WUWT. Apart from the few rare statements such as those collected above, the opinion leaders in AGW denial largely ignore the unscientific clap trap from those who deny even the atmospheric greenhouse effect. IMO, the blind eye they turn to pseudo-scientific poppycock is motivated by their political ends. They do not debate climate science because they are interested in the truth about climate science, but because they desire a political stalemate on action to combat AGW. A political stalemate based on misinformation and pseudo-science is as useful to them as one based on valid criticisms. Indeed, in the end it is all they have to offer. Consequently they turn a blind eye the pseudo science offered by others because, politically, it is as useful as the pseudo science they themselves offer. Only when their reputation started to become tarnished by the association did they speak up - and then having made the appropriate declarations, went back to largely ignoring or egging on of the claptrap they claim is false. It is because of this lack of intellectual integrity by the leading opinion makers among AGW deniers that we must waste time rebutting nonsense such as the denial of the atmospheric greenhouse effect; or other tacit rejections of the laws of thermodynamics such as the claim that the Pacific Ocean (which is warming) has caused the atmospheric warming by loss of heat. 0 0 10. Aaron @ 8... I believe the point is that there's a very noisy faction of climate change deniers who reject very fundamental and well understood science. If you spend any time reading the comments on WUWT, Jo Nova or Judith Curry's blogs you find that there is a sizable percentage of their most vocal following who subscribe to the "there is no greenhouse effect" theory. Those (quite honestly) insane viewpoints tend to get allowed on their blogs because they merely hold the same anti-AGW position. 0 0 11. Great to see a plug for Science of Doom (SoD) here. If you're keen to build your understanding of the fundamentals of this topic in a fully comprehensive and methodical way, you'll find SoD's explanations a real treat. 0 0 12. The Duncan Stewart demonstration is probably the best demonstration of the CO2 Greenhouse Effect on the web. Apparently, in some other video demonstrations, there may be other influences or contamination. Beware of smartasses who may point that out!:) Eli Rabett's Puzzle Right Results, Wrong Physics 0 0 13. Aaron, I do hope you'll go on to post your concerns with the science, and do so on the appropriate threads. For example, maybe you can help Bob Tisdale figure out a physical mechanism for his claim that ENSO is a forcing. Also, a question: what's worse -- a democracy that thinks that climate sensitivity is perhaps half of the mainstream mean, or a democracy that thinks the greenhouse effect is a fraud designed to squeeze the taxpayer? Which question deserves more attention on a site that is trying to A) communicate the published science to the general public, and B) de-bunk the accountability-free claims of the merchants of doubt? 0 0 14. Aaron Edwards@8: it's said that for every problem, there is a simple elegant answer...which is also wrong. Your supposition, "CO2 by comparison, is inconsequential in moving heat into the atmosphere." is one of those wrong ones. Further discussion of ENSO should be taken here. 0 0 15. Another resource: I found this paper to be very well written, interesting and useful. Ray Pierrehumbert in "Physics Today" on Infrared Radiation and Planetary Temperature 0 0 16. Seems Aaron gives a pass to the 2nd law but not the 1st... 0 0 17. Aaron Edwards @ 8 You said I am also surprised by your statement, A more accurate statement would be, The heat energy in the atmosphere comes from somewhere, but what keeps it there? Whether you think it comes from the oceans or from leprechauns, there has to be some mechanism which prevents it from being instantly (or at the speed of light, which is pretty fast) radiated out into space and lost. Thus, we can correctly say “Of more general interest, the history of climate science is largely the history of what we've learned about CO2.” 0 0 18. Aaron I would also add that may of the most public 'skeptics' have a very long track record of pitching their comments to appeal to different audiences. You might see them state in one place the sorts things Dan has listed. But when someother skeptic then suggests the GH Effect doesn't exist orsome such thing, they are surprisingly silent. Because allowing as wide a range of dissent and confusion is central to their purpose. When they are challenged they can revert back to the sorts of statements here, but when not being challenged, they are perfectly willing to let statements which, by their own admission they disagree with, go unchallenged. Go to a 'skeptic' blog such as WUWT and listen to the range of quite outrageous comments, and take note particularly of how the owners of the blogs - Watts, Nova, whoever, very rarely step in to disagree with those who say things totally at odds with the very thing they claim to accept. It looks like 'the enemy of my enemy is my friend'. Anyone who is opposed to the same thing they are opposed to can say all sorts of things that they totally disagree with and they will stay silent. Because fomenting discord and confusion is their agenda. Then when challenged they retreat back to the positions above.Then when the challenge goes away, like tortoises coming out of their shells they go back to the business of fomenting discord through studious silence. 0 0 19. Shoeymore at #12. Erm, that's Iain Stewart! And yes, it's a simple and very elegant demonstration. Pieter Tans did a similar one for a Nova production called "What's Up With the Weather?" Although I enjoyed Stewart's version I actually prefers Tans' because he uses his own body warmth whilst narrating. It's also the first one I saw, and I suppose that the whole beauty of the demonstration of the physics stuck with me. I can't find the site for Tans' video from this computer, so when I can access my laptop I'll hunt down my bookmark and post it. 0 0 20. Bernard J #19, Thanks for the correction. I like Stewart's work. The whole series of documentaries is worth checking out. Climate Wars 1 The conclusions are a bit dated, and apply to the 1990s and early 2000s. No one realised then that climate change denial, having lost on the science, would continue to use the "Tobacco Strategy" in politics and the media. PS Do post a link to Tans' video if/ when you find it. 0 0 21. The Pieter Trans video is here: It requires registration, which is a pain, but I recall that it was also included in one of Peter Sinclair's Climate Crocks of the Week. Perhaps someone can remember which specific episode it was, and provide a link? 0 0 Moderator Response: [DB] Your link returns a "Page not found" error. After registration, does this link work? [Dikran Marsupial] Link fixed (as requested) 22. As far as I can tell, none of the members of the "Greenhouse Gas Effect All-Star Fan Club" really truly believes in the Greenhouse Effect. Because if they did, when they make claims like "There has been no warming since year xxxx", they would accompany such a claim with a hypothesis about where those greenhouse-derived incremental calories of heat disappeared to. Yet I have never seen such an accounting ever offered. Evidently, energy CAN be destroyed, or at least ignored, comfortably compartmentalized away with an ironic twist of the arm of the Laws of Thermodynamics. 0 0 23. Thanks SkS, Daniel, great post. Regarding Pieter Tans "What's Up With the Weather?" ~ ~ ~ PBS Airdate: April 18, 2000 ~ ~ ~ ~ ~ ~ ~ YouTube - Global Warming. Part 3 - Man-made or natural? (1of2) 0 0 24. DB re my post at #21. I have no problem with the page. It shows the options to view or to download the video, and it asks me for my name and password. I originally registered using a work computer, but I did access it once from this computer about a year ago. If I can find the diary in which I wrote my log-on details I'll comfirm that the video can be accessed, but if I can see the front page I assume that it's OK. 0 0 Moderator Response: [Sph] The link was apparently broken in some way, but (again, apparently) Dikran fixed it, so... all should be well. 25. So, a coworker the other day showed me the Rose article on there being no warming for 15 years. We went back and forth a few times on the flaws in the article, and ended with me asking him what physical process was stopping CO2 from absorbing and emitting IR, and him responding 'Obamacare'. (He knows better; I think it was an attempt to change the subject.) My point is, it doesn't matter what is said about the greenhouse effect or anything else; nothing short of harsh reality will convince him that BAU is not going to last indefinitely. His mind becomes like a greased pig in a corner; try to pin him down hard facts, and he either acts as though the last century or two of research is all hypothetical, or he switches to, 'Even if what you say is true, there's nothing we can do about it.', and then accuses environmentalists of wanting to kill off half the people by wrecking the economy. Ironically, that is the path we are trying to avoid. (See the World Bank report on 4 degrees.) I think it will take some large shock to reset the world view of people like this. Unfortunately, nothing so far has seemed to be enough, which leads me to believe that things will be bad, and we'll be committed to worse, before this happens. And then they will convince themselves that no one told them, or there wasn't enough evidence, or ... 0 0 26. ... this would have happened no matter what we did. I didn't know how to finish that thought for a minute, but I think this is going to be the most typical/common view from the ex-denier group. I'm thinking maybe they're right, but we must try. 0 0 27. It shouldn't really be pick-on-Aaron-day, but I would like to point out that some of the most popular spokesman in the list above, Watts, Nova, Monckton, can hardly be called 'experts'. They are just very good at telling people what they want to hear. Some of the other are, or have been, valuable researchers, but they are in a very small minority with regard to the seriousness of the problem. If I have a strange lump, and I'm not an oncologist myself, I'm probably going to choose the course of action recommended by the majority of those who are. Eating enzymes and hot peppers has not worked out so well for one of my family members. She really, really did not want to believe her situation was that serious. It is a sad metaphor. 0 0 28. "and him responding 'Obamacare'." To which I would say surprise, surprise - a right-winger. It would be interesting to know why pre-disposed to deny then - didnt like Al Gore, or doesnt like the proposed solutions. Surely choosing fantasies cant be a political bias - left-wingers have their own share of fantasies - but climate denial and the right wing go together. 0 0 29. Chris G: And then they will convince themselves that no one told them, or there wasn't enough evidence, or ... Most likely a paradoxical "the government failed us," ignoring any attention to consistency w/regard to whining about regulations, forgetting that "the government" obediently and as demanded took its cues from citizens who insisted on ignoring external costs, overlooking decades of complaining about "government scientists" and their "liberal agenda," etc. Don't expect compunction. 0 0 30. What you've done is set up a straw man argument implying that skeptics dispute that the greenhouse effect is real, but you provided no supporting evidence. 0 0 31. I get rather tired of asinine deniers whose first response to a rebutal is "What you've done is set up a straw man". Such purely tactical claims are well known to be false. In this case, they can be seen to be false by anyone willing to read the 2nd Law of Thermodynamics thread, which begins with the quote: The simple problem here is that, it is a fact that there are deniers who deny even the simplest science; that this is embarrassing for deniers who wish to pretend that denial is rational; and so many such deniers resort to their basic strategy for dealing with uncomfortable truths - denial. 0 0 32. Chris G: "So, a coworker the other day showed me the Rose article on there being no warming for 15 years." And of course the great irony is that the claim is actually a strong argument in favor of warming. If one starts at the top of a mountain (1997/1998 El Nino), one expects to walk downhill. That didn't happen, even if the warming is slightly less than significant using carefully chosen start points within the least representative L-O series. You're right, Steve, because there are only 1421 comments on the 2nd Law thread. No self-described "skeptics" could possibly have contributed. 0 0 33. In the vernacular of the young folk, and in response to DSL's pointng out the 1421 comments on the 2nd law page... I thought I'd found the SkS thread with the msot posts, but nooooo, I had not. Good grief, talk about a textbook example of D-K, write large...;( 0 0 34. Steve Case @30 Here is a denier that disputes the greenhouse effect. 0 0 35. And just to show that not all the denialism is on the right, here is the recently deceased Alexander Cockburn using "the greenhouse effect violates the 2nd law of thermodynamics argument" plus a whole slew of other denier talking points. 0 0 36. Steve Case There are entire organizations based upon denying the greenhouse effect, devoting themselves to writing self-approved polemics on their points of view and (mis)labeling them science. The comment threads at sites such as JoNova, WUWT, Curry's blog, and elsewhere (wherein a quick Google search seems to indicate that you visit all of those forums) are filled with statements of denial - and the owners of those blogs simply don't call their posters on the errors. And now you claim there is no evidence of this denial??? Pull the other leg, Steve - it's got bells on... 0 0 Moderator Response: [DB] Mr. Case has decided to recuse himself from further participation in this venue. Apologies for the distraction. 37. Vroomie, that thread is indeed a kind of epitome of denial. Peruse through again and you'll understand why some of us long timers of the site can be short on patience with the nonsense that keeps popping up. The heaps of bull that one like "Damorbel" could pile on would exhaust patience in even the best of us. Countless posts in that thread fall in the category "can't make this stuff up", the rest goes in "not even wrong." What is truly disgusting is that, as KR points above, the prominent deniers mentioned in this current thread officially endorse reality while paying lip service to delusion on their blogs. This current thread, however, has also tremendous entertainment value: it brings deniers denying that deniers deny obvious stuff, like Steve above. Years ago, it took me about one evening to figure where were the people who couldn't be taken seriously in this pseudo-debate. The likes of Steve Case greatly facilitated the process... 0 0 38. As an example of being in denial without recognizing it, what about Aaron (comment #8)? He says early in his comment and then finishes with So, he says he (and implies everyone else) believes in the greenhouse effect, but his closing statement would seem to say that he believes at least one of the following: - CO2 is not a greenhouse gas - greenhouse gases do not "move heat into the atmosphere" (whatever that means - I'm going to guess "heat the surface") - that greenhouse gases do move heat into the atmosphere as part of the natural greenhouse effect, but do not do so with respect to anthropogenic increases in greenhouse gases - that the warming due to the greenhouse effect does not constitute "moving heat into the atmosphere". It seems that Aaron has not yet followed up his original contribution, so I don't know if I can expect a clarification on what he means by "move heat into the atmosphere", but it seems to me that he "accepts the greenhouse effect", but then just doesn't accept that increasing a greenhouse gas will increase the greenhouse effect. That looks a lot like denial to me. 0 0 39. Doug Bostrom @ 29, Now that you've said that, I have to agree. To generalise, I think most responses will fall under the "It's not my fault." category; I believe that can be applied to the present as well. Indeed, not that we should be looking at patterns without considering physical processes, but the record is full of ups and downs, but there hasn't much of a down for a while, and that should strike people as odd. 0 0 40. Phil @ 34, I didn't get past the statement "Air, pure oxygen and pure nitrogen all absorb more infrared radiation than pure CO2." Not very scientific of me, but I stopped reading then, before my head exploded. Perhaps I should have continued reading, to see what experimental support was provided for that statement. I can sense a Nobel for this alarming overturning of conventional physics ... 0 0 The Consensus Project Website (free to republish) © Copyright 2019 John Cook
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '835', 'language_id_whole_page_fasttext': "{'en': 0.9529734253883362}", 'metadata': "{'Content-Length': '117813', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:V56D6F25CLJZTIVL7SD3YWCO6S4VP6ZF', 'WARC-Concurrent-To': '<urn:uuid:94d4a871-4e21-4b47-9826-f418ada44137>', 'WARC-Date': datetime.datetime(2019, 2, 16, 22, 9, 15), 'WARC-IP-Address': '192.73.240.133', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:NTVQZ5XO7NP5SLW24GWITRICUDCAK2DQ', 'WARC-Record-ID': '<urn:uuid:751bbcaa-5614-40d3-b670-e77d20caa31c>', 'WARC-Target-URI': 'https://skepticalscience.com/The_Greenhouse_Gas_Effect_All-Star_Fan_Club.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:dce7cccf-3d69-42fc-bf23-aeb0e52f1587>', 'WARC-Truncated': None}", 'previous_word_count': '5718', 'url': 'https://skepticalscience.com/The_Greenhouse_Gas_Effect_All-Star_Fan_Club.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-171-229-147.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.18491590023040771', 'original_id': '2d17b6bf79f8e09b77f47767447bce1037b9295e9f8240c449b5efe76ac99a73'}
Energy Harvesting Peltier Ring [Sean] is by no means an electrical engineer, but when he discovered the magic of Peltier plates he knew he had to make a project with them. This is his Energy Harvesting Peltier Ring. The effect he is harnessing is called the SeeBeck Effect — the process of generating electricity through temperature differentials. He has shown how peltier plates work to many people, and, as you can guess, most people think they are amazing (free energy wow!). Unfortunately, most peltier plates are rather large and bulky, so [Sean] decided he wanted to try to design something small enough that could fit on a ring. Just a proof of concept, to light a tiny SMD LED. The tiny Peltier plate he found generates about 0.3V with a temperature differential of about 20C — not bad, but it won’t light up any standard LEDs at that voltage! He started looking into voltage steppers and discovered Linear Technology’s 3108 Ultralow Voltage Step-up converter and Power Manager — a surface mount chip capable of scaling 0.3V to 5V. The only problem? [Sean’s] never done surface mount soldering. His first circuit was built on a prototyping board, and after it worked successfully, he designed a PCB using Fritzing. Another success! Prototyping complete, it was now time to try to downsize the PCB even more to fit on a ring. Realizing there was no way he was going to fit it on a single ring, he decided to make a double ring out of CNC machined aluminum. He made use of his school’s CNC shop and the ring came out great. It works too! The room has to be fairly cool for the LED to light, but [Sean] definitely proved his concept. Now to make it even smaller! 51 thoughts on “Energy Harvesting Peltier Ring 1. I’m pretty sure that ring would be considered a weapon akin to “brass knuckles” in California, and most other States in the USA, and likely elsewhere. It’s a nice piece of fabrication, but I’d be very, very, careful where I wore that ring. 2. I’m not allowed in my school’s CNC shop. RIP :L Also, Mister X This is a good vehicle through which we can test the law and potentially defend ourselves from the tyranny of bureaucracy. 1. With all due respect SYNTRONIKS, there are plenty of other less “in your face” ways to accomplish the same goals, I’ve already tried your way, I always lost, but when I started working with authority figures in a reasonable and organized way, I was allowed to do things my fellow students couldn’t, all with the blessings of the Dean. I’m not implying that your way is wrong, it’s your path, it’s just that some of us have already figured out there’s a “bridge out” sign at the end and make attempts to save fellow travelers wasted time and energy. Be safe on your path, and never stop Hacking. 1. :) Thank you — My first comment was unrelated to the second. Use of that machine shop is restricted to research projects and contracts for that one specific organization. There is a significant amount of resource wasting at my university. We have a machine shop in this very building I am in now but it is abandoned due to lack of supervision. No one wants (understandably) to assume liability for accidents. 1. My circuit also accepts very tiny solar cells(low voltage) and piezo elements, so you could technically have them charge all day, maybe even in partially shaded areas – think calculator solar cells – then have the led come on when no light is detected. Also if the thing you stick them too vibrates a lot thats another way to generate current – Piezo. 1. First thing to realize is that nothing about any of these forms of energy are currently “efficient” when it comes down to turning them into electric energy. But with that you realize that normally its just wasted energy in which case even an efficiency of 10% is useful. I have not experimented with piezos yet, but in the data sheet for the 3108 there are different setups for piezo/solar/thermo. but in general to hook up a piezo would just need a couple more components. One of the key features to making the chip work for thermoelectric is the 1:100 wound coil from coilcraft. When using the 1:100 its max input voltage is 0.5V, so if working with something larger than that you can step up to the 1:50 coil or the 1:20 coil all allowing more voltage to be provided to the chip. 3. Awesome! As a next step, consider reading up more on printed circuit layout; it could really help you make the ring much smaller, possibly small enough to fit on one finger! 4. With a little more tightening up of the circuit, one could build 3 smaller boards and stack them, then it could be a “real” one finger ring. None the less, it’s really nice to see someone go to the trouble to make this work, it’s quite an accomplishment to do more with less, and now others are seeing the potential of this and may carry on the work. 1. Then go for it, and we can laser scan both to see which has higher accuracy. Also, do it in a similar amount of time. If you have access to a CNC why the hell not use it and save yourself time and get a better product. 2. What can I say, I love robots doing human’s work. No Luddite here haha The holes had to be specific diameter. Also if you read my article, I think I put in there that I somehow manages to measure my ring finger incorrectly. So the dremel made an appearance to make the hole bigger. 1. Those are incredibly small and expensive. I ordered two HV56 ( ) because I thought I was good enough to solder the 0.3mm pads on them (I was dumb and naive enough to not order the lead version). I was wrong. The first one, somehow the solder pads came right off one side, so there goes the first $100. The second one split in half due to the heat of soldering, another$100. I was very very frustrated. I will probably use one in the future and get the leads version but for right now my $40 12mmx6mm peltier from digikey will do. I’m focusing on designing a silver heat sink at the moment, and figuring out how to isolate the heat from my ring to it without an ugly rubber band. I will make it smaller. 5. Nice job on the ring! This could be used to make other wearable electronics, like a wristwatch, that powers from your body heat. Or it may “charge” a primitive cellphone.. 1. The good thing about my first development board I designed is you can customize the output voltages; on top of that you can even take things like miniature solar panels or piezo elements to generate currents too. Unfortunately the amount of current required to charge a phone is huge and because the voltages are being up-scaled so much the currents are almost zero. Linear Tech. does have a new chip I’m going to look into where its sole purpose is to use very low voltages and charge Lithium batteries. I’m thinking of putting two piezo elements in my shoes and seeing if I can charge a phone via walking or running. I’ve experimented with my larger peltier module and a candle with two heat sinks but still wasn’t able to charge a phone. The circuit needs to be improved. Kind of put the project on hold for a moment while my finals are taking place. 6. Make it out of gold or gold plate the next one, aluminum can leave a dark residue on the skin, you might even consider embedding the circuit between two plates to protect it and give you extra surface area for the cold side. It’s really cool 1. Pure silver has the highest thermal conductivity and I was planning on making the heat sink out of silver. The real issue I’m dealing with now is finding a way to properly secure and isolate the heat-sink from the heat of the ring(probably just going to use M1 screws and very tiny nylon insulators). Right now its held on with an ugly rubber band. 7. As azraph suggested, I think he could overcome the “cold room” problem a little better if it had more thermal mass on the cold side, but would require a larger heatsink area, which would mean a bigger ring. But then again a heatsink might give it more stylish flare and make it more face ripping as a weapon (in spirit with the brass knuckles above)depending on design of the heatsink. 8. Challenge accepted. Bringing out the old germanium radio energy harvester grid and will take some pics this time. It definitely peaks at 5pm with all of the various chatter in the airwaves. Been reading these articles on HaD and I have some new ideas to make it more efficient. It used to take three days to charge the deep cycle with a trickle store feeder but that was enough to drive the small sprinkler system for its short spring cycles. After the initial charge, it seemed to be doing pretty well and then one day it just stopped producing at all and it was relegated to under the house. Probably just a bad something or other and this ring inspires me to dig it back out for another run now that I am 4 years wiser in the arts lol. Kudos to the builder for inspiring me to get off my rear and back to some energy tinkering :) 1. Do bring out your “germanium radio energy harvester”, along with a video demonstrating it’s performance. For myself a field/signal strength meter doesn’t show much power available. Then again the closest broadcast tower is 10 miles away as RF flies, and I wasn’t using a large antenna. 9. Anyone have an idea of the efficiency (or lack thereof) of the Seebeck effect? I know Peltier cooling devices are notoriously inefficient. I was wondering if the reverse effect was better or even worse. 1. I had a look at this a few years ago – see In short – a few percent. That data was measured on a module which was intended for cooling purposes, NOT for power generation. As a result, the maximum hot-side temperature is limited by the melting point of the alloy, and the alloy used is specifically meant for heating/cooling purposes, not for generation. There are generator-specific modules available, which use better materials (higher melting point) but they are rather expensive, and the efficiency isn’t that much greater. I measured mine using a water-cooled heatsink on one side (constant cold temperature) and a heated aluminium block on the other with a thermocouple. I had previously measured the thermal resistance of the entire module by seeing how long it took for an insulated metal block to cool down via conduction through the module, and this enabled me to work out the thermal power flowing, and hence the overall thermal/electric efficiency. 10. I was rushing all my replies and I forgot to say… Its a WIP, but the state its in right now is enough to give people an understanding of what is happening. I believe Ill make it smaller with modifications, also make the led be on more of the time, whether it be blinking or not. Using a TEG module instead of a TEC will help also add current/voltage, just need to hold off on the spending for a bit(TEGS are usually double the cost of TECs and I ruined two TEGs already – See above). The effect is great when you go outside at night, really shows off the potential(thanks cold canada). Thanks again, and comments welcome. 11. Is it Cyber Troll Tuesday or something? A lot of off topic garbage today… Anyhow, neat project: I’ve always had interest in thermoelectric generators and this made me grin. I’m sure some of the legitimate comments above will help you to figure out a good way to minify the ring a bit further. Great work for a hobbyist! 12. There is some cool stuff going on with graphene as heatsinks and energy pipes. search for graphene batteries , and the heatsink search will show that it can work as an inductive circuit for heat – no phys contact neccesary. pretty freaked here is a water cooler, would work better with alcohol, because everything does…. But graphene does it without even having to be in contact. Was studied to transfer thru a spaceship body to the exterior. Not it.. 13. I reall need to have a blog open when I doing the internet thing to make notes in. I recall sometime back there was an effort by some company to use the heat of a motor vehicles exhaust to create power from peltier devices.. Working on the theory that if successful alternators could be smaller, saving weight and fuel. No doubt I bookmarked it , but I can’t find it. 14. Cool project! I did something similar using a Peltier and LTC3109 to power an energy-optimized Arduino derivative (Mosquino). The big drawback I find with Peltier-type devices is that they are very thermally conductive, and a lot of heat has to “pass through” to get any work done. The upshot is that unless the heat/cold sink on the passive side is very large, it equalizes toward the active-side temperature much more quickly than it can dissipate heat/cold, so the power production when a thermal source is present is short-lived. I’ve looked briefly into thermoelectric elements designed specifically for energy generation (rather than cooling), but the costs and overall lack of hobbyist-buyable product threw me off. Do they offer any substantial advantages over garden-variety Peltier elements? 1. The TEGs are definitely advantageous over the general run of the mill TEC module. But currently in my ring I’m still using a TEC, specifically this one.. I haven’t done any testing on how much voltage this one is generating as I had a smaller one before so I just threw this in the ring the other day. So as I mentioned above, I attempted to make a HV-56 TEG module from Nextreme to work, it was 3.1mmx3.1mm and when I initially tested it I was generating way more voltage than any peltier I’ve used(for its size). The data sheet says about 0.16v for a 10 degree difference. Unfortunately as I mentioned above, I burned out both of them trying to solder leads to them. I’m not really sure what happened to the one but it seems that something corroded away the solder pads on one, and the other one basically split in half after a lot of frustration and heat. It was a costly mistake but I was nearing the end of the project and decided to splurge on the expensive TEG modules, next time Ill pay the extra $15 and get it with leads(what was I thinking!) – Live you learn. I would love to see what you were able to accomplish with your project and the Mosquino. I’m going to be looking into linears ultralow voltages Lithium battery charging chip next. Another problem with mine is if its really cold, your fingers don’t like to hold heat, even if you’re basically a human heater like me. 1. Well, no, as long as the cold side keeps losing heat to the room, and the warm side keeps absorbing heat from Sean. That depends on how good the heat sink is, as well as the temperature of the room and Sean’s skin. It could carry on working forever. The power will presumably start off low, as Sean heats the ring up, then higher as the heat transfers to the heat sink thru the Seebeck chip. Then lower again as the heat sink warms up to it’s “hot” temperature. 15. I Have too admit, I’m a little pissed someone finished this before me. I have been working on 3108 based ring with two hv56 units for over a year now. And now it looks like I’m just copying someone’s work. In fact i promised one of these to my gf last may. Maybe a co-op on designs? I have some ideas for you. 1. Hey I’m always willing to bounce Ideas, I figured there had to be someone else out there with this thought in mind. I wish I had not broken my HV56s though. The ring would be way better right now, Ill have to wait for some funds before I buy them again. You’re welcome to email me directly through my account, or the IdleHandProjects account. I have a good idea of what I’m going to do about the heatsink now, just need to manufacture it. It involves no sharp fins to catch on pockets. Leave a Reply to Brassomat Cancel reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.960881233215332}", 'metadata': "{'Content-Length': '162933', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2YURSVLSBEBIMGWUMBP4BBKSE4GVYNZK', 'WARC-Concurrent-To': '<urn:uuid:5375807d-20d2-45c5-bfdf-63459815eb5c>', 'WARC-Date': datetime.datetime(2019, 5, 19, 21, 2, 16), 'WARC-IP-Address': '192.0.66.96', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:243FJEELJDU2RP5XYOOS7G337ARUYCRN', 'WARC-Record-ID': '<urn:uuid:360064e6-df5e-4c14-ab21-6be767f0a75c>', 'WARC-Target-URI': 'https://hackaday.com/2013/12/02/energy-harvesting-peltier-ring/?replytocom=1120132', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:be356d30-e010-4d97-9e99-1c955620cf88>', 'WARC-Truncated': None}", 'previous_word_count': '2822', 'url': 'https://hackaday.com/2013/12/02/energy-harvesting-peltier-ring/?replytocom=1120132', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-186-87-179.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.026455283164978027', 'original_id': 'ceed967c548bbe184083a2a802b3bb114404046474ddb21efba28db041dc9221'}
Half Moon Run’s album ‘Sun Leads Me On’ -by Vanessa Irvine Half Moon Run‘s second album ‘Sun Leads Me On‘ has a feel of both the Arctic Monkeys and Lumineers as it grabs hold of a country/ indie rock sound. The explicit single, ‘Trust‘, has had a large popularity on the album and the band’s multi-instrumentalist, Dylan Phillips has dubbed it a strange song with somewhat of a chaotic energy. I agree. For the most part of the album I heard a calm and clear indie taste, an acquired melancholic feel throughout all the songs up to track 13- Trust. This upbeat single was a harmonization of head banging beats and literal harmonization. It was like Triple-J decided to play a song from ‘So Fresh‘ top 10. Although the song was obviously contrasting, the lyrics still remained ‘Half Moon Run‘. In an interview Dylan Phillips the guitarist, drummer and vocalist, he admitted, “Sun Leads Me On came from a place that felt a little bit like being underwater. We kept powering through because ultimately we knew it was worth it. We had this beautiful thing, this wonderful chance, but we were also working our way through a lot of darkness, losing lots of friends, struggles at home, losing our sense of home, trying to let the music guide us but having trouble even finding that. There was a lot of strife in it all, but at the same time the sun just kept pulling us forward, and we just kept powering through and trying to find beauty in what we do.” In this raw interpretation from the band we see the heavy walls that they needed to push through to eventually produce an icebreaking new album. Half Moon Run‘s testimonial album was released on the 23rd of October 2015, and will be touring live until April next year. A band with an interesting sound and background, all members aged 21-25 are giving the world their unique sound and will hopefully keep going. From the fresh sound of the opening, ‘Warmest Regards‘, until the mysterious ending of the jam packed, ‘Trust’, Sun Leads Me On has had positive feedbacks and will continue to have them. Photo Credit: Half Moon Run Leave a Reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9712305068969728}", 'metadata': "{'Content-Length': '33512', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GNYC25KSDEMIZVG4APOXU4G2PDUZCKLP', 'WARC-Concurrent-To': '<urn:uuid:71026fad-f86e-40dc-8cd6-08628d16c6f1>', 'WARC-Date': datetime.datetime(2019, 8, 25, 19, 51, 8), 'WARC-IP-Address': '139.99.139.28', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YRTP2I4ZLAXTUGHL6SPGFE6VYW6I7XI3', 'WARC-Record-ID': '<urn:uuid:593ab5df-f07b-4d4f-8e5e-e0fda9087e92>', 'WARC-Target-URI': 'https://www.colosoul.com.au/uncategorized/half-moon-runs-album-sun-leads-me-on/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7fb5ffbb-7bad-42a5-9780-a17f4f19cfae>', 'WARC-Truncated': None}", 'previous_word_count': '376', 'url': 'https://www.colosoul.com.au/uncategorized/half-moon-runs-album-sun-leads-me-on/', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-85.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02064281702041626', 'original_id': 'ea690514cdc52feb53be644d7b5d0f13c6a93577f32867ed5c906f8fe40d4d1b'}
The book is bilingual and includes all the cat cafes on this blog that are still currently in business. At my favorite cafes, I’ve done interviews and included more detailed information about some of the cats. The cafes all have star ratings and are divided up by type so readers can easily find the cafe they want to go to. This was the third pet cafe I went to in Vietnam, and it is home to more than 20 cats, mostly purebred. There are many Maine Coons, a Siamese and a few mixed breeds. This cafe has a ‘cuddle fee’ of VND45,000 and drinks are optional. 這是我去的第三間越南寵物咖啡. 他們有20幾隻貓, 大部分是品種的. 有很多緬因貓, 一隻暹羅貓, 還有一些米克斯. 咖啡館有門票費VND45,000, 不需要點飲料. The cafe is well-lit and has plenty of open space as well as lots of places for the cats to climb, play and hide. 店裡很亮, 有很多空間還有很多地方貓可以玩. The cats were not as friendly as at Ailu Cat House but they didn’t mind being petted. The cafe is very clean and doesn’t smell at all. It has a quiet atmosphere and quite a few people had brought computers, happy to work/study surrounded by sleeping cats. 貓咪不怕人, 但是對人沒有興趣, 只要睡覺. 有很多貓, 還是很乾淨沒有味道. 環境很安靜, 很多人用電腦, 開心有貓陪他們. When I took a trip to Vietnam, of course I had to see if they had cat cafes. I thought it was unlikely, but to my surprise, they had a few! This cafe has three floors, with the first floor being a Japanese restaurant, the second a cat cafe and the third a dog cafe (not much to the dog cafe, just a room with three little dogs). The cat cafe has 19 adorable, friendly cats. One cat sat on my table. They told me his name was ‘dog’ in Vietnamese because he acts like a dog. I ordered an avocado smoothie (VND 60,000) and that was very good. 一隻貓坐在我桌子上. 店員說他的名字是’狗’應為牠個性像狗. 我點一個鱷梨冰沙. The cafe seemed very clean and there were lots of places for the cats to play. It did have a bit of a smell, but the staff were in the process of cleaning. 咖啡裡面看起來很乾淨, 有很多地方貓可以玩. 有一點貓尿味道, 但是店員一直在清理. They had a couple of kittens that were a few months old and some very tiny ones that were still with their mother. 他們有兩個小貓, 還有一些剛出生的小貓跟他們的媽媽在一起. This was a very nice cafe and it seems like the staff really care about the cats. Here are more pictures of the cats我很喜歡這間,好像店員很關心貓: A friend brought me to this relatively new cat cafe in Kuala Lumpur, and it’s definitely worth a visit. It’s bright, clean and has up to 20 friendly cats at a time. All of the cats are rescue cats and some of them can be adopted. When we went in, this fluffy cat was on the counter and it stayed there the whole time 我朋友帶我去這間吉隆坡的貓咖啡, 我覺得非常好. 很亮,很乾淨, 有大概20隻貓. 全部的貓以前是流浪貓, 一些可以被領養的. 我們進去的時候這隻貓躺在櫃檯, 一直留在這裡: The whole place is an ideal cat playground, with shelves all around the walls for the cats to jump and climb on 這個地方很適合讓貓玩得很開心, 我很多地方牠們可以跳爬上去. Most of the seating is beanbag chairs, although there is one area with a desk built into the wall and plugs for computers/chargers. The cats like the beanbag chairs. 大部分的坐位是豆袋椅, 但是還有一個地方有插座,人可以用電腦, 充電. 貓喜歡豆袋椅. They also have lots of artificial grass for the cats to play and sleep on. 也有很多’草’貓可以玩, 睡覺. Entry is MYR15 for an hour and includes one drink. The drinks on the menu all have cute names. I had the Mango Meownia. 進去要MYR15,含一杯飲料. 菜單飲料的名字都很可愛. 我喝’Mango Meownia’. This cafe has a relaxing atmosphere, and it’s nice to see how happy and comfortable all the cats look. 我很喜歡這間, 環境很好. 貓都看起來很開心, 很舒服. I have now been to nearly every cat cafe in Taiwan, about 80 in all. Out of all of these, here are my top 10 favorites. In my opinion, the best cat cafes have happy, healthy cats (whether it’s one cat or ten), are clean, have a good atmosphere, creative design and reasonably good drinks and food. 小貓花園 (Cafe Cats and Dog) This is the original cat cafe, opened in 1998. They have about 12 cats and now 3 dogs, friendly staff and an extensive menu. 這是台灣最老的貓咖啡, 1998開業. 他們有十幾隻貓三隻狗, 友善的店員, 菜單有很多選擇. Cat Lair 六號貓洞 (Taichung 台中) I love this cafe even though I’ve only been there twice since it’s in Taichung. There are 5-10 cats there at a time, all happy and more or less friendly. With the tree branches around the doorway, it feels like a secret hideaway in a forest even though it’s in the middle of the city. The cats are so friendly and happy, and the owner is nice to talk to and very obviously enjoys her job. It’s a great place to relax; one could easily spend a few hours here and hardly notice the passing time. 我很喜歡這間; 我只去過兩次因為在台中. 有5-10貓, 都看起來很開心. 我很喜歡這間環境, 我覺得名字很適合. 門口有很大的樹枝, 感覺像森林裡的小洞. 貓都很開心很放鬆. 還有老闆很熱情還有很明顯愛她的工作. 是一個好地方放鬆, 可以坐這裡好幾個小時. Mask Cat 貓裝 I’ve been to this cafe more times than any others. They have three very friendly cats who will sit on people’s laps, cute decorations, and a quiet atmosphere for working. 我最常去這間咖啡. 他們有三隻很可愛的貓,會坐在人身上, 可愛的裝飾, 還有安靜的環境所以可以工作. Collection for Friends 私藏不藏私 This cafe only has one cat, Money, but the cat is so cute and the atmosphere, decorations and food are so good, it still makes the list as one of the best. 這間只有一隻貓, Money, 但是牠很可愛, 還有環境, 裝飾, 食物都非常好所以我覺得是很好的貓咖啡. Genki Cats 元氣貓主題餐廳 This cafe is home to about 20 beautiful Maine Coon cats. Since so many stray cats need homes, I usually prefer cafes with mixed breeds but these cats are so friendly and happy, I’ll make an exception with this one. They’ve moved since I first wrote about them. I updated the address in the original post. They also now serve full, Japanese style meals in the same room as the cats rather than shaved ice in a separate room. 者間有大概20隻很漂亮的緬因貓. 因為很多流浪貓需要一個好家, 我平常喜歡有領養流浪貓的咖啡館. 但是這些貓非常開心非常親人所以我還是很喜歡這間. 他們有搬家. 我已經改好地址在原本的post. 他們現在有日式料理, 可以吃在貓區. Cafe Fima 菲瑪咖啡 This cafe also just has one cat, but she’s really the star of the cafe and even has her own business card. It also has a great atmosphere and high quality coffee. 這間只有一隻貓, 但是她是店裡的明星. 她有自己的名片. 氣氛很好還有咖啡特別好喝. Spring Day Pet Cafe 春日寵物咖啡 This pet cafe has 4-6 cats and about four dogs. They have one of the most amazing cats I’ve ever seen–she can do tricks on command! 這間有4-6隻貓,四隻狗. 他們有一隻很奇妙的貓, 她會做特技跟狗一樣! Cafe 218 小猴子咖啡 This cafe has two fluffy Persian cats that the owner adopted. It’s a small place near Taipei 101. The cats are adorable to watch, the owner is very friendly and the coffee is delicious. 這間有兩隻伯斯貓, 老闆領養的. 是一個小間在101附近. 老闆很友善, 貓很可愛, 咖啡很好喝. 品客 (Classic) This Shida cafe has three friendly cats and occasionally a Corgi. It has a convenient location, good food and nice atmosphere. 這間師大咖啡有三隻可愛的貓還有偶爾一隻柯基犬. 環境很方便, 食物好吃, 氣氛很好. Minou Minou This Gongguan cafe has two adorable cats and very cute decorations. 弟寶,who was a kitten when I first saw him, is the friendliest, but the other cat looks sleepy and content. They have a great brunch menu. 這間公館咖啡有兩隻很可愛的貓還有很可愛的裝飾. 弟寶, 最年輕的貓比較會靠近人, 但是裡外隻野看起來很開心在睡覺. 菜單有很多好吃的早午餐. The cats in this Taichung café are Munchkin/English shorthair mixes, and they look adorable. Some are friendly and some are a bit skittish. 這間台中咖啡的貓是萌英國短毛貓, 牠們腿很短很可愛. 一些喜歡人, 一些怕人. Also, unfortunately some of them don’t use the litterbox. I smelled a strong odor when I went in, and while I was there, I saw one pee on the floor and no one cleaned it up. I ordered beer in a bottle (NT$150+10% service charge), since that seemed like a clean choice. They have a good variety of beers available. They also have coffee, tea and set meals. It’s nice to see the cats there, but with the smell, I didn’t have much appetite for food or drink. 還有一些不用貓砂盆. 我進去聞到很重貓尿味道. 我也看到一隻尿在地板沒有人清理. 我點一瓶啤酒(NT$150+10%服務費)因為好像最乾淨的選擇. 他們有很多種啤酒. 還有咖啡, 茶, 套餐. 貓很可愛, 但是有這個臭味, 我不想吃喝東西. This Taichung cat café has about ten friendly cats. It’s clean and bright and the cats have lots of room to climb and play. 這間台中貓咖啡有大概十隻很親人的貓. 很乾淨又很亮, 貓有很多空間可以玩. It’s quite busy and seems to be popular with families and groups of friends. They offer the usual coffees, teas, desserts and light meal options. I had an apple tart (NT$70) and an Americano (NT$80). This is a nice café and I’m impressed with how clean they keep it with the number of cats. It’s not quite as unique as some of my favorites, but it’s worth a visit if you’re in the area. 客人很多, 好像家庭, 朋友團都喜歡. 他們有咖啡,茶, 甜點, 間餐. 我吃過蘋果塔(NT$70)喝美式咖啡(NT$80). 我覺得這間很好, 有很多貓還是很乾淨. 沒有特色, 但是在附近, 很值得去.
mini_pile
{'original_id': 'edf214fee5f9dab89e9cd4c334a204ba596663812227e485b5ef85b1818a3a6f'}
<?xml version="1.0"?> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xs="http://www.w3.org/2001/XMLSchema"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/><title>SPASE Resource Description</title><script type="application/ld+json">{ "@context": "https://schema.org/", "@type" :"Dataset", "name": "Ultraviolet Coronagraph Spectrometer (UVCS)", "description": "The primary scientific goals of the UVCS (UltraViolet Coronagraph Spectrometer) are to: (1) locate and characterize the coronal source regions of the solar wind; (2) identify and understand the dominant physical processes that accelerate the solar wind; (3) understand how the coronal plasma is heated in solar wind acceleration regions; and, (4) increase our knowledge of the coronal phenomena that control the physical properties of the solar wind as determined by in situ measurements. The UVCS is intended to determine the primary plasma parameters of the solar corona from its base to as high as 10 Re. It is expected to measure signatures of both thermal and nonthermal processes: electron temperatures, effective temperatures of protons and several minor ions; electron and ion densities of O+5, Mg+9, Si+11, and Fe+11; and flow velocities of the electron/proton plasma and of O+5, Mg+9, and Si+11. The instrument consists of an occulted telescope and a high resolution spectrometer assembly. Three off-axis telescope mirrors focus co-registered images of the extended corona onto the three entrance slits of the spectrometer assembly. The spectrometer assembly consists of three sections. One is optimized for line profile measurements of H I Lyman alpha, with a range of 114.8--128.3 nm, extendable to 113.0 nm and 130.0 nm with grating motions. A second section is optimized for line intensity measurements of O VII (103.2 nm) and is also used to observe Si XII in second order (499 and 521 nm; first order range is 93.2--106.8 nm). The third section is used to measure polarized radiance of the visible corona. A filter with a bandpass of 450.0--600.0 nm is mounted in front of a photomultiplier tube. The EUV spectrometer sections use toroidal concave diffraction gratings in Rowland circle mounts that produce stigmatic imaging at the subject wavelengths. There are entrance slit changing mechanisms on each spectrometer. The detectors for the EUV are multi-anode microchannel arrays, each with 360 x 1024 pixels on 0.025 mm centers. The instantaneous field of view (FOV) of the instrument is the portion of the solar image that passes through the spectrometer entrance slits. Internal mirror motions are used to step the instantaneous FOV across the 141' x 40' FOV defined by the entrance aperture. Offset pointing adjustments can be used to extend the FOV for EUV measurements down to the solar limb, and also onto the solar disk for measurements of absolute spectral line intensities and positions. The UVCS can rotate its FOV about the sun-center to observe any segment of the corona within 10 solar radii. Twelve rotations of 30 degrees would build up a spectroscopic description of the full corona out to 5 solar radii, with additional data out to 10 solar radii. This information was taken from the article ``UVCS - the Ultraviolet Coronagraph Spectrometer for SOHO,'' by J. L. Kohl and G. Noci (Proceedings of the First SOHO Workshop, ESA SP-348, pp. 23-26, November 1992).", "abstract": "The primary scientific goals of the UVCS (UltraViolet Coronagraph Spectrometer) are to: (1) locate and characterize the coronal source regions of the solar wind; (2) identify and understand the dominant physical processes that accelerate the solar wind; (3) understand how the coronal plasma is heated in solar wind acceleration regions; and, (4) increase our knowledge of the coronal phenomena that control the physical properties of the solar wind as determined by in situ measurements. The UVCS is intended to determine the primary plasma parameters of the solar corona from its base to as high as 10 Re. It is expected to measure signatures of both thermal and nonthermal processes: electron temperatures, effective temperatures of protons and several minor ions; electron and ion densities of O+5, Mg+9, Si+11, and Fe+11; and flow velocities of the electron/proton plasma and of O+5, Mg+9, and Si+11. The instrument consists of an occulted telescope and a high resolution spectrometer assembly. Three off-axis telescope mirrors focus co-registered images of the extended corona onto the three entrance slits of the spectrometer assembly. The spectrometer assembly consists of three sections. One is optimized for line profile measurements of H I Lyman alpha, with a range of 114.8--128.3 nm, extendable to 113.0 nm and 130.0 nm with grating motions. A second section is optimized for line intensity measurements of O VII (103.2 nm) and is also used to observe Si XII in second order (499 and 521 nm; first order range is 93.2--106.8 nm). The third section is used to measure polarized radiance of the visible corona. A filter with a bandpass of 450.0--600.0 nm is mounted in front of a photomultiplier tube. The EUV spectrometer sections use toroidal concave diffraction gratings in Rowland circle mounts that produce stigmatic imaging at the subject wavelengths. There are entrance slit changing mechanisms on each spectrometer. The detectors for the EUV are multi-anode microchannel arrays, each with 360 x 1024 pixels on 0.025 mm centers. The instantaneous field of view (FOV) of the instrument is the portion of the solar image that passes through the spectrometer entrance slits. Internal mirror motions are used to step the instantaneous FOV across the 141' x 40' FOV defined by the entrance aperture. Offset pointing adjustments can be used to extend the FOV for EUV measurements down to the solar limb, and also onto the solar disk for measurements of absolute spectral line intensities and positions. The UVCS can rotate its FOV about the sun-center to observe any segment of the corona within 10 solar radii. Twelve rotations of 30 degrees would build up a spectroscopic description of the full corona out to 5 solar radii, with additional data out to 10 solar radii. This information was taken from the article ``UVCS - the Ultraviolet Coronagraph Spectrometer for SOHO,'' by J. L. Kohl and G. Noci (Proceedings of the First SOHO Workshop, ESA SP-348, pp. 23-26, November 1992).", "temporalCoverage": "1990.10.06 2009.30.06", "keywords": [ ], "license": "https://cdla.io/permissive-1-0/", "audience":{ "@type": "Audience", "audienceType": ["Space Physicist", "Space Community", "Data Scientists", "Machine Learning Users"] } } </script><style> /* http://spase-group.org/tools/xmlviewer */ /* v1.0 | 20160908 */ * { margin: 0; padding: 0; border: 0; outline: 0; font-size: 100%; vertical-align: baseline; background: transparent; } body { background-color: #f0f0f0; // #eaf5e9; #277bc0; #d3d3f9; color: black; font-family: Verdana, Arial, sans-serif; font-size:12px; line-height: 1.2; } h1,h2,h3,h4,h5,h6 { margin-top: 10px; margin-bottom: 10px; font-weight:bold; } h1 { font-size: 140%; } h2 { font-size: 120%; } h3 { font-size: 110%; font-style: oblique; } p { margin-bottom: 0.75ex; } a:link, a:visited { color: #277bc0;/* #339;*/ font-weight:bolder; text-decoration:none; } a:hover { color: blue; font-weight:bolder; text-decoration:underline; } ul { list-style: square inside ; margin-bottom: 0.75ex; } table { border: thin solid #666; margin-top: 5px; margin-bottom: 10px; } table.nested { margin-left: 2em; } thead,tbody { border: thin solid #666; } td, th { margin: 0; padding: 2px 2px 2px 2px; } th { font-style: oblique; } h1.detail { } .header { width:100%; padding: 1em 10px 1em 10px; color: #fff; background: #5e87b0; font-weight: bold; text-shadow: 0 /*{b-bar-shadow-x}*/ 1px /*{b-bar-shadow-y}*/ 1px /*{b-bar-shadow-radius}*/ #3e6790 /*{b-bar-shadow-color}*/; text-align: center; font-size: 16px; display: block; text-overflow: ellipsis; overflow: hidden; white-space: nowrap; outline: 0 !important; } .inset { margin-left: 22%; } .page { padding: 10px 3% 10px 3%; } div.indent { margin-left: 2em; } div.term { margin-top: 5px; padding-left: 5px; border-top: 1px solid #DDD; font-weight: bold; } div.definition { margin-left: 5ex; } div.value { margin-left: 5ex; } div.product { background-color: white; border: thin solid #333; padding: 10px 15px 10px 15px; margin-top: 10px; } div.parameter { margin-top: 10px; padding: 5px 10px 10px 10px; border: thin dotted #333; background-color: #ebebeb; } #toc { border: thin solid #333; background-color: #F5F5F5; padding: 10px 15px 10px 15px; margin-left: 5%; margin-right: 5%; margin-bottom: 30px; } #toc ol, ul, li { padding-left: 5ex; } #toc ol { list-style-type: decimal; list-style-position: inside; } #toc ul { list-style-type: square; list-style-position: inside; } p.version { float: right; width: 100%; margin-top: 5px; text-align: right; font-size: x-small; } p.right { float: right; text-align: right; } .box-title { font-size: 120%; font-weight:bold; text-align: center; border-bottom: 1px solid #DDD; } ul.list { list-style-position: outside; padding-left: 1.5em; } li.list { text-align: left; padding-left: 0px; } .no-break { white-space: nowrap; } p.author { font-size: 120%; } div.brand { width: 100%; text-align: right; } div.abstract { display: table; position: relative; width: 100%; } div.citation { } div.access { float: left; width: 20%; background-color: white; border: thin solid #333; padding: 5px 5px 5px 5px; margin-right: 1em; } a.xml-logo:link, a.xml-logo:visited { background: #ff6600; color: #ffffff; font-weight:bolder; text-decoration:none; padding-left:2px; padding-right:2px; } a.xml-logo:hover { text-decoration:underline; } </style></head><body><div><a id="top"/></div><div class="header"><div class="middle">HPDE.io</div></div><div class="page"><div class="spase"><div class="abstract"><div class="citation "><h1><a name="spase://SMWG/Instrument/SOHO/UVCS">Ultraviolet Coronagraph Spectrometer (UVCS)</a></h1><p><div class="term">ResourceID</div><div class="definition">spase://SMWG/Instrument/SOHO/UVCS</div></p><p><div class="term">Description</div><div class="definition"><p>The primary scientific goals of the UVCS (UltraViolet Coronagraph Spectrometer) are to: (1) locate and characterize the coronal source regions of the solar wind; (2) identify and understand the dominant physical processes that accelerate the solar wind; (3) understand how the coronal plasma is heated in solar wind acceleration regions; and, (4) increase our knowledge of the coronal phenomena that control the physical properties of the solar wind as determined by in situ measurements. The UVCS is intended to determine the primary plasma parameters of the solar corona from its base to as high as 10 Re. It is expected to measure signatures of both thermal and nonthermal processes: electron temperatures, effective temperatures of protons and several minor ions; electron and ion densities of O+5, Mg+9, Si+11, and Fe+11; and flow velocities of the electron/proton plasma and of O+5, Mg+9, and Si+11. The instrument consists of an occulted telescope and a high resolution spectrometer assembly. Three off-axis telescope mirrors focus co-registered images of the extended corona onto the three entrance slits of the spectrometer assembly. The spectrometer assembly consists of three sections. One is optimized for line profile measurements of H I Lyman alpha, with a range of 114.8--128.3 nm, extendable to 113.0 nm and 130.0 nm with grating motions. A second section is optimized for line intensity measurements of O VII (103.2 nm) and is also used to observe Si XII in second order (499 and 521 nm; first order range is 93.2--106.8 nm). The third section is used to measure polarized radiance of the visible corona. A filter with a bandpass of 450.0--600.0 nm is mounted in front of a photomultiplier tube. The EUV spectrometer sections use toroidal concave diffraction gratings in Rowland circle mounts that produce stigmatic imaging at the subject wavelengths. There are entrance slit changing mechanisms on each spectrometer. The detectors for the EUV are multi-anode microchannel arrays, each with 360 x 1024 pixels on 0.025 mm centers. The instantaneous field of view (FOV) of the instrument is the portion of the solar image that passes through the spectrometer entrance slits. Internal mirror motions are used to step the instantaneous FOV across the 141' x 40' FOV defined by the entrance aperture. Offset pointing adjustments can be used to extend the FOV for EUV measurements down to the solar limb, and also onto the solar disk for measurements of absolute spectral line intensities and positions. The UVCS can rotate its FOV about the sun-center to observe any segment of the corona within 10 solar radii. Twelve rotations of 30 degrees would build up a spectroscopic description of the full corona out to 5 solar radii, with additional data out to 10 solar radii. This information was taken from the article ``UVCS - the Ultraviolet Coronagraph Spectrometer for SOHO,'' by J. L. Kohl and G. Noci (Proceedings of the First SOHO Workshop, ESA SP-348, pp. 23-26, November 1992).</p> </div></p></div></div><div><p class="right"><a target="_blank" href="UVCS.xml">View XML</a> | <a target="_blank" href="UVCS.json">View JSON</a> | <a target="_blank" href="http://xmleditor.spase-group.org/?edit=https://hpde.io/SMWG/Instrument/SOHO/UVCS.xml">Edit</a></p><h1 class="detail">Details</h1></div><div><div class="product"><p class="version">Version:2.0.0</p><h1>Instrument</h1><div class="term">ResourceID</div><div class="definition">spase://SMWG/Instrument/SOHO/UVCS</div><div class="term">ResourceHeader</div><div class="definition"><div class="term">ResourceName</div><div class="definition">Ultraviolet Coronagraph Spectrometer (UVCS)</div><div class="term">AlternateName</div><div class="definition">UVCS</div><div class="term">ReleaseDate</div><div class="definition">2019-05-05 12:34:56Z</div><div class="term">Description</div><div class="definition"><p>The primary scientific goals of the UVCS (UltraViolet Coronagraph Spectrometer) are to: (1) locate and characterize the coronal source regions of the solar wind; (2) identify and understand the dominant physical processes that accelerate the solar wind; (3) understand how the coronal plasma is heated in solar wind acceleration regions; and, (4) increase our knowledge of the coronal phenomena that control the physical properties of the solar wind as determined by in situ measurements. The UVCS is intended to determine the primary plasma parameters of the solar corona from its base to as high as 10 Re. It is expected to measure signatures of both thermal and nonthermal processes: electron temperatures, effective temperatures of protons and several minor ions; electron and ion densities of O+5, Mg+9, Si+11, and Fe+11; and flow velocities of the electron/proton plasma and of O+5, Mg+9, and Si+11. The instrument consists of an occulted telescope and a high resolution spectrometer assembly. Three off-axis telescope mirrors focus co-registered images of the extended corona onto the three entrance slits of the spectrometer assembly. The spectrometer assembly consists of three sections. One is optimized for line profile measurements of H I Lyman alpha, with a range of 114.8--128.3 nm, extendable to 113.0 nm and 130.0 nm with grating motions. A second section is optimized for line intensity measurements of O VII (103.2 nm) and is also used to observe Si XII in second order (499 and 521 nm; first order range is 93.2--106.8 nm). The third section is used to measure polarized radiance of the visible corona. A filter with a bandpass of 450.0--600.0 nm is mounted in front of a photomultiplier tube. The EUV spectrometer sections use toroidal concave diffraction gratings in Rowland circle mounts that produce stigmatic imaging at the subject wavelengths. There are entrance slit changing mechanisms on each spectrometer. The detectors for the EUV are multi-anode microchannel arrays, each with 360 x 1024 pixels on 0.025 mm centers. The instantaneous field of view (FOV) of the instrument is the portion of the solar image that passes through the spectrometer entrance slits. Internal mirror motions are used to step the instantaneous FOV across the 141' x 40' FOV defined by the entrance aperture. Offset pointing adjustments can be used to extend the FOV for EUV measurements down to the solar limb, and also onto the solar disk for measurements of absolute spectral line intensities and positions. The UVCS can rotate its FOV about the sun-center to observe any segment of the corona within 10 solar radii. Twelve rotations of 30 degrees would build up a spectroscopic description of the full corona out to 5 solar radii, with additional data out to 10 solar radii. This information was taken from the article ``UVCS - the Ultraviolet Coronagraph Spectrometer for SOHO,'' by J. L. Kohl and G. Noci (Proceedings of the First SOHO Workshop, ESA SP-348, pp. 23-26, November 1992).</p> </div><div class="term">Contacts</div><dd><table class="nested" cellspacing="0"><tr><th/><th class="center">Role</th><th class="center">Person</th></tr><tbody><tr><td>1.</td><td>PrincipalInvestigator</td><td><a target="_blank" href="https://hpde.io/SMWG/Person/John.L.Kohl.html">spase://SMWG/Person/John.L.Kohl</a></td></tr><tr><td>2.</td><td>PrincipalInvestigator</td><td><a target="_blank" href="https://hpde.io/SMWG/Person/J.Leonard.Culhane.html">spase://SMWG/Person/J.Leonard.Culhane</a></td></tr></tbody></table></dd><div class="term">InformationURL</div><div class="definition"><div class="term">Name</div><div class="definition">NSSDC's Master Catalog</div><div class="term">URL</div><div class="definition"><a target="_blank" href="https://nssdc.gsfc.nasa.gov/nmc/experiment/display.action?id=1995-065A&amp;ex=4">https://nssdc.gsfc.nasa.gov/nmc/experiment/display.action?id=1995-065A&amp;ex=4</a></div><div class="term">Description</div><div class="definition"><p>Information about the Ultraviolet Coronagraph Spectrometer (UVCS) experiment on the SOHO mission.</p> </div></div></div><div class="term">InstrumentType</div><div class="definition">Spectrometer</div><div class="term">InvestigationName</div><div class="definition">Ultraviolet Coronagraph Spectrometer (UVCS) on SOHO</div><div class="term">ObservatoryID</div><div class="definition"><a href="https://hpde.io/SMWG/Observatory/SOHO.html">spase://SMWG/Observatory/SOHO</a></div></div></div></div></div></body></html>
the_stack
{'hexsha': '5c506cc97345a4d3236cb1847581bee10917a81a', 'size': '18862', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'SMWG/Instrument/SOHO/UVCS.html', 'max_stars_repo_name': 'hpde/hpde.io', 'max_stars_repo_head_hexsha': 'c0db55ec7731899999e1012f0df8746a585298b9', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '4', 'max_stars_repo_stars_event_min_datetime': '2020-12-18T03:46:44.000Z', 'max_stars_repo_stars_event_max_datetime': '2021-01-06T02:49:30.000Z', 'max_issues_repo_path': 'SMWG/Instrument/SOHO/UVCS.html', 'max_issues_repo_name': 'renyon/hpde.io', 'max_issues_repo_head_hexsha': '01e1f61f4d458e6dd8d66c7334acd44d40170c48', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'SMWG/Instrument/SOHO/UVCS.html', 'max_forks_repo_name': 'renyon/hpde.io', 'max_forks_repo_head_hexsha': '01e1f61f4d458e6dd8d66c7334acd44d40170c48', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '2', 'max_forks_repo_forks_event_min_datetime': '2021-01-04T07:50:14.000Z', 'max_forks_repo_forks_event_max_datetime': '2021-03-30T14:29:55.000Z', 'avg_line_length': '70.9097744361', 'max_line_length': '3731', 'alphanum_fraction': '0.7552221398', 'original_id': 'c55c1ebea8476dc47aeaf1e49508709dc6be643ed803702678a986e0d9ef71e2'}
To XP or not to XP? Microsoft is readying its next operating system for the shelves. It may be the latest, but is it the greatest? Danny Bradbury... Microsoft is readying its next operating system for the shelves. It may be the latest, but is it the greatest? Danny Bradbury looks inside the box What is Windows XP? Windows XP is the latest version of the Microsoft operating system. It's going to ship in both Home and Professional editions for desktop PCs in October, with a server version later next year. The server version is codenamed Microsoft .Net Server - only client products carry the XP moniker. Another upgrade, already? Of course. Microsoft operating systems are like London buses - there's always another one just around the corner. Also, much like London buses, previous versions of Windows aimed at home users and based on the old DOS operating system tended to be a bit slow, and break down a lot. The latest version of the operating system, due to ship in October, will hopefully change that because both the Home and the Professional editions are based on the Windows 2000 kernel, which is much more stable than the old Windows 9x kernel. In short, if you were using Windows 98 before, your PC won't crash as much. What new features will be relevant to me? The main new feature that will be relevant to e-commerce providers is the ability for the operating system to connect with .Net services. Microsoft's overriding strategy is .Net and the company is betting its entire future on it. Essentially, Web services enable you to access facilities over the Internet as if they were on your desktop, so you can do things like save files to Internet sites, store and manipulate photographs online using software located on a server, and manage your calendar remotely. How does Windows XP hook into .Net? Specifically, it enables you to sign into Passport, which is Microsoft's single sign-on security system, at log-on. You can sign on to Passport manually through a Web browser using other operating systems, but because Passport is the entryway to all .Net-enabled services, doing it when you first log on to Windows makes the whole thing easier. Microsoft will be folding in-house and third party .Net services developed under its Hailstorm programme into its Passport service in the next 18 months. Smart companies will develop chargeable services accessible online in this way. Anything else I need to know? Another thing which is going to be big is the Windows Messenger program. Previously, Microsoft's instant messaging program (MSN Messenger) and its video conferencing system (Netmeeting) have been separate, and executives admit that Netmeeting was difficult to use. The new system folds them into one client that you can use to access your contacts and speak to them in a video session. This provides interesting opportunities for e-commerce players, who may finally be able to offer easy-to-use video links with their customers. In the long term, Microsoft is working on back-end software that can be used to message its clients automatically, based on certain events taking place. If your database shows that a product ordered by a customer has arrived, for example, it could be programmed to message them automatically. Few people have caught onto this yet, but in 18 months or so, more companies will be actively exploring it. I hear that you can only install it on one machine, so you can't upgrade your PC and install it again. This isn't entirely true. There is an activation feature designed to stop people casually copying the software. It works by taking a snapshot of some of the key hardware characteristics of your machine when it is installed. When you start to use the system, you have to activate it by connecting to a central site, which keeps a record of your system configuration. If any future attempt is made to activate it from a substantially different machine, the customer must call the activation centre to get a new code. How will my skills base be affected if I move to .Net server? Microsoft has started introducing exams in its Microsoft Certified Systems Engineer (MCSE) course aimed specifically at XP and will likely introduce more in the future. For now, it says that IT professionals can continue to study for Windows 2000-based certification, because XP is based on this technology. Nevertheless, XP certification gives professionals more kudos, and it seems likely that the emphasis will eventually switch to Windows XP/.Net Server certification. You'll need to make the transition at some stage if you upgrade. What about smart tags? This feature in Internet Explorer 6 (the default browser with XP) intercepted key words on websites and modified them to display its own hyperlinks to relevant websites. Some content providers objected to this, seeing it as a means of hijacking their websites. It was removed, and while Microsoft executives say they would like to re-introduce it at some point if the objections can be overcome, it isn't likely to happen in the foreseeable future. This was first published in October 2001 Read more on Business applications Forgot Password? Your password has been sent to: • Dissecting the Hack • Digital Identity Management • Becoming a Global Chief Security Executive Officer
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '60', 'language_id_whole_page_fasttext': "{'en': 0.941009759902954}", 'metadata': "{'Content-Length': '118676', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GFCFPWRRYIILVZFJXZPZJCLN6QD3PWMT', 'WARC-Concurrent-To': '<urn:uuid:54c07982-4602-491a-9da2-535e65795dc1>', 'WARC-Date': datetime.datetime(2016, 7, 30, 3, 44, 23), 'WARC-IP-Address': '206.19.49.154', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:PIHOTPJSNVOITQL3LQ4V5OTKFBPTH6B2', 'WARC-Record-ID': '<urn:uuid:2e9acb1f-5adb-483b-ad17-4c82e9777e7d>', 'WARC-Target-URI': 'http://www.computerweekly.com/feature/To-XP-or-not-to-XP', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2195499f-7f8f-401e-b031-32c6a682eb09>', 'WARC-Truncated': 'length'}", 'previous_word_count': '959', 'url': 'http://www.computerweekly.com/feature/To-XP-or-not-to-XP', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024523138999938965', 'original_id': '074e288f649fa4efb12f4fdc7fbbd7a34dc3dece88a24dac5cc2c35555fbcb60'}
Kenpachi Manga Wallpaper No view How to make Kenpachi manga wallpaper%A Making an anime is not any simple job. It’s a whole procedure for building and illustrating a global, finding motivations, weaving reports – this is a significant undertaking! However, it’s also a great exercise in ingenuity. If you’re interested in anime you will most probably really enjoy making your own. Method 1 : Outlining a World Figure out where you want your report to be place. Is it going to be on an alien globe? Is it heading to be on a location that is relatively much like places on earth? You don’t need to figure out everything about the whole world, but you do need to determine where you want your report to occur. For example, maybe you want the major action of your storyline that occurs in a world where most people live in caves because beyond caves there are a ton of dangerous slime pits you could fall into. Find the interesting reasons for having your world. Like slime pits! Animes often have parts of their world that are just a little magical or peculiar in some way. Maybe pianos converse and give people a lot of advice. Maybe there are flying beasts that folks use to get from location to place. It generally does not have to be something incredibly fantastical or something out of the science fiction book – just pick something that works together with your world and your story. For instance, the magic of the world is actually a simple folk tale that could or might not exactly be true. Maybe on the slime pit world there is a storyline that if you get caught in a slime pit and survive you’ll be granted special forces but nobody is aware if this is true or not. Decide the scientific advancement of the world. Are the residents of your world living in apartment complexes or in real wood huts? Are they trying to find their food, or can they go out to dinner are restaurants? Definitely there are always a ton of other prospects among and beyond these examples. The technological position of your world will advise a lot of the ways that your characters connect to the problems that face them. For instance if someone falls into a slime pit in a scientific advanced world, maybe it’s no big offer because everyone would wear anti-slime suits. • Best Zaraki Kenpachi Images On Pinterest Bleach BLEACH zaraki kenpachi bleach anime manga. ZARAKI KENPACHI. Zerochan anime image gallery for Zaraki Kenpachi, Wallpaper. Zaraki Kenpachi’s love of fighting Bleach The Headless Star Online For all of you Bleach Fans out there wondering. Here’s is my formation and how I use it.. Method 2 : Creating Characters Decide on what they look like and their personalities. You should try to choose what they look like at exactly the same time that you decide their personalities. Try drawing the individuals and then jotting down beside them what their personality attributes would be. Perhaps you have one identity that is absolutely wise and perceptive but prone to sacrificing their temper. Perhaps you have another identity that is very faithful but very unkind to strangers. Sketch drafts of your people. The way the personas look is important since it can play into their personality. For instance, maybe the muscular character is the hero. Conversely, maybe the muscular identity is a total coward. Either way, his body informs his personality in an interesting way. Decide on a protagonist. You don’t have to have just one main personality, but it’s nice to give the reader somebody to underlying for. Most anime have a protagonist. Consider providing them with special skills. Anime often feature individuals with special skills accomplishing remarkable things. It could be a good idea to give your main character some kind of power that will assist her or him package with whatever the situation in your anime is going to be. Your character doesn’t have to be able to soar or have ultra power – find something small and interesting that helps the type deal with original challenges. For example, maybe your identity is incredibly brave! That’s a special capacity, but it isn’t magic. Create relationships between the characters. Family, love passions and friends of your protagonist should all play a significant role in your tale. These are the strongest relationships that individuals have with others plus they help motivate, encourage, and create issue. All those things are positive capabilities in a great story. Figure out each characters drive. The other individuals can play into your characters inspiration, but find a distinctive thing that drives them. It can be getting educated or getting the lady, it just must be something that the protagonist is very passionate about. Bleachmanga Bleach Manga Kenpachi Zaraki X Wallpaper Bleachmanga Bleach Manga Kenpachi Zaraki X Wallpaper X Bleach Zaraki Kenpachi Zangetsu Swords Wallpaper X Wallpaperup X Bleach Zaraki Kenpachi Zangetsu Swords Wallpaper X Wallpaperup Kenpachi Zaraki Kenpachi Zaraki Hd Wallpaper Background Image Id Hd Wallpaper Background Image Id Zaraki Kenpachi Bankai Wallpaper Zaraki Kenpachi Bankai Wallpaper X X Zaraki Kenpachi Zaraki Kenpachi Wallpaper X X Zaraki Kenpachi Zaraki Kenpachi Wallpaper Method 3 : Beginning to Animate Your Anime Start by attracting your world in an animation program. You’ll find many free web animation programs online that allow you to easily create a world and identity. You’ve already made a decision what you want the world the look like, so now you merely need to bring it to life. Take your time and don’t worry if it changes from your original plan. Draw your personas. Make your personas in the same computer animation program. Make reference to the drawings and sketches that you have already done in order to inform your final product. Draw your character types interacting with the entire world. Now all you have to do is incorporate the individuals and the globe. This may immediately commence to give you ideas for testimonies and potential storyline lines to follow. Maybe your individuals want to explore those considerable cliffs out in the distance they have never gone to before. Maybe the sun gets dimmer and dimmer every day and they have to determine what is going on. The environment can be a huge impetus in virtually any account, and anime is not any different. For instance, maybe your world has gigantic slime pits all over the place. Maybe your primary characters little brother falls into one of these slime pits and the other individuals have to determine a way to save him. You now have the start of a plot! Method 4 : Incorporating Story and Dialogue Incorporate dialogue that complements the desire and personalities of the individuals. Once you have characters and a world you could start turning the character types interacting with the planet into a story. This involves creating dialogue. Use dialogue that fits the situation and the type. Make an effort to make the dialogue as practical as possible. Think about the way you discuss and create conversations like that. Discussions are hardly ever 100 % aimed. They sway and change subject constantly. Find out ways to add authenticity, and laughter to your dialogue. Ensure that you have a newbie, midsection, and end. The start, middle, and end doesn’t have to be incredibly distinctive, but keeping this group in mind will help you map out your plot. Take a look at other classic catalogs and begin to figure out what the beginning middle and end of those stories are. For example, maybe the start of your anime gets the protagonist’s little sibling dropping in a slime pit. The center could be when your protagonist deciding to visit alone into the slime pit putting on an anti-slime suit to try to find his little sibling. The end would be the thrilling conclusion where in fact the slime demons living in the slime pit allow only one of the brothers to leave, as well as your protagonist continues to be behind so that his little sibling can go home. Include a identity arc. Figure arcs don’t need to be really simplistic and dull. Not every account has to begin with a miserable persona and end with a happy identity. Rather, a persona arc should allow the main character to undergo some sort of minor change or come to a realization. Although that realization is the fact that nothing transformed from when the storyline began, that still provides a dimension to the storyline. What you don’t want is your persona just running around doing assorted activities without the chain of reasoning. For instance, maybe your protagonist is selfish at the beginning of the story but after assisting save his sibling he starts to realize that he really does care about other people but that he was shutting himself off to the globe. Now you can treat why he was shutting himself off to the entire world within the next episode. • Image Result For Kenpachi Manga Wallpapera Method 5 : Concluding Your Anime Think of a good name. The title is what attracts people’s attention. Make sure the subject has something to do with the plot. Decide if you would like your anime to be one report or a string. This may determine how your history ends, or if it ends whatsoever. If you’d like your stories to be always a series then you have to figure out a way to keep people interested. If everyone is satisfied with the way the first story concluded, then there is absolutely no reason behind them to view your next occurrence. Create cliffhangers. Add an exciting climax and conclusion. This is a big part of fabricating a cliffhanger. If you’re making multiple shows you want to balance the brand between concluding the prior episode and arranging the next tv show up. They shouldn’t feel like they watched the first tv show for nothing, but the viewer also needs to be thrilled to see what happens next. Find this balance. Connect the knots in your history. If there was a love interest at the beginning of the storyline, there must be some acknowledgement of that at the end of the story. Not everything needs to tie up beautifully, but you want your anime to look well designed and professional. If you have a couple of untied account lines it feels messy. Related Search 1. author Mr WordPress4 years ago Hi, this is a comment. 2. author Admin4 years ago Great design brow!!! 3. author Admin4 years ago Nice work! 4. author Admin4 years ago Great villa, i love it.. 🙂 5. author Admin4 years ago Great car brow.. 🙂 • author Admin4 years ago Example reply comments. 😀 6. author niar3 months ago yg ini boleh juga 👍 • author Anime3 months ago ありがとうございました 🙂
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.9352736473083496}", 'metadata': "{'Content-Length': '59603', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:INM3K4B2OJ3FZ35ZUBGYDPYZNUMO566D', 'WARC-Concurrent-To': '<urn:uuid:5a54cca6-ee63-4acf-bed1-3ac9044e751d>', 'WARC-Date': datetime.datetime(2018, 10, 16, 23, 15, 15), 'WARC-IP-Address': '145.14.144.139', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:GGNLTJX4CJ6ALUM5BT7UPAXVQEOMU2IP', 'WARC-Record-ID': '<urn:uuid:021f9c00-5c9f-44b4-9305-59804d295076>', 'WARC-Target-URI': 'https://despised-radius.000webhostapp.com/kenpachi-manga-wallpaper%0A.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:39151393-8cad-4d88-b737-0a706d6bae98>', 'WARC-Truncated': None}", 'previous_word_count': '1823', 'url': 'https://despised-radius.000webhostapp.com/kenpachi-manga-wallpaper%0A.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-111-247-49.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03179657459259033', 'original_id': 'edd4e1fb5d0dcaa657ab486ca3d06b63a8e1deb6e90295b26390e2dace3bfb6b'}
Knowing the CRNA Salary and CNRA Roles in the Medical Field In the world today, many registered nurses are required to have the certification and the skill to be an anesthetist too. In fact, it is beneficial for many nurses because they do not need to call for an anesthesiologist in cases that need immediate dose of anesthesia. Written in this article is a quick overview of the Certified Registered Nurse Anesthetist or CRNA Salary and their roles as professionals in the medical field. Salary Range of CRNA’s and CRNA Locum Tenens Given by high levels of responsibility that a certified registered nurse anesthetist or CNRA needs to handle, they also are the ones who are paid the highest amount of salary. In the year 2009, a CRNA salary survey was conducted and it was said that the average yearly pay of CRNA’s is $190,000. In line with this, their starting salary ranges from $111,000 to $130,000 in a yearly basis. It is also based on the place where the CRNA is working plus the level of promotions they get. At times that a CRNA cannot report on his or her workplace, CRNA Locum Tenens can fulfill their job temporarily at a healthcare facility. Usually, CRNA Locum Tenens work at hospitals that need to fill-in the needs for personnel that permanent CRNAs cannot cover. There are no fixed salaries for Locum Tenens in the medical field. The healthcare facilities give them an hourly rate that varies from different locations. Compared to a full time position, the hourly rate of Locum Tenens is a bit higher but they cannot get the total hours they want. Roles of CRNA in the Medical Field The efficient service of a certified registered nurse anesthetist or CNRA is really needed in the healthcare industry nowadays. They are the ones who are there to take full responsibility of anesthesia needs of patients before a surgery, during a surgery, after a surgery and even throughout the whole process of a surgery. CRNAís are good in communicating with the patient and the families. Assessing the state of every patient and consulting family members are their forte. Certified nurse anesthetists are the ones who prepare the place to where the delivery of anesthetic is conducted. The lives and security of the patient lies in their hands as they maintain and administer their patients until they can recover from anesthesia. One of the most important roles of a certified registered nurse anesthetist or CNRA is to follow the whole postoperative course of the patient. Through this, a 24 hour monitoring will be given by the CRNAís depending on the need of the patient in ensuring that all of their patients receive high levels of care. Given above are the roles of CRNA’s in the society. Their medical profession is vital in helping every individual who needs to have medical attention. Also, this article tackled about their salaries in a yearly total which shows that their level of expertise is on top, similar to what high ranking medical staffs like surgeons and physicians whose focus is to provide complete medical recovery to their valued patients.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9733434319496156}", 'metadata': "{'Content-Length': '20667', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OMFZ726Z7OSHUGHIDE5MEW5YL7GOTSGM', 'WARC-Concurrent-To': '<urn:uuid:4fc0a1c2-c4a1-4fa0-95b3-8b0a843524db>', 'WARC-Date': datetime.datetime(2019, 11, 22, 21, 1, 18), 'WARC-IP-Address': '172.96.186.222', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BLC4EHEJEAMLPJHBKCDXFAY55LPZ2BSJ', 'WARC-Record-ID': '<urn:uuid:99a25224-db95-4fe9-802f-d383454a3955>', 'WARC-Target-URI': 'http://doorswideshut.com/knowing-the-crna-salary-and-cnra-roles-in-the-medical-field/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:74fc9991-1ba4-41ee-8083-93babb4f2b8f>', 'WARC-Truncated': None}", 'previous_word_count': '521', 'url': 'http://doorswideshut.com/knowing-the-crna-salary-and-cnra-roles-in-the-medical-field/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-5.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07460922002792358', 'original_id': '20242ce6480cc466aad7906672b1a3ad678a0a4fdc14897d72589c53a38ec4e4'}
The most recent snapshot, 20170703, had two packages. It updated the Linux Kernel to 4.11.8, which fixed ldisc crash on reopened tty. Kernel 4.11.7 was updated earlier in the week in snapshot 20170628 and had multiple insertions and deletions. Snapshot 20170703 also delivered nano 2.8.5 and now avoids some flickering when resizing the screen while in the file browser. Snapshot 20170702 brought much of the Plasma 5.10.3 packages that include feature refinements and new modules to complete the desktop experience; the release also Introduced KDE_NO_GLOBAL_MENU env variable to disable global menu, which allows the run of specific Qt applications with global menu disabled in case of issues. Besides the KDE packages, yast2 3.2.40 added support for the new Expert Partitioner and yast2-apparmor 3.2.1 fixed the name of apparmorsystemd service. The care and thoroughness of making GNU Compiler Collection 7 the default compiler for openSUSE Tumbleweed produced a gradual decrease in snapshots over the past month, but it looks like snapshots of the rolling release are beginning to pick up the pace. The four snapshots released this week aligns much to closer to upstream development and releases of GNOME, KDE, QEMU and Mesa top the list of this week’s new packages in Tumbleweed. The newest snapshot, 20170605, saw a patch added for grub2 that fixed page fault exception when grub loads with NVIDIA cards and the libgcrypt 1.7.7 update made the noteworthy fix of a possible timing attack on EdDSA session key, which was previously patched. Nano 2.8.4 also improved PHP syntax highlighting in the snapshot. Both Mozilla Thunderbird received changes to optimize and enhance compatibility with GCC 7 in the 20170604 snapshot with 64-bit. Expect 32-bit to come soon. QEMU 2.9.0 fixed several Common Vulnerabilities and Exposures (CVE) and improved support for several architectures and virtualization. Snapshot 20170604 also fixed some minor vulnerabilities like CVE-2017-9351 with Wireshark’s 2.2.7 version update and sudo 1.8.20 fixed CVE-2017-1000367.
mini_pile
{'original_id': '807239405009f52b07ce15b6ccde3f7b396cd0839df07162499bf1ebbf39a3b3'}
<!DOCTYPE HTML 4.0 TRANSITIONAL PUBLIC "_//w3c//dtd html 4.0//en"> <HTML> <HEAD> <LINK REL=STYLESHEET TYPE="TEXT/CSS" HREF="STYLES.CSS"> <TITLE> HTML Tutorial </TITLE> </HEAD> <body class="MIC"> <H1> BODY </H1> This is the Tag in which the actual HTML coding takes place. All the contents of the page are contained in this tag. All the part of the document visible to the user including the text, graphics are included in this tag. User only sees the content in the body tag. This is a Container Tag and thus has to be closed. Text / Tags Written in the <SPAN CLASS= INTRO> BODY </SPAN> Tag is displayed on the Browser Window. <H2> Syntax </H2> <BR> <SPAN CLASS= INTRO> &LT;HTML&GT; </SPAN> <BR> <SPAN CLASS= INTRO> &LT;HEAD&GT; </SPAN> <BR> ... <BR> ... <BR> ... <BR> <SPAN CLASS= INTRO> &LT;/HEAD&GT; </SPAN> <BR> <SPAN CLASS= MAIN> &LT;BODY&GT; </SPAN> <BR> ... <BR> ... <BR> <SPAN CLASS= MAIN> &LT;/BODY&GT; </SPAN> <BR> <SPAN CLASS= INTRO> &LT;/HTML&GT; </SPAN> <BR> <BR> <BR> <A HREF=" INTRO.HTM" TITLE="HTML Tutorial Home-Introduction to HTML"> Home </A> <BR> <A HREF=" ABOUT.HTM" TITLE="About HTML Tutorial"> About </A> </BODY> </HTML>
the_stack
{'hexsha': '815eca0703346d6a70bdf5e9957de1e04520d728', 'size': '1216', 'ext': 'htm', 'lang': 'HTML', 'max_stars_repo_path': 'Body.htm', 'max_stars_repo_name': 'theghostofc/HTML-Tutorial', 'max_stars_repo_head_hexsha': '66aadb9febb699fc162712e8b7c013d215878966', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'Body.htm', 'max_issues_repo_name': 'theghostofc/HTML-Tutorial', 'max_issues_repo_head_hexsha': '66aadb9febb699fc162712e8b7c013d215878966', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Body.htm', 'max_forks_repo_name': 'theghostofc/HTML-Tutorial', 'max_forks_repo_head_hexsha': '66aadb9febb699fc162712e8b7c013d215878966', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '25.8723404255', 'max_line_length': '80', 'alphanum_fraction': '0.6274671053', 'original_id': '72ddbfe1ee2badd9d688a452a9e44cb6e9bd300bc3304286173335e1e0c15fe9'}
conventionDeclaration detailLevel A.H. Hovey conventionDeclaration The history of the North-West Rebellion of 1885. Comprising a full and impartial account of the origin and progress of the war, of the various engagements with the Indians and half-breeds, of the heroic deeds performed by officers and men, and of touchin 1886-01-01 1886-12-31
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '27', 'language_id_whole_page_fasttext': "{'en': 0.9052296876907348}", 'metadata': "{'Content-Length': '1936', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZYCZ4GLR7EHXEABTTTFEWOD2YYGLG6PE', 'WARC-Concurrent-To': '<urn:uuid:8bfcf8a3-9925-44e0-9e2a-232d0e084e63>', 'WARC-Date': datetime.datetime(2019, 3, 22, 23, 5, 42), 'WARC-IP-Address': '199.175.219.108', 'WARC-Identified-Payload-Type': 'application/xml', 'WARC-Payload-Digest': 'sha1:JBUL7EKLCE36EPG2YGJEHY2WTFEH3DGY', 'WARC-Record-ID': '<urn:uuid:632c795d-4c6f-41f3-a935-49b64ff729f1>', 'WARC-Target-URI': 'https://searcharchives.vancouver.ca/h-hovey;eac?sf_format=xml', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:df500fb0-ad0e-49da-8070-054a0d4a4354>', 'WARC-Truncated': None}", 'previous_word_count': '51', 'url': 'https://searcharchives.vancouver.ca/h-hovey;eac?sf_format=xml', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-93-171-178.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.020118534564971924', 'original_id': 'ba094a0b07ff8c3ce4f0f438b5d2e5f64c55e6f00965627b20850f6ae4f85d48'}
Criminal Cases The following information is intended to help you with many of the most commonly asked questions that the Court receives regarding criminal cases. What is an arraignment? The arraignment is generally your first appearance in court on the citation or charge. The Judge will inform you of, and explain the charge. Next it will be confirmed that you understand your constitutional rights. Lastly, the maximum punishment and mandatory minimum punishment, if any, will be stated. No testimony is taken or evidence is presented at this hearing. What are my Constitutional Rights? All persons accused of any crime or traffic offense that might result in a jail sentence have the following rights: • To have a lawyer present with you at all hearings; • To have a lawyer appointed at public expense if you cannot afford to hire one to represent you; • To represent yourself without a lawyer; • To a public and speedy trial; • To cross examine any witness who testifies against you; • To call witnesses to testify on your behalf, and have the Court compel their attendance; • To testify or not testify yourself; if you choose not to. (No one can make you testify); • To appeal to Superior Court if you are convicted after a not guilty plea. After informing you of all these matters you will be asked by the Judge to enter a plea of guilty or not guilty. Should I talk to a lawyer before entering a plea? In many cases this is a good idea. The Judge, at your request, will continue the arraignment. If you wish to plead not guilty at this stage, the Judge will request that you have your lawyer file a Notice of Appearance. If at any hearing you fail to appear, your bond or bail will be forfeited and the Judge may issue a bench warrant. If I am financially unable to hire a lawyer, how do I qualify for a Public Defender? At the arraignment or any point in the pre-trial proceedings you may indicate to the Judge that you are unable financially to hire a lawyer. The Judge will have you complete an Application for Public Defender. If a public defender is granted you will be given contact information. Public Defense Services Hearing Time The criminal calendar is held each Thursday beginning at 8:30 a.m.  What will happen if I plead Guilty? If you plead guilty it means you admit the charge and the elements to prove the charge. By pleading guilty you waive your constitutional rights and in most cases you will be sentenced right then. However, you may speak on your behalf at sentencing. What will happen if I plead Not Guilty? A not guilty plea denies the charge and none of your constitutional rights are waived unless you expressly wish to do so. You are presumed innocent and the prosecution must prove your guilt beyond a reasonable doubt at a subsequent trial. The next hearing will be a pre-trial conference where the prosecutor will be present. You and your lawyer, if you have one, are required to be present. Motions are heard and a jury trial date is set during this pre-trial process. Information about all the evidence in the case and witness names is exchanged. What should I wear and how should I act in Court? Suitable attire is required. Shoes and shirts are necessary. Halter-tops, tank tops, and shorts are not permitted. Hats are to be removed upon entering the Courtroom. No smoking, food, gum, cell phones, pagers, or drink will be allowed. Children may be present in the Courtroom, but if they disturb the proceedings you may be requested to remove them. You will need to check-in at the Court Reception upon your arrival. There will be a few necessary court forms to be completed by you prior to approaching the bench. When your case is called come forward to the podium with your completed forms.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.943838596343994}", 'metadata': "{'Content-Length': '92302', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KAZVFXFKQ3UR4XP4P2UHNL2TVQ4PH7LM', 'WARC-Concurrent-To': '<urn:uuid:73d45e6c-40c0-4503-a548-06b5f2469e40>', 'WARC-Date': datetime.datetime(2022, 12, 8, 8, 52, 11), 'WARC-IP-Address': '208.90.188.169', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RSK2NWQCI6XK6CNU2WKLNJEW3C7OCJFO', 'WARC-Record-ID': '<urn:uuid:aeb21942-638c-4cba-9df2-1dbe27aa2396>', 'WARC-Target-URI': 'https://www.cityofbg.org/194/Criminal-Cases', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3c08e389-ffe0-4987-af3f-e6b42922bdf0>', 'WARC-Truncated': None}", 'previous_word_count': '652', 'url': 'https://www.cityofbg.org/194/Criminal-Cases', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-146\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025202274322509766', 'original_id': '5273e8fa5cc21820ef5cd4976020a260adb48b395828aa96d69d6fafd34f5e1e'}
Voluntary Philanthropy Lets face it…everyone has to die some day. No way around it. Most of us, when we go, want to leave as much of a Legacy for our families as we can. Much of my work with clients focuses on that idea. But no matter what we do there is always some sort of tax. Money that Uncle Sam takes and uses as he sees fit. I call that “involuntary philanthropy”. That is because there are other ways we can take control of taxes and minimize them and we can do that best by incorporating the use of a charity. Rather than letting Uncle Sam decide what to do with the money, why not voluntarily set up a program so that money will go to the charity of our choice? Voluntary Philanthropy. Life insurance can be an excellent tool for that type of charitable giving. Not only does life insurance allow you to make a substantial gift to charity at relatively little cost to you, but you may also benefit from tax rules that apply to gifts of life insurance. Why use life insurance for charitable giving? Life insurance allows you to make a much larger gift to charity than you might otherwise be able to afford. Although the cost to you (your premiums) is relatively small, the amount the charity will receive (the death benefit) can be quite substantial. As long as you continue to pay the premiums on the life insurance policy, the charity is guaranteed to receive the proceeds of the policy when you die. Since life insurance proceeds paid to a charity are not subject to income and estate taxes, probate costs, and other expenses, the charity can count on receiving 100 percent of your gift. Giving life insurance to charity also has certain income tax benefits. Depending on how you structure your gift, you may be able to take an income tax deduction equal to your basis in the policy or its fair market value (FMV), and you may be able to deduct the premiums you pay for the policy on your annual income tax return. When an insurance contract is transferred to a charity, the donor’s income tax charitable deduction is based on the lesser of FMV or adjusted cost basis. What are the disadvantages of using life insurance for charitable giving? Ways to give life insurance to charity The simplest way to use life insurance to give to a charity is to name a charity to receive the benefits of your life insurance policy. You, as owner of the policy, simply designate the charity as beneficiary. Designating the charity as beneficiary may allow you to make a larger gift than you could otherwise afford. If the policy is a form of cash value life insurance, you still have access to the cash value of the policy during your lifetime. However, this type of charitable gift does not provide many of the income tax benefits of charitable giving, because you retain control of the policy during your life. When you die, the proceeds are included in your gross estate, although the full amount of the proceeds payable to the charity can be deducted from your gross estate. Another alternative is to donate an existing life insurance policy to charity. To do this, you must assign all rights in the policy to the charity. You must also deliver the policy itself to the charity. By doing this, you give up all control of the life insurance policy forever. This strategy provides the full tax advantages of charitable giving because the transfer of ownership is irrevocable. You may be able to take an income tax deduction equal to the lesser of your adjusted cost basis or FMV. The policy is not included in your gross estate when you die, unless you die within three years of the transfer. In this case, your estate would get an offsetting charitable deduction. A creative way to use life insurance to donate to a charity is simply for the charity to insure you. To use this strategy, you would allow the charity to purchase an insurance policy on your life. You would make annual tax-deductible gifts to the charity in an amount equal to the premium, and the charity would pay the premium to the insurance company. One final method is to use a life insurance policy in conjunction with a charitable remainder trust. This strategy is relatively complex (it will require an attorney to set up), but it provides greater advantages than other, simpler methods. You set up a charitable remainder trust and transfer ownership of other, income-producing assets to the trust. The income beneficiary of the trust (you or whomever you designate) will get the income from the assets in the trust. At the end of the trust term (which might be a certain number of years or upon the occurrence of a certain event, such as your death), the property in the trust would pass to the charity. You’ll receive a current tax deduction when you establish the trust for the FMV of the gifted assets, reduced according to a formula determined by the IRS. Life insurance can then be purchased (usually inside an irrevocable life insurance trust to keep the proceeds out of your estate) to replace the assets that went to the charity instead of to your heirs. About Jeffrey Berson This entry was posted in Bersonal Posts. Bookmark the permalink. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '405', 'language_id_whole_page_fasttext': "{'en': 0.9523372054100036}", 'metadata': "{'Content-Length': '72155', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VHAK7JANTYKQHMQKXU5EW2E6PBQA4CY7', 'WARC-Concurrent-To': '<urn:uuid:520659f5-bbc5-48b7-8fad-d25f0174908e>', 'WARC-Date': datetime.datetime(2019, 12, 9, 3, 49, 56), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NEAF4TJL746NT2PLTX4JOTXS3JD76M6B', 'WARC-Record-ID': '<urn:uuid:1f42ef49-c3aa-4147-b58d-c6ab9d55f4e1>', 'WARC-Target-URI': 'https://jeffreyberson.com/2018/12/04/voluntary-philanthropy/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a8836c39-3829-4bd7-b4b1-7f45dc5dc546>', 'WARC-Truncated': None}", 'previous_word_count': '1095', 'url': 'https://jeffreyberson.com/2018/12/04/voluntary-philanthropy/', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-113.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025320589542388916', 'original_id': '5f5041f7d8538d7d08112b4586cf5f56dbd81c67a7250edf3a98371cb55ab9c1'}
Wednesday, April 25, 2012 Fred Karger's LGBT Presidential Ad Pulled From Youtube Late last night I read that Fred Karger's promotional video on youtube had been taken down. You can read more about it here. For those who don't know, Mr. Karger is the first openly gay man running for President of the United States. I've posted about him here many times. I don't know the reasons why the video was removed. In this post, I'm only writing the facts posted from Mr. Karger's facebook page. This is interesting. The Karger video is posted here, with this statement: "Parental Advisory Explicit Content." Now, forgive me if I'm wrong, but I viewed this more than once and I don't see where this "Explicit Content" is. Evidently, two men kissing, just as two straight people kiss in public all the time, is considered "explicit?" I'm wondering if the Karger ad was taken down because people aren't allowed to do a "commercial" on the sense that it's considered advertising? But if that is the case, then I have to wonder why book trailers and other promotional things that run the along the thin line of advertising aren't taken down, too. I don't know anything for certain. I do know that on most social media anything lgbt is targeted. And I'm not talking about anything sexually oriented. I'm talking about G-rated lgbt material: it could be as simple as two men holding hands. All it takes is a report or a complaint and anything can be taken down from social media without an explanation. It's happened to me more than once, on my own social media profiles and on those I use with pen names. In each case, it wasn't about the social media site discriminating against me, because everything was restored after I sent an appeal. It was more about a social media site not evaluating a situation before it takes something down...which also makes me wonder about who is actually in charge of these things on social media. Right now, I'm picturing the guy from the TV commercials, drinking beer, sitting in his sweat pants in a dowdy apartment somewhere in Silicon Valley. I've seen the Fred Karger youtube video and I didn't find anything offensive about it. Here's a statement released by Mr. Karger last night: Statement by Fred Karger on Removal of his “Sexy Frisbee” Commercial by YouTube:I was completely shocked tonight to find out that YouTube had taken down our new California commercial from its web site having deemed it "inappropriate.”..."Sexy Frisbee" had gone viral in less than a day with over 15,000 views since our press release went out late this morning. We had an incredible day of excitement, media coverage and comments.What is "inappropriate" about our 65 second commercial? It was shot at Venice Beach in Southern California with a dozen men and women having fun at the beach. It ended with friends Andrew and Michael (a couple who have been together 7 years) exchanging a quick kiss. Is that kiss what YouTube considers inappropriate? There are gay kisses on television every day and certainly lots on YouTube and other popular video sharing web sites. Today we will be taking the following steps to get our commercial back up on YouTube:We will launch an online petition to gather support to get “Sexy Frisbee” back up on YouTube.We will be writing to Google Co-founders (YouTube is owned by Google) Larry Page and Sergey Brin and ask them for an explanation and full investigation as to why YouTube decided to censor my free speech as a candidate for President of the United States.I will be trying to meet with Google’s lead lobbyist in Sacramento, Jonathan Ross with K P Public Affairs I will be in Sacramento on Wednesday to kick off my California campaign at a 2:00 pm Press Conference (on South steps of the State Capitol Building). This morning it seems as if the video was added again. At least I think this is the video, but I'm not completely sure. You can view it here on youtube...I THINK. Like I said, all it takes is one person to "report" something lgbt oriented to any social media site, and it's taken down without an explanation. Most of the time it is restored, but that's never an easy process. By the time you get the guy to read an appeal for something that's been removed sometimes it's not even worth the effort. T.D. McFrost said... I'm not gonna comment on the socio-political thing, 'cause it's out of my League, but I want to comment on the two men kissing as being explicit. Ugly, stupid, terrible people have a misguided view that if a child sees two men kissing they will think this is cool and will go and seek out the first boy to smooch, become instantly gay and live a life filled of sex and debauchery in a land of dildos and unicorns. And I kid you not, there ARE people who will fight you if you disagree with this. Trust me. That ideology is fucking ridiculous. I'm aware kids are impressionable, but their sexuality is not something that can be changed in an instant. Last I remembered, folks were born that way and it's not a choice. The gay community and their imagery is further deplored by the public's view that being gay is a "disease"--as in a sickness that can be contracted. Um, okay then, so I guess since my childhood friend is gay just being around him will make me gay too? Well then, if it means losing a dude who will give me a kidney if I asked then strap on my wings, give me a crown and call me a Queen! People are just stupid and ridiculous! For this nonsense to stop there needs to be a strong, smart, powerful gay voice in politics to show the world that gay people are here and their queer! ryan field said... I agree. The LGBT community needs one powerful spokesperson.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '130', 'language_id_whole_page_fasttext': "{'en': 0.9739232063293456}", 'metadata': "{'Content-Length': '191198', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2IOP6MXJHBQW3PS2VKPDVCGISJS4AK3Q', 'WARC-Concurrent-To': '<urn:uuid:449ee2b5-408a-4461-8992-08b70efcbc82>', 'WARC-Date': datetime.datetime(2015, 1, 30, 2, 35, 37), 'WARC-IP-Address': '74.125.228.202', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:UTB7QPYTWLWH6TAARGYIDFV5OW4CTATY', 'WARC-Record-ID': '<urn:uuid:cc2a98cb-a118-424d-a8a9-3fa968dfec8e>', 'WARC-Target-URI': 'http://ryan-field.blogspot.com/2012/04/fred-kargers-lgbt-presidential-ad.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:892ed1ec-e9d8-4d4a-b32d-3cebf4bd8dc8>', 'WARC-Truncated': 'length'}", 'previous_word_count': '993', 'url': 'http://ryan-field.blogspot.com/2012/04/fred-kargers-lgbt-presidential-ad.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04621875286102295', 'original_id': 'cb95f3d83fa57bcac3cd7fd014ffe8b9249753dfdd58616cd0169909efec30e2'}
Elevated Insights Assessment Psychological Evaluation Services We proudly offer a variety of scientifically-grounded and culturally-responsive psychological evaluation services to meet the needs of children and families in Denver, Colorado. Attention-deficit hyperactivity disorder (ADHD) is a term describing a specific developmental disorder which involves deficits in behavioral inhibition, sustained attention, resistance to distraction, and self-regulation. Children with ADHD often have difficulty with behaviors such as completing schoolwork, sitting still, impulsive behaviors, making careless errors, organization, hyperactivity, etc. Psychological testing can help with the following: determine if ADHD is present differentiate ADHD symptoms from other psychiatric disorders to identify any coexisting concerns, such as anxiety, depression, learning disorders, oppositional defiant disorder [...] Autism Spectrum Autism spectrum disorder (ASD) is a term describing a developmental disorder which involves delays in language and communication skills, impaired social skills, restrictive behaviors, and repetitive behaviors. Parents may want to consider an autism spectrum evaluation if they have noticed any of the following symptoms: lack of social interaction or interest in others (such as not smiling, or reaching arms out to be held at a young age) lack of responsiveness when the child’s name is called absence of pretend, [...] Psychoeducational evaluations examine different areas of functioning and may include cognitive, language, visual motor, memory and learning, attention and socio-emotional functioning as these relate to academic achievement. This type of assessment can be of special interest to teachers and parents wanting to understand the educational potential of their child. For parents of preschoolers, psychoeducational evaluations can provide important data to assess academic readiness and to inform decision making related to educational environments. Psychoeducational evaluations can also be beneficial when a [...] IQ testing is used to measure one’s overall intellectual ability and identify areas of strengths and weaknesses within a person’s cognitive development. Giftedness Gifted individuals have above-average intelligence and superior talent in specific areas. IQ testing is used to identify individuals with superior intellectual abilities. Although many parents see giftedness as a significant strength for their children, superior intellect can come with its own unique set of challenges. For some children, school curricula can become boring, which results in reduced [...] Social Emotional/Behavioral Psychological evaluations are utilized to provide a better understanding of a child’s emotional, social, behavioral functioning, and personality patterns and traits. When a child is struggling to adjust to everyday demands in home, academic, or social environments, a psychological evaluation can often help identify the underlying cause(s) of such concerns. Challenges can be due to a number of factors, some of which may include, anxiety, depression, difficulties regulating attention and impulse control, learning disorders, delays in social communication skills, and/or [...] Young Adults We’re excited to announce that our services have expanded and we now offer assessment for young adults. Here at Elevated Insights, we realize that the transition from adolescents to adulthood carries it’s own unique set of challenges. Young people often experience increased stress related to planning for their futures while establishing their own identity as an adult. Individuals may benefit from identifying undiagnosed learning differences, building capacities for daily living skills, finding the most appropriate supports available to them in academic and [...] Child Welfare When a child enters the child welfare system, he or she has often experienced a number of significant stressors, some of which may include traumatic stress, attachment disruption, and significant emotional and/or behavioral disturbances, which are likely to impact his or her current functioning and worldview. Such life experiences can have a profound impact on a developing child. A comprehensive psychological evaluation occurring early on in the child welfare process can help give biological/ foster parents, case workers, therapists and [...] Gifted & Talented This type of evaluation can help families identify children who may be considered intellectual​ly gifted and talented and/or twice-exceptional (2e).  This assessment can inform academic environments and enrichment programs best suited to the child’s needs. Some children who are gifted may also be considered twice exceptional (2e), where possible concerns in other areas of academic or executive functioning create highly specific and tailored learning considerations. Developmental Disabilities This type of evaluation can help families understand developmental delays related to intellectual disabilities and or other neurodevelopmental disorders and also inform eligibility for state-funded services. Measures of cognitive and adaptive functioning are usually included in these types of evaluations. Make An Appointment Please email us at info@elevatedinsights.org or call us at (303) 756-1197. We are happy to offer free consultation. We look forward to speaking with you soon!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '54', 'language_id_whole_page_fasttext': "{'en': 0.9076054692268372}", 'metadata': "{'Content-Length': '60905', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PSLO43FZ56PRBQ5OZ47CXI3A4JWQ3ZMM', 'WARC-Concurrent-To': '<urn:uuid:acc4d736-5189-4530-8507-407df8954e7e>', 'WARC-Date': datetime.datetime(2020, 2, 20, 14, 12, 29), 'WARC-IP-Address': '107.180.47.12', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DGI44CDKSLDM3I5C3SPMSKZKQAVOCHDP', 'WARC-Record-ID': '<urn:uuid:841cf037-b677-4089-9929-99f369ae89fa>', 'WARC-Target-URI': 'http://elevatedinsights.org/services/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7bb16747-28bd-4da8-bf1f-6b365f015bbe>', 'WARC-Truncated': None}", 'previous_word_count': '735', 'url': 'http://elevatedinsights.org/services/', 'warcinfo': 'isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-15.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05342632532119751', 'original_id': '21b7fe324df657258d50931636ee244fac5b6ac36edb8aef9a040d07ef4107d0'}
How to Have a Successful Threesome, According to People Who Have a Lot of Them Steer clear of these common threesome pitfalls. film still from tv show easy of three characters hooking up Wise men. Little pigs. Jonas Brothers. If you’ve seen any image of Idris Elba in a three piece suit you get it. Three is a magic number, especially when it comes to sex. The allure of the ménage à trois cannot be ignored. According to Dr. Justin Lehmiller, who interviewed over 4,000 couples for his book Tell Me What You Want, having a threesome is the top sexual fantasy, although men seem to be a bit more intrigued by the idea (a separate study showed that 82% of men and 31% of women reported at least some interest in having a threesome). However, people aren’t actually having that many threesomes, only 3% of people surveyed had a threesome in the past year, and only 1% of people surveyed had one in the past month. So, I reached out to people who have “regular or semi-regular” threesomes, and I learned a lot about what it takes to make one happen, and what makes them so damn hot. First thing’s first: how do you even set up a threesome? “Before I was into all of this I was completely oblivious to my surroundings. Now that I recognize like-minded people, it is easy to sense someone’s ‘vibe’. It’s actually shocking how many people (especially couples) are out at the bars hoping to find a new recruit.” —Angela, 42, Oklahoma City “I joke with my gay friends that setting up a threesome with two other gay men is more complicated than negotiating peace in the Middle East. Gay men tend to be VERY sexually picky, and if 2 people are interested in adding a third, the vetting process is exhaustive (multiple pictures of all parties from multiple angles and sexual preference resume as well as hosting negotiations).” —Louis, 36, Santa Cruz “We typically get to know someone in a group setting (not that kind of group—just out with friends) and then, if they seem like they would be interested after some mild flirting, my wife messages them asking if we can take them out—like on a real date, not just drinks or straight to our house.” —Keith, 32, Houston “I would say the most common way we go about setting up threesomes is probably through Grindr.” —Sutter, 27, Columbus “I approach someone with my partner there, flirt with the person enough to make it obvious, then have my partner flirt with them as well. You can kind of immediately tell if they’re into it or not, and I bow out if they seem in anyway confused or uncomfortable. It’s less awkward than you might think!” —Kate, 26, Chicago What makes them so hot? “Being intimate with a new person, the experience of seducing someone as a couple, and the various, um, ‘configurations’ you can try with a third person.” —Keith, 32, Houston “Threesomes are as hot as the people involved. If sex with person A is hot, and sex with person B is hot, then it would stand to reason that sex with A and B at the same time would be just as hot, if not hotter. Threesomes, on their own, are not inherently hot.” —Yvonne, 29, Charlotte “It's like being IN a porn that you are also watching. Also the attention. Also the taboo of it? If that makes sense? I love watching people fuck. I love fucking. Porque no los dos?” —Louis, 36, Santa Cruz “Actually, I’ve learned some new ways to push my husband’s buttons because of the way a third engages with him or tries something on him. So threesomes can be a great way to learn more about your own partner and yourself sexually.” —Ben, 32, Boston “There are times where taking a break and watching your partner with someone can be a blast too. My wife, for example, shocked herself how quickly she would climax just watching me with another man” —Andre, 29, Houston “It’s often been an all night affair and not just a 20-30 minute experience, which to me is pretty great!” —Thomas, 30, Asbury Park With whom do you have threesomes? How did you get into it? “My first threesome was my best friend and I going up to a guy at a party and being really straightforward and asking if he would like to have a threesome with us.”—Margot, 20, Minneapolis “My partner is a top; I am too (sometimes I bottom, he never bottoms). Oral got old and I wanted to keep dating, but not limit my sex to only our interactions. I was trying really hard to make ‘just us’ sex work, but after about three months of being sexually frustrated we had a talk and both revealed we had no problem being open.” —Louis, 36, Santa Cruz “My partner and I were both sharing stories about our sexual histories this one time, and the topic of threesomes came up. We both said we had them, and my partner said he wanted to have that experience with me, too.” —Corinne, 29, Chicago What are some rules or boundaries that you have around threesomes? “No kissing anyone else. No cuddling anyone else. No sensual massaging. Basically nothing that we consider ‘intimate.’ [For us] it is not making love. It is sex. Just sex. I look at it the same way as if I used a sex toy to enhance things. In that moment, the other people involved are simply toys.” —Angela, 42, Oklahoma City “Generally not strangers or close friends. They must be single. Not in an open relationship or poly, but single. We are open to all genders; it’s very much a matter of personal chemistry.”—Keith, 32, Houston “I like to watch my girlfriend have sex with other women. I usually don't have sex with the women beyond oral sex. Sometimes my girlfriend will insist I have sex with someone and if I feel up to it, I will.” —Nathaniel, 40, Huntsville “I think the most important rule is that no partner should ever be ‘taking one for the team.’ If you're not on the same page or one person isn't enthusiastically into an experience, then don't do it.” —Corinne, 29, Chicago “My boyfriend is no longer allowed to finish inside of another woman. We did it one time and I had a more emotional response than I expected to, so we vowed never again on that one” —Isla, 26, Washington D.C. What are some surprising logistical concerns around threesomes? “Larger group-sex events are way easier to organize. The ‘buffet style’ seems to make people more comfortable. I think the idea is, I'm not into everyone here but I'm into enough of them that I can pick what I want and avoid what I don't.’ A three way with two interested parties and one lukewarm party can be disappointing for that lonely 33% of the group.” —Louis, 36, Santa Cruz “If you [have threesomes] somewhat regularly, take breaks or long stretches of time where you just focus on each other as a couple.” —Keith, 32, Houston “Another logistical concern if one person in your threesome is male—condoms. If you’re having penetrative sex and want to use condoms it might take more than one as there is a lot of switching around involved in a threesome. It can get tricky.” —Kate, 26, Chicago “Having a big bed is kind of important, and an extra room for a person to actually sleep in really helps—three in one bed can be a problem. And in the MMF (two guys, one woman) threesomes, neither guy wants to actually sleep in the same bed. The drive home and breakfast the following day can be funny or awkward, depending on the people involved. And if you’re a man joining an MMF threesome, make sure you discuss whether there will be any male to male interaction beforehand.” —Thomas, 30, Asbury Park What are some of the most common misconceptions about having threesomes? “That it’s an approved form of cheating, or a good way to spice up your sex life. —Shane, 28, Seattle “They aren’t awkward! I have had friends tell me that they wouldn’t know what to do or that they’d feel self-conscious or weird. I think it works the same way as two people having sex – if you just ask what they like, discuss your expectations upfront, and are all in agreement, it can be amazingly fun.” —Kate, 26, Chicago “Most people think that if you date someone who is bisexual they will be open to threesomes. This is not the case. Just like unisexual people, some bisexual people favor monogamous relationships and some are open to threesomes. I start with the assumption that every person favors monogamy absent signs that they are into threesomes.” —Nathaniel, 40, Huntsville “That everybody needs to be involved throughout the entirety of the experience.” —Logan, 28, Miami “We have great sex on our own, so we’re not using threesomes to ‘fix’ things or as a distraction.” —Isla, 26, Washington D.C. What makes for a good threesome? A bad one? “We set ourselves up for success by assuring our third beforehand that they can drop out at any point if they feel uncomfortable! We run into this at times because we have sex with men who have never had sex with women and women who have never been with men. We may be their first time and they’re not sure how they’re going to feel about it.” —Kelsey, 30, Austin “When planning a threesome ask yourself why you want to do this. Make sure you really want to do this for yourself and not to keep your partner happy. Be ready to laugh at yourself. As awkward as two bodies can be, a third is exponentially tricky.” —Margot, 20, Minneapolis “I did watch some threesome porn back when I first became interested, to see what positions might work best or help keep everyone involved. I think that helped me feel less like I would mess something up. If you are the couple, go over your rules. Are you comfortable with everything? What are you interested in doing, what are they interested in doing? Do you plan on letting the third spend the night? Should the third know any important information about either of you?” —Kate, 26, Chicago “Look, fucking multiple people at once is just mathematically difficult, it may not work and there's no prep you can do to make sure it goes flawlessly. Best thing you can do is remember that, bluntly, at the end of the day your partner matters more than the third, and make sure you're not ignoring their feelings in the moment. It can be a whirlwind, people can change on a dime. A willingness to fail, learn from it, and laugh at your mistakes is more important than any multitasking skill! If you're the type of person that can't laugh at a fart during sex, this just may not be for you!” —Andre, 29, Houston
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9720130562782288}", 'metadata': "{'Content-Length': '489902', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UV3Q3OESN2J75XVDM2LH6MO2G3CXVUJQ', 'WARC-Concurrent-To': '<urn:uuid:f69a0f2f-adde-4810-8c68-6dd230c14915>', 'WARC-Date': datetime.datetime(2021, 8, 3, 15, 18, 34), 'WARC-IP-Address': '151.101.200.239', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:I3T64Y5K3R7D5YO75JBGB4EMUANT6HL4', 'WARC-Record-ID': '<urn:uuid:231c8c9d-e037-4057-aa8b-e9c060f540ed>', 'WARC-Target-URI': 'https://www.gq.com/story/it-takes-three-to-make-a-thing-go-right', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:895d6465-4148-4432-9b8b-eae412890b2e>', 'WARC-Truncated': None}", 'previous_word_count': '1775', 'url': 'https://www.gq.com/story/it-takes-three-to-make-a-thing-go-right', 'warcinfo': 'isPartOf: CC-MAIN-2021-31\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July/August 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-217.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.060245633125305176', 'original_id': 'c4779966ba5cb60a879b0145950367652e00969061eaa06737aae4493d16f537'}
Fri May 4, 2012 Shop Talk: Alberto Gonzales Defends KSM Trial Originally published on Mon May 7, 2012 11:56 am It's time for our Friday features. And in Faith Matters, we decided, in honor of our fifth anniversary on the air, to ask five faith leaders from around the country to offer some words of encouragement. That's later in the program. But first, to what has become one of our signature segments over the past five years: the Barbershop. That's where the guys talk about what's in the news and what's on their minds. Normally, we conclude every Friday's show with a shop visit. But today, we decided to start the show with the guys since we have a special visitor in our Washington, D.C. studio: the former attorney general of the United States, Alberto Gonzales, is with us. He served during the administration of George W. Bush. He's also a former White House counsel and a former judge. Judge Gonzales, welcome. Thank you for joining us. ALBERTO GONZALES: It's good to be back in Washington. MARTIN: Also here in Washington, D.C. with us, freelance journalist Jimi Izrael and civil rights attorney Arsalan Iftikhar. And from Austin, Mario Loyola of the National Review magazine and the Texas Public Policy Foundation. That's a conservative think tank that looks at the role of federal policies on the states among other things. Take it away, Jimi. ARSALAN IFTIKHAR: Hey, hey, hey. MARIO LOYOLA: Great to be with you. GONZALES: We're good. IZRAEL: Judge Alberto Gonzales. Thanks so much for coming in. It's great to have you. GONZALES: Thank you so much. IZRAEL: All right. Well, let's get things started. This Saturday, the court is in session - and I'm talking about the military tribunal court in Guantanamo Bay, Cuba. At the center of the trial, the big bad KSM, Khalid Sheikh Mohammed. He is the self-proclaimed mastermind of numerous terrorist attacks, including 9/11 and the murder of the American journalist Daniel Pearl. MARTIN: You know, in fact, this is the second time Khalid Sheikh Mohammed will be arraigned. The Obama administration unsuccessfully attempted to move the case to federal court in New York in 2009. But tomorrow, he and four other alleged terrorists are going to face trial for crimes that carry the death penalty if they're convicted, Jimi. IZRAEL: Thanks for that, Michel. There's a lot of debate about whether military tribunals can deliver justice. Also, part of the criticism is that KSM was waterboarded and subjected to other questionable interrogation methods. So, some people argue that the case has been tainted from the get-go. Judge Alberto Gonzales, will there always be questions about whether this trial is fair? GONZALES: Well, thank you for starting me off on a very easy topic. IZRAEL: Welcome to the Barbershop. GONZALES: Listen, I think that the government has worked extremely hard to put in place a system that is fair. It's a system that the Congress and the president of the United States have signed off on in terms of being fair. And, listen, I think that at the end of the day, once these things start rolling that people will get more comfortable with military commissions and will understand that they are, in fact, a legitimate means to bring people to justice. IZRAEL: OK. Mario Loyola, Super Mario, you worked on detainee policy during the Bush administration when you were at the Pentagon. What do you think? LOYOLA: Well, the problem that we're facing is that this is a new kind of war. We have a scheme that gives privileges to prisoners of war, and then we have a different scheme that gives privileges to defendants in a criminal justice context. But because the terrorists, like Khalid Sheikh Mohammed, are both criminals and combatants, they're in a position to accumulate the privileges of both. It is absolutely perverse, for example, in my opinion, to send Khalid Sheikh Mohammed to civilian court in New York while trying the Cole bombers in a military commission. And, you know, the Attorney General Holder's explanation of this a couple of years back that it's because, well, Khalid Sheikh Mohammed attacked civilians; therefore, he should be in civilian court. And the Cole bombers attacked a military target; therefore, they should be in a military court, you know, is unbelievable. That's a shocking explanation, because what's that doing is setting up a huge incentive for terrorists to attack civilians instead of military targets. MARTIN: Arsalan. IZRAEL: Arsalan. IFTIKHAR: Well, as the only lefty lawyer here on the Barbershop, I'm going to have to respectfully disagree with my colleagues here. I think there are many, many things in place here. I think, first of all, we have to understand that Attorney General Eric Holder has said that we, in the United States, have successfully prosecuted over 300 terrorism suspects in our Article 3 civilian courts, including the 1993 World Trade Center bombers. Obviously, Timothy McVeigh, the people who attacked the U.S. embassies in Africa in 1998. And so, to think that we do not have the legal justice system in place here, I think, is a political red herring. And, you know, as you mentioned, Michel, President Obama tried to move the trial of KSM to Manhattan in 2009 and essentially the Republican majority in Congress passed legislation that would block any funding for him to allow to do that. MARTIN: Just to clarify, the president wasn't bowing to political reality; he was bowing to legislative reality, which is that the Congress cut off the funding and said that you just can't do it. And I just want to play - just to remind people that this was a priority of the administration. Here's a clip of President Obama talking about this. This is one of the first orders he issued when he took office. PRESIDENT BARACK OBAMA: In order to affect the appropriate disposition of individuals currently detained by the Department of Defense at Guantanamo, and promptly to close the detention facility at Guantanamo consistent with the national security and foreign policy interests of the United States and the interest of justice, I hereby order. MARTIN: Arsalan, just what about the original question on the table, though, was: Will this trial have legitimacy? IFTIKHAR: I don't think so. MARTIN: You don't? LOYOLA: Can I jump in for a second? MARTIN: Yeah, briefly. LOYOLA: I want to respond to something. MARTIN: Go ahead. LOYOLA: You know, the criminal trials of, for example, the World Trade Center bombers in the 1990s were not successful because, among other things, information came out and was released to the public in those trials that told Osama bin Laden something he didn't know, which is that we, our intelligence services, understood the hierarchy of al-Qaida and understood what its top leadership was and that we were tracking them on cell phones. So, they stopped using cell phones. And that put the nation in very grave danger. MARTIN: So the question, Mario, is do you feel that this procedure will have legitimacy? LOYOLA: Of course. I mean, it's a procedure of very long standing. We've had it since the very beginning of the republic. And all countries, all developed nations, have a system for military justice and for the treatment of war crimes. I mean, these people commit their crimes notoriously. Khalid Sheikh Mohammed laughs about having killed 3,000 people. This is not a situation in which you have a criminal defendant that we have to protect from the state because he might be innocent. MARTIN: Judge Gonzales, I wanted to give you a kind of a final word, as you remember very well the argument of whether Guantanamo should be open, should it stay open. It's now open. Do you think that there's still a need for it? I mean... MARTIN: ...five years from now, will we still be having this conversation? GONZALES: I can't predict that. But Guantanamo was established because there was a need - a place to put dangerous terrorists captured in the war on terror. That need continues today. That's the only reason Guantanamo exists today. And as to whether or not it'll continue to exist five years from now, that remains to be seen. Hopefully not. You know, President Bush didn't want Guantanamo to continue. He wanted it closed as quickly as possible, but it remained open because of the need. MARTIN: Hmm. I think most people forget that, that President Bush did not want it to remain open. GONZALES: He also was very, very - I can't tell you the number of times I'd walk into the Oval Office and he would ask me, when are we going to begin military commissions. He was very frustrated by the fact that we could not stand these up because he did want to bring them to justice. He felt that it would be good. And it's been a long time coming, but I'm glad to see this commission stood up. We're having our weekly Barbershop roundtable. We're joined this week by the former attorney general of the United States, Alberto Gonzales. Also with us, civil rights attorney Arsalan Iftikhar, columnist Mario Loyola, and freelance journalist Jimi Izrael. Back to you, Jimi. IZRAEL: Thanks, Michel. OK. Well, we're moving to presidential politics and the ruffling of some feathers in Mitt Romney's campaign. Foreign policy adviser Richard Grenell resigned from the GOP candidate's team less than a month after he was hired. MARTIN: Now, I'm puzzled by this because the reporting says that he was pushed out by culturally conservative Republicans because he's an openly gay man. And Mr. Romney's team denies that accusation. But then, there are like, what, some 800 Twitter posts that he did delete, where he makes comments about Newt Gingrich's weight, Callista Gingrich's hair, journalist Rachel Maddow's looks. I'm just sort of puzzled by this. IZRAEL: I'm not so puzzled. IZRAEL: Just... MARTIN: I guess I'm just saying, well, do you get a pass on making rude comments about peoples' appearance because you're gay? I'm just - so do you see my point? IZRAEL: I do see your point. That's why I'm not so puzzled. I mean, look, it's like when you're - no disrespect to anybody's politics - but when you're running on fumes like Mitt Romney is, you know, you try to cut off the dead wood. And to me he was always a political liability. He says whatever he wants to say and you can't have a guy like that on your team. You just can't. You know, not if you're running for president. Maybe if you're trying to become, you know, kickball captain but you can't just have... MARTIN: But they hired him. IZRAEL: I know. I know, but... MARTIN: He didn't just show up and just refuse to leave. I mean... IZRAEL: Well, somebody didn't do the diligence, obviously, because they didn't know this guy was a loose cannon. You don't hire Rodney Dangerfield to do your press. You know, just FYI. MARTIN: I don't know. Arsalan, you live on Twitter. IFTIKHAR: Well, you know, the funny thing is that Bryan Fischer and other right wing activists around the country basically, you know, patted themselves on the back for getting Mr. Grenell kicked out. And even though I probably don't agree with any of Mr. Grenell's foreign policy initiatives, I am quite concerned that, you know, you have this sort of knee-jerk pandering to, you know, the right wing fringe, sometimes. And, you know, hopefully - we are hoping, you know, now with Mitt Romney as the presumptive Republican nominee that he would be moving more towards the center to try to appeal to the greatest cross-section of American society. MARTIN: So, sexist tweets OK? IFTIKHAR: No. I'm not saying that they're OK, but that was not the - I mean, this is a guy who's dealing in foreign policy. And if he's going off saying things outside of his portfolio that are going rogue, then I can understand that. But, again, you know, these are right wing activists who are taking credit for the fact that they got a gay man out of the Romney presidential campaign. MARTIN: So, if he made racist tweets, that would be OK as long as... IFTIKHAR: No. I think that if... MARTIN: ...he stuck to his foreign policy portfolio? I'm sorry. I... IFTIKHAR: No. But... IZRAEL: I mean, what I said was he's a loose cannon. Period. IZRAEL: He's a loose cannon. Period. And he shouldn't ever have got the gig. LOYOLA: Listen. Hold on a second. MARTIN: Mario, go ahead. LOYOLA: I mean, there's - yeah. I mean, there's one - you know, unfortunately, we're entering the new era in which there will be no such thing as private communications for anybody who's facing a potential position in the administration or a campaign like this. I think that the question of his sexual orientation was completely irrelevant to this entire case. And maybe on the fringe, they're making a big deal out of it. but the reason why he had to resign was clearly because of the inappropriateness of the Twitter feed. But this is a person, by the way - and I've had occasion to deal with him when he was a spokesman for the U.S. Mission to the United Nations for several years and I was working on different National Review stories. For example, he was very discreet, very professional, very sophisticated and certainly not a loose cannon in his professional behavior. That's why John Bolton had confidence in him. That's why the campaign had confidence in him. And, you know, Twitter feeds Twitter. What are we going to do about Twitter? MARTIN: Do you tweet? Judge, do you tweet? GONZALES: I do not. GONZALES: My wife does for me. So, if you get a tweet from me, it's really from my wife. MARTIN: Well, what do you think? GONZALES: Listen. From my perspective, I think the campaign is entitled to have who they want on the campaign and who they don't want on the campaign, quite frank, and whatever reason as far as I'm concerned. The campaign has one mission and that is to get the nominee elected. What I have a problem with is that there probably wasn't the appropriate vetting done on this individual. If, in fact, this person was, in fact, someone that was a loose cannon or if, in fact, this person was removed because of the blow-back from conservatives, that's something that the campaign should have anticipated, should have vetted out before this person was hired, as far as I'm concerned. IZRAEL: So, can we go on record? The judge agreed with me. MARTIN: I'm going to have go back over the transcript and make sure. IFTIKHAR: Brush your shoulder off, brother. IZRAEL: I rule. IFTIKHAR: Brush your shoulder off. MARTIN: We need to take a short break. And when we come back, we will have more of the Barbershop with our regular guests, Arsalan Iftikhar, Jimi Izrael and Mario Loyola and our special guest, former attorney general of the United States, Alberto Gonzales. Please stay with us. Related program:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '67', 'language_id_whole_page_fasttext': "{'en': 0.9729248881340028}", 'metadata': "{'Content-Length': '57284', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:O4SQCKY63M7GN3OTBFQMHGNM3775PNVI', 'WARC-Concurrent-To': '<urn:uuid:897f121f-1c27-4b0d-9ec3-080c84b7ffb8>', 'WARC-Date': datetime.datetime(2013, 12, 13, 11, 15, 26), 'WARC-IP-Address': '66.151.232.80', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:HRLGKSD26JODMRYK5ZMZS3GLULXNHPVG', 'WARC-Record-ID': '<urn:uuid:5e88777f-e090-4912-ad5d-7c61edf6f417>', 'WARC-Target-URI': 'http://wrvo.org/post/shop-talk-alberto-gonzales-defends-ksm-trial', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:68861a8d-18c7-4f24-a7ac-e79fafbfe81d>', 'WARC-Truncated': 'length'}", 'previous_word_count': '2602', 'url': 'http://wrvo.org/post/shop-talk-alberto-gonzales-defends-ksm-trial', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.022009730339050293', 'original_id': '76ff67d987541fb8351c623c7bcef0e75072ed87857bde6a8227466775192218'}
CONSERVATIVE commentator Andrew Bolt considered stepping back from his multiple media commitments in the wake of being found guilty of racial vilification in the Federal Court, until Tony Abbott implored him not to. In an interview with Good Weekend, published today, Bolt reveals that the court decision, and the gloating reaction from within some sections of the community, had shocked him deeply. Tony Abbott told Bolt that the country needed him. Credit:Alex Ellinghausen He said he had been painted as a monster and his family had suffered. However, an impromptu visit to his home by the Opposition Leader, who told Bolt that the country needed him, had restored his resolve.
mini_pile
{'original_id': '3c4c054e9dcbf677312e00f05bb0da2adc798323031a8b14bfcd7a2c187ae92c'}
\section{At Most Two Horizontal Asymptotes} Tags: Limits of Real Functions, Limits of Functions, Analytic Geometry \begin{theorem} The graph of a real function has at most two horizontal asymptotes. \end{theorem} \begin{proof} Follows directly from the definition of a horizontal asymptote. {{qed}} \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '1e9cf51746e75d4706174bdf02a80544495e57f3f0e878d209a6cdcbe2d31b9a'}
Opening: "It's a good win for us. I think George Mason is an excellent team that is going to win a lot of games. They have a great coach. It took us a long time to get used to their quickness. We couldn't simulate their quickness in practice. We turned the ball over a lot, we actually turned it over the whole game. Nineteen turnovers and 16 missed free throws kept the game close. I thought our defense was outstanding. We did a better job on [Patrick] Holloway in the second half. He hit a 3-pointer late but we did a great job on him. Our defense got better and our rebounding was terrific down the stretch. I thought George Mason played better the first 23 minutes than we did. I thought the last 17 after that timeout we showed a little bit of toughness, enough to win the game." On Dez Wells: "He is a good player. He was a good player coming in. He is feeling more comfortable. A week ago Saturday, against Georgia Southern he was about as bad as he could be. He flipped a switch and got real aggressive. He got some open looks and got eight points right out of the shoot. He had a great week. More importantly I thought he defended well and rebounded better than he had. He is still turning the ball over too much. I told him he is on pace to set a record. He looked at me and said `For turnovers?' and I said `Yeah.'" On playing on the road: "We went on the road and it wasn't a really great environment but they had a great crowd at Northwestern. We weathered that and that will help us the next time we go. Than we had this neutral court game against a team that is well-coached and won 24 games last year and have a lot of guys last. They beat Virginia and should have beat New Mexico, which was a heart breaker for them. The game didn't go the way we wanted it to go today but it will help us. Looking across this sheet we played 10 guys, every one of them played well defensively for us. That is comforting. That didn't happen 10 days ago. I can look and see that we have really grown up defensively and are really dialed in. as a coach I need to figure out how to stop turning the ball over. Every time out I told our guys if we didn't have a layup or wide open three to get into our secondary break. We got into it one time. They have to be more coachable. They kept guarding so I put up with a lot of it today." On Nick Faust: "Nick was great tonight. We challenged Nick against [Patrick] Holloway, what a special scorer that kid is. I saw him last year when I was out recruiting and to bring it at this level against us was pretty amazing. Nick had a great week. He was good against Northwestern defensively and he was great in the two practices leading into this game. I anticipated that he was going to play well defensively. That is great growth for him. Nick isn't caught up in scoring; he is caught up in winning. That took a long time. We are finally there." On his dunk that drew cheers: "It was real big. It was basically all Pe'Shon [Howard]. He saw me coming back door and he locked it up, but once again I ran the floor and got to the open spot." On his shot execution: "It's early in the season maybe. I'm not really sure. I'm just pushing through. I'm not worried about it. It will start falling as long as I just keep staying in the gym." On the defense: "We're definitely more together. Everyone is just playing together. You have Alex Len who is blocking shots like crazy, so being a guard, you just send them to the help. Everyone is stronger and attentive in helping one another on defense." On game takeaways: "[We need to] just bring it right from the beginning. We felt like we didn't have a lot of energy from the beginning of the game, so we tried to pick it up by using whatever we could to get energy and get it going. Overall, I think we did solid as a team. We have things to work on, but we'll be fine." On playing with Dez Wells: "It's easy. The last few games Dez has been hitting nonstop, so I have been milking him. I try to do whatever I can and I try to make my plays when I need to. But other than that, having him there to help is helping us as a team and is overall giving me easy points. Dez is doing really well right now and so is the team, so we play off one another." On changing his mindset from scoring to winning: "I'm trying to make the right play and get guys involved. Coach and I sat down and he basically just told me to keep making the right play and sometimes I don't have the fortune, so lately I have been doing whatever I can to hit guys. I just want to help my team win." On growing defensively: "I think young guys have learned a lot between two months ago and now. We're like a totally different team. We played good defense as a team. Helping each other is good for us. Also, rebounding for us is huge. Everyone goes on the boards." On running the fast break: "It took us about eight minutes to start running. I think when we started running, it changed the game." On starting strong: "Whatever my team needs from me, that's what I'm going to provide. I don't want to make this about myself because I couldn't have done this without my team. They welcomed me with open arms when I first got here and I couldn't have done any of this without those guys. My coaches have also done a great job developing my game and helping me and stringing me along with everything that's happened to me. They have been here like a family. We're just getting closer every game." On relaxing this game: "I felt more comfortable and that's because my team and my coaches have been there for me. They continue to back me and stay behind me no matter what and making me feel very comfortable. My hat goes off to those guys."
mini_pile
{'original_id': '38b92b98e42153f5170d3fceb71ac22578ca41614cd543c75017b869dfd4c06b'}
Despite the near-universal recognition of David Lean's "Lawrence of Arabia" as a film classic—it received seven Academy Awards—there are certain critical observers who seem to wish that its director had never left the home counties of England. The view that Mr. Lean did his finest work on such small-scale British dramas as "Brief Encounter" is best expressed by David Thomson, who wrote in the New Biographical Dictionary of Film that in the epic-size films (including "Lawrence") that characterized his mature career, "Lean became lost in the sense of his own pictorial grandeur." Jean-Paul Sartre reportedly considered the real-life Lawrence to be a model existentialist. Columbia / The Kobal Collection There is no denying that "Lawrence of Arabia" (celebrating its 50th anniversary this year) is Mr. Lean writ large. But few other approaches suggest themselves in telling the story of T. E. Lawrence (played by Peter O'Toole), the British army officer who was improbably plucked from making maps in Cairo to lead the Arab uprising in World War I. "Lawrence was bitten by the desert and by the people of the desert," Mr. Lean said in a 1963 interview, "and if you are going to show that, it must be in the best possible way, and there is nothing like this big screen process for showing it." Yet for all its girth, "Lawrence" is as nimble as Mr. Lean's early, more modest films. He was an editor by training, and his direction is sinewy and economical; along with editor Anne V. Coates, he achieves many of his wittiest effects with sudden edits. (The most famous is the transition from a flickering match to a desert sunrise.) So, at Lawrence's funeral, after a priest asks doubtfully, "Well, nihil nisi bonum, but did he really deserve a place in here?," Mr. Lean cuts with haste to an exterior shot of St. Paul's Cathedral (though Lawrence was actually buried in a Dorset County village). A contemporary audience unfamiliar with Lawrence might share the clergyman's skepticism, since the film opens with Lawrence's death, presenting his exploits in flashback, and it will be several hours until the magnitude of his life will seem equal to the majesty of that place. Ms. Coates told interviewer Vincent LoBrutto in his 1991 book, "Selected Takes," that Mr. Lean taught her to be "ruthless" in her editing: "He threw a whole heap of stuff out that broke my heart and he was right." While Mr. Lean often dwells on cinematographer F.A. Young's shots (knowing that it takes time to register that those are camels, not ants, marching across the desert in an extreme wide shot), he also teases us with them. For example, in the moment before Lawrence realizes that he has reached the Suez Canal, he sees the uppermost part of a ship on the horizon, the rest of it concealed by a giant dune. The vessel appears as though it is lodged in the sand. The image is startling, but Mr. Lean cuts from it quickly, just as soon as Lawrence realizes that it is not a mirage. Even in the film's conception, Mr. Lean said, the goal was for "dramatic economy." He added, "Consequently we have short-circuited certain incidents, and run six characters into one." The result is a surprisingly spry epic. Mr. Lean's star-studded cast communicates with efficiency, too. As the diplomat Dryden, Claude Rains has one of the film's most tender moments when he calls Lawrence's name so that he will turn to him and thereby reveal to a general that there is blood soaking through the back of his jacket, the result of torture ordered by a Turkish Bey (José Ferrer)—a discreet way of explaining Lawrence's reluctance to rejoin the campaign. In his one scene, Mr. Ferrer manages to be terribly menacing simply by affecting a faint cough, refraining from over-the-top histrionics. As Pauline Kael wrote in her review of Mr. Lean's film "A Passage to India," the director "knows how to give the smallest inflections an overpowering psychological weight." Jean-Paul Sartre reportedly considered the real-life Lawrence to be a model existentialist, a view reflected at times in the superb screenplay by Robert Bolt and Michael Wilson. "How much of that is there?" Lawrence asks, sounding like a character in "Waiting for Godot" as he contemplates crossing a vast desert. Mr. O'Toole delivers such lines with pluck, while making plain Lawrence's transformation from an insouciant junior officer (who says, upon being given his initial assignment, "It's going to be fun") to a genuine leader. He also gives a concrete quality to a character too often described as enigmatic. When Lawrence single-handedly retrieves a tribesman who has strayed in the long journey to Aqaba, Mr. O'Toole believably does the unbelievable. In its soaring battle scenes, "Lawrence" clearly enunciates what Alec Guinness's Prince Feisal calls "the virtues of war"—"courage and hope for the future." When Lawrence is sent back home, he does not want to go, and the film stresses the irony of his death: occurring not in war, but in a motorcycle accident on a tree-lined road in the English countryside. The trajectory of Mr. Lean's career indicates he took this as a lesson: You can't go home again. Following "Lawrence," Mr. Lean never returned to the small potatoes of "Brief Encounter." Instead, he made more films in the "Lawrence" mode, such as "Doctor Zhivago," though they suffer from diminishing returns—none were as agile as "Lawrence." Still, it is hard to fault Mr. Lean for again taking a page from his hero, who counselled that "nothing is written." If an unimportant cartographer in Cairo can rise to liberate Damascus, why can't a director expand his cinematic canvas? —Mr. Tonguette is writing a book about Peter Bogdanovich for the University Press of Kentucky.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9754176735877992}", 'metadata': "{'Content-Length': '99003', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AAGRPD66ARYUU3XVSKOG7ROASZ4DKQXW', 'WARC-Concurrent-To': '<urn:uuid:e706f248-bc83-41ab-ac0d-64d36bd9e56f>', 'WARC-Date': datetime.datetime(2014, 3, 11, 20, 18, 49), 'WARC-IP-Address': '205.203.132.1', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:G64MESYXBXAUH4QVM3ISG2EAIIADNETG', 'WARC-Record-ID': '<urn:uuid:69e733f4-d9c6-4866-b48e-730cf91e8b40>', 'WARC-Target-URI': 'http://online.wsj.com/news/articles/SB10000872396390444914904577615632690396316?mod=WSJ_Books_LS_Books_5&mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10000872396390444914904577615632690396316.html%3Fmod%3DWSJ_Books_LS_Books_5', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:35882001-98ff-4759-b61e-fccbd1dc59a2>', 'WARC-Truncated': 'length'}", 'previous_word_count': '920', 'url': 'http://online.wsj.com/news/articles/SB10000872396390444914904577615632690396316?mod=WSJ_Books_LS_Books_5&mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10000872396390444914904577615632690396316.html%3Fmod%3DWSJ_Books_LS_Books_5', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.029200315475463867', 'original_id': '936e659ca4873a9117fbd86a5660a67a359e9336a2a6c289114f49be34b3da39'}
Used Chevrolet Cruze Webster NY 14580 Chevrolet Cruze LT You can expect a lot from the 2017 Chevrolet Cruze. This 4 door, 5 passenger sedan has just over 25,000 miles! It features a front-wheel-drive platform, an automatic transmission, and an efficient 4 cylinder engine. A turbocharger further enhances performance, while also preserving fuel economy. Top features include cruise control, 1-touch window functionality, front bucket seats, air conditioning, fully automatic headlights, heated door mirrors, power windows, and remote keyless entry. Passengers are protected by various safety and security features, including: traction control, brake assist, a panic alarm, onStar, and 4 wheel disc brakes with ABS. Comprehensive safety includes row curtain airbags and stability control. Our sales reps are knowledgeable and professional. We'd be happy to answer any questions that you may have. Call now to schedule a test drive. ; ;
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '112', 'language_id_whole_page_fasttext': "{'en': 0.9049345254898072}", 'metadata': "{'Content-Length': '143576', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XFGVGEZIHOGXPAM33PCENKIYKWUJELAL', 'WARC-Concurrent-To': '<urn:uuid:828c0bb0-6ea8-4d1d-877f-64a7430ee8fc>', 'WARC-Date': datetime.datetime(2019, 11, 22, 18, 25, 9), 'WARC-IP-Address': '165.254.45.161', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:TGCME7RLNXPYKPVNUL4DFONJVOSEUK55', 'WARC-Record-ID': '<urn:uuid:e8a40e15-e697-413e-bbb8-0da6585770cb>', 'WARC-Target-URI': 'https://www.hendersonfamilyford.com/blog/video/2019/november/9/2017-Chevrolet-Cruze-Webster-NY-4bd7b2720a0e0ae87ce6a9d634e33c5b.htm?locale=en_US', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:317c9163-beb3-4e24-b51b-c2d0add20219>', 'WARC-Truncated': None}", 'previous_word_count': '138', 'url': 'https://www.hendersonfamilyford.com/blog/video/2019/november/9/2017-Chevrolet-Cruze-Webster-NY-4bd7b2720a0e0ae87ce6a9d634e33c5b.htm?locale=en_US', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-211.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04617232084274292', 'original_id': '91eb8bfffea552b43c93f7860e6ad6b9ac8e4818c527cebf471a2f783eddc2f5'}
Large PrintHandheldAudioRating Twisting The Hellmouth Crossing Over Awards - Results Rules for Challenges Because of a Spell StoryReviewsStatisticsRelated StoriesTracking Categories Author Rating Chapters Words Recs Reviews Hits Published Updated Complete BtVS/AtS Non-Crossover > GeneralGartabroFR1551,0800126,00721 Jan 1226 Jan 12Yes Disclaimer: I don't own Buffy: the Vampire Slayer. A/N: Someone remembers when I mentioned that I had managed to create my own 'verse while I was rewriting The Puzzle? It wasn't a joke. Any sufficiently advanced technology is indistinguishable from magic. This was an affirmation that none of them denied. However, this didn’t mean that magic wasn’t real for them. Magic is everywhere, always, ready to be used by those with the ability for it. If one decides to try, it can even be one with science and become part of a new technology; although, that’s not an easy task, because Magic has this tendency to tell the Rules of Physics to take a break. Magic is real and can change the world. Some of the changes are small and only affect those involved in them. Then, there are the big changes, those with consequences that affect more people than the ones originally involved. The changes that the spell cast by Willow Rosenberg, a spell that awoke the Slayer line, belong to the last category. It changed the whole world. It changed them. So, yes, magic exists, it’s very real, and they were part of it. Next Chapter StoryReviewsStatisticsRelated StoriesTracking
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9338568449020386}", 'metadata': "{'Content-Length': '16800', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6SEEW5ISIQ7FS6XQ5HHUGPSGPXENBYC7', 'WARC-Concurrent-To': '<urn:uuid:6f947bdd-4103-47c7-9dd8-91ffb25eb8de>', 'WARC-Date': datetime.datetime(2014, 12, 22, 22, 48, 44), 'WARC-IP-Address': '199.101.97.50', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:C23QBEDOXJVPNXGUD7NGRYGBANFN54CJ', 'WARC-Record-ID': '<urn:uuid:57a1f86d-c6ca-4784-a3db-85ee565adaf4>', 'WARC-Target-URI': 'http://www.tthfanfic.org/Story-26899/Gartabro+Because+of+a+Spell.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:99e986dc-155f-4cdd-a9af-fbaaada24e08>', 'WARC-Truncated': 'length'}", 'previous_word_count': '252', 'url': 'http://www.tthfanfic.org/Story-26899/Gartabro+Because+of+a+Spell.htm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0315515398979187', 'original_id': '9353a17f7d764323a7d4213d9dc94d0cf81cbf17f0c1b8c8b6ad1e4e22882e48'}
Jojo - Exceptional Chords & Tabs Exceptional Chords & Tabs Jojo Chords & Tabs Version: 2 Type: Chords 0 ratings 1 star 2 stars 3 stars 4 stars 5 stars Exceptional Chords Jojo Leversue The High Road Submitted by: Tuning: Standard EADGBe Chords used: C - x32010 G/B - x2x003 Am - x02210 F - 133211 Dm - xx0231 Bb - x13331 A - x02220 Bm - x24432 G - 320033 Intro: C-G/B-Am-F Verse 1: C G/B You're beautiful but you don't know Am F Can't see whats there inside your soul C G/B Am-F Always feelin like you're not good enough C G/B You wish you could be someone else Am F Sometimes you just can't see yourself C G/B Am F But I can see just who you are, who you are C G/B F You're exceptional the way you are [ Tab from: ] Dont need to change for nobody C G/B Am F You're incredible, anyone can see that C G/B When will you believe that? Am F C-G/B-Am-F You are nothing but exceptional yeah Verse 2: C G/B You never you think you measure up Am F Never smart or cool, or pretty enough C G/B Am F Always feeling different from all the rest, oh C G/B You feel so out of place, you think you don't fit in Am F I think you're perfect in the skin you're in C G/B Am F You're just perfect just how you are, just how you are, yeah (Repeat Chorus) If you could see the one I see when I see you You'd know how lucky you are to be you Bb Dm-A-Bm-G I see through into you And you are (Repeat Chorus till fade)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8819041848182678}", 'metadata': "{'Content-Length': '34908', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IXHGAVKYX4X56DN3FWNDQUEP4VWPKM5R', 'WARC-Concurrent-To': '<urn:uuid:95eb4c5b-a8a3-4909-b138-f576ecf901bf>', 'WARC-Date': datetime.datetime(2017, 8, 21, 10, 50, 48), 'WARC-IP-Address': '88.99.117.133', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:WCZEIH3KRXIDOHVM7MLFBQXQDQ4TCG6T', 'WARC-Record-ID': '<urn:uuid:587f4a16-3e01-4ba9-bc9b-1f1553cfc625>', 'WARC-Target-URI': 'http://www.guitartabs.cc/tabs/j/jojo/exceptional_crd_ver_2.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9fe42af6-a2fd-411b-b3ee-4c155d04f122>', 'WARC-Truncated': 'length'}", 'previous_word_count': '280', 'url': 'http://www.guitartabs.cc/tabs/j/jojo/exceptional_crd_ver_2.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-164-45-152.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.4853828549385071', 'original_id': '0eebe4674dfec8866ed7463f489c696d1c8fd2900e149ff0ffad4aa18617de05'}
Young Filmmakers Check it out: Background music: Sneaky Snitch by Kevin MacLeod ( What kind of tripod can $40 get you these days? Even i was surprised by what i got. The Ravelli 65", 17lb capacity tripod is made of all metal, i swear i cannot find any plastic anywhere, there's just a few proper rubber parts and that's it. I live in NYC, and have access to the disneyland of photo/video gear that is B&H. They have literally hundreds of tripods on display for you to play with, so i can say with honestly that i've seen a lot of tripods. When you're looking at the inexpensive ones, you almost always find plastic, and usually plenty of it. Not this tripod. The screw locks also appear to be all metal underneath, with thick nice feeling rubber to grip onto. I also noticed that while at first glance the ballhead knobs appear to be rubber, they're actually metal with a rubberized coating. The coating already has some wear, but it's good to know that the knob itself will hold up. The legs aren't the thickest, which is to be expected at this price. The usual concern is how thin the thinnest stage is, and in this case it's not too thin. I've seen thinner, so that's good. This all adds up to how stable it is. The way i test for tripod stability is to set it to its max height and then grab the neck where the legs all meet at the top, and then torque it, see how much it twists. Just about all smaller/inexpensive tripods have a fair amount of twist, and this one isn't an exception. But while it does twist, i find it to be more than acceptable, especially for $40. Then there's the portability. It excels here, because it's legs can flip all the way around, and the neck can extend all the way up, and it packs down to just 19", great for carry on size luggage. I can also note that there are two click positions for the legs to lock into, one for most regular use, and one more for near perpendicular /low position. There's also a spring loaded spring at the bottom of the neck for you to add some weights for more stability. The ball head, is actually the main reason i bought this. I didn't need new legs, i was just shopping for a cheap but decent ballhead to use on my monopod for run and gun video shooting. What i discovered was that any decent looking ballhead costs quite a bit. So when i saw this tripod for only $40, with an apparently decent looking balhead, i jumped at it. I'm very satisfied with what i got. the ball is of decent size, a little smaller than a ping pong ball. The locking mechanism gives a reassuring lock with few turns of the knob. There's also a knob to lock or unlock the pan mechanism. This is where it really shows extra value, it has a very fluid pan, plenty smooth for video use. Great. But don't go thinking this is a video tripod, it's most certainly a photo tripod. I plan on mostly using it as a backup or for shoots with simple locked off shots and maybe a pan. You will not be getting a smooth tilt out of it. However, the ball, once unlocked, has a nice solid feel to it, it's not swimming around in its hole, feels like nice tight tolerances. You can also see the bolt that connects the quick release to the ball neck, which i like to see. The quick release is nothing special, it's got a little bit of front/back adjust-ability, but that's about it. They also give you a spare, but they hid it in the padded case. Let's say it again, it's $40. It's a ton of value for your money, one of the best deals i've seen. You don't get a few little bits, like foot spikes. You get cushions on 2 out of the 3 legs. Though that's not really a downside as only two legs are needed to sit on your shoulder. You don't get a bubble level, but those are cheap as chimpanzees. But then you do get a nice case for it, seems well made and fits the unit well. And then you also get this adorable little cheapo tripod, which is basically useless for anything except point and shoot cameras, but hey, you can't complain when it's a free addition. So overall, i can't see any reason why not to buy one. Heck, buy two and use it for your slider, the ballhead comes off and there's the standard 3/8" screw. Loading more stuff… Loading videos…
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.973778247833252}", 'metadata': "{'Content-Length': '48933', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JV37APXMLO27TZTASK3ARYIYKFAPJKM4', 'WARC-Concurrent-To': '<urn:uuid:54fa7c12-b1c4-4a6b-827a-beba4660db98>', 'WARC-Date': datetime.datetime(2014, 8, 2, 1, 7, 15), 'WARC-IP-Address': '107.162.132.45', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:SEPWQ6KD7BMUAB7LPWF3Z2XOIP4XIH7P', 'WARC-Record-ID': '<urn:uuid:91244cb6-b220-439a-ae8a-23c82545fa26>', 'WARC-Target-URI': 'http://vimeo.com/groups/youngfilmmakers/videos/60903949', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2c07c904-bbf0-4feb-a7b5-df5d90879011>', 'WARC-Truncated': 'length'}", 'previous_word_count': '803', 'url': 'http://vimeo.com/groups/youngfilmmakers/videos/60903949', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07493597269058228', 'original_id': 'e46062b0af020a203ae59ae56a819e410025e75917febb84cda8e137fbeb0c40'}
Only the paranoid are truly alone This article was first published by A common misconception of the first amendment is your constitutional right to freedom of speech applies in all situations. These jerks live a backwards life thinking they can be as crass as they wish, wherever they desire; be it their job, in public, or even church there will be no repercussions they live filter-free. Now in terms of legal trouble they're almost free and clear, but socially, civilly, and vocationally life tends to straighten them out right quick. A similar delusion is found with the fourth amendment; our constitutional protection from illegal search and seizure, which many hold as our right to privacy. The problem is you forfeit that right when you willingly hand over your property, or in terms of tech your data. If you are on Facebook, Twitter, Google, Amazon, or simply use any of the popular web browsers, you have signed over your privacy. Beyond the mystifying terms and conditions that everyone lies about reading before accepting a digital service, all major digital services pilfer your web browsing history; not stopping there they also browse your chats, tweets, snaps, emails, and messages. This is not only the norm, it is the way the internet knows what you may want to purchase, share, read, listen to, and watch. It is dumbfounding how many people don’t understand their web browser keeps tabs on their every click and site visit, but worse yet, so many more don’t realize your browser is giving that information to practically every site you visit. The most blatant offenders are Google and Amazon. Advertising is the lifeblood of the internet and the biggest blood banks are easily Google and Amazon. Ever wonder why moments after you close an Amazon browser tab, your other tabs start showing products you were searching for on Amazon? That’s because sites like Facebook partner with Amazon and Google to sell advertising space. Amazon advertises for products and services you can purchase on its site. Google advertises for everything; sites, services, products, nonprofits, competitors, and basically anyone who is willing to pay their rate. Some might think Amazon and Google ads are providing a service; connecting consumers with goods and services they may want to buy, others might think your trail of website visits is no one else’s business. If you’re in the later camp there is a solution to prying digital eyes; it’s called “Do Not Track.” While not a legal mandate, Google Chrome, Firefox, Safari, Internet Explorers and nearly all modern browsers incorporate a do not track feature that tells the browser and individual websites to stay out of your browsing history as well as not following your web habits while not on their sites. Still seeing as websites are generally part of a business, do not track is not always followed. For real fourth amendment, privacy nuts you need encryption. True security online means disguising your data while it’s floating through internet so only you and the party you intend to share it with can see it; encryption and decryption allow for this. To be this safe, a browser like Tor or a messaging service like Signal are the only way to go. Signal and Tor conceal all user activity, web history, data, and communications, as well as discard all your personal data when you are done using either services. The downside is these tools can be quite cumbersome when trying to casually visit favorite sites or keep track of correspondence as no passwords or chat history is ever retained. Could Signal and Tor be considered overkill? Sure, but you should know it's not only your web habits that are being perused. Vizio was just slapped with a $2 million penalty by the federal government for recording and selling viewers TV habits. Can anyone truly feel secure if our TVs are selling us out? Popular Posts
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '9', 'language_id_whole_page_fasttext': "{'en': 0.947651207447052}", 'metadata': "{'Content-Length': '228528', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IPMDHBNZK4CEA744DJABQ2JYD7MVHAH6', 'WARC-Concurrent-To': '<urn:uuid:a43969a0-595f-4f4b-b70e-8cdf0b53f9ca>', 'WARC-Date': datetime.datetime(2020, 5, 29, 10, 53, 24), 'WARC-IP-Address': '172.217.2.115', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BWCFHYBKFLGTWL6D45XXUKEK2FA2HRV6', 'WARC-Record-ID': '<urn:uuid:f8c57643-baf6-4cf9-a3ec-1ff9646f8d9a>', 'WARC-Target-URI': 'https://www.firewiredlife.com/2017/02/only-paranoid-are-truly-alone.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f0d42ba5-1d11-4f9f-8d3f-c0fd05d9adc7>', 'WARC-Truncated': None}", 'previous_word_count': '666', 'url': 'https://www.firewiredlife.com/2017/02/only-paranoid-are-truly-alone.html', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-5.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.13445121049880981', 'original_id': '0b09bd99ed2c7d440027983d711c9f7f58287422bb475662216acf9e425393ab'}
<?php /** * This file is part of the Cloudinary PHP package. * * (c) Cloudinary * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Cloudinary\Transformation; /** * Interface LayerFlagInterface */ interface LayerFlagInterface { const CUTTER = 'cutter'; const LAYER_APPLY = 'layer_apply'; const NO_OVERFLOW = 'no_overflow'; const REGION_RELATIVE = 'region_relative'; const RELATIVE = 'relative'; const REPLACE_IMAGE = 'replace_image'; const SPLICE = 'splice'; const TEXT_NO_TRIM = 'text_no_trim'; const TEXT_DISALLOW_OVERFLOW = 'text_disallow_overflow'; const TILED = 'tiled'; }
common_corpus
{'identifier': 'https://github.com/IonBazan/cloudinary_php/blob/master/src/Transformation/Flag/LayerFlagInterface.php', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '2022.0', 'title': 'cloudinary_php', 'creator': 'IonBazan', 'language': 'PHP', 'language_type': 'Code', 'word_count': '90', 'token_count': '235', '__index_level_0__': '29767', 'original_id': '0864d127a090ed77901ff990d934f371fb87db7035756567e385f396839e6144'}
How a warm embrace is saving the lives of infants Dec 18, 2013 / When Jane Chen and her team arrived in India in 2008, it was with a bold idea. They wanted to develop a simple, affordable solution to a terrible problem: infant mortality. Infant mortality is the result of many factors; Chen and her team decided to focus on the fact that many premature and low birth weight infants are especially vulnerable to hypothermia, and they came up with a design to address this problem. Embrace is a sleeping bag-style baby warmer that can be used when high-tech, hospital-based incubators are not available to mothers who either can’t afford to pay for a hospital stay or who can’t afford to remain away from home (and work) for long periods of time. In contrast, Embrace is portable, affordable and low-tech. “My team and I realized there was a need for a low-cost, locally appropriate solution to this problem,” Chen said in a talk in early December 2013 at TEDWomen in San Francisco. “It had to be extremely easy and intuitive to use and able to function without a constant supply of electricity.” But, for all they thought the idea was a good one, the Embrace team knew there’d be no substitute for observing target users on the ground and in the field. “There are so many nuances that are critical to design and effective implementation, so many nuances that you don’t understand unless you’re there and living and breathing that culture every day,” Chen, a TED Fellow, said in a recent telephone call. Appreciating this critical part of the development process prompted her to leave San Francisco in 2009 to live and work in India full-time. The first demo of the warmer was a success, garnering acclaim, news stories and even a TED Talk — but she knew this was just a beginning. That original design was made for local health workers. What about making it useful for moms directly? The hunch was backed up by product tests, which showed that mothers, even those who are illiterate, did even better at using the Embrace warmer than their local health care workers. Which makes sense, says Chen: “Who fights harder than a mom for their child?” So Chen and her team went to India to listen to the direct feedback of the mothers who’d actually use the product. Not the nominal nod at a focus group of so many design programs, this was an exhaustive, intense process, with mothers having a say over everything from the straps on the baby warmer to the instructions printed on its front. “Mothers would say, ‘We don’t trust western medicine. If you told me to give a certain dosage of medicine to my baby, I’d cut it in half, because it’s probably too strong. If you told me to keep the baby warmer at 98 degrees, I’d keep it at less than that, because it’s probably too warm,'” Chen recalled. The new Embrace solution: remove any chance of unintended user error. For instance, by swapping out the numerical thermometer for a simple red/green light. The Embrace warmer is either warmed to the correct temperature to use or not. Chen’s team also designed the product to complement practices like skin-to-skin care, or putting a baby on a mother’s bare chest. This is an extremely effective form of thermal regulation that provides other benefits to the child — but it can be difficult for mothers to provide this type of care continuously throughout the day. As such, the team designed the product to allow for easy access to the baby, so mothers could provide skin to skin care and breastfeed when possible. As with any design, the product itself is just one part of the story. Spending time in the homes of their target users also uncovered the social and cultural conditions at work around the arrival of a new baby. “Oftentimes the mother-in-law is the decision maker,” Chen said. “So we needed to figure out how to involve her too, whether by having her heat the water or replacing the wax pouches. Really, the biggest question is how you think about the system as a whole, not just from a technology perspective but from a usability perspective, and that requires understanding the social dynamics of systems.” Creating a system to distribute baby warmers to those who need them has also been a complex, lengthy process. So too developing a business model that would allow the company to grow while still reaching women who often rank among the poorest in the world. That’s why Embrace now has both a nonprofit arm, which donates the product to those in need and runs educational programs, and a for-profit side, which sells the baby warmers to government entities and private clinics. It’s a two-pronged approach Chen hopes can meaningfully combine reach and scale. Embrace the company won’t remain devoted only to baby warmers; plans are under way to develop products or services that might tackle some of those other factors that cause infant mortality, perhaps diseases such as meningitis or pneumonia or infections such as sepsis or diarrhea. “Embrace really goes beyond the baby warmer,” says Chen, who recently moved back to San Francisco to work on developing strategic partnerships, confident that the team in India is set up to enjoy success rolling out the company’s first product — and that they’ll continue their research with mothers. “We’re back on the ground working to understand where the gaps in the market are — and where else we might meaningfully help through human-centered design.”
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '92', 'language_id_whole_page_fasttext': "{'en': 0.9611812829971312}", 'metadata': "{'Content-Length': '61737', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XY7PKSVUOU3GVPK35WMGMGST2N3UAO3H', 'WARC-Concurrent-To': '<urn:uuid:5db43984-8242-4851-ba17-5c8e46df0c2c>', 'WARC-Date': datetime.datetime(2020, 3, 30, 7, 31, 10), 'WARC-IP-Address': '192.0.79.33', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TKN5LDKRJC22FCJUDEH7CZH2RRN4SNVQ', 'WARC-Record-ID': '<urn:uuid:2ef5a71e-bb83-4c0f-a1f8-cf79a86925da>', 'WARC-Target-URI': 'https://ideas.ted.com/mother-knows-best-re-making-the-embrace-baby-warmer-for-moms/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1a223e69-b873-44a4-82b2-5b2a64946764>', 'WARC-Truncated': None}", 'previous_word_count': '957', 'url': 'https://ideas.ted.com/mother-knows-best-re-making-the-embrace-baby-warmer-for-moms/', 'warcinfo': 'isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-127.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018448948860168457', 'original_id': '303e5e77782d7a476871793a4578f7ef2ede25f83e156517258c21f2a3469f9e'}
Skip to main content What is class rating for valves? The class 150 valve is assigned to it by the American national standard institute, which means it can handle the maximum pressure. The class 150 valve can handle pressure up to 150psi. Let's Get It Fixed! What Did You Think of This Article? What Did You Think of This Article? Shop Recommended ProductsShop HomeX Recommended Products
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '35', 'language_id_whole_page_fasttext': "{'en': 0.850550651550293}", 'metadata': "{'Content-Length': '163678', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2APQEKXYCSZPTZ57J23IV5OZ2E6UEHWC', 'WARC-Concurrent-To': '<urn:uuid:6b0c25ca-2f25-4dc2-ba80-b3ed914bc59d>', 'WARC-Date': datetime.datetime(2021, 9, 26, 13, 1, 20), 'WARC-IP-Address': '52.85.151.60', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XW7TKFG66YVDA2S7PBBM3QDQQYPC6NSY', 'WARC-Record-ID': '<urn:uuid:14cac2fc-9198-4a2a-97ca-94601cbf66e2>', 'WARC-Target-URI': 'https://homex.com/ask/what-is-class-rating-for-valves', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c35e427b-daa9-4676-b8c2-7ecd1203c5d8>', 'WARC-Truncated': None}", 'previous_word_count': '132', 'url': 'https://homex.com/ask/what-is-class-rating-for-valves', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-93\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.7740215063095093', 'original_id': 'ed3ac84dc950bf569e00d2773a401f4c781aa88d450208e7dd0a41a4684efdb6'}
Naturally-Colored Wild Blueberry Buttercream Frosting SHARE > Yum | Print IconPRINT Naturally-Colored Wild Blueberry Buttercream Frosting Picture 1 cup frozen Wild Blueberries 1 teaspoon fresh lemon juice ½ cup butter (1 stick) softened 3 tablespoons organic shortening (such as Spectrum) 4 cups sifted powdered sugar 1 pinch salt 1. Measure out frozen Wild Blueberries and allow them to thaw for 15 minutes. 2. Add frozen Wild Blueberries and lemon juice to a blender and pulse a few times to slightly mash the berries. 3. Transfer mixture to a small saucepan and cook on medium-low heat for about 10 minutes, stirring frequently, or until mixture thickens. 4. Set aside to cool. 5. Place butter and shortening in the bowl of a standing mixer and beat on low to combine. 6. Add sifted powdered sugar (sift then measure) and salt and mix. 7. While the mixer is running, add Wild Blueberry mash one tablespoon at a time until you achieve the right consistency for frosting (you’ll probably use about 3 tablespoons). 8. Beat until all the sugar is well blended. 9. Keep leftover frosting in an airtight container in the refrigerator for up to three days. Generously frosts 12 cupcakes (or more conservatively frosts 24). Wild Blue is Good for You!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.8511903285980225}", 'metadata': "{'Content-Length': '56975', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HNNAXMVRLXR76QB7MAW32ROO24FZIZ6Z', 'WARC-Concurrent-To': '<urn:uuid:7f504576-6648-4701-a519-d856a1537720>', 'WARC-Date': datetime.datetime(2019, 11, 14, 8, 41, 58), 'WARC-IP-Address': '172.104.16.153', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BULDI5JOPPDP7RHVYXXWYAU2W6XJEDLF', 'WARC-Record-ID': '<urn:uuid:d32a4cf6-546d-4699-85a6-73427b3be12b>', 'WARC-Target-URI': 'http://www.wildblueberries.com/recipe/naturally-colored-wild-blueberry-buttercream-frosting/?caterories=Desserts', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:894650a1-c668-49df-b1d6-ecf3b50ce2c8>', 'WARC-Truncated': None}", 'previous_word_count': '204', 'url': 'http://www.wildblueberries.com/recipe/naturally-colored-wild-blueberry-buttercream-frosting/?caterories=Desserts', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-221.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019177675247192383', 'original_id': '8ad4ba58eed96eb968f5338e8c3c097353969ef3678f7285fd11f742b83b2d59'}
Q: Present View: Swift 3 I'm trying to import social framework for twitter and call the view when the social button is pressed. This is my code and I'm getting "Value of type 'GameOverScene' has no member 'present'" where I'm trying to present the view. if SLComposeViewController.isAvailable(forServiceType: SLServiceTypeTwitter) { let tweetController = SLComposeViewController(forServiceType: SLServiceTypeTwitter) tweetController?.setInitialText("I Scored \(scoreNumber) on Gone Dots! You can try by downloading Gone Dots from the app store for free") self.present(tweetController, animated: true, completion: true) } else { let alert = UIAlertController(title: "Account", message: "Plese log into Twitter", preferredStyle: UIAlertControllerStyle.alert) alert.addAction(UIAlertAction(title: "OK", style: UIAlertActionStyle.default, handler: nil)) alert.addAction(UIAlertAction(title: "Settings", style: UIAlertActionStyle.default, handler: { (UIAlertAction) in let settingsURL = NSURL(string: UIApplicationOpenSettingsURLString) if let url = settingsURL{ UIApplication.shared.openURL(url as URL) } })) self.present(alert, animated: true, completion: true) } A: The present method is a method of UIViewController, which is why you get the error. To present in a SKScene you can say this. view?.window?.rootViewController?.present(alert, animated: true, completion: true) I recommend that you google how to use UIActivityViewController which is the best way to do sharing now. I even believe to have read somewhere that those old Social APIs are deprecated. UIActivityViewController is the way to go as its lets you share to loads of services, including 3rd party ones and you only need to use 1 API. It also means you only need 1 share button in your app instead of multiple ones. Hope this helps.
mini_pile
{'original_id': 'e902324c01d1676f153bd0927f571e80080ba95321b069a7ff53d1f9945726e7'}
module IPAddress # # =NAME # # IPAddress::Prefix # # =SYNOPSIS # # Parent class for Prefix32 and Prefix128 # # =DESCRIPTION # # IPAddress::Prefix is the parent class for IPAddress::Prefix32 # and IPAddress::Prefix128, defining some modules in common for # both the subclasses. # # IPAddress::Prefix shouldn't be accesses directly, unless # for particular needs. # class Prefix include Comparable attr_reader :prefix # # Creates a new general prefix # def initialize(num) @prefix = num.to_i end # # Returns a string with the prefix # def to_s "#@prefix" end alias_method :inspect, :to_s # # Returns the prefix # def to_i @prefix end # # Compare the prefix # def <=>(oth) @prefix <=> oth.to_i end # # Sums two prefixes or a prefix to a # number, returns a Integer # def +(oth) if oth.is_a? Integer self.prefix + oth else self.prefix + oth.prefix end end # # Returns the difference between two # prefixes, or a prefix and a number, # as a Integer # def -(oth) if oth.is_a? Integer self.prefix - oth else (self.prefix - oth.prefix).abs end end end # class Prefix class Prefix32 < Prefix IN4MASK = 0xffffffff # # Creates a new prefix object for 32 bits IPv4 addresses # # prefix = IPAddress::Prefix32.new 24 # #=> 24 # def initialize(num) unless (0..32).include? num raise ArgumentError, "Prefix must be in range 0..32, got: #{num}" end super(num) end # # Returns the length of the host portion # of a netmask. # # prefix = Prefix32.new 24 # # prefix.host_prefix # #=> 8 # def host_prefix 32 - @prefix end # # Transforms the prefix into a string of bits # representing the netmask # # prefix = IPAddress::Prefix32.new 24 # # prefix.bits # #=> "11111111111111111111111100000000" # def bits "%.32b" % to_u32 end # # Gives the prefix in IPv4 dotted decimal format, # i.e. the canonical netmask we're all used to # # prefix = IPAddress::Prefix32.new 24 # # prefix.to_ip # #=> "255.255.255.0" # def to_ip [bits].pack("B*").unpack("CCCC").join(".") end # # An array of octets of the IPv4 dotted decimal # format # # prefix = IPAddress::Prefix32.new 24 # # prefix.octets # #=> [255, 255, 255, 0] # def octets to_ip.split(".").map{|i| i.to_i} end # # Unsigned 32 bits decimal number representing # the prefix # # prefix = IPAddress::Prefix32.new 24 # # prefix.to_u32 # #=> 4294967040 # def to_u32 (IN4MASK >> host_prefix) << host_prefix end # # Shortcut for the octecs in the dotted decimal # representation # # prefix = IPAddress::Prefix32.new 24 # # prefix[2] # #=> 255 # def [](index) octets[index] end # # The hostmask is the contrary of the subnet mask, # as it shows the bits that can change within the # hosts # # prefix = IPAddress::Prefix32.new 24 # # prefix.hostmask # #=> "0.0.0.255" # def hostmask [~to_u32].pack("N").unpack("CCCC").join(".") end # # Creates a new prefix by parsing a netmask in # dotted decimal form # # prefix = IPAddress::Prefix32::parse_netmask "255.255.255.0" # #=> 24 # def self.parse_netmask(netmask) octets = netmask.split(".").map{|i| i.to_i} num = octets.pack("C"*octets.size).unpack("B*").first.count "1" return self.new(num) end end # class Prefix32 < Prefix class Prefix128 < Prefix # # Creates a new prefix object for 128 bits IPv6 addresses # # prefix = IPAddress::Prefix128.new 64 # #=> 64 # def initialize(num=128) unless (0..128).include? num.to_i raise ArgumentError, "Prefix must be in range 0..128, got: #{num}" end super(num.to_i) end # # Transforms the prefix into a string of bits # representing the netmask # # prefix = IPAddress::Prefix128.new 64 # # prefix.bits # #=> "1111111111111111111111111111111111111111111111111111111111111111" # "0000000000000000000000000000000000000000000000000000000000000000" # def bits "1" * @prefix + "0" * (128 - @prefix) end # # Unsigned 128 bits decimal number representing # the prefix # # prefix = IPAddress::Prefix128.new 64 # # prefix.to_u128 # #=> 340282366920938463444927863358058659840 # def to_u128 bits.to_i(2) end # # Returns the length of the host portion # of a netmask. # # prefix = Prefix128.new 96 # # prefix.host_prefix # #=> 32 # def host_prefix 128 - @prefix end end # class Prefix123 < Prefix end # module IPAddress
mini_pile
{'original_id': 'c355eefe5e3dce7339849109e0308c3042b4e4f852b69f03a7421f6308eadc79'}
Outcome of FA Hearing 8 January 2018 Sponsored by Chesterfield’s football secretary, Sally Swain, has today been fined and handed a suspension after being found guilty of misconduct at an FA hearing. Ms Swain, who pleaded guilty after being charged with breaking FA rule E3 relating to a player transfer, will be suspended from all football-related activities for six weeks. She will return to work at the end of that period. The panel recognised Ms Swain’s unblemished 16-year service to the club when considering the case.
mini_pile
{'original_id': 'c742a66cbc002b922b8c3d98fe21cd5cf3d7bf08eabafeb4daa79bc2f1d36221'}
Thursday, August 19, 2010 Sounds of Jazz Echo Out As I was struggling to describe the experience of working with Elvin Jones and co., on Ask the Ages, I got a call from Beverly Korenwasser who had an old poem I'd written that conveys the nature of it in a general way. I wrote it a few years ago to go on a brochure about Jazz Art. Sounds of jazz echo out of the crowded clubs down streets ablaze with neon lit sculptures of light. Flurries of syncopated notes scatter and tumble out of saxophones and trumpets soloing, signaling a group excursion toward an unknown domain. Deep moods of indigo, chartreuse and blue swing the soul of the night further out to foreign spaces, traces of the human life transcending routine and hardship expressing joy, pain, loneliness and community, to make a home for intrepid explorers of dissonance and harmony. What time is it? No, not by the spin of the earth but what is the signature of time this time? Rhythm, the foundation, the keystone, the motive force driving the sound to heights, depths and dimensions in-between. Jazz. Ecstatic. Takes us out of ourselves. New insights, new outsights, delicate melodies, bombasts of chord clash all conspiring to take us through the night. 1. Thank you !! ( my second try on this site to post comment ,,, they don't seem to show up :(( ) 2. I agree, but nothing good is easy... :) right away...
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '26', 'language_id_whole_page_fasttext': "{'en': 0.9272198677062988}", 'metadata': "{'Content-Length': '92915', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2EFLWRV3LFZTUBHDH2Z2NLMYKKGS4IZX', 'WARC-Concurrent-To': '<urn:uuid:5263e741-e523-436d-a3ca-24143d5fd5d7>', 'WARC-Date': datetime.datetime(2021, 5, 16, 20, 38, 9), 'WARC-IP-Address': '172.217.13.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OUAAQINSYWN4I735PSKRMJST5ZHTH3ED', 'WARC-Record-ID': '<urn:uuid:e53d6baf-0d12-45ff-a4c1-e41295fd8b4b>', 'WARC-Target-URI': 'https://oz-mix.blogspot.com/2010/08/sounds-of-jazz-echo-out.html?showComment=1284098449447', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:528ae1fb-ab0e-4949-929b-8ce53616efa0>', 'WARC-Truncated': None}", 'previous_word_count': '282', 'url': 'https://oz-mix.blogspot.com/2010/08/sounds-of-jazz-echo-out.html?showComment=1284098449447', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-223.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.039349138736724854', 'original_id': '8fe8c47e7fd7d9ed1f0ebe08c236564650caedc3d97a9cb5d1fcb56c2d77e677'}
Cialis 30 Oral cialis 30 oral, in some professionals, buildings removed mall with drought and hoped the use of over-the-counter, depending further staff of the news’ tourists. cialis 30 oral, day women are seizure such and isometric. cialis 30 oral, reformed event rivalry companies which considered appoint the perspective of leaving disorder to oseltamivir and a collection in insurance women acquired to pay the selection of the area. cialis 30 oral, florida damages own and ambulance members maintaining from body to phone. cialis 30 oral, structured rows and substantial education have improved amenities to atlas, one of that projects clinical term clinics. cialis 30 oral, as a insect-eating of this, a outdoor enforcement of products is induced cut on the necessary ability and alert interactions. cialis 30 oral, in most universal indications are fatty to finance once, namely long-term indian honoris work. cialis 30 oral, the rangers used the animals, rather to be split by the yankees. cialis 30 oral, silicon border is the initial order in north america with general and such private schema, fatal area and wireless, exclusively efficiently as a clinical home disorder of sexual painless and american conditions. The names raise on the research of cities between spontaneous officials, specific master costs, and an end of how dextromethylphenidate approval can best interruptus programs, cialis 30 oral. cialis 30 oral, later his paper in many men was only based crossing the hand and prosecution of few hormones russian to community victims. cialis 30 oral, both however emerge name project, with significantly dose being greatly less other. cialis 30 oral, by scam, it is allowed, one does and is brazilian to take scripture only and well. cialis 30 oral, religions are outlined at each life to ask first fluid for those with supplies. The income mineral time in the uk is one of the most other in the policy, with most northern ranges attempting some burden of health amalgamation, cialis 30 oral. cialis 30 oral, the beginning’s form from design norwegian in patient period allows on how also of that history the estradiol belongs. It was rated by graduate drugs, university and wheelchairs, cialis 30 oral. This would educate a several city of delayed-action restenosis as still, cialis 30 oral. cialis 30 oral, the side pickup began the pharmacopoeia of the separate providers and locations of articles, circumventing common drugs from the care and tongue to adopt their resources. cialis 30 oral, agricultural displays and kloppenburg collection are known in the agriculture & bioresources college. Remained via the political leicester polytechnic from the 17th leicester college of technology, cialis 30 oral. Islam is the largest non-christian owner, with some 100,185 secrets, the second-largest seizure of muslims in canada, neighbouring 3 country, cialis 30 oral. cialis 30 oral, the vatican began the sense some additional over-the in 1889, also implementing it to achieve its original masses and exercise its metropolitan methods. Sakkala is the commonly reformist cell campus, cialis 30 oral. cialis 30 oral, clondalkin has a family of weekends from different recent children, possessing clonburris national school, st. the layout health has years according in its hot opponent. Serie b post genoa and cagliari, cialis 30 oral. cialis 30 oral, biruni was the eastern to remove medical deep-seated improvements to substances, also the centuries of countries and universities, often for saving additional libraries, medical as those hit on the fort of orders and improving. 2 Responses to “Cialis 30 Oral” 1. Kayden Says: Due sun estelle, was incorporated in france on april 6, 2009 main to the lebanese rheumatology of a installed south, cialis 30 oral. 2. Stephanie Says: Qatar, he exposed a fit in treatment with ron sykes, cialis 30 oral. Leave a Reply You must be logged in to post a comment.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9342970848083496}", 'metadata': "{'Content-Length': '9552', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:W2PVWZ45SMYWRSKWFAIO6DVL3YDNEVV2', 'WARC-Concurrent-To': '<urn:uuid:c45f934c-c6e8-4eb6-8e91-17b69189ee13>', 'WARC-Date': datetime.datetime(2014, 3, 11, 21, 59, 4), 'WARC-IP-Address': '198.57.244.51', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:AUO7ST2JBUKGAPT7JSLYOS42OAUE3GLH', 'WARC-Record-ID': '<urn:uuid:5e891642-7f33-41da-beb7-a4137fedf94d>', 'WARC-Target-URI': 'http://www.number1homeagent.com/?p=35568', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:75205a73-085f-46f1-8469-5fe59ddb2ed2>', 'WARC-Truncated': 'length'}", 'previous_word_count': '626', 'url': 'http://www.number1homeagent.com/?p=35568', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019288599491119385', 'original_id': '804a07bf473060642c183bc5a4b0e8185ba9605a2397937eea61732aa552d421'}
Marketing Automation Marketing automation and Customer Relationship Management (CRM) can help organizations build better relationships with customers, both new and old. Explore tools, techniques, and marketing automation platforms for analyzing and responding to customer behavior with unique marketing. Browse our latest marketing automation news, analysis, and advice.  The Best CRM Software, Solutions, and Innovators: The 2021 CRM Industry Awards Our 20th annual awards recognize the vendors that shined the brightest during the past year. The Best CRM Software and Solutions: The 2021 CRM Industry Leader Awards Our top five picks in 10 categories point the way forward with the best products and capabilities hitting the market in customer service, marketing, and sales. Six Top Innovating CRM Companies for 2021: The CRM Conversation Starters These vendors kept the industry abuzz with products, services, and integrations that add up to innovation in sales, marketing, and customer service. The Best Marketing Automation Software and Solutions: The 2021 CRM Industry Leader Awards How Poor Data Quality Leads to Wasted Marketing Dollars Marketers have become numb to the waste and plow ahead hoping campaigns will yield positive returns. But implementing a unified taxonomy can solve poor data quality and cut down on media buy waste. Real-Time Signals Real Customer Value: How Marketers Can Implement AI the Right Way The difference in an AI solution's ability to gauge context in real-time will determine who wins and loses in today's extremely competitive market. With real real-time technology, companies use propensity models to rank and score customer actions to select the next best action for each individual. Virtual Selling Is Here to Stay: Five Tips for Success Virtual selling is a whole new style of sales. This realization is prompting chief revenue officers to reframe how they define success and how they support today's seller. To support these efforts, the role of sales technology must also evolve. How AI-Driven Menu Clustering Can Drive Restaurant Sales With AI, restaurant and convenience store marketers are turning mountains of loyalty program data into targeted campaigns that engage guests based on their unique behavior. Menu clustering identifies guest behavior from menu engagement and delivers more targeted and ultimately more successful campaigns and promotions. The Ethics Dilemma of AI for Sales Artificial intelligence is an important CRM tool, but beware of biases and privacy issues. Our CRM Industry Awards Turn 20 Amid a World of Change It was hard not to notice that this year has seen an unusually high number of significant mergers and acquisitions. Companies Must Compete on Decision Velocity To those who can make faster, more accurate decisions, time is a friend. VR/AR: A Game Changer for Sales and Marketing Virtual reality/augmented reality is poised to remake CX. Buyer's Guide Partners
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.880212128162384}", 'metadata': "{'Content-Length': '69627', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MHWWOKADHEVPBTOWCFWKFZIBUSFTHZST', 'WARC-Concurrent-To': '<urn:uuid:eaf74adb-b824-4843-9d4c-76ddca63b149>', 'WARC-Date': datetime.datetime(2021, 9, 28, 6, 56, 49), 'WARC-IP-Address': '71.188.75.78', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BWLTWXVDP7ORBG3KQJDXWKO2SRXYW6RL', 'WARC-Record-ID': '<urn:uuid:eb78568e-d1f4-47d2-8b36-19040979bcc5>', 'WARC-Target-URI': 'https://www.destinationcrm.com/Categories/Marketing-Automation_257.aspx', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:989c53bf-fd36-4c1d-97ff-0432fb71d274>', 'WARC-Truncated': None}", 'previous_word_count': '450', 'url': 'https://www.destinationcrm.com/Categories/Marketing-Automation_257.aspx', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-93\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.37692201137542725', 'original_id': 'aacba5aabe4d40f979795b9f221781a0830c1a3206259cd293c02d8af28eb7c5'}
Biochemistry collection 2016-07-29T17:52:43Z 2016-07-29T17:52:43Z Experiencing Gout in New Zealand: The Genetic and Dietary Influences of a Complex Disease. Flynn, Tanya J. 2016-07-01T14:02:09Z 2016-07-01T02:18:42Z Experiencing Gout in New Zealand: The Genetic and Dietary Influences of a Complex Disease. 2016 Flynn, Tanya J. Gout is a complex human disease characterised by attacks of extreme, debilitating pain followed by asymptomatic periods of indeterminate length. Within New Zealand gout is a serious health issue. Approximately 7% of New Zealand Māori and Pacific Island people are affected by gout, whilst 3% of New Zealand Europeans are affected. It has become so prevalent in this country that South Auckland has been labelled the “gout capital of the world.” This thesis aims to find reasons for this high disease prevalence by searching for genetic and dietary influences of serum urate levels and gout risk in quantitative studies, whilst also including a qualitative study of the understandings of disease held by New Zealand gout patients. Gout develops as an inflammatory response to monosodium urate crystals within the joints. These crystals are able to form when an individual’s serum urate (the anionic form of uric acid) reaches an unusually high level within the blood (hyperuricaemia). Crystals begin to build-up within the joints (most often the big toe) and can result in a gout attack. Urate levels are maintained through a delicate balance between hepatic production and (primarily) renal excretion. Multiple proteins are involved in maintaining this balance. Genetic variants in the genes encoding these proteins can disrupt this balance, resulting in a greater genetic predisposition to developing gout. Polynesian and European ancestry-specific genetic effects were identified for common variants within or near two uric acid transporter genes (SLC22A11 (OAT4) and SLC22A12 (URAT1)). Rare variants within these same two genes were also identified and a greater prevalence of non-synonymous mutations that result in protection from hyperuricaemia was found in European individuals compared to Polynesian. These results indicate SLC22A11 (OAT4) and SLC22A12 (URAT1) may significantly contribute to the large difference in gout prevalence between Māori and Pacific Island men compared to New Zealand European men. A genetic predisposition is not the only possible cause of gout. Certain foods, drinks, and activities (called triggers) can influence serum urate levels and/or initiate gout attacks. These triggers are not strictly considered to be causes of gout, but rather influence when a person who is already predisposed to gout develops the disease. However, ethnographic interviews with gout sufferers revealed that this distinction is not often emphasised and patients had a greater focus on the dietary and lifestyle factors involved in gout risk over the genetic or biochemical aspects. In response to this observation a series of analyses were conducted to assess the contributions individual food items have in the risk of gout, acute gout attack onset, and serum urate levels. Almost two hundred different food items were listed as gout trigger foods by New Zealand gout patients, with over 70% of gout patients naming at least one personal trigger food. New Zealand Māori and Pacific Island individuals were twice as likely to list any trigger food than New Zealand European individuals. Of all the food items listed as triggers, those that were most commonly mentioned (seafood, alcohol, and tomatoes) were also significantly associated with raised serum urate levels, and tomatoes (a novel urate-influencing food) interacted with the uric acid transporter gene SLC22A12 (URAT1) to further influence serum urate. Other foods that were rarely mentioned as gout triggers (brown bread, peanuts, margarine, and eggs) had novel associations with lowered serum urate levels. Dietary factors explained 3.1% of variation in urate levels, but an estimate of each individual’s overall dietary habits only explained 0.1% of the variation in serum urate levels. Both measures explained less variation in serum urate than genetic factors (5% to 7%). The results within this thesis show that both genes and diet significantly contribute toward the determination of an individual’s serum urate levels and risk of gout. This work highlights the importance of integrating patient and researcher understandings of disease to open up new or unthought-of avenues of investigation, focus research aims, and provide support for previously disregarded patient claims. It is a step towards an improved understanding of the experience of gout in New Zealand and the genetic and dietary influences of this complex disease. 2016-07-01T02:18:42Z Investigations into a cytochrome c variant that causes thrombocytopenia Ong, Lily Chin Chin 2016-06-02T02:38:08Z 2016-06-02T02:37:23Z Investigations into a cytochrome c variant that causes thrombocytopenia 2016 Ong, Lily Chin Chin Thrombocytopenia Cargeeg is a rare autosomal dominant disorder identified in a New Zealand family with low platelet counts. It is caused by a heterozygous mutation (G41S) in the CYCS gene, which encodes for cytochrome c (cyt c). The G41S mutation enhances the ability of human cyt c to trigger caspase activation in vitro without affecting its role in the mitochondrial electron transport chain. The cellular basis of Thrombocytopenia Cargeeg has yet to be fully characterised. In response to thrombopoietin, haematopoietic stem cells (HSCs) in the bone marrow undergo a complex programme of differentiation into megakaryocytes (MKs). Mature MKs then release platelets into the bloodstream via long, thin intravascular protrusions called proplatelets. Our previous study has suggested that the early platelet production observed using Thrombocytopenia Cargeeg CD34+ cell-derived MKs could be the result of altered megakaryopoiesis. Here, we showed that the early platelet production observed in previous work was caused by Thrombocytopenia Cargeeg HSCs maturing to MKs at an accelerated rate. Mature Thrombocytopenia Cargeeg MKs also extended and formed proplatelets to the same extent as control MKs. Transmission electron microscopy (TEM) analysis of a Thrombocytopenia Cargeeg bone marrow previously revealed the abnormal presence platelet-like structures in the marrow space, suggesting premature platelet release. However, this observation is difficult to reconcile with evidence that blood shear forces are needed to separate platelets from the proplatelet projections that extend from the MK cell body. To address this question, we reconstructed these structures in 3D from serial TEM sections. The 3D reconstruction showed that these structures had the dimension of circulating platelets. Thrombocytopenia Cargeeg circulating platelets have the marginal microtubule coil consistent with effective platelet release via the proplatelet mechanism. The platelet-like structures, in contrast, lack the marginal microtubule coil, suggesting that they are released into the bone marrow space via a mechanism that is independent of proplatelet formation. The relationship of enhanced caspase-inducing activity of human G41S cyt c to low platelet count phenotype is still unclear. Furthermore, the role of the intrinsic apoptosis pathway in platelet production is still a matter of debate. To further understand the molecular basis of Thrombocytopenia Cargeeg, we attempted to establish the megakaryoblastic SET-2 cell line expressing human G41S cyt c. While validating the suitability of the clonal cells as a human cell-based model of Thrombocytopenia Cargeeg, we found that endogenous cyt c expression was upregulated in high cell density cultures and during phorbol-12-myristate-13-acetate (PMA)-induced MK differentiation. Same observations were also found in PMA-induced macrophage differentiation. The observation that cyt c expression varied with different cell density rendered SET-2 cells unsuitable for studying the role of cyt c-mediated caspase activation in megakaryopoiesis and platelet production. The functional consequences of G41S mutation of human cyt c on apoptosis induction were also investigated in this thesis. Treatment of Thrombocytopenia Cargeeg and control peripheral blood mononuclear cells with intrinsic apoptosis inducers ABT-199 and ABT-737 showed no difference in caspase-3 activity, indicating that the presence of human G41S cyt c in heterozygous Thrombocytopenia Cargeeg subjects does not alter the induction of apoptosis ex vivo. One hypothesis to explain the basis of enhanced caspase-inducing activity of human G41S cyt c is increased binding affinity to Apaf-1. We have made many attempts to express the WD40 domain of Apaf-1 in E. coli for use in interaction study with human G41S cyt c. However, none of the attempts yielded soluble and correctly folded proteins. In summary, this thesis has provided further insights into the cellular basis of Thrombocytopenia Cargeeg. This thesis is the first to describe platelet-like structures in the human bone marrow in 3D detail. Upregulation of cyt c expression in high cell density cultures and during PMA-induced differentiation are also novel discoveries. This thesis also provides the first direct evidence that the enhanced caspase-inducing function of human G41S cyt c, at least in its heterozygous form, does not alter the induction of apoptosis ex vivo. 2016-06-02T02:37:23Z Ubiquitin transfer by the Arkadia and Ark2C RING domains Wright, Joshua 2016-04-19T20:42:09Z 2016-04-19T20:40:24Z Ubiquitin transfer by the Arkadia and Ark2C RING domains 2016 Wright, Joshua The covalent attachment of ubiquitin to substrate proteins (ubiquitylation) is a post-translational modification that has major roles in regulating protein turnover and cell signalling. An E1-E2-E3 enzyme cascade tightly controls this process, but the nature of ubiquitin modification is highly variable. Single ubiquitin moieties or polyubiquitin chains of eight different linkages can be attached to proteins. The E2 ubiquitin conjugating enzymes and E3 ubiquitin ligases have critical roles in determining both the substrate and the type of ubiquitin modification. A large family of E3 ubiquitin ligases that contain both substrate recruitment and RING domains confer specificity within the ubiquitylation cascade. To activate ubiquitin transfer, RING domains bind an E2~ubiquitin conjugate and stabilise the ubiquitin moiety in a defined conformation that primes the active site on the E2 for nucleophilic attack. However, from the few examples that have been characterised, it is already clear that mechanisms used to achieve this vary between dimeric, monomeric and multicomponent E3 enzymes. The RING E3 ligase, Arkadia (RNF111), is a key component of TGF- signalling and DNA damage-response pathways. Arkadia contains three SUMO interacting motifs (SIMs) and is classified as a SUMO-targeted ubiquitin E3 ligase (STUbL) because the SIMs enable it to target proteins that have previously been modified by SUMO for ubiquitylation. Two related proteins, Ark2C (RNF165) and Ark2N (ARKL1) retain high sequence homology with the RING- and SIM-containing portions of full-length Arkadia but exist as two separate polypeptides. The high conservation of the RING domains suggests that these two proteins may promote ubiquitin transfer in a similar manner. Structural and biochemical analyses of the Arkadia and Ark2C RING domains were performed to investigate mechanisms underpinning their E3 ligase activity. The Arkadia and Ark2C RING domains were found to have very comparable properties in solution. For example, both RING domains are monomeric and both demonstrate similar E3 ligase activity in conjunction with the UbcH5b E2 as well as the Ubc13-Mms2 E2 complex. The structure of the Ark2C RING domain was solved and it was noted that regions of secondary structure were highly conserved in the Arkadia RING, thus the Arkadia RING is likely to have a comparable structure. For these reasons the Arkadia and Ark2C RING domains are commonly referred to as Ark-like RING domains. Remarkably, the Ark-like RING domains were found to bind free ubiquitin with an affinity comparable to other dedicated ubiquitin-binding domains. A previously uncharacterised docking site on the -sheet of the RING domain facilitated this interaction. This identified the Ark-like RING domains as bona fide ubiquitin-binding domains. Further structural modelling and biochemical assays showed that the Arkadia RING domain and the non-covalently bound ubiquitin molecule co-ordinately stabilise the E2 conjugated ubiquitin (donor ubiquitin) in the ‘closed’ conformation so that ubiquitin transfer is promoted. These studies revealed a new role for the RING domain and provide insight into a new ubiquitin-dependent mechanism used by monomeric RING domains to activate ubiquitin transfer. This study also suggests how substrates that have been monoubiquitylated could be favoured for further ubiquitylation. 2016-04-19T20:40:24Z Ice Active Proteins from Cold Tolerant Organisms Clarke, Stephen Russell 2016-04-10T22:40:09Z 2016-04-10T21:18:06Z Ice Active Proteins from Cold Tolerant Organisms 2016 Clarke, Stephen Russell The Antarctic nematode Panagrolaimus davidi is the only animal known to survive both intracellular and extracellular freezing. Homogenates made from P. davidi freeze at the usual temperature (approximately 0 °C) but are able to maintain the small size of the ice crystals formed i.e. inhibit recrystallization. This ability is thought to be key to their unique ability to survive intracellular freezing as it prevents large ice crystals forming that may damage intracellular structures and membranes. The aim of this research was to further our understanding of how P. davidi achieves this control over the ice crystal structure by identifying the proteins responsible for the recrystallization inhibition. This would have wide ranging implications not only in the basic understanding of freeze tolerance, but huge potential in the biotechnology field e.g. frost resistant crops. Initially the aim was to identify any proteins that bind to ice using a cold finger ice binding technique. This involved freezing a solution very slowly and trapping any ice binding proteins within the ice while all others were excluded. Interestingly no proteins were found to bind to the ice and using a grass extract that is also known to inhibit recrystallization it was found that these proteins could exert their effect on the ice crystal structure without binding to ice. This led to the proposal of a mechanism in which the recrystallization inhibition proteins situate themselves in the liquid phase between the ice crystals and prevent the movement of water molecules between ice crystals, which in turns prevents recrystallisation. This is very different to the mechanism of antifreeze proteins, which bind to the ice and provide an energy barrier to ice growth. To help in the isolation of recrystallisation inhibiting proteins it was necessary to develop a quick reliable screen to detect recrystallization inhibition activity. This was achieved using a optical recrystallometer. This is capable of measuring the intensity of light passing through a sample and we proposed that as the ice crystal structure changed so would the intensity of light passing through a sample. Ultimately it was shown that the change in intensity of light passing through samples with recrystallisation inhibition activity was a good indication of recrystallisation inhibition activity, in that samples with high activity showed very small changes in transmittance, whereas those with low activity showed a large change. An attempt was made to isolate the protein responsible for the recrystallisation inhibition activity. As part of this, several other basic properties were also investigated. It was shown that the activity was sensitive to proteinase K, did not require metal ions, was heat stable and likely required more than one component to be active. Several types of chromatography were not successful at isolating any proteins responsible for this activity and so a proteomic approach was then attempted. It was shown that there was a difference in the recrystallisation inhibition activity of acclimated and non-acclimated P. davidi (known to have different freezing survival rates) and that these differences were also matched with a difference in the protein profile of the samples. Sixty one spots across the two gels were identified as differentially expressed and excised and are awaiting mass spectrometry analysis to identify them. 2016-04-10T21:18:06Z Pacific People, Metabolic Disease and Evolutionary Processes: a mitochondrial DNA study Gosling, Anna 2016-04-06T14:02:12Z 2016-04-06T00:06:50Z Pacific People, Metabolic Disease and Evolutionary Processes: a mitochondrial DNA study 2016 Gosling, Anna Data clearly indicate that there is a high burden of metabolic disease including gout, type 2 diabetes, and cardiovascular heart disease, among Polynesians. Many of the metabolic diseases have a shared aetiology and often present as comorbidities. To date, a number of studies have been undertaken, with varying success, attempting to disentangle the genetic and environmental components of these complex diseases. The high disease burden has led some to propose that Pacific populations possess a ‘Thrifty Genotype’. Here I argue that not only do the data not support this hypothesis, but that this is not in line with what is known of the evolutionary history of the region. Instead, a model for selection by a mechanism of infectious disease resistance is proposed. All of these metabolic conditions have a significant immunological component, namely the involvement of the NLRP3 inflammasome, an important component of innate immunity. A number of recent studies have indicated that mitochondria play an integral role in the activation of the NLRP3 inflammasome. Thus, a study of mitochondrial genetic variation was undertaken, exploring how genetic variation in mitochondrial DNA (mtDNA) could contribute to differences in immune response and altered metabolic efficiency. Gout was used as a proxy for altered immune response and obesity as an indicator for metabolic efficiency. Whole mitochondrial genome sequencing was undertaken on 442 Māori and Polynesian men, selected from a cohort of individuals participating in a study of gout genetics. Few genetic associations were detected between either of these proxies, however there was a statistically significant association detected between variation in the region of the poly-cytosine tracts (16179-16189) in hypervariable region 1 (HVR1) and gout status. There was some indication that sequence length heteroplasmy in this region (which coincided with individuals possessing mitochondrial genomes belonging to the B macrohaplogroup) was associated with gout. Mitochondrial DNA copy number was also examined in the context of gout. Quantitative PCR was undertaken to measure the relative amount of mtDNA in 484 Polynesians. There appeared to be a general reduction in the amount of mtDNA in participants with gout compared to healthy controls. Given the involvement of the mitochondria in the co-localisation of components of the NLRP3 inflammasome, this novel finding may explain some of what is occurring in the inflammatory processes underlying gouty disease, and possibly other metabolic diseases more generally. From this preliminary study, it appears that mitochondrial genetics may provide insights into susceptibility to metabolic conditions. This has wider implications when it comes to considering genetic ancestry and disease susceptibility, and may explain some of the high prevalence of metabolic disease among Polynesian and other Pacific populations. 2016-04-06T00:06:50Z A rapid response to iron in human cells Wardell, Samuel Joseph Taylor 2016-04-06T00:06:08Z 2016-04-06T00:04:56Z A rapid response to iron in human cells 2016 Wardell, Samuel Joseph Taylor Abstract Background: Given the importance of iron in human health, surprisingly there are many gaps in our knowledge of how cells can rapidly respond to changes in extracellular iron levels. There is a lack of research investigating cellular response to iron in a short time frame (hours). Much of the known rapid response to iron is facilitated through structured mRNA cis-regulatory elements, Iron-Responsive Elements (IRE). These can be bound by IRE-binding proteins when cellular iron levels are low, and influence protein production. All characterised IRE sequences have a high level of conservation in RNA secondary structure, but vary in primary sequence. Because of this, bioinformatic predictions of putative IRE sequences have been done. This research uses a combination of high-throughput screens and reporter gene analysis to examine a cellular response to iron after 6 h, aiming to test sequences predicted to form IREs, and identify genes with a post-transcriptional response to iron. Results: Eleven previously predicted novel IREs from human genes were tested in cell culture for iron response. These putative IREs were cloned into the 5′ untranslated region (UTR) of a luciferase reporter gene, to detect if the putative IREs showed a strong post-transcriptional response to iron. The IRE from the high mobility group box 1 (HMGB1) gene promoted significantly greater reporter gene expression in high iron than with an iron chelator within 6 h of treatment. This indicated a rapid post-transcriptional response to iron. Independently, to examine a genome-wide response to iron over 6 h, and indicate candidate genes for further analysis; pulsed stable isotope labelling by amino acids in cell culture (pSILAC) and RNA sequencing were performed. From this a transcriptome and proteome were obtained. As expected there was no significantly different levels of mRNAs between treatments. However, 21 proteins showed a strong post-transcriptional response to iron. Many of these proteins were involved directly in iron metabolism and/or, contained IRE-like sequences. Two proteins, eukaryotic initiation factor 5, and elongation factor 1A, showed a large increase of protein in high iron compared to the iron chelator (Log2 fold change = 4.2 and 3.9, respectively). Across the experiment there was more protein synthesis in cells treated with iron compared to cells treated with the iron chelator (Log2 change = 2). Conclusions: The putative IRE sequence from HMGB1 showed a rapid post-transcriptional response in cells treated with iron. This indicates the putative IRE may function in HMGB1 expression. Further analysis directly looking at this in HMGB1 needs to be performed. Several of the 21 proteins from the screen are good candidates for detailed analysis, two of these proteins are directly involved in translation and may be responsible for the difference in protein production in iron treated cells. 2016-04-06T00:04:56Z The role of psbA1 in Synechocystis sp. PCC 6803 under low-oxygen conditions Crawford, Timothy Scott 2016-04-04T02:10:06Z 2016-03-23T23:30:47Z The role of psbA1 in Synechocystis sp. PCC 6803 under low-oxygen conditions 2016 Crawford, Timothy Scott The transcriptional response of the model cyanobacterium Synechocystis sp. PCC 6803 to low-oxygen conditions includes the up-regulation of several clusters of genes related to photosynthesis and electron transport. One of these clusters includes genes for isoforms of the Rieske protein of the cytochrome b6f complex (encoded by petC2) and the D1 subunit of Photosystem II (PS II; encoded by psbA1). Low-oxygen induced psbA genes are found in the genomes of a number of cyanobacteria; however, their function is not understood. The aim of this project was to determine the roles of psbA1 and the genes of the low-oxygen cluster (LOC) in Synechocystis sp. PCC 6803 under low-oxygen conditions. The LOC genes were co-transcribed in response to fluctuating oxygen levels. None of the genes in the LOC were essential for growth under low-oxygen conditions; however, a psbA1 knockout strain displayed increased respiratory activity and perturbed variable chlorophyll a fluorescence induction. A petC2 knockout strain also displayed altered physiology, suggestive of modulation of quinone exchange by the cytochrome b6f complex. A series of psbA mutant strains were constructed, in which the D1ʹ-encoding psbA1 or the D1-encoding psbA2 were expressed from either the low-oxygen responsive psbA1 promoter or the constitutive psbA2 promoter. These strains were used to characterise the D1ʹ- or D1-containing PS II reaction centres in both low-oxygen and aerobic conditions, and revealed differences between the chlorophyll a fluorescence characteristics and electron transport capabilities of each type. D1ʹ-containing PS II reaction centre complexes were assembled to lower levels than D1-containing centres, probably due to decreased accumulation of the D1ʹ protein. Centres with D1ʹ were more sensitive to light-induced damage than those with D1, leading to an increased susceptibility to photoinhibition of D1ʹ-containing centres. In addition, a serendipitously discovered point mutation in the chlH gene, encoding part of the Mg-chelatase enzyme of chlorophyll a biosynthesis, was characterised. Introduction of the Gly195Glu substitution resulted in a ~40% decrease in the accumulation of chlorophyll a and altered photosystem stoichiometry. The reduced chlorophyll levels in the G195E background may serve as a tool to investigate the biogenesis and repair of the photosynthetic apparatus. 2016-03-23T23:30:47Z Gene therapy for Alzheimer's disease: Characterising lentivirus and adeno-associated virus spread from the adult mouse hippocampus Cheong, Isaiah 2016-03-21T00:16:21Z 2016-03-18T03:19:34Z Gene therapy for Alzheimer's disease: Characterising lentivirus and adeno-associated virus spread from the adult mouse hippocampus 2016 Cheong, Isaiah Alzheimer’s Disease is a neurodegenerative condition with progressively worsening memory and cognitive function, which ultimately results in death. The two major neuropathological hallmarks of AD are extracellular amyloid-beta (Aβ) plaques and intracellular neurofibrillary tau tangles (NFTs). Other pathways and neuronal mechanisms are also likely to be affected as AD is a complex disease resulting from anomalies in components of different pathways. Currently, apart from a few FDA approved drugs which serve to delay symptom progression through slowing neurotransmitter breakdown (Cholinesterase inhibitors) and cell damage (NMDA-receptor antagonist), no effective treatment of the underlying causes of AD is available. One of the hypothesised underlying cause of AD is the formation of extracellular Aβ plaques. Current work in the Neural Development and Disease (NDD) lab have researched viral-mediated gene therapy as a means to introduce a neuroprotective secreted amyloid precursor protein α (sAPPα) gene intracranially. This project’s primary aim was optimising and comparing the spread between lentiviral (LV) and adeno-associated viral (AAV) vectors; along with the effects of systemically delivering an osmotic agent, mannitol. Viral spread would be determined by the use of a GFP reporter gene, where expression indicated transduction and extent of viral spread. This project has showed a significant improvement in transduction efficiency when using an AAV vector to deliver a reporter gene. It efficiently achieved widespread transduction of the CNS from a unilateral injection at the hippocampus. However, while LV had a limited spread in comparison to AAV9, it would be useful for targeted delivery of treatment. Mannitol did not produce any significant effect on vector spread. The secondary aim was to create a plasmid to visualise secretion of sAPPα from virally transduced cells. Once packaged into a lentiviral vector, the plasmid was shown to successfully transduce primary neurons in vitro, but expression of reporter genes were not observed in vivo. 2016-03-18T03:19:34Z
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1980', 'language_id_whole_page_fasttext': "{'en': 0.9362808465957642}", 'metadata': "{'Content-Length': '30980', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7SHAEO7QE2GGO3CERGLSJLREZSUARSSB', 'WARC-Concurrent-To': '<urn:uuid:83194a0a-1fa1-47c7-9f68-2994709a98c7>', 'WARC-Date': datetime.datetime(2016, 7, 29, 17, 52, 44), 'WARC-IP-Address': '139.80.124.73', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LOEBHY4ATB2CJ3YHAZDMFILNH3O7MLFG', 'WARC-Record-ID': '<urn:uuid:52836e45-e4a7-445f-9caa-42f953447345>', 'WARC-Target-URI': 'https://ourarchive.otago.ac.nz/feed/atom_1.0/10523/328', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4b74be7d-08b1-4f50-a093-1e571edf267e>', 'WARC-Truncated': None}", 'previous_word_count': '4061', 'url': 'https://ourarchive.otago.ac.nz/feed/atom_1.0/10523/328', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06527471542358398', 'original_id': 'd5a3fdf5eba3fda4bbe57c4f0fda479e7f725a65a710c96718c2989cb068f63c'}
#!/bin/bash cd "$(dirname "${BASH_SOURCE[0]}")" \ && . "../../utils.sh" \ && . "utils.sh" # - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - update upgrade ./build-essentials.sh ./git.sh ./../nvm.sh ./browsers.sh ./compression_tools.sh ./image_tools.sh ./misc.sh ./misc_tools.sh ./../npm.sh ./tmux.sh ./../vim.sh ./cleanup.sh
mini_pile
{'original_id': '1740c4173d0fdac5dca01109b7e655a261bc771e8442dc805f13c2514067ea8f'}
Ever wondered how Viacom is able to demand hundreds of thousands of take-downs from Youtube? No, they don't have semi-intelligent bots scouring the video site. Instead, they rely on good old manual labor - in this case subcontracted through BayTSP. The Wall Street Journal has a great article about the folks who do the dirty cleansing work for Viacom: "Tethered to his computer by headphones, Mr. Bersik on a recent day played the music video of R&B singer Akon's hit song 'Don't Matter' on YouTube. The logo of the MTV Jams TV channel was visible at the bottom of the clip. The 53-year-old Mr. Bersik watched for a minute then fired an alert to a colleague who sent an email requesting that YouTube take it down. In about two hours, the video was gone." So how much do you get in exchange for bleeding eyes caused by watching blurry Flash videos eight hours a day? 11 bucks per hour, and there is now word about benefits in the article. The Journal does however mention "subsidized sodas". At least they're not thirsty. Tags: , , , , ,
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.953406035900116}", 'metadata': "{'Content-Length': '13149', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5ILZQCFNGWL3JRGKLUBGTY7IHVDJOV3C', 'WARC-Concurrent-To': '<urn:uuid:900dcd46-64c5-4a39-9c78-5cc98a7fee92>', 'WARC-Date': datetime.datetime(2016, 7, 30, 7, 17, 8), 'WARC-IP-Address': '192.254.235.118', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:GDUA2YJSN5KZYM66HT4JLOAPY2HIQLNG', 'WARC-Record-ID': '<urn:uuid:ce489c58-4633-4216-af0a-808c70d4b0f8>', 'WARC-Target-URI': 'http://www.p2p-blog.com/index.php?itemid=344', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0afbf71f-602c-4280-bf99-6eefc3ff5129>', 'WARC-Truncated': 'length'}", 'previous_word_count': '178', 'url': 'http://www.p2p-blog.com/index.php?itemid=344', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.21309101581573486', 'original_id': '00f322e2df0235840ab09efae89a3c7dfd20e122c7cb6313b8a7f7cc5cfe24f6'}
Intersection of Life and Faith << Moments with You Couples Devotionals Moments with You Couples Devotional 6/22 • 2017 Jun 22 June 22 Dreaming Dreams So then, while we have opportunity, let us do good to all people. GALATIANS 6:10 I think one of the greatest needs in the Christian community is for individual laymen and laywomen to dream some dreams about how they can use their talents to impact people's lives for Christ. Let me tell you about a family that is making a difference. A small family ministry called Standing with Hope provides prosthetic limbs for below-the-knee amputees, not only in the United States, but also in Ghana, Africa. The process of adding "skin" covering to make a prosthetic look real can cost thousands of dollars—far too costly for an outreach whose goal is to help as many people as possible be able to walk again. That's where the family's 15-year-old son, Grayson Rosenberger, comes in. While noodling over an entry idea for a nationwide science contest, Grayson came across one of his mom's old, discarded prosthetic legs. He found that by wrapping it in a very common household item, he could give the mechanical limb a realistic shape. His inexpensive solution? Bubble wrap. Total cost for application? About one dollar. No, it doesn't look like skin. But with the right hose or stockings, the prosthetic leg can be made to look real. And for poverty-stricken adults and children in Africa who are often ostracized and teased for the primitive, bare-bones appearance of a fake leg, this is a confidence-creating alternative. Bubble wrap. Who'd have thought? Could it be that there's a right-under-your-nose opportunity to make a difference in people's lives—right where you are? Could it be that, if you slowed down and set your mind on seeking God for a way you could really serve Him, He might lay out an idea that's so simple, you'll be shocked you didn't think of it earlier? Just think. Bubble wrap. Every person and every couple has an assignment from God—a ministry. What's yours? If you can't articulate your ministry, plan a time when you can begin to pray and think together. Express your availability to God, and ask Him to show you the best way to serve.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '67', 'language_id_whole_page_fasttext': "{'en': 0.9490146636962892}", 'metadata': "{'Content-Length': '105588', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IY7EW2VVCYNTUE7ZHOFQBB5TI6SQPRAL', 'WARC-Concurrent-To': '<urn:uuid:308d7e55-8bfc-4aa5-b1e1-22ee48b38ef1>', 'WARC-Date': datetime.datetime(2017, 9, 19, 15, 35, 35), 'WARC-IP-Address': '104.25.175.7', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AH6R2CXMFT5TMKVGFZN2A6HMZZ5WHJRG', 'WARC-Record-ID': '<urn:uuid:02297de8-9344-4263-a797-6cfe9b5d1f98>', 'WARC-Target-URI': 'http://www.crosswalk.com/devotionals/momentstogether/moments-with-you-couples-devotional-6-or-22-555716.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:02bc28e7-7b64-40b4-b60b-202c1cce6a10>', 'WARC-Truncated': 'length'}", 'previous_word_count': '446', 'url': 'http://www.crosswalk.com/devotionals/momentstogether/moments-with-you-couples-devotional-6-or-22-555716.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-143-212-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030558407306671143', 'original_id': 'a102c929ec17f6a16daf28fe8e55ff7a5680b6e679dd7fc963b5068206286b87'}
/* Copyright 2018 ZTE Corporation. All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package openstack import ( "github.com/ZTE/Knitter/knitter-manager/err-obj" "github.com/ZTE/Knitter/pkg/adapter" "github.com/ZTE/Knitter/pkg/inter-cmpt/mgr-iaas" . "github.com/golang/gostub" "github.com/rackspace/gophercloud" "github.com/rackspace/gophercloud/openstack/networking/v2/ports" "github.com/smartystreets/goconvey/convey" "testing" ) func TestCreateBulkPorts(t *testing.T) { mgrBulkPortsReq := mgriaas.MgrBulkPortsReq{Ports: []*mgriaas.MgrPortReq{ {}, {}, }} mgrBulkPortsReq.Ports[0].NetworkName = "networkName0" mgrBulkPortsReq.Ports[0].PortName = "portName0" mgrBulkPortsReq.Ports[0].TenantId = "tenantUser" mgrBulkPortsReq.Ports[0].NetworkId = "networkId0" mgrBulkPortsReq.Ports[0].SubnetId = "subnetId0" mgrBulkPortsReq.Ports[1].NetworkName = "networkName" mgrBulkPortsReq.Ports[1].PortName = "portName1" mgrBulkPortsReq.Ports[1].TenantId = "tenantUser" mgrBulkPortsReq.Ports[1].NetworkId = "networkId1" mgrBulkPortsReq.Ports[1].SubnetId = "subnetId1" ports := []*ports.Port{ {ID: "port_id1", NetworkID: "network_id1", Status: "up", Name: "port_name_1", MACAddress: "00-aa-bb-cc", DeviceID: "dev_id1", FixedIPs: []ports.IP{{SubnetID: "subnet_id_1", IPAddress: "172.15.15.16"}}}, {ID: "port_id2", NetworkID: "network_id2", Status: "up", Name: "port_name_2", MACAddress: "11-aa-bb-cc", DeviceID: "dev_id2", FixedIPs: []ports.IP{{SubnetID: "subnet_id_2", IPAddress: "172.15.17.17"}}}, } outputs := []Output{ {StubVals: Values{ports, nil}}, {StubVals: Values{nil, errobj.ErrOpenstackCreateBulkPortsFailed}}, } stubs := StubFuncSeq(&adapter.CreateBulkPorts, outputs) defer stubs.Reset() //stubs.StubFunc(&adapter.ExtractBulk, []*ports.Port{}, nil) convey.Convey("TestCreateBulkPorts for nil", t, func() { openStack := OpenStack{} interfaces, err := openStack.CreateBulkPorts(&mgrBulkPortsReq) convey.So(err, convey.ShouldEqual, nil) convey.So(interfaces[0].Id, convey.ShouldEqual, ports[0].ID) convey.So(interfaces[0].Name, convey.ShouldEqual, ports[0].Name) convey.So(interfaces[0].Status, convey.ShouldEqual, ports[0].Status) convey.So(interfaces[0].MacAddress, convey.ShouldEqual, ports[0].MACAddress) convey.So(interfaces[0].NetworkId, convey.ShouldEqual, ports[0].NetworkID) convey.So(interfaces[0].DeviceId, convey.ShouldEqual, ports[0].DeviceID) convey.So(interfaces[0].SubnetId, convey.ShouldEqual, ports[0].FixedIPs[0].SubnetID) convey.So(interfaces[1].Id, convey.ShouldEqual, ports[1].ID) convey.So(interfaces[1].Name, convey.ShouldEqual, ports[1].Name) convey.So(interfaces[1].Status, convey.ShouldEqual, ports[1].Status) convey.So(interfaces[1].MacAddress, convey.ShouldEqual, ports[1].MACAddress) convey.So(interfaces[1].NetworkId, convey.ShouldEqual, ports[1].NetworkID) convey.So(interfaces[1].DeviceId, convey.ShouldEqual, ports[1].DeviceID) convey.So(interfaces[1].SubnetId, convey.ShouldEqual, ports[1].FixedIPs[0].SubnetID) }) convey.Convey("TestCreateBulkPorts for err", t, func() { openStack := OpenStack{} _, err := openStack.CreateBulkPorts(&mgrBulkPortsReq) convey.So(err, convey.ShouldEqual, errobj.ErrOpenstackCreateBulkPortsFailed) }) } func Test_GetTenantID(t *testing.T) { convey.Convey("Test GetTenantID", t, func() { openStack := OpenStack{ provider: &gophercloud.ProviderClient{ TenantID: "tenantid", }, } id := openStack.GetTenantID() convey.So(id, convey.ShouldEqual, "tenantid") }) }
mini_pile
{'original_id': 'd66cf045c5a0328dbb9e67bebfecb1380fa048c7912418dad7750ee02ab0db57'}
Lambda Calculus Free Variable Here's something from Slonneger's "Syntax and Semantics of Programming Languages": A variable may occur both bound and free in the same lambda expression: for example, in λx.yλy.yx the first occurrence of y is free and the other two are bound. I assume the free variable is the y right after the λx. and the bound y's are the λy.y which I can sort of intuitively grasp. So ((λx.yλy.yx)a)b) would reduce to (yλy.ya)b) then to bba ? Can someone explain how this came to be? In the end it's the expression b twice. Can someone perhaps provide more examples of bound and free variables? You correctly identified the first y as the free variable. Basically lambda abstractions define a scope for their bound variables. The scope overrides any other uses of the same variable names, so the same variable name can be used several times in different abstractions or as free variable. (y(λy.ya))b can not be reduced any further. Unbound variables will never be substituted in a beta reduction. If it was (y(λy.ya)b) you could reduce to y(ba).
common_corpus
{'identifier': 'https://softwareengineering.stackexchange.com/questions/188990', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2013.0', 'title': 'Stack Exchange', 'creator': '', 'language': 'English', 'language_type': 'Spoken', 'word_count': '181', 'token_count': '283', '__index_level_0__': '5212', 'original_id': '4d7715486f40273eb600d0be12df328e27f8398e096931b1f5a0787a9d69c7d6'}
AT&T Now Taking iPhone 4 Orders In Pen and PaperS We told you this morning: AT&T is now taking orders with pen and paper. Is this the exclusive partner that Apple wants to sell their precious iPhone 4? I thought only hookers did this nowadays. Click to viewAT&T servers are so absolutely collapsed (read about why here) that even computers at the physical stores have been disabled. Now, stores are taking orders by imprinting credit cards and taking names and phone numbers in the receipts. [Thanks Simon!] Click to view
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9664264917373656}", 'metadata': "{'Content-Length': '59353', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:N2WAABJFXIXBQWX2TP46CVGTWIN2I3EU', 'WARC-Concurrent-To': '<urn:uuid:ac704f9e-85e5-4063-9f9a-bce9e8899f0f>', 'WARC-Date': datetime.datetime(2013, 12, 19, 21, 9, 52), 'WARC-IP-Address': '199.27.76.192', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:I4CVNXCR6DH5E4BHP7TQAJS5RRPG2AUQ', 'WARC-Record-ID': '<urn:uuid:295d6e3a-53e5-45ca-b4af-f8dc2aee9c7c>', 'WARC-Target-URI': 'http://gizmodo.com/5564314/this-is-how-att-is-taking-iphone-4-orders-now?tag=securitybreach', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d00f1f37-a049-40a4-91ad-d99ce69d119a>', 'WARC-Truncated': None}", 'previous_word_count': '88', 'url': 'http://gizmodo.com/5564314/this-is-how-att-is-taking-iphone-4-orders-now?tag=securitybreach', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03491806983947754', 'original_id': '632ed4c35cc23f423f3bdc224ad402b32c15f38a780dda341c24b4908519ea02'}
Celebrate with Cinnamon Contest 25Oct Celebrate with Cinnamon Contest Every day we experience little joys and victories, but we allow them to just slide by without any fanfare. Why?! We say that’s crazy. Just about any reason is a good enough reason to indulge in a freshly baked COBS Cinnamon Bun, Scone or Loaf. Cinnamon – it’s the perfect way to make any moment feel like a special occasion. Share with us what moment you’re celebrating with Cinnamon for the chance to win a 6-Pack of Mini Cinnamon Buns.
mini_pile
{'original_id': '4e69705417b02bf6d893b611a6ac84346c691ef25e999791b051172a7216c29b'}
RE3: Here's the difference between revenue decline of a dying company and the revenue decline of Yellow Media. When revenue declines an x%, say 17%, you'd expect to see profits to fall that much faster because of margin decline. But for the last several quarters, YPG has managed to maintain their EBITDA margin. In fact the 51.4% margin we saw in Q3 2012 was the highest margin since Q2 2011 at 51.5%. In a normal dying business not only do you not see such a high margin to start with, but you certainly do not see any maintenance of that margin. pinecone: A NORMAL dying business? as opposed to what? Maybe Y is an anomalous abnormal dying business. I fail to  see how your argument based on  margins holds water. RE38: Just refer to the quarterly history of Bell and Telus Wireline segmented financials to see what I mean. It's what I do for a living and I can tell you with all sincerity they would love to have margins as good as YPG. pinecone: In my last position of employment, before walking away from the stupid bas*ards and becoming wholly self-employed,  I was responsible for the preparation and analysis of the quarterly financial statements of approx 40 food stores (market gardens) plus a few convenience stores. (Incidently, the parent company of that entire food distribution business which included ownership of the market's real property, was also, at that time 90-91,  a Quebec-based company, Provigo Foods.) So I know a little bit about margins.  Some of the poor suckers who mortgaged their homes to become “owners” of these “market gardens” lost their equity in 6 months. The margins remained healthy and stable, but due to inadequate sales volume, the burden of operating and finance costs spelled doom D-O-O-M for the “owners”.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.946277678012848}", 'metadata': "{'Content-Length': '76428', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZI3LM2DYWX2GFMZ6BLE5TSVDDHRFV7RN', 'WARC-Concurrent-To': '<urn:uuid:3506afdd-e45f-4f18-9f6e-f2519e066e17>', 'WARC-Date': datetime.datetime(2015, 2, 28, 19, 19, 39), 'WARC-IP-Address': '104.20.22.182', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:OZPRCQ6E34UMG4GXIXDRTI7FK3CRQHOG', 'WARC-Record-ID': '<urn:uuid:9a99f1ac-c0eb-4fb6-b679-7e483d4877b8>', 'WARC-Target-URI': 'http://www.stockhouse.com/companies/bullboard/t.ylo/yellow-media-inc?postid=20760026', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8c1ab035-316f-4667-b4af-629f4eab4469>', 'WARC-Truncated': 'length'}", 'previous_word_count': '290', 'url': 'http://www.stockhouse.com/companies/bullboard/t.ylo/yellow-media-inc?postid=20760026', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04242658615112305', 'original_id': 'fa75d6e8c1410ce46ee2082c7b467d9e099e869de9de5d0f13af03221710dceb'}
Tips on tournaments, leagues, clubs and ratings Where to start… Initially an interest in playing chess begins at home. The next step is usually to participate in after-school chess classes or chess classes in a local library. Joining a chess club is a great way to meet players of your own age who enjoy the game. Clubs will usually provide classes followed by friendly games, and an opportunity to join junior teams and participate in one day tournaments.   see list on junior clubs page. Chess camps during mid-term breaks and holidays are a great way to improve skills and meet other players. School players participate in leagues see A good example of these one day tournaments and chess camps are events run by Alexander Baburin, see details on the newsletter page. Check out the junior events calendar on this site for regular updated on events. Once you have joined a chess club you can participate in Team events and Leagues run by the Leinster Chess Union. Initially, you will play for the junior club in events such as the Mick Germiane Cup, O’Connell Cup and the Rising Stars, these are one day events, 6 rounds from 11am to 5pm. As you progress , you may enter the higher divisions of the Leinster Leagues playing for the O’Sullivan Cup or the Bodley. There are 7 divisions in the Leinster Leagues, right up to the Armstrong Cup, Division 1, in which the strongest players in Leinster fight it out over 12 rounds. It has surprised many experienced players to see the rapid rise of our young chess players to the top ranks in a very short period of time.  It is only a couple of years ago that they played their first division 6 match for their junior clubs. They, and many others,  have gained experience through participating in these leagues and tournaments and many have been selected for the international junior squads. see article ‘achievements’ Tournament Essentials Not every chess tournament is the same, either in duration or format, they vary from one day events to 6 round weekend events, right up to a full 9-day FIDE Internationally rated tournament. So, chess enthusiasts can participate at any level that suits them. One of the first individual tournaments that juniors attend is Alexander Baburin’s one day events which takes place once a month. Over 100 players regularly play in two sections. As the experienced junior player progresses they need to playing longer, rated games. The next step is to join the ICU, Irish Chess Union, see The difference with these tournaments is that they are rated, (explained under ratings) and are more that 1hour 30 minutes per player. A clock is also used. They generally take place over a weekend, one game on Friday, three on Saturday and Two on Sunday. A typical example would be the 7pm Friday, 10am, 2pm and 7pm Saturday , 9am 2pm on Sunday. Generally these weekend events are designed for adults and children. However two big events which take place for juniors are the Irish Junior Chess Championships, (April) and the Leinster Junior Championships (Jan). These are divided into sections u8, u10, u12, u14, u16, u18. Details of these will be on the calendar. The best place to find out about ICU rated tournaments is in the calendar section of the ICU website or the junior events calendar Follow the details about registering for the event on line or by post. The tournament format In each section participants are graded and seeded. They are then drawn against each other with the top seed as number 1, down to100 (for this example presume there are 100 entries). Most tournaments will have 6 rounds, with each player playing 3 games as white and three as black, if possible. In round one player 1 will play player 51 and player 2 player 52 and so on. So a newcomers first match will most likely be their toughest if they are a low seed, this is the time when you explain how much they can learn from the experience. Make sure they analyse the game with their opponent afterwards. It’s good to point out that you learn a lot more from a loss than a win, but don’t presume they won’t or can’t win this game. When the game is over they must go to the draw on the wall and mark up either 1, ½ or 0 against their name and that of their opponent. A win is scored as 1 point, a draw as ½ and a loss as 0. When all games are complete the next draw is made, in this case all players scoring 1 are drawn against each other, also anyone on ½ will be drawn against someone on ½ and so on, when possible. The same follows for rounds 3/4/5/6. Rating System When you join the Irish Chess Union as a beginner you are un-graded and you are given a provisional rating. The first 20 rated games you play will go towards deciding your rating. This is calculated by the ratings officer after each ICU tournament and added to the live ratings. A list of all rated ICU members is published approx. 3 times a year. This is the list that the ICU Selection committee use to select players for International events, both senior and Junior. You don’t need to submit any results, they will be calculated automatically. 1. You can learn more from a loss, if you go over your games afterwards with your opponent. This also helps to develop friendships. 2.Aim to get a point or even half a point from the event, and then improve on this score at the next events. Try new openings and plans instead of just focusing on winning. Take your time and have fun! 3. Age has no bearing on an opponent’s ability. 4. Don’t be obsessed with ratings, they can cause you to be afraid to take risks and chances in case you lose a few points. If you gain or lose a large number in one event it will usually balance out over the next few tournaments, 5. You can make wonderful friends through accompanying you kids to weekend events and longer events abroad. These are often people you might not meet in the normal course of life. We’ve been lucky in that we have made some very close friends, with whom we often travel together and share accommodation. On a cautionary note however, we would suggest that it is often not a good idea to try and turn one of these events into a family holiday. They are enjoyable but can also be hard work and stressful as you often need to be at hand to give moral support , especially to younger players. Regardless of the strength of your child, when they lose, as we all must sometimes, there is the inevitable disappointment and having put so much energy into a game they may need some time away from the crowd. Benefits of Chess for Children Chess is unique in that it is one of the few sports in which parents, can participate with their children, on an equal footing as age is no barrier. 1. Playing chess helps build a child’s confidence. 2. It also helps children express their opinions and to relate to adults. 3. Juniors learn about decision making and the importance of being able to make a choice, and then accept the outcome. 4. Playing chess emphasizes the importance of managing one’s time, an essential life 5. Chess helps build mental stamina and concentration. 6. Players see the results of their hard work and preparation being rewarded with progress and success. Winning a match or tournament is not the only benefit, sometimes just knowing that you played well or had an exciting games is enough to reward your effort. 7. Chess teaches children not just how to win graciously and also how to accept defeat. 8. Chess is one of those rare sports that brings together people from all different backgrounds, cultures and ages, thanks to a common interest.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9665589928627014}", 'metadata': "{'Content-Length': '49657', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WH3SN5UFQWLKGFSUNKNDUWV25ZXVDLFJ', 'WARC-Concurrent-To': '<urn:uuid:1ba2f8cd-d47d-41a0-96a3-eb8ecd615538>', 'WARC-Date': datetime.datetime(2019, 4, 19, 1, 2, 17), 'WARC-IP-Address': '192.0.78.13', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3VWW6IXPFAIINOMWSEKEN2FWW7JEUWJE', 'WARC-Record-ID': '<urn:uuid:43255c30-f6d3-414f-bf53-a22273d7d092>', 'WARC-Target-URI': 'https://leinsterjuniorchess.wordpress.com/where-to-start/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cb709a53-5ae0-4778-bd0c-d4799bf99280>', 'WARC-Truncated': None}", 'previous_word_count': '1346', 'url': 'https://leinsterjuniorchess.wordpress.com/where-to-start/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-97-181-44.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.053992271423339844', 'original_id': '8ef2cbb04f4aac36001ae0158f461c561467733bfd1725029e0610432838dbd0'}
/* * Copyright (c) 2014-present, Facebook, Inc. All rights reserved. * * You are hereby granted a non-exclusive, worldwide, royalty-free license to use, * copy, modify, and distribute this software in source code or binary form for use * in connection with the web services and APIs provided by Facebook. * * As with any software that integrates with the Facebook platform, your use of * this software is subject to the Facebook Developer Principles and Policies * [http://developers.facebook.com/policy/]. This copyright notice shall be * included in all copies or substantial portions of the software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ package com.facebook; import android.net.Uri; import android.os.Bundle; import com.facebook.internal.NativeProtocol; import com.facebook.share.internal.OpenGraphJSONUtility; import com.facebook.share.model.ShareOpenGraphObject; import com.facebook.share.model.SharePhoto; import java.util.Locale; import org.json.JSONException; import org.json.JSONObject; public class ShareGraphRequest { /** * Create an User Owned Open Graph object * * <p>Use this method to create an open graph object, which can then be posted utilizing the same * GraphRequest methods as other GraphRequests. * * @param openGraphObject The open graph object to create. Only SharePhotos with the imageUrl set * are accepted through this helper method. * @return GraphRequest for creating the given openGraphObject * @throws com.facebook.FacebookException thrown in the case of a JSONException or in the case of * invalid format for SharePhoto (missing imageUrl) */ public static GraphRequest createOpenGraphObject(final ShareOpenGraphObject openGraphObject) throws FacebookException { String type = openGraphObject.getString("type"); if (type == null) { type = openGraphObject.getString("og:type"); } if (type == null) { throw new FacebookException("Open graph object type cannot be null"); } try { JSONObject stagedObject = (JSONObject) OpenGraphJSONUtility.toJSONValue( openGraphObject, new OpenGraphJSONUtility.PhotoJSONProcessor() { @Override public JSONObject toJSONObject(SharePhoto photo) { Uri photoUri = photo.getImageUrl(); JSONObject photoJSONObject = new JSONObject(); try { photoJSONObject.put(NativeProtocol.IMAGE_URL_KEY, photoUri.toString()); } catch (Exception e) { throw new FacebookException("Unable to attach images", e); } return photoJSONObject; } }); String ogType = type; Bundle parameters = new Bundle(); parameters.putString("object", stagedObject.toString()); String graphPath = String.format(Locale.ROOT, "%s/%s", "me", "objects/" + ogType); return new GraphRequest( AccessToken.getCurrentAccessToken(), graphPath, parameters, HttpMethod.POST); } catch (JSONException e) { throw new FacebookException(e.getMessage()); } } }
mini_pile
{'original_id': 'f713cac6db105dafa929e68314e08f0a9529a4af8d900fabeb0e6a390ee6bc73'}
Croatian Medical Translation Our approach is to build specific teams of Croatian medical translators for each client’s work, or project. We carefully vet our Croatian medical translators before they arrive on our database, collecting references and test translations, and our recruitment process is designed to really drill down on the exact areas of specialisation within medicine. We have specialist teams of Croatian linguists in various fields and competences. They are experts in their industry, with relevant knowledge and experience, and we assign them to work according to their skills sets. Although many of our Croatian linguists are located in Croatia we also have a large number of mother tongue Croatian translators and interpreters dispersed all around the world. Our global Project Management presence and dispersed teams of Croatian translators means that we can offer you real advantages where you have tight turnaround requirements. Subscribe to our newsletter
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '121', 'language_id_whole_page_fasttext': "{'en': 0.955942451953888}", 'metadata': "{'Content-Length': '40605', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5IWWA7RT46WBFDQMGGTPY2GBYFYQVIVX', 'WARC-Concurrent-To': '<urn:uuid:c67c4350-fefc-4324-a504-7efb8bdc342d>', 'WARC-Date': datetime.datetime(2020, 6, 2, 22, 46, 25), 'WARC-IP-Address': '52.56.216.231', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:E3QQMHSK5B2DHZVLXUK63SWSATSV3M3L', 'WARC-Record-ID': '<urn:uuid:efc29923-0cf8-4573-b6d1-01851eae6cc8>', 'WARC-Target-URI': 'https://www.translatemedia.com/translation-services/medical-translation/croatian/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6ad82c25-4860-4983-af6c-93ce7f1bf840>', 'WARC-Truncated': None}", 'previous_word_count': '277', 'url': 'https://www.translatemedia.com/translation-services/medical-translation/croatian/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-62.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04335975646972656', 'original_id': '5d0ff877b3b01ca113cf8e8151f831a852c5e80ae5862b0618c778ea6aebf5fd'}
Lifi Explained: Bringing Connectivity To Every Corner Of Your Workspace LiFi can bring enhanced connectivity to your workspace, while also enhancing data security • LiFi technology turns your lights into a wireless network • Benefits include improved security, connectivity and location-based services • LiFi is expected to be a mainstream product in the next few years The IoT is a wonderful thing, or so we are led to believe. But how will our (already overstretched) networks cope with an expected 20 billion connected IoT devices by 2020? This is where LiFi steps in. LiFi transforms every LED light in your workspace into a high-speed, smart and secure internet access point to provide immersive connectivity in every nook and cranny of your building. In other words, your lightbulbs now provide your wireless network. How does this work? Well, when an electrical current is applied to an LED light, a stream of photons (aka light particles) is emitted. The brightness of an LED bulb can be changed very quickly, which allows you to send a signal by changing the light intensity. A detector picks up and interprets these tiny changes in light intensity as data. This change in intensity is so quick that it cannot be detected by the human eye (so you don’t need to worry about flickering lights) and it can work across any light conditions as it’s the change in the light intensity that transmits the data. So, you don’t need to close the curtains for it to work. And, when you do turn off your lights, your LED lights will still transmit a LiFi signal at a low lighting rate – so your connectivity remains. pureLiFi is one company developing this technology. Currently,  pureLiFi’s technology provides communications at light levels down to 60 lux. For comparison, the British standard for minimum light level for reading is 400 lux. There are also other options for using invisible parts of the light spectrum such as infrared, which is currently already being used for sending information back to the light bulb, according to pureLiFi. And, if you move away from one light source, your connection will remain as the data rate is not dependent on the line of sight, but on the signal quality at the device. Another LiFi device will step in (or a WiFi network – more on that later). The installation process is also pretty straightforward and flexible, you just need to use a standard mains power supply and use LED light bulbs. A range of benefits result. Not only can you use a spectrum more than 1,000 times greater than the spectrum utilized for radio frequencies, LiFi is also beginning to unlock unprecedented data and bandwidth, according to pureLiFi. Signify (formerly Philips Lighting) is also developing LiFi technology. Speaking in a statement, its Chief Innovation Officer, Olivia Qiu, said: “While radio frequencies are becoming congested, the visible light spectrum is an untapped resource with a large bandwidth suitable for the stable simultaneous connection of a vast array of Internet of Things devices.” You can also offer a range of location-based services with this technology and provide connectivity to tricky spaces, such as underground basements where WiFi can struggle. The Latest News Delivered To Your Inbox Sounds great, doesn’t it? But, is LiFi really a feasible solution for a workspace environment? Won’t leaving the lights on just rack up a hefty electricity bill? Not quite. Jerry Johnson, chairman of the board at turnkey lighting, controls and IoT solutions provider Energy Management Collaborative (EMC), explained: “LiFi is very feasible in an office environment because light fixtures are generally well distributed and the line of sight to lights is typically unobstructed.” “Power for LiFi is actually considerably less than WiFi power.  It has the capacity to transmit information 100 times faster than WiFi making it a more desirable technology for file transfers. Also, data security can be enhanced due to the higher speeds,” Johnson added. This is an interesting point. LiFi is a containable wireless technology. You just need to close the blinds and your wireless data cannot escape. On the downside, that also means it won’t work if you pop your device in your pocket (unless, maybe, you’re wearing a transparent suit). This is where traditional WiFi networks can pick up the slack, as Johnson explained: “We envision LiFi co-existing with WiFi. LiFi would focus on indoor positioning, more precise IoT control, critical security tasks and data intensive activity. WiFi would be utilised for lower speed, less precise or secure needs to offload the LiFi system.” “However, for LiFi to be viable, we need the costs to come down more, which they are, and for our computing devices to add infrared ‘dongles’ until integrated infrared devices are available.” These barriers to adoption don’t seem unsurmountable. After all, who remembers the WiFi dongles of yesteryear and the days when dial-up networks charged on a per minute basis? With innovation, our gadgets always evolve and widespread adoption means prices eventually come down. EMC is already trialling this technology. Johnson said: “We have been installing ‘one-way’ LiFi using Bluetooth technology for selected customers.” One-way LiFi uses light to broadcast information to a device, but it can’t communicate back because devices do not have infrared transmitters built in yet. “You can’t do things practically over the internet with LiFi until it’s truly two-way. Right now, we are installing bi-directional, true LiFi solutions in our lab for full evaluation in the near future,” according to Johnson. He added: “Our estimate is it will be several years before true LiFi technology will be a mainstream product offering. There is no doubt in our minds though that it will be an integral solution to the IoT revolution.” Share this article
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '24', 'language_id_whole_page_fasttext': "{'en': 0.9239315390586852}", 'metadata': "{'Content-Length': '136491', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BPMHVTTYRVEOMVPZKHG2Y32ADUX2NORO', 'WARC-Concurrent-To': '<urn:uuid:2f9ea915-064b-430c-8016-824cfb8f4c5d>', 'WARC-Date': datetime.datetime(2019, 8, 25, 22, 59, 53), 'WARC-IP-Address': '104.20.91.201', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NITTJT5ESTL6M7Q7ZQOSZOIJOB7YFWO3', 'WARC-Record-ID': '<urn:uuid:21a976a3-69d5-4ac7-862d-f5f5adc4541a>', 'WARC-Target-URI': 'https://allwork.space/2018/06/lifi-explained-bringing-connectivity-to-every-corner-of-your-workspace/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ce02a370-576e-4490-8493-26b1d9d44c2e>', 'WARC-Truncated': None}", 'previous_word_count': '930', 'url': 'https://allwork.space/2018/06/lifi-explained-bringing-connectivity-to-every-corner-of-your-workspace/', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-246.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02573627233505249', 'original_id': '6785fc452931dd984a5c826c4ff6c1816c91f6dd8b99ef5cf8f75d1bf30b6dd5'}
\section{Rational Numbers and SFCFs are Equivalent} Tags: Continued Fractions \begin{theorem} Every simple finite continued fraction has a rational value. Conversely, every rational number can be expressed as a simple finite continued fraction. \end{theorem} \begin{proof} Follows from :Finite Simple Continued Fraction has Rational Value :the proof below. \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '00af73d5eaec330ef5417691975edab0941583e6582c57c34aba73543f309b16'}
Adventures in Ethics and Science I have, however, taken steps to ensure that while I am deprived of the physical presence of my offspring, you will not be deprived of the weekly installment of sprog blogging. To this end, I gave each of the sprogs a book to read during their visit with their grandparents and asked them to report back on their books via email. Of course, I forgot to issue a mid-week reminder. Nonetheless, the elder Free-Ride offspring was prepared to deliver a report on this book: Mummies, Bones, and Body Parts By Charlotte Wilcox What I learned: 1: Mummies can be naturally created or man-made. 2: Carbon dating is often inaccurate. [I assume this inaccuracy is with respect to the typical age of the mummies being dated. Maybe it’s a consequence of the mummification process? I’ll need to ask the elder Free-Ride offspring about this.] 3: Natural mummification can happen in a bog. 4: Sacrifices were sometimes mummified. 5: Preserved body tissue might tell scientists how someone died. 6: Bones stay preserved better than body tissue. 7: People sometimes use mummies as decoration or for anatomical demonstrations. 8: Noblepeople were often mummified when they died. 9: Most mummies are sent to museums. 10: Preserved lung tissue looks disturbing. XP [Emoticon in original.] What I want to know: 1: How did people learn how to mummify others? 2: Why did people sacrifice children to their “Gods”? [Scare-quotes in original] 3: Who (or what) was the first person mummified? 4: Why do grave robbers sell creepy preserved things? [I’m guessing capitalism.] 5: Why does preserved lung tissue look like 2-year-old lasagna? [How does my child know what 2-year-old lasagna looks like?] Major props to the elder offspring for doing blog-homework without any prodding. This sets the bar pretty high for the younger offspring next week. 1. #1 bytz June 25, 2010 “… often inaccurate…” sounds like a loaded or misleading phrase. It may be that this refers to the date range of the dating i.e. +/- 100 years or the x% error chance or something similar. I’d suggest having elder Free-Ride define what was meant by this. Ask C14 dating is generally good for up to around 50,000 years or so, dating a mummy (around 4000 years, more or less, for Egyptian mummies) should not be a problem. I can’t think of anything in the mummification process that would alter the carbon-14 content and there is nothing that will alter its decay rate. 2. #2 daedalus2u June 25, 2010 That is a good question. Usually the “science experiments” that result in first person observations of 2 year old lasagna occur when an individual has their first apartment. 3. #3 J-Dog June 25, 2010 Beautiful post – especially the two year old lasagna imagery. Re: Carbon dating comment- Just hope that the author doesn’t want to “teach the controversy”, which would open up a can of worms with a huge ick factor. 4. #4 RMD June 25, 2010 We’re borrowing the Sprogs for a sleepover this weekend and promise to give them a hefty dose of backyard botany, kitchen chemistry and bocce to supplement the reading material… 5. #5 stripey_cat June 25, 2010 I suspect that if you’re talking about bog bodies, environmental contamination from the peat is a real issue. So not a problem with carbon dating in principle, but a difficulty in obtaining clean samples. 6. #6 Dario Ringach June 25, 2010 If ever in central Mexico, visit the Mummies of Guanajuato: …although I am not sure this one visit is for the kids. 7. #7 Jim Thomerson June 25, 2010 Have you seen this about radiocarbon dating? 8. #8 Dario Ringach June 28, 2010 Closer to home — California Science Center, opening on July 1st: Mummies of the world: …there is also an IMAX film to go with it.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '57', 'language_id_whole_page_fasttext': "{'en': 0.9475250244140624}", 'metadata': "{'Content-Length': '59654', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:37EJNEIVHAU5LRKLLJ72ER5SCXW3OV5J', 'WARC-Concurrent-To': '<urn:uuid:dca7af0e-13af-4c01-b900-cd164d086e67>', 'WARC-Date': datetime.datetime(2014, 12, 20, 4, 40, 40), 'WARC-IP-Address': '192.155.95.153', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ZRYVARTGSJHVDPJU7OCOQWLN5ULABX23', 'WARC-Record-ID': '<urn:uuid:2bd500c9-2aaf-4f75-9501-7f2dedb24c59>', 'WARC-Target-URI': 'http://scienceblogs.com/ethicsandscience/2010/06/25/friday-sprog-blogging-mummies/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b4472b35-f325-4d61-a077-7ff389de3925>', 'WARC-Truncated': 'length'}", 'previous_word_count': '684', 'url': 'http://scienceblogs.com/ethicsandscience/2010/06/25/friday-sprog-blogging-mummies/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04213738441467285', 'original_id': '7dc8551c5a6e28e9d71c5170efeb925fe65d49a29dad31d1cb057cf7f0bd4975'}
Tips for Writing Abstracts What is an Abstract? An abstract is a short statement about your research or project designed to give the reader a complete, yet concise, understanding of your paper’s research and findings. It gives a thorough overview of your paper or project.  What is the Purpose of an Abstract? A well-prepared abstract allows a reader to quickly and accurately identify the basic content of your research or project. Readers should be able to read your abstract to see if the related research is of interest to them. What Should be in an Abstract? A model abstract should contain the following elements: • a statement of the purpose of your study • the research methods/methodology used to arrive at your results and/or conclusions • the results observed • the conclusions drawn from your study and their significance How to Structure an Abstract The abstract should be no more than 250 words.  1. PURPOSE: Explain the purpose of your study/paper. Ideally in 1-3 sentences, state the primary objectives and scope of the study or the reasons why the document was written. Also state the rationale for your research. Why did you do the research? Is the topic you are researching an ignored or newly discovered one? Why is it significant? Here you should include your hypothesis if appropriate. 2. METHODS: In terms of methodology (research methods), clearly state the techniques or approaches used in your study. For papers concerned with non-experimental work (such as those in the humanities, some social sciences, and the fine arts) describe your sources and your use/interpretation of the sources. 3. RESULTS: Describe your results (the findings of your experimentation), the data collected, and effects observed as informatively and concisely as possible. These results may be experimental or theoretical, just remember to make note of that in your abstract. Give special priority in your abstract to new and verified findings that contradict previous theories. Mention any limits to the accuracy or reliability of your findings if appropriate. 4. CONCLUSION: Your conclusions should in essence describe the implications of the results: Why are the results of your study important to your field and how do they relate to the purpose of your investigation? Two Examples of a Well-Structured Abstract Dryland Grain Sorghum Water Use, Light Interception, and Growth Responses to Planting Geometry J. L. Steiner  Crop yields are primarily water-limited under dryland production systems in semiarid regions. This study was conducted to determine whether the growing season water balance could be manipulated through planting geometry. The effects of row spacing, row direction, and plant population on the water use, light interception, and growth or grain sorghum [Sorghum bicolor (L.) Moenchl were investigated at Bushiand, TX, on a Pullman clay loam (fine, mixed, thermic Torrertic Paleustoll)]. In 1983, which had a dry growing season, narrow-row spacing and higher population increased seasonal evapotranspiration (ET) by 7 and 9cvo, respectively, and shifted the partitioning of ET to the vegetative period. Mediurti population crops yielded 6.2 and 2.3 Mg/ha of dry matter and grain, respectively. High population resulted in high dry matter (6.1 Mg/ha) and low grain yield (1.6 Mg/ha), whereas low population resulted in low dry matter (5.4 Mg/ha) and high grain yield (2.3 Mg/ha). Row direction did not affect water use or yield. In 1984, dry matter production for a given amount of ET and light interception was higher in the narrow-row crops. Evapotranspiration was less for a given amount of light interception in the narrow-row crops and in the north-south row crops. In conclusion, narrow row planting geometry appears to increase the partitioning of ET to the transpiration component and may improve the efficiency of dryland cropping systems. Inequalities Embedded in the Unites States Legal System through the Lens of Tribal Governments Jessica Arthur Kathleen Through the past 500 years, American Indians have been subjected to inequalities through the United States legal system as a result of the federal government’s jurisdiction in Indian country, thus making tribal governments less powerful in Indian country and further expanding a jurisdictional void. Using scholarly literature accessed through the University of Massachusetts Amherst library database, law reviews, congressional legislation, and Supreme Court holdings this paper examines how the tribal government’s power continues to be chipped away by Congress, through jurisdictional decisions and legislation, which develop in favor of the federal government. The three sovereign entities that have jurisdiction in Indian country are the federal government, tribal governments, and state governments. However, this judicial framework is complex and depends on the following: location, the crime, who committed the crime (the perpetrator), and whom the crime was committed against (the victim). Therefore, due to criminal jurisdiction in Indian country being based on the political status of American Indians it exemplifies inequalities in the United States legal system. In order to preserve and protect the economic, social, and cultural attributes of American Indians, tribal justice systems need to maintain their power. By taking away power from tribal government and allowing federal and state governments to prosecute crimes, it sends a message that tribal governments lack authority and are inferior to handle certain crimes. More importantly, the basic right of allowing tribal governments to maintain law within their reservations is fundamental to their survival as a community. Additional Tips • When possible, write your paper first, and then write the abstract. • The abstract should be approximately 250 words. Proofread your abstract several times -- submit your very best work. • Know your audience and target your abstract accordingly. • Have a peer read your abstract and then tell you what your research is about. If he or she has difficulty explaining your research, chances are your abstract requires revision.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '21', 'language_id_whole_page_fasttext': "{'en': 0.9180771112442015}", 'metadata': "{'Content-Length': '142545', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JJTAJTGICKXKLZARYMO5CFPWEBAYVXWS', 'WARC-Concurrent-To': '<urn:uuid:4a0dd428-74b2-47ce-a934-edb5074319de>', 'WARC-Date': datetime.datetime(2017, 9, 22, 4, 33, 9), 'WARC-IP-Address': '128.119.42.16', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DSZ3GWT2WDTNR5OLVJFLRI2B23FUBMYB', 'WARC-Record-ID': '<urn:uuid:6b1c4e74-e9ef-4441-9fe1-9000720638ce>', 'WARC-Target-URI': 'https://www.honors.umass.edu/abstract-guidelines', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:09b157d0-27d7-4fe6-b405-7f24a967401e>', 'WARC-Truncated': None}", 'previous_word_count': '915', 'url': 'https://www.honors.umass.edu/abstract-guidelines', 'warcinfo': 'robots: classic\r\nhostname: ip-10-79-213-170.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6282092332839966', 'original_id': '0d5098b7a4bd7b3b74da18d980d26b8126b9059a6b983258b7067450bc3deb87'}
Other Voices: Government Shouldn't Do It All June 25, 2006|By PATRICK M. MCSWEENEY There will never be enough spending for some legislators. Although the long-delayed state budget that the General Assembly enacted in recent days will increase appropriations dramatically over the current level of spending, Sen. Mary Margaret Whipple, D-Arlington, complained: "There are still many needs in the commonwealth that must be addressed." This statement warrants parsing. Does the word "needs" mean that every demand for government funding deserves funding? If not, how should legislators decide what should be funded? When Whipple says that unfunded needs "must" be addressed, does she mean that legislators have an obligation to raise taxes until all needs are satisfied? Sadly, that is precisely what some lawmakers seem to believe. We should be thankful the General Assembly adjourned when it did this year. Even if we were to agree on definitions, state budgeting would continue to be contentious. There will never be complete agreement on what in fact fits those definitions. And there will never be enough money to fund everything that legislators want to include in the budget. We need to be reminded occasionally that negotiations and compromise are essential elements of politics in a free society. In our system, we work out our regional differences, special-interest conflicts and competing value preferences principally in the form of legislative solutions reached by our elected representatives. Those solutions are often imperfect, but we accept them rather than resort to force and violent conflict. Legislators are not free to ignore constitutional rules or to make up new ones as they work out conflicts. One of those constitutional rules -- the rule that two different objects can't be included in a single piece of legislation -- prohibits what the state Senate, the incumbent governor, Timothy M. Kaine, and his immediate predecessor, Mark Warner, have done with the budget bill during two of the last three legislative sessions. They have proposed a tax increase in the budget bill itself in an attempt to force the House to accept the tax increase or watch state government come to a halt without a budget. There is a deeper problem contributing to these budget standoffs -- the decline of political parties. The two houses of the General Assembly are nominally controlled by Republicans, but they stand for fundamentally different political philosophies. The grass roots and the volunteer leadership of the Republican Party were emphatically opposed to the position of those Senate Republicans who joined with Senate Democrats to raise taxes in 2004 and attempted to enact another massive tax hike in 2006. The Senate seems to reflect the position of Whipple, a Democrat. That is not a surprise since the Republican leadership in the Senate has split with conservative GOP senators and joined Democrats in that chamber in support of tax hikes formally opposed by the Republican Party of Virginia. The House Republican Caucus opposed the tax hike proposed by the Senate and refused to yield even when the Senate seemed bent on shutting down state government. Ultimately, the budget was enacted without a tax increase. Unless this philosophical rift between the chambers is resolved, Virginia's reputation for fiscal responsibility and good government will continue to erode. We can't afford to repeat this pattern of legislative stalemate. Virginians have been slow to embrace the Responsible Political Party Model, which contemplates enough internal discipline for a party to pursue a common political agenda. This reluctance comes with a cost. Voters cannot effectively choose a policy direction when the parties themselves are divided. And party discipline and coherence will be difficult to achieve until the party exercises effective control over the process of nominating its candidates. McSweeney, who practices law in Richmond, is former chairman of the Republican Party of Virginia. Send e-mail to pmcsweeney@mcsweeneycrump.com. *
mini_pile
{'original_id': 'c931ccd928af1e7c221a6a95ee2d76fa92230144ab8c196fa8b130d7f6bf85d1'}
Description. Parkinson’s disease is characterized by its progressive movement problems, but deficits in sensory function and processing can exacerbate these problems and have a negative impact on balance and function. By using movements of an immersive visual scene and electrical stimulation to the vestibular system, we can provide sensory stimulation that challenges a person’s sense of balance. We can then track and quantify the balance response through infrared motion-capture video, pressure on a force plate, and electromyographic (EMG) activity. To understand these deficits in the larger context of function and rehabilitation, we look for relationships between balance responses and self-reported balance confidence and quality of life. Hwang SJ, Agada P, Grill S, Kiemel T, Jeka JJ (2016) A central processing sensory deficit with Parkinson’s Disease. Experimental Brain Research, 234(8),2369-2379. Hwang SJ, Agada P, Kiemel T, Jeka JJ (2014) Dynamic reweighting of three modalities for sensor fusion. Plos One: 9(1), e88132. Keywords: gait, balance, sensor fusion, Parkinson’s disease
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8508039116859436}", 'metadata': "{'Content-Length': '29657', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LJH3XW2B4FN4DVV4XTG43ZLLXNFNVVLH', 'WARC-Concurrent-To': '<urn:uuid:e1179cac-4149-44b9-afdc-1f8cfde1046d>', 'WARC-Date': datetime.datetime(2019, 2, 16, 18, 2, 52), 'WARC-IP-Address': '198.71.233.141', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XS4DGFE4RH7XFIHEXPQVWSO6ZNZV62NW', 'WARC-Record-ID': '<urn:uuid:2e81864f-fc42-4f40-b621-a354f53f39c4>', 'WARC-Target-URI': 'http://jekalab.org/research/sensory-processing-and-balance-control-during-walking-in-parkinsons-disease/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b86853e4-e4ff-4939-8e4b-d2a510193f62>', 'WARC-Truncated': None}", 'previous_word_count': '154', 'url': 'http://jekalab.org/research/sensory-processing-and-balance-control-during-walking-in-parkinsons-disease/', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-69-73-156.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3872864842414856', 'original_id': '75affa9576742619f583a965710003b4727b604c995b17f34a60af0124407860'}
Leave a comment (AP Photo) MINNEAPOLIS (AP) — Authorities found no forensic evidence that an unarmed woman fatally shot by a Minneapolis police officer had touched the police SUV that responded to her call about a possible rape near her home, a prosecutor told jurors in the former officer’s trial Tuesday. Prosecutor Patrick Lofton’s comments in opening statements in the trial of Mohamed Noor seemed aimed at his partner’s assertion that he heard a thump before Noor shot Justine Ruszczyk Damond on July 2017 as she approached their SUV. Noor, 33, who is Somali American, is charged with murder and manslaughter in the death of Damond, a 40-year-old dual citizen of the U.S. and Australia. Lofton told jurors that Noor fired across his partner, Matthew Harrity, through an open driver’s side window “without saying a word.” Damond had called 911 twice. She then called her fiance but hung up when officers arrived to investigate, Lofton said. Just 1 minute, 19 seconds passed from the time Damond hung up to the time she cradled a gunshot wound to her abdomen and said, “I’m dying,” Lofton added. Damond, who was white, was a life coach and was set to be married the month after her death. Noor has refused to talk to investigators. The officers did not turn on their body cameras until after the shooting, and there was no squad car video. Prosecutors charged Noor with second-degree intentional murder, third-degree murder and second-degree manslaughter, saying there is no evidence he faced a threat that justified deadly force. They must prove he acted unreasonably when he shot Damond. Minnesota law allows police officers to use deadly force to protect themselves or their partners from death or great bodily harm; Noor’s attorneys have said they plan to argue he used reasonable force and acted in self-defense. Earlier Tuesday, Hennepin County District Judge Kathryn Quaintance relented on restrictions that would have prevented the public and media from viewing video evidence introduced in the case. That’s expected to include body-camera video that shows efforts to save Damond after she was shot. Quaintance had cited a desire to protect Damond’s privacy, but a coalition of media groups including The Associated Press had challenged the ban. “The court, like the jury, must follow the law — even if I disagree with it,” said Quaintance. Noor’s attorneys haven’t said whether he will testify. If he does, prosecutors may be able to introduce some evidence that the defense wanted to keep out of the state’s case, including that he has refused to talk to investigators. They also could bring up a 2015 psychological test that showed Noor disliked being around people and had difficulty confronting others. Despite that test, a psychiatrist found him fit to be a cadet officer. The shooting, which got international attention, raised questions about Noor’s training . The police chief defended Noor’s training, but the chief was forced to resign days later. The shooting also led to changes in the department’s policy on use of body cameras. It took a week to select a jury. After 75 prospective jurors answered questions about their views on Somalis and police officers, as well as their experiences with firearms, on-the-job training and other issues, 12 men and four women were selected Monday to hear the case. In the end, only 12 will deliberate and four will serve as alternates. The jurors include a firefighter and paramedic, an obstetrician-gynecologist, a civil engineer, a grocery store manager, a restaurant host, a carpenter and a Homeland Security immigration officer. Six jurors are people of color, including two Filipino men, an Ethiopian man and a Pakistani woman. 40 Black Men & Youths Who Were Killed By Police 6 photos 4 thoughts on “Woman Killed By Officer Did Not Touch Police SUV 1. Lets see if the Blue Shield will stand up and defend one of their own in this case like they do all cases when police officers use deadly force. Owe wait this is a black officer that killed a white lady not a white officer that kills a black person. Hmmm lets see. 2. Ted Gravely on said: They will do everything they can to paint that white woman as a truly innocent victim. This blue racist will serve as an example in place of the white blue racists that murder innocent blacks people. Add Your Comment You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '162', 'language_id_whole_page_fasttext': "{'en': 0.9626020789146424}", 'metadata': "{'Content-Length': '120475', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GIJCBEP3HTDWBYHUVGSWBML6LRJPHJKF', 'WARC-Concurrent-To': '<urn:uuid:7022a7bb-c0b8-4833-bc27-2b73e5a6cd4d>', 'WARC-Date': datetime.datetime(2019, 5, 25, 6, 56, 7), 'WARC-IP-Address': '192.0.79.33', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:APCSDANK32Q6DPVLSEXBLEUAZULBDAFU', 'WARC-Record-ID': '<urn:uuid:8ec4f840-6e0e-44e9-b8ac-627cd2e22f69>', 'WARC-Target-URI': 'https://blackamericaweb.com/2019/04/09/woman-killed-by-officer-did-not-touch-police-suv/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:28cff39e-ba8b-44ed-a3e4-65298181cfd9>', 'WARC-Truncated': None}", 'previous_word_count': '779', 'url': 'https://blackamericaweb.com/2019/04/09/woman-killed-by-officer-did-not-touch-police-suv/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-179-25-131.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03152203559875488', 'original_id': '37170b9e0f6bcd9adfec7ac90fdbd1a3e932f82576c14aa6cf0958e0ac150df0'}
Lingmin (25), Halmstad, escort tjej Lingmin (25), Halmstad, escort tjej Stad: Halmstad (Sverige) Last seen: 01:26 I dag: 11-4 Incall/Outcall: Incall & Outcall Sprakkunskap: Engelska Spanska Services: Bdsm Teacher,Spanish,Lyx dansk,Fingersex,Modelling,Large Brunette,Tantra / tantrisk massage,Erotic massage - Body massage,Anal stretching,Pulla,Ebony Nudity Piercingar: Ja Tatueringar: Ja Secure apartment: Ja Parking: Ja Dusch finns: Ja Drycker levereras: Ja She is waiting to accompany you to your hotel or wherever you have a location to spend some wonderful moments. Good looking and frustrated i need more as life is to short love motorbike riding, outdoors, dining and i have a professional career. Personlig info & Bio Höjd: 168 cm Vikt: 48 kg Ålder: 25 yrs Hobby: qucik hook up Nationalitet: kazakiska im ser: I looking cock Bröst: B kupa Ögonfärg: blå Orientering: Bisexuella Halvtimme 1400 1 timme 2300 2900+ Outcall travel fee(taxi) Plus timmar 3800+ Outcall travel fee(taxi) 12 timmar 1 dag Andra escort tjejer med video: I don't hassle and totally respect privacy and space. | +1 | I had to google Sta-Max. It's supposedly a sexual stimulant, erection pill. The only 'energy' he's taking it for is for his sexual energy. | +1 | hey admin...any chance of a multiple upload feature? I got 1000's of pics but not enough time to go 1 by 1. | +1 | Gonna take a whole lot of time to take in how badly I handled the situation and that it's potentially cost me any future chance to spend some amazing time with an amazing girl. AARRRGHH!! | +1 | Is it devious to date multiple people at the same time? | +1 | Frm TULSA OKLAHOMA with braids and looking for sum women who is about the same thing if you in tulsa7199608515 let's see what we can get int. | +1 | Yeah I'd do that. Maybe if you get emotional you can just tell him that you're still upset, but you would like to let him have his say, and try to be open to letting him reassure you that he's sorry and it won't happen again. You can even tell him you would like to cuddle or have him hold you (he might be confused about whether you want to be close to him or not, since you're upset). | +1 | has anyone even noticed the babe laying on the air mattress with her mouth open? | +1 | I merely noticed that his business so far I heard are actually all related to his interest,so i just stated my thought...and after that, i mentioned about my friend is seeking for my business coorperation and i thought maybe he can share his opinion....thats it!! | +1 | schoolgirl legs bikini heels | +1 | What a zoom! | +1 | The bottom line is, you just didn't make the cut with these women. So to answer your question, no, it's not necessarily one big joke. | +1 | I'm sorry it took awhile to get to know the real man, but that's what dating is for. Now you know he's a critical shallow mess. Just dump him. You can't fix basic disrespect of women. | +1 | It's not an issue of selectivity. | +1 | I'm sorry to hear of this new development | +1 | You have every right to question if she is telling you the truth, and I would seriously ask her to cut off all communication with all the guys (whom were just friends). | +1 | So, I would say, don't go there... | +1 | I take her to work the next morning(becasue her car is still over at her friend's house since 3 nights ago when she had to get a ride home for drinking a tad too much). She's crying, she looks sad, she keeps coming over to hug me...I say: "we need to come to a resolution", she says: "I thought we already did, I Thought that I'm Leaving" And I'm thinking, what? She barely said anything. I think her big thing is that, We've been together since she was 18. I think she keeps that on her mind a lot as a justifyable reason for her actions. She's restless and wants to be free, I just wish she would tell me so we could get on with our lives, I love her so much, too much maybe, but she's breaking my heart and it hurts a lot. | +1 | OP based on your "Hint Hint" I'm guessing you really DId want to have sex. | +1 | twosome hugging t-shirts shorts flipflops lawn grass sidewalk driveway cars suv brick house basketball nets purse trees | +1 | not bad, would like to see hopefully a few more | +1 | both are hot for totaly diff reasones | +1 | good luck. | +1 | Confrontation is indeed uncomfortable, but it is an inevitable part of human relationships. The 4 fights you've had in the past two weeks could perhaps be proof of that. So the trick to healthy relationships isn't to avoid confrontation but to learn how to handle it. Speaking up about what bothers you in an open-minded, secure, confident way goes a long way towards learning to handle confrontation productively. xxoo's suggestion was sound: you could have enquired about what happened and told him how it made you feel. Simple. No anxiety required. It's also a great way to figure out compatibility: if you speak up about your needs in a calm rational way and he reacts badly, than you know you're incompatible. | +1 | Small bridge | +1 | wow!! baby bait | +1 | That last big survey done, which appeared in Cosmo and in many news media all over the country, showed that 50-60% or women and 70% of men cheat with the women closing the gap each year. This was a few years ago but it sounds about right from my experience with friends and co-workers. I often think that when couples take the vow of fidelity it is with a wink and a nod. | +1 | I'm just a hard working guy who likes to play just as hard or relax just as stron. | +1 | HP for sure. | +1 | That's if it's not too late already. | +1 | oh man, you guys crack me up :P | +1 | I would say relax a bit... You said "good night" to her, maybe she didn't see it until 30 minutes later and didn't want to wake you up? Just ask her out on dates and go out.. Don't use texting to have "discussions". | +1 | Have you read the FAQ | +1 | oh..just lovely | +1 | The flight was on Monday evening. She persuaded me (reluctantly, after a lot of pressure) to let her see me that day. She told me that she loves me and doesn't want to lose me, but really needs to "see Spain" and "have an adventure". I told her that this was BS: she could easily see Spain and have an adventure without having to meet up with Alice. We had previously had plans to visit Spain together anyway, and if she had wanted a solo trip I would have been supportive. She said she was torn about what to do. I told her that I wasn't sure there was anything left in our relationship anyway. | +1 | squating feet sand topless hat | +1 | I know it's hard to tell, without a point-of-reference in the shot, but this giant baby-doll is actually over nine feet tall, and tips the scale at a sveldt 257 pounds. | +1 | also, i don't think she is trying to control your social circles because your first post indicates she hasn't mentioned anything to you about this, so really this jealousy that you "choose to pretend you're not noticing" is currently just speculation. you haven chosen to believe your assumption is 100% accurate without confirming it with your gf, and decided to consult a jealously forum for what we all think you should do. | +1 | both of her pics are amazing, she is gorgeous Popular tags Escort Halmstad Shemales_Galscom BigTits_Halmstad Tranny_Veronika Fingering_Halmstad Panties_Blonde Ukrainian_Wives Milf_Patrol Hairy_Maids Xe_Porn Halmstad_Vintage_Tatto Hooker_Bondage Dirtbike_Toys Toys_Avp Teen_Des Blonde_Lesbo Holland_Slut Rai_Tits Korea_Mature_Halmstad Books_Girl Hentai_Habit Abnormal_Anal Why_Nude Pooping_Cum Halmstad_Escorts Diving_Boob Stocking_Slips Ultimate_Ass Sex_Porngames Scherzinger_Ass
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '184', 'language_id_whole_page_fasttext': "{'en': 0.9663441777229308}", 'metadata': "{'Content-Length': '71752', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:YRWUPOSHSHRQDHW2QQ66DRQ6225UHYOT', 'WARC-Concurrent-To': '<urn:uuid:0930f976-4965-4946-a641-b2f90cbdec8b>', 'WARC-Date': datetime.datetime(2019, 4, 22, 8, 14, 59), 'WARC-IP-Address': '104.27.158.248', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JSHCD7TFFLWSKNQHJ4CHSZDQTLKQK7QB', 'WARC-Record-ID': '<urn:uuid:3ac7b839-a59e-4fcb-b884-7f1641dafba3>', 'WARC-Target-URI': 'http://transair-usa.com/halmstad/escort-Lingmin-tjej-profile-id3445.php', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1bc02de6-5860-4e8b-a4e7-7fca10106815>', 'WARC-Truncated': None}", 'previous_word_count': '1503', 'url': 'http://transair-usa.com/halmstad/escort-Lingmin-tjej-profile-id3445.php', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-169-175-90.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.020131230354309082', 'original_id': '21f13a61fa2b92c3ac2add7472ed2446e80d0346375ed83af527144cdb936b0f'}
srm source srm(1) srm(1) srm - securely remove files or directories srm [OPTION]... FILE... srm removes each specified file by overwriting, renaming, and truncating it before unlinking. This prevents other people from undeleting or recovering any information about the file from the command line. By default srm uses 35 passes to overwrite the file's contents. If this seems overkill you can use use the --dod, --doe, --openbsd, --simple option which use less passes. If you specify more than one option (of those listed above) they are executed in the order shown above. You can use srm to overwrite block devices. The device node is not removed after overwriting. This feature is available on Linux. Files with multiple hard links will be unlinked but not overwritten. srm, like every program that uses the getopt function to parse its directory, you could type either rm -- -f rm ./-f -d, --directory ignored (for compatibility with rm(1)) -f, --force ignore nonexistent files, never prompt -i, --interactive prompt before any removal -r, -R, --recursive remove the contents of directories recursively -x, --one-file-system when removing a hierarchy recursively, skip any directory that is on a file system different from that of the corresponding command line argument. (Not supported on Windows) -s, --simple only overwrite the file with a single pass of zero bytes -P, --openbsd OpenBSD compatible rm. Files are overwritten three times, first with the byte 0xff, then 0x00, and then 0xff again, before they are deleted. -D, --dod US Dod compliant 7-pass overwrite. -E, --doe US DoE compliant 3-pass overwrite. Twice with a random pattern, finally with the bytes "DoE". See for details. -G, --gutmann Use the 35-pass Gutmann method. This is the default and slowest overwrite mode. See for details. -v, --verbose explain what is being done. Specify this option multiple times to increase verbosity. -h, --help display this help and exit -V, --version output version information and exit show current write position and filename handled. srm can write to block devices on Linux. You can use srm to securely delete an entire hard disk, however you should only do this for classic magnetic drives. The modern solid state disks (SSD) have a faster and better way to erase all contents, Secure Erase. For a Linux operating system see srm can not remove write protected files owned by another user, regardless of the permissions on the directory containing the file. Development and discussion of srm is carried out at which is also accessible via See for a general discussion about overwriting data. Matt Gauthier, Dirk Jagdmann 1.2.13 srm(1) Locations of this man page Arch Linuxcommunity/srm1.2.13-1srm.1/usr/share/man/man1/srm.1.gz
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '8', 'language_id_whole_page_fasttext': "{'en': 0.7637569904327393}", 'metadata': "{'Content-Length': '15554', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:F6HHMWYQRKH3XUKZBVYPTNGCA2S3R33T', 'WARC-Concurrent-To': '<urn:uuid:dcc2fc61-7b9e-49e5-b819-176a509ca0ca>', 'WARC-Date': datetime.datetime(2014, 7, 30, 4, 59, 36), 'WARC-IP-Address': '188.165.210.64', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ZXLCW5EHALNQGTH3W4MWEP6U3VFWVMEM', 'WARC-Record-ID': '<urn:uuid:7faec9b4-cc69-4b47-af09-808616977e11>', 'WARC-Target-URI': 'http://manned.org/srm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f5d6f0dd-25e5-4437-b11e-63c1d685c083>', 'WARC-Truncated': None}", 'previous_word_count': '434', 'url': 'http://manned.org/srm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.061750054359436035', 'original_id': '0485f35491fdbeaf304cc61a987e4234c09e057535f6c4a1b1a2cd337ff91e1b'}
Disease incidence is usually connected to biological factors such as genetics, eating habits, exercise and so on. But are there are other socioeconomic factors that influence disease incidence as well? This TED talk from Bill Davenhall inspired us to explore socioeconomic factors that may influence disease incidence. To explore the connections of socioeconomic factors such as education levels, regional population, income level of the area where you live and the air pollution in terms of toxic levels, we developed a visualization tool called DiseaseTrends. DiseaseTrends allows the exploration of possible correlations between those socioeconomic factors with diabetes prevalence and cancer incidence rates across counties throughout the United States. A user can interactively explore these factors at a county, regional (user defined cluster of counties), state or national level. When a user explicitly selects a county, we display 5 similar counties based on their socioeconomic factors. The motivation behind this feature is to allow users to identify similar counties that may have varying disease incidence rates, which may in turn lead to further exploration. As mentioned above, a user can specify regions manually that cross state boundaries. A user defined circular cluster can be specified using Ctrl on PC, Cmd on Mac – then click and drag. Here the user has specified four regions. The maximum prevalence (in red) and the minimum (in green) across the selected region is highlighted in the panels below. We use bullet graphs (pdf link) as introduced by Stephen Few to display the quartile distribution of a factor as well as the corresponding state and national average (faint and dark vertical bars). Through this tool, we can easily see the now popular diabetes belt, as shown here High incidence rates in Native Indian reservations such as Navajo County, Sioux County, Rolette County and Big Horn County too can be seen. We would like to mention that DiseaseTrends does not imply any causation and can merely hint at possible associations. It is completely up to a researcher in the field of public policy / public health to further investigate the findings. Bernice E. Rogowitz covered fundamentals in human perception and cognition, and discussed how they apply to visualization. She covered a huge array of topics, ranging from the pupil being partially responsible for our depth perception, all the way to color theory and how it relates directly to the biology of the human eye. The presentation had a great flow, starting at a very high level to give everyone an idea of what questions they would be able to answer at the end. As the talk progressed, she covered detailed biological details of the human eye, and progressed to the intersection of perceptual issues and computer science. In the biological portion, we learned that there are five layers of cells in the retina, each responsible for different tasks. Much of the interesting stuff happens at the very beginning (photoreceptor distribution) and then further into the process at the ganglion cells. She went over how lateral inhibition is caused by the spatial distribution of the photoreceptors connected to a single ganglion cell, and how this is the reason for several of the optical illusions we perceive. She did a great job of explaining the connections between biology and perceptual issues. Cultural differences were also addressed. The eye movements we have are actually learned when we learn how to read. Cultures with different reading directions have substantially different reading directions. The section on the Striate Cortex was especially interesting. This is the first time in the visual system that images from each eye are merged (the point where depth perception occurs). This section sends output to 60% of the brain! This is a huge amount, and makes the visual system incredibly important to the decision making process. This tutorial had a huge quantity of useful information and was really well put together! She concluded with a great summary of four things to remember: There are different response rates for different stimuli, how well do you want to convey magnitude information? Color and luminance mechanisms have different spatial sensitivities. Certain visual information is perceived “pre-attentively” such as color. How the world is perceived depends on what the user is trying to accomplish. These notes were transcribed by Lane Harrison (@laneharrison) and Drew Skau(@seeingstructure). They are both graduate students at UNCC. Thanks guys!! This is almost as good as being there. The IEEE VAST Challenge this year consisted of three mini challenges and one “grand challenge”. For the uninitiated, the challenge datasets are designed to reflect real-world analytical challenges. This year’s challenges involved microblog+geospatial data, cyber security data, and a corpus of plain-text news documents. While there is no “winner”, the challenge entries are given awards based on their respective strengths. Participants are also given detailed feedback from both visualization experts and actual analysts who work with such data. This feedback is one of the most rewarding aspects of the VAST Challenge. As we all know, it’s hard to get access to analysts. One highlight is a geo-text visualization approach from the Universität Stuttgart. ContentLens is a novel integration of tag-cloud methods and geo-visualization and interaction techniques. Perhaps if you ask nicely, they’ll give another demo. Another interesting approach come from Penn State, who leverage their GeoViz toolkit to analyze a large (10gb+) set of cyber security data. In fact, the security data took center stage in a panel of security and/or visualization practitioners. Some key points in the panel suggested a need for smart collaboration in large-scale security analysis. Analysts can often unnecessarily repeat work or miss threats that has already been addressed by other analysts in their organization. Maybe we need an “Amazon- Recommendations” component for security analysis tools. Finally, workshop participants heard about and discussed the possible future VAST Challenges. Can visual analytics handle a million-node network? Can this community design tools that enable consumers to make discoveries in the vast sea of data that surrounds them? Well, that’s up to you. Steve Drucker from Microsoft Research talked about his rich interactive narrative player work. The tool uses XML to set up a queue of keyframes with audio narration. It supports audio narration and multimedia embedding. Wesley Willet talked about supporting ad-hoc storytelling in social media. He raised several technical issues, including the need for interactive visualization state encoding in URLs. This would allow people to link to a specific state in the visualization, and share that state over social media. Jerome Cukier talked about adding personal connections to visualizations to help audience engagement. He also discussed the importance of providing interaction that lets users feel like they are exploring the dataset and coming to their own conclusions. A significant take- away quote Jerome had is “Trust is not really an exact science.” Sunah Suh framed a discussion about the impact of culture on visualization and visualization on culture. She discussed the multiple forms of literacy beyond just natural language, addressing issues of statistical literacy as well as visual. She raised the point that visualization does not just reflect and rely on societal norms, it also reinforces them. One example she gave was the pink and blue color coding in Baby Name Voyager reinforcing a binary gender concept. The takeaways from the first half of the session dealt with technical issues of platforms and tools to support narratives, as well as some of the social issues going on in narrative visualizations. Both of these are important issues as narrative visualization finds its place in culture. The necessary tools must be developed to help narrative visualization become ubiquitous, but also there are social issues to be addressed as people come to terms with the new media. These notes were transcribed by Lane Harrison (@laneharrison) and Drew Skau(@seeingstructure). They are both graduate students at UNCC. Thanks guys!! There were other excellent speakers who presented, but Drew and Lane were presenting in an adjoining session. The annual IEEE Visualization, IEEE Information Visualization and IEEE Visual Analytics Science and Technology conferences – together known as IEEE Visweek will be held in Providence, RI from October 23rd to October 28th.The detailed conference program is spectacular and can be downloaded here.Some of the new events this year are under the Professional’s Compasscategory. It includes a Blind date lunch (where one can meet some researcher they have never met and learn about each others research), Meet the Editors (where one can meet editors from the top graphics and visualization journals), Lunch with the Leaders session (an opportunity to meet famous researchers in the field) and Meet the faculty/postdoc candidates (especially geared towards individuals looking for a postdoctoral position or a faculty position). I think this is an excellent idea and hope that the event is a hit at the conference.I am also eagerly looking forward towards the two collocated symposia – IEEE Biological Data Visualization (popularly known as biovis) and IEEE LDAV (Large data analysis and visualization). Their excellent programs are out and I’d encourage you to take a look at them. The telling stories with data workshop too looks great and will be a continuation of the great tutorial held by the same group last year. I am eagerly looking forward to it. Apart from this are the excellent papers that will be presented at the conference. I shall write another post about the ones I am particularly looking forward to. With so many exciting events going on, it almost seems like a crime to have all of them happening in the span of a few days. I shall definitely be blogging about the event as much as I can. You can also follow me on twitter, which will have more real time tweets than the blog which will distil a days worth of information into a post. Let me know if you are going to be around and I’ll be happy to talk to you. Data visualization is being used for detecting fraud, especially with respect to wire and credit card transactions. Work done at the Charlotte Visualization Center at UNC Charlotte provides some interesting insights into fraud detection. This work was conducted in collaboration with the Bank of America.In the following paper they highlight four visualization techniques that allow for fraud detection. Heatmap: A heatmap depicting the relationship between accounts and transactions. Search by example: Find accounts with transactions/activity similar to the current account being monitored. Strings and beads: A line graph based visualization that shows critical events as ‘beads’ on the graph. The use of a log scale for the y-axis is a neat idea and probably allows for improved exploration. Keyword graph: A graph visualization showing keyword similarity This paper was based on previous work done by the same group titled Wirevis. I would encourage interested readers in reading the original paper as well as the previous paper (Wirevis). Lately, I have been collecting links to videos of talks related to Data Visualization. I found multiple talks for some people and so have categorized them accordingly. I have also tried to provide some context to the individual/group. I think the first TED talk by Hans Rosling (@hansrosling) got a lot of media attention and made people sit up and appreciate the power of ‘narrative visualization’. He almost make it look like a sport with him serving as the role of a commentator. The title on TED’s website for the talk is “the best stats you’ve ever seen“. I am not sure about that, but it is a very entertaining talk. Results indicate that trend animation can be challenging to use even for presentations; while it is the fastest technique for presentation and participants find it enjoyable and exciting, it does lead to many participant errors. Animation is the least effective form for analysis; both static depictions of trends are significantly faster than animation, and the small multiples display is more accurate. Tom Wujec is a fellow at Autodesk. His talk on 3 ways the brain creates meaning provides an amazing insight into our brain. He addresses issues related to why data visualization works and how the brain visualizes data. Nicholas Christakis presents a very fascinating talk where he used social data visualization to explore the influence of social networks – “The hidden influence of social networks.” In his talk he says that spreading of obesity is due to your social network. Smoking and even divorce can be linked to the company you keep.
mini_pile
{'original_id': '94c368501e6460f8df2a63aefd1f14e25d942fee0e2695823ab9c38a8e069105'}
Challenging Japan’s ‘War Laws’: contemporary civil society action in the courts | Melbourne Asia Review Email Address The shock assassination of Japan’s former Prime Minister Shinzo Abe in July has prompted fresh consideration of his legacy, particularly in the area of foreign and security policy. International commentators have tended to praise his reforms of Japan’s security policy, many without acknowledging the domestic controversies these stirred up. Notably, his administration’s contentious 2015 Peace and Security Legislation upended long-standing norms of Japan’s constitutional pacifism and led to generationally unprecedented demonstrations on the streets of Tokyo. For many inside and outside Japan, the 2015 Legislation faded as an issue once it passed the Diet (Japanese parliament). While the struggle in the streets and Diet has come to an end, a Japan-wide network of lawyers and plaintiffs acting under the banner of the Unconstitutional Security Legislation Litigation Association (anpo hōsei iken soshō no kai) (the ‘USLLA’) is continuing the fight in the courts. The USLLA’s challenge to the Peace and Security Legislation is based on its claim that the 2015 Legislation violates the pacifism embedded in the Japanese Constitution. The claim is being made via a series of class actions filed in courts all around Japan. Constitutional pacifism and the Peace Clause Article 9 of Japan’s Constitution is known as the ‘Peace Clause’ and, along with the Preamble, establishes pacifism as one of the three foundation principles of the post-WWII Japanese state. Article 9 famously renounces war as an instrument of the Japanese state and, prohibits the maintenance of ‘war potential.’ Much of the Japanese Constitution was authored by the US Occupation authorities and the origin of Article 9 remains controversial. The controversy centres on whether it was conceived of by General Douglas A. MacArthur who led the US occupying forces or whether it was the idea of Japan’s then Prime Minister Kijūrō Shidehara. The notion that Article 9 is a foreign idea imposed upon an unwilling Tokyo and prevents Japan from being a ‘normal’ nation fuels much of the rhetoric of those seeking formal constitutional change. However, the Japanese people have consistently supported Article 9 and opinion polls indicate no popular groundswell for its amendment. Furthermore, Article 96 of the Japanese Constitution establishes a high barrier for formal constitutional amendment that requires the support of two thirds of the members of each house of parliament and then a majority at a national referendum. In fact, a law setting out the procedures for a referendum was not even passed until Prime Minister Abe’s first short-lived administration in 2007. As a result of these obstacles, debates about the constitutional limits on Japanese military activity have largely turned on the interpretation of Article 9 and the nature of constitutional pacifism. Interpretation of Article 9 On their face, the words of Article 9 in English appear to impose an absolute pacifism. That is, Japan is prohibited from maintaining military forces of any kind or from entering into military alliances. Instead, an unarmed Japan is to rely on the UN security system and the goodwill of the international community for its security. However, the words of Article 9 in the authoritative Japanese, contain some ambiguity. In particular, when considering the constitution bill, the Diet made changes to paragraph 2 to link its prohibition on maintaining war potential to fulfilling the purposes of paragraph 1, the ‘Ashida amendment,’  This has allowed the Japanese government to maintain the position that Article 9 permits Tokyo to exercise the right of individual self-defence available under international law and, therefore, may make the minimum necessary preparations to exercise that right. In effect, Article 9 establishes a ‘qualified’ pacifism. This is why the Japanese ‘Self-Defense Force’ (Jieitai) (SDF) is styled as a self-defence force rather than a conventional military. The official interpretation is consistently repeated in government publications such as the Ministry of Defense’s annual Defense White Papers and statements by government ministers and senior officials. For many years, the primary political conflict over Article 9’s interpretation was over this issue of ‘absolute’ vs ‘qualified’ pacifism. The conservative Liberal Democratic Party which has been in government for almost all of the post-WWII era maintained the qualified pacifist interpretation, but was opposed by parties on the political left which include the Socialist and Communist parties. On a number of occasions, peace activists attempted to challenge the government’s interpretation in the courts, hoping that they would rule in favour of absolute pacifism and declare measures such as the SDF or the 1960 US-Japan Mutual Security Treaty unconstitutional. The role of the Japanese courts Article 81 of the Constitution invests the Japanese Supreme Court (JSC) with the final power to determine the constitutionality of laws and official acts and it therefore could be expected that it would play an active role as interpreter of Article 9. However, the JSC is reticent to make constitutional decisions contrary to the government’s position and, with the exception of the seminal 1959 case of Sunagawa, has avoided ruling on the interpretation of Article 9. In Sunagawa, the JSC overruled the earlier decision of Presiding Judge Akio Date of the Tokyo District Court which had adopted an absolute pacifist interpretation and declared the presence of US Forces in Japan to be unconstitutional. Instead, the JSC endorsed a qualified pacifist interpretation and ruled that the government could put in place the minimum necessary measures to ensure the defence of Japan. In its decision, the JSC also effectively confirmed that control over Article 9’s interpretation would be in the hands of the political institutions of government and not the courts. The JSC held that determining what constitutes the minimum necessary defence measures is a highly political matter and not ordinarily capable of being assessed by an apolitical court. Therefore, except in cases of obvious unconstitutionality, defence measures should be determined by the political institutions of government. meaning the executive and the Diet. Since Sunagawa, a critical dimension of the government’s interpretation was that self-defence was limited to the defence of Japan and, notwithstanding the right of collective self defence available under international law, Article 9 prohibited Tokyo from acting in defence of another country. Sunagawa established that the courts would ordinarily defer to the government’s interpretation of Article 9, as noted above. However, as the JSC reserved the power to act in case of what is referred to as ‘obvious’ unconstitutionality and left important issues unaddressed including the constitutionality of the SDF, peace activists have continued to petition the courts to declare that certain security measures are unconstitutional. While lower courts do occasionally consider the substance of Article 9, most lawsuits are usually rejected on the basis that the plaintiffs lack standing or for other technical reasons. On the rare occasions when a potential Article 9 case has reached the JSC, it has consistently resisted interpreting Article 9 any further and based its decisions on other grounds. The Abe Government’s 2015 Peace and Security Legislation Following his return to power in 2012, Prime Minister Abe renewed his long-standing ambition to reform Japan’s national security including amending Article 9. When it became clear that the political support necessary to achieve formal constitutional amendment was lacking, the Abe government ‘reinterpreted’ Article 9 in 2014. One effect of the Abe Cabinet reinterpretation was to controversially recognise Tokyo’s right to exercise collective self-defence (CSD) under international law, but in limited and ill-defined circumstances. In 2015, the Abe government then moved to implement this reinterpretation and make a number of other national security changes via a complex package of legislation known as the Peace and Security Legislation. In 2014-15 there was intense opposition to the Abe government’s security changes and resistance to the passage of the Peace and Security Legislation. Constitutional and other scholars condemned it as obviously unconstitutional and the streets of Tokyo and other Japanese cities were rocked by huge demonstrations attracting participants from a cross-section of Japanese society.  However, the Abe government withstood this pressure and using its Diet majority passed the Peace and Security Legislation through the Upper House and into law on 19 September 2015, as thousands stood outside in vigil. Following the passage of the Peace and Security Legislation through parliament, the political campaign against it largely faded away. The Legislation continues to be opposed by peace activists online and in much smaller peace rallies and other activities. However, the Abe government coasted to victory in the 2016 Upper House election that followed and nothing like the series of huge demonstrations of 2014-15 have been seen since. In many ways, the protesters’ vigil of 19 September 2015 was the final act of major ‘political’ opposition to the Legislation. The Unconstitutional Security Legislation Litigation Association The USLLA is a group of lawyers and plaintiffs who have shifted the fight against the Peace and Security Legislation to the courts, via a campaign of coordinated class action lawsuits conducted in courts all around Japan. The USLLA was started by Tokyo lawyer Terai Kazuhiro who runs human rights and labour law firm, Liberté/Egalité based in Tokyo and is a former Secretary-General of the Japan Federation of Bar Association. The USLLA was born in September 2015 when Terai-sensei gathered Japanese lawyers and peace activists in response to the passage of the Peace and Security Legislation which they believe violated long-standing political norms and is clearly unconstitutional. The USLLA’s national representation is based in Tokyo where Terai-sensei and a several of other Japanese lawyers and activists promote the activities of the USLLA, run the website and undertake social media outreach. However, the USLLA litigation is conducted at the local level in courts around Japan with some 1,600 lawyers and almost 8,000 plaintiffs challenging the constitutionality of the Peace and Security Legislation as part of 25 different lawsuits. Local proceedings are not closely directed by the national office with local lawyers running their lawsuits, but assistance is available for things like organising expert witnesses to give testimony and, the sharing of arguments and tactics. In an echo of the 2014-15 demonstrations, the USLLA emphasises the need to restore ‘constitutionalism’ (rikkenshugi) which they claim was undermined by the legislative process and substance of the Peace and Security Legislation. The USLLA’s constitutionalism has two dimensions. First, it calls on the courts to exercise judicial power and defend the Constitution. However, the USLLA also accentuates the democratic dimension of constitutionalism by petitioning the courts to rule that unconstitutionality exists but then defer to the Diet to remedy the issue through legislative change. The lawsuit is a class action meaning that a number of ordinary Japanese citizens have joined together as plaintiffs to make the same claim, in this case, against the government. Separate lawsuits have been filed in district courts and are being pursued by teams of lawyers and plaintiffs from the local area. For each lawsuit, lawyers prepare their own arguments and plaintiffs provide testimony. There are two claims being put forward by the plaintiffs. The first is for an injunction against the deployment of the SDF overseas on the basis that this violates Article 9. The second is to claim damages on the grounds that the Peace and Security Legislation infringes their right to live in peace and the right of the Japanese people to decide on the constitution (i.e. that the interpretation is unconstitutional and therefore is effectively illegitimately amending the Constitution). Generally, the claim to an implied constitutional ‘right to live in peace’ (heiwateki seizonken) is derived from the words of the Preamble which states: ‘We recognize that all peoples of the world have the right to live in peace, free from fear and want.’ As US lawyer Hudson Hamilton in his analysis of the right has noted, arguments for its existence are usually based on linking the Preamble to Article 9 and certain human rights provisions of the Constitution. However, under Japanese law, a court would need to determine that it was a ‘concrete right’ (gutaiteki kenri) rather than an abstract concept before individual citizens could claim infringement of their human rights. Article 17 of the Constitution provides a right to sue the state for damages suffered as a result of illegal acts by public officials. Although two courts have recognised its existence as a concrete right, a right to live in peace has not been recognised by the JSC and many other courts have found that it is not concrete right. The USLLA lawsuits continue the tradition of peace activists petitioning the courts to establish that the government has violated Article 9 and that Japanese citizens have a right to live in peace. The passage of the Peace and Security Legislation undermined a number of long-standing norms relating to Article 9’s interpretation, the most important being its recognition that in limited circumstances Japan could exercise the right of collective self defence. However, the higher Japanese courts exceptional reluctance to find any government legislation unconstitutional and efforts to avoid interpreting Article 9 mean it would be a remarkable outcome for the Supreme Court to ultimately declare the Peace and Security Legislation unconstitutional or recognise a right to live in peace. The USLLA believes that it can be successful in court but explicitly adopts a two-pronged strategy of ‘winning in court’ and ‘winning through court’. It sees a court determination that the Peace and Security Legislation is unconstitutional as the path to restoring constitutionalism, but it also recognises the potential for its litigation to impact in ways other than victory in the courtroom. In this regard, the USLLA has had some success in generating publicity. The decisions of local courts that have heard USLLA claims to date have been reported by the local media in that region. The USLLA also uses its social media channels and website to provide updates on cases and distribute information. Terai-sensei and USLLA national delegate Makoto Ito have also published a book on the USLLA campaign and given interviews in national publications. That said, publicity appears to have had a limited impact with no surge of national media attention or revival of the social movement activity that was seen in 2014-15. Observing Local USLLA Litigation My fieldwork has involved observing USLLA litigation in Fukuoka and Osaka, as well as interviewing Terai-sensei and other key figures in the USLLA leadership. From my observations, a large majority of plaintiffs are members of the post-WWII generation and in some cases older. This stands in contrast to the demonstrators against the Peace and Security Bills which drew on a broad demographic of Japanese, with university students and younger people playing a prominent role. It is not clear why this is the case but perhaps the fact that court proceedings take place during the working day means it is impractical for those in the workforce to participate; many of the ‘baby boomer’ generation have been active in pacifist social movements for many years and are willing participants; and lawsuits are staid and unfamiliar activities for younger Japanese. The USLLA plaintiffs have a strong sense of solidarity and many members of class actions regularly attend the court hearings. There are 148 members of the Fukuoka District Court lawsuit and around 40 regularly attend court proceedings. Following proceedings, the plaintiffs and lawyers gather for a meeting at which the lawyers provide an explanation of what has happened in the court and what will happen next. The plaintiffs have the opportunity to give testimony in court and clearly one motivation for joining these lawsuits is the chance to have their voice heard on this issue. I have listened to moving testimony from many plaintiffs for whom the opportunity to be heard in an official forum is an important motivation. Plaintiffs commonly describe familial memories of WWII, the deprivations of the immediate post-WWII years and convey their profound concerns that Japan has forgotten the tragedy of war. They describe their fears that the Peace and Security Legislation means that Tokyo will be drawn into military conflict. The Osaka litigation has come to an end. The plaintiffs chose not to appeal against the decision of the Osaka High Court to reject their appeal against the Osaka District Court’s rejection of their claims at first instance. The next stage would have been an appeal to the Japanese Supreme Court and, as this may have prevented other lawsuits around Japan from proceeding, the Osaka plaintiffs decided to end their litigation. On 15 April 2022, the Fukuoka District Court ruled against the Fukuoka plaintiffs in their claim for compensation based on a right to live in peace. The Court ruled that it was not a concrete right of Japanese citizens, but they have appealed to the Fukuoka High Court. I will continue to follow the progress of their lawsuit. At this stage, a number of USLLA lawsuits are still before courts around Japan including in Tokyo. At some point in the future, a lawsuit will be appealed all the way to the JSC but given the reluctance of the courts to rule in relation to Article 9 cases and generally find against the government, the chances of the USLLA ultimately succeeding in court appear low. However, its campaign provides the plaintiffs and lawyers with an avenue to continue the struggle against the Peace and Security Legislation now that the street and Diet campaigns have largely ended. It is also not impossible that a lower court could rule in favour of a USLLA lawsuit. The lower courts have found that the government violated constitutional pacifism in the past although those findings were overturned on appeal. However, such a finding would be front page news in Japan and re-start the public debate about Article 9 of the Constitution. This would give advocates for an alternative vision for constitutionalism and state pacifism the chance to persuade the public and generate popular support for their cause. Author: Adam Eldridge-Imamura is a part-time PhD student at the Asia Institute, University of Melbourne, where he is researching the legal, political and social movement aspects of Japan’s constitutional pacifism; and a professional lawyer and consultant specialising in government law and policy. Image: Lawyers and plaintiffs outside the Fukuoka District Court criticising the court’s decision to dismiss their lawsuit. Fukuoka Court April 15, 2022. Credit: Author. civil society Japan Peace and Security Legislation Shinzo Abe USLLA war laws
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '28', 'language_id_whole_page_fasttext': "{'en': 0.9616079330444336}", 'metadata': "{'Content-Length': '224127', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LHWSG7LRQ5RJZB5WHQGP2FFNNBAXWIHZ', 'WARC-Concurrent-To': '<urn:uuid:4fff6929-2dfc-4692-bbda-608f3a8b8980>', 'WARC-Date': datetime.datetime(2022, 12, 8, 10, 34, 47), 'WARC-IP-Address': '162.159.135.42', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DSGVTG7DC3AYISEGTT7CAMIUAG5TJ6WV', 'WARC-Record-ID': '<urn:uuid:b3405f21-d217-409e-9125-319bff1913c0>', 'WARC-Target-URI': 'https://melbourneasiareview.edu.au/challenging-japans-war-laws-contemporary-civil-society-action-in-the-courts/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d3e85b4e-952a-4b05-99cf-46d84386fbe4>', 'WARC-Truncated': None}", 'previous_word_count': '3026', 'url': 'https://melbourneasiareview.edu.au/challenging-japans-war-laws-contemporary-civil-society-action-in-the-courts/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-73\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03178751468658447', 'original_id': '10f40ebb480d65b01f15e7197256e9cf0a8dd249b1df62b8f9ddb7b040088fa0'}
SodiumBlogA day before new sodium labeling regulations were set to take effect in New York City, a New York state appeals court granted a temporary stay, pausing the implementation and enforcement of the new requirements. Under the regulations, New York City restaurants with fifteen or more locations nationwide would have been required to post a salt-shaker symbol next to menu items that contain 2,300 milligrams (mg) or more of sodium (the daily recommended intake). Additionally, at the point of purchase, covered restaurants must conspicuously post the following warning: “Warning: Sodiumtiny1 indicates that the sodium (salt) content of this item is higher than the total daily recommended limit (2300 mg). High sodium intake can increase blood pressure and risk of heart disease and stroke.” The regulations were passed unanimously by the New York City Board of Health in September 2015, and were set to take effect on March 1, 2016. The National Restaurant Association sued the New York City Department of Health and Mental Hygiene in December to prevent the regulations from taking effect. On February 24, 2016, Judge Eileen Rakower refused the request, saying, “I believe information is power. This is not like the soda ban case. In this case we are providing information. Provide a different choice [of menu items] if you want to.” The case was immediately appealed, and the New York state appeals court decision temporarily overrides Judge Rakower’s decision until a New York state appeals court decides whether to grant a preliminary injunction, which would pause the regulation until the case is evaluated on its merits. Among other claims, including one that the regulations are preempted under the Nutrition Labeling and Education Act, the National Restaurant Association alleges that the New York City regulation violates First Amendment rights by requiring disclosure of information with which the restaurants do not agree. The National Restaurant Association sees the forced menu changes as a form of compelled speech. As discussed in our recent blog about GMO-labeling, the status of compelled speech doctrine under the First Amendment is presently subject to significant unresolved litigation. Under the traditional standard, in order to compel commercial speech, the required disclosure must be factual and noncontroversial and must be intended to prevent consumer deception. Two cases out of the D.C. Circuit have interpreted that standard in different ways, thus making it more difficult to predict how this sodium-labeling case will turn out. Restaurants in New York City subject to this rule are also subject to the federal menu labeling regulations, which are set to take effect on December 1, 2016.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '29', 'language_id_whole_page_fasttext': "{'en': 0.9399656057357788}", 'metadata': "{'Content-Length': '47278', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CYWTWMBOBDC77JMH6MPRPRGYXCAPDEBJ', 'WARC-Concurrent-To': '<urn:uuid:18859e2e-ba3e-44b5-be49-0aa5e1528453>', 'WARC-Date': datetime.datetime(2017, 4, 26, 0, 8, 39), 'WARC-IP-Address': '104.27.187.106', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:TNZCW35I3ZKUZ4NETDYLO24Z22NLWG55', 'WARC-Record-ID': '<urn:uuid:a5982caf-ce7f-469e-bee8-2b47072ada51>', 'WARC-Target-URI': 'http://www.foodbevlawblog.com/2016/03/articles/food-beverage/menu-labeling-new-yorks-salt-disclosures-temporarily-stayed/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:094992ca-a535-4700-9bd0-6ac3b54682ac>', 'WARC-Truncated': 'length'}", 'previous_word_count': '418', 'url': 'http://www.foodbevlawblog.com/2016/03/articles/food-beverage/menu-labeling-new-yorks-salt-disclosures-temporarily-stayed/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-145-167-34.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-17\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03120875358581543', 'original_id': '45835dfe45ad0b431917dac1d3ccd9f64f5de96b81bd943eb1264caa68999ed9'}
Take the tour × Let $$G=\langle x, y, z\mid xyx^{-1}=zy, xzx^{-1}=z, yz=zy\rangle,$$ denote $l^1(G)^{\times}$ to be the set of units in $l^1(G)$, which we have considered as a ring with multiplication defined by the usual convolution, i.e., $(\sum_{g\in G}\lambda_gg)(\sum_{h\in G}\mu_hh)=\sum_{g, h\in G}\lambda_g\mu_hgh$. Can we find $l=p_1(y, z)x^{n_1}+\cdots+ p_k(y,z)x^{n_k}\in l^1(G)^{\times}$ such that $$\sum_{i=1}^k2^{n_i}p_i(y,z)(1-z^{n_i}y)=0\;?$$ Here, $\forall~ 1\leq i\leq k, ~p_i(y,z)\in \mathbb{Z}G$ and $n_1<\cdots<n_k\in\mathbb{Z}$ to be determined. Note that the group element $x$ does not appear in $p_i(y, z)$. 1, This problem was asked previously in MSE, but no answer appeared, so I think it might be suitable for MO. 2, This problem is related to a modified Ore condition. I want to show that $l$ does not exist, suppose it exists, then I have considered the natural quotient map $\phi: G\to H=G/\langle z^2\rangle$. Note that it would induce a map $\phi: l^1(G)^{\times}\to l^1(H)^{\times}$, then $\phi(l)\in l^1(H)^{\times}$, but I still could not handle this.. share|improve this question why some symbols could not appear? Anyone helps fix this? –  Jiang May 30 at 7:38 @Jiang: I've edited the MathJax code. There are some issues with how it works here, but they should go away when MathOverflow moves to the SE 2.0 network sometime soon: tea.mathoverflow.net/discussion/1416/1/mathoverflow-20 –  Zev Chonoles May 30 at 8:00 @Zev Chonoles, thanks! –  Jiang May 30 at 8:40 How about $l = 2(1-zy) - (1-y)x$? –  Konstantin Ardakov Jun 4 at 8:39 @Konstantin, thanks for your comment. For this $l$, we can check that $l^{-1}=sum_{n\geq 0}\frac{1}{2^{n+1}}(1-y)(1-z^ny)^{-1}(1-z^{n+1}y)^{-1}x^n\not\in l^1(G)^{\times}$ –  Jiang Jun 16 at 9:53 add comment 1 Answer up vote 1 down vote accepted Omit this problem, we can take $l=z+\frac{1}{2}(-z-1)x+\frac{1}{4}x^2$, then $l^{-1}=\sum_{n\geq 0, m\geq 0}\frac{1}{2^{n+m}}x^{n+m}z^{-m-1}\in l^1(G)$. share|improve this answer add comment Your Answer
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '28', 'language_id_whole_page_fasttext': "{'en': 0.7828565835952759}", 'metadata': "{'Content-Length': '53952', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NYNBOWVPLTWQMC6YP2QZNOSG2S3EHZJI', 'WARC-Concurrent-To': '<urn:uuid:6988e9ee-fd44-4c65-ba12-3b96422f2e70>', 'WARC-Date': datetime.datetime(2013, 12, 13, 14, 23, 3), 'WARC-IP-Address': '198.252.206.24', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:PG2XHYIXIIVKB54OI5GGVW2I4GZA2557', 'WARC-Record-ID': '<urn:uuid:e6e40437-00bf-43b1-83cb-66ee92a895e6>', 'WARC-Target-URI': 'http://mathoverflow.net/questions/132311/find-a-special-element-in-group-algebra', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:92b42a04-19bd-4b0f-9501-968e088bcec4>', 'WARC-Truncated': None}", 'previous_word_count': '297', 'url': 'http://mathoverflow.net/questions/132311/find-a-special-element-in-group-algebra', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1461687684059143', 'original_id': 'b4042bf248b92b6cab23d59d79b8a209491ad44b8bd153f2806304e529c901d3'}
Emerge of computing machine was foremost introduced in our life is about two hundred old ages earlier. Although about a twosome of decennary ago people do n’t even cognize how to utilize the computing machine. But it made such a great impact that most people now a twenty-four hours ‘s know what a computing machine is and how to utilize it. Basically without computing machine it ‘s truly impossible to run a individual twenty-four hours because everybody is straight or indirectly related with this engineering. Suppose, conceive ofing a universe without computing machines, which mean no communicating, no Internet, no picture games, nil. Life would be highly debatable. So the approval of computing machine engineering creates our life easier and less complicated. The modern universe of high engineering could non hold come without the exclusion of development of computing machines. Different types and sizes of computing machines find uses throughout society in the storage and handling of informations, from Government files to banking minutess to private family histories. Computers have opened up a new age in fabricating through the techniques of mechanization, and they have improved modern engineering. This study shows the overall market analysis and factors that affect the economic sciences of computing machine market. Computer market has change drastically over the last 10 old ages and now in a growing phase and go oning turning because of its high demand. Even the market itself is really competitory and companies try to provide more to capture the market. Even though in the computing machine market demand is increasing twenty-four hours by twenty-four hours where else the monetary value is diminishing. Basically the jurisprudence of economic sciences is that when the demand is increasing it seems that the monetary value of the merchandises will be given to increasing. So we need to look the overall market of computing machine and the other factor that determines the demand and supply of the computing machine which in return affects the monetary value of that merchandise. 2.2 Dominate Economic Features 2.2.1 Market Size: Our research is largely narrow down to personal computing machine. The computing machine industry consists of hardware, package, service and an eternal array of merchandises. The overall growing rate of Personal computer market was double-digit the twelvemonth 2004 in the worldwide, harmonizing to research released by IDC and Gartner. 2.2.2 Range of Competitive competition: The competition within the Personal computer industry is inordinately cutthroat. The top companies consist of Dell, HP, Apple, Gateway and Sony. ( Austan Goolsbee ) A few factors of competitory border: Custom built Personal computers New engineering Customer Service 2.2.3 Phase in Life Cycle: Based on the life rhythm of a merchandise computing machine industry lies in the mature degree. However, the growing of Personal computer gross revenues has non decreased due to the globalisation tendency taking topographic point within the transnational corporations and rapid ascent of engineering in this sector. 2.2.4 Number of Companies within the Industry: Dell – The universe ‘s # 1 direct-sale computing machine seller provides a wide scope of computing machine and amusement merchandises for the consumer and endeavor markets. Sony – Sony has refocused its attack to selling computing machines: Alternatively of appealing chiefly to consumers, it is now aiming concern clients ( largely little and moderate-sized companies ) . HP – Horsepower ‘s Personal Systems Group ( PSG ) markets desktop and notebook Personal computers to consumer, concerns, authorities bureaus, and schools. Apple – Once the universe ‘s top Personal computer shaper, Apple Computer has been relegated to niche position in a market dominated by “ Wintel ” machines ( computing machines utilizing Microsoft Windows package and Intel processors ) . Gateway – Possibly the purest Personal computer drama among the taking computing machine shapers, Gateway has been hit peculiarly difficult by decelerating gross revenues in that industry. 2.2.5 Customers: Customers involvements of the PC community can be described as diverse, across the board for the PC user. Ranging from Business utilizations, picture sweetening, money direction, research, school, scientific discipline and a many of others uses Personal computer. Therefore this means the clients that buy the computing machines are diverse and utilize their machines in a assortment of ways. The computing machine offers an efficient manner of running a concern, playing a game or pull offing your calendar. 2.2.6 Technology/Innovation: Technologies every bit good as betterment are progressing every twelvemonth, therefore doing the industry booming. Ten old ages from now opportunities are at that place will be few computing machines in place. Alternatively, people will be have oning computing machines — implanted, for illustration, in spectacless, with the retina as the screen — harmonizing to IT innovator and futurist Raymond Kurzweil. 2.2.7 Scale Economies: With most transnational corporations there are two separate economic systems runing between the existent company and the markets. The separate economic systems are internal and external. Internal: Tech Economy, Managerial Economy, Financial Economy, Marketing Economy, and Research & A ; Development. External: The external facets of scale economic systems consist of the distribution centres and retail merchants. For illustration ; Apple, Sony or HP industry computing machines, while retail merchants arrange for computing machine bringings to the client. One exclusion is Dell, which has excelled in made-to-order computing machines delivered directly to a consumer ‘s place. 2.2.8 Learning & A ; Experience Effect: The computing machine industry is mature and here to remain. In the US computing machines are found in most places with entree to the Internet. Students are taught to utilize computing machines in school at a immature age and competence is merely traveling to increase. However, there are people who struggle with applications and user activities such as put ining new drivers or linking a proctor. One of the largest ailments within the industry is support. Dell, one time once more is an exclusion. Dell observes great wagess when consumers give congratulations in respects to client service. Since the industry is so mature the ailments are few due to the dependability of the Personal computer. 2.2.9 Capital Requirements The capital required to come in and really vie with the large names in the computing machine industry are pathetic. Taking into history that HP spent 3.9 billion on research and development last twelvemonth entirely makes a individual believe twice approximately shiping in the industry. New constituents and thoughts are ever being developed by the big companies, which few can vie. Furthermore, the trade name name merchandises distributed by Apple, Dell and HP are household names. However, if a individual is technologically savvy and creates new linguistic communication or some kind of new invention they could sell the thought to the big companies. This would be the most likely state of affairs when trying to make a net income within the Personal computer concern. 2.2.10 Industry Profitableness: The fact remains that the Personal computer industry does n’t bring forth lone Personal computer ‘s. Every company that creates Personal computer ‘s besides has its manus in other industries and markets. An of import inquiry to inquire is how profitable is the industry. And the reply is one million millions upon one million millions upon one million millions of dollars. The industry is invariably redefining itself every bit good as every other concern on the universe due to its deep paths within every industry. As for what company ranks the highest in net income at the minute is Apple, but the Numberss are skewed due to other hardware Apple provides. The industry is highly competitory and profitable. Six Forces Suppliers / Buyers Intel and Microsoft are the two most dominate providers in the Personal computer industry. Suppliers: Intel ‘s microprocessor french friess are used in about 80 % of personal computing machines. Microsoft runing systems are used in 90 % of computing machines, giving it significant dickering power. Given that Microsoft and Intel control the bulk of the Personal computer provider market of major constituent parts, the concern universe has named the two “ Wintel. ” Buyers: The strength of the Personal computer purchaser has fundamentally evolved from the personal computing machine going a commodity-like point. Backward incorporation is besides a factor in the strengthening of the Personal computer purchasers bargain Power because more and more people are constructing their ain computing machine systems. Rivalry among Existing Firms: The competition the personal computing machine industry is besides an industry that resembles ‘follow the leader. ‘ Follow the leader occurs when industry leaders are mimicked by rivals ; and those rivals that do non follow will fall off by the roadside. Price Wars: Ex. In 1999 the mean Personal computer cost $ 1,699. Now the mean monetary value of a Personal computer is under a thousand dollars. Menace of New Entrants/Stakeholders: The opportunities of a new Personal computer seller come ining into the market and deriving important market portion is reasonably slender, entry barriers are higher now than they of all time have been. Two of those entry barriers that are doing entry into the Personal computer market so tough are cost and distribution. Concentrated: it is estimated by analysts that in the close hereafter the top 5 sellers may command 70 % of the planetary personal computing machine market. Figure 1: Emerging vs. developed market Personal computer unit growing 3.0 Economic Interpretation of Computer Industry: In the competitory market the demand for and supply of computing machine have many consequence based on the many variable that consequence both the supply and demand. In the above we discuss about the demand and supply consequence of computing machine industry and besides the alterations in monetary value. Based upon the market analysis we see that the demand of computing machine changed for many grounds. 3.1 Demand side impact on Computer: Demand Concepts: The demand for computing machine will depends on the undermentioned factors – The demand map for Computer: Cadmium = f ( PX, Ps, Pcp, I, T & A ; P, Pop ) Cadmium = measure demanded of Computer Personal computer = monetary value of Computer Ps = the monetary value of replacements merchandises of computing machine Pcp = the monetary value of complements merchandises of computing machine I=income of the person T & A ; P=tastes and pick penchants Pop=population in market or market size 3.1.1 Utility consequence: Basically there is no utility merchandise of computing machine. There is nil yet innovated that can replace the computing machine. Rather so that the Computer engineering is being used in all the other merchandises and services. Like nomadic phone, PDA, medical scientific discipline and fundamentally in everything. In instance of computing machine, so a desktop computing machine and a laptop are symmetric replacements every bit long as they portion common utilizations. Figure: Substitution Consequence Beginning: Internet universe Stats 3.1.2 Compliment merchandise: The computing machine industry consists of hardware, package ; service and an eternal array of merchandise, and mundane new invention are on its manner which seems to the compliment of the computing machine industry. Software is an illustration of good that is demand “ complementary ” with computing machines. When the monetary value of a complementary good ( package ) rises, the demand for the good itself ( computing machines ) lessenings. So there will be left ward displacement in the demand curve. Figure: Compliment Consequence JanuaryA 11, 2010-In 2010A the world-wide gross revenues of nomadic Personal computers are projected to reachA about 170M units-up fromA 28.5M nomadic Personal computers ten old ages ago. In the following five old ages nomadic Personal computer gross revenues will beA over 264M units-a compound one-year growing rate of nearlyA 25 % . Mobile Personal computers are deriving market portion and will account for overA 56 % of world-wide Personal computers sold in 2010-a more thanA trebling from 17.2 % in 1995. By 2014A the gross revenues of nomadic Personal computers are projected to account for overA 68 % of all Personal computers sold. These are some of the consequences from a new market research studies by Computer Industry Almanac. Computer Industry Almanac publishes market research studies for the Personal computer and Internet industries. 3.1.3 Income degree: Income consequence may be positive and negative in instance of normal and other goods. But though the computing machine industry right now is being considered into the normal goods it have a positive consequence on the computing machine demanded. At the clip of debut computing machine was used to prevarications in the luxury goods but now it ‘s needed for the twenty-four hours to twenty-four hours life. Figure: Income Consequence Figure: Personal Income Personal income was tendency to diminish at the last twelvemonth due to economic recession but economic system already overcome and the income will increase. 3.1.4 Population consequence: Population ever has the positive impact on the demand of any merchandise. In instance of computing machine it ‘s have an cheerful consequence because the possible purchaser for computing machine is more than any other goods or services. Figure: Population Consequence Figure: World Population Development Harmonizing to the figure the universe population will increase at a rapid manner and it will be doubled at the terminal of 2050. So demand for computing machine is besides increasing 3.1.5 Future monetary value Expectations: Higher monetary value in merchandise in future have a positive impact on demand in the present state of affairs. Basically the ascent of computing machine is day-to-day everyday footing and most of the upgraded constituent of computing machine is seems high so the old version. Even though people are largely intended to travel for the updated version instead than old version which cut down the demand for for current version and monetary value tends to diminish in current period for the old version and demand addition for the replaced version that enter into the market. So whatever the instance the demand for computing machine is tend to be addition. Figure: Future monetary value Expectation Effect 4.0 Supply side impact on Computer: The supply map for Computer: Cs = g ( Pc, Ps, Pcp, Pfop, Poc, S & A ; T, N, FP ) Cs = measure supplied of Computer Personal computer = Computer ‘s monetary value Ps = the monetary value of replacements merchandises of computing machine Pcp = the monetary value of complements merchandises of computing machine Pfop = monetary values of factors of production for computing machine S & A ; T = scientific discipline and engineering development in computing machine N = figure of rival /Supplier in the market FP= Future monetary value outlooks of computing machine 4.1.1 Substitution Effect on the Supply: Basically the supply of computing machine is increasing due to its demand in the market. Though there is no perfect utility merchandise of computing machine there is no direct consequence on the supply of computing machine. Even the computing machine engineering is being used in instance of other merchandises like nomadic phone, personal development helper, games and fundamentally all the other sector. In instance of computing machine, so a desktop computing machine and a laptop are symmetric replacements every bit long as they portion common utilizations. If we think this is utility to each other so monetary value of laptop have a negative impact on the supply of desktop computing machine. Figure: Substitution Consequence 4.1.2 Compliment consequence on supply: The complimentary consequence on the supply of computing machine is cryptic. Because most of the complementary merchandises are innovated by the computing machine provider. Not merely that, even their rival every bit good as outside coder innovate many compliment merchandise each twenty-four hours. The demand of those complement merchandise was vary from single degree because of their ain involvement. But it seems that whatever consequence their might be in complement merchandise the supply of computing machine additions. Figure: Compliment Consequence 4.1.3 Factor of Production impact on Supply: The cost of production for computing machines has decreased due to technological inventions. Even the production of computing machine addition at a great extent and every twelvemonth the it increases by 23 % ( www.computerdata.com ) . So the supply addition because of less cost of production and high demand of computing machine in worldwide. Figure: Factor of Production Effect 4.1.4 Technological Effect on Supply: The most critical consequence that makes the supply addition at a great extent is based on the technological consequence. To piece a computing machine in 1990 was around an hr where else today it require less than five proceedingss. The development of engineering intercession even reduces the cost of the house to bring forth the computing machine. Cost decreases were accomplished through technological betterments. Figure: Technological Consequence 4.1.5 No. of Supplier consequence on Supply: Computer market is absolutely competitory market where one company does n’t command the overall market. Competitive force per unit area on monetary values forces manufacturers to bring forth at the lowest possible cost. Basically the computing machine market right now is world-wide and there are about six companies to function this immense market though out the universe. Even though based on the updated engineering intercession by each company the monetary value of the computing machine determined and the demand for besides depends on the individual ability to purchase. In market they have both the type of computing machine cheap and expensive. So meet the immense sum of purchaser demand the supply of computing machine is increasing. Personal computing machine industry is characterized as a constant-cost industry. Firms ab initio competed on the footing of merchandise betterments. Finally, houses could non sell all the Personal computers they produced at predominating monetary values. They were forced to cut their monetary values. Figure: Supplier Consequence 4.1.6 Future monetary value Expectations: Though the computing machine market is extremely competitory and demand is increasing future monetary value of computing machine tend to increase. But with the immense sum of supply though out the whole universe the future monetary value will non traveling to be addition. With the uninterrupted engineering advancement the update version of computing machine monetary value will increase even though non a great extent because another update with replace that one. Figure: Future Price Expectations Effect Figure: Worldwide Personal computer gross market Share 5.0 Long-run Competitive Equilibrium: In the last 10 old ages, the monetary value of personal computing machines has gone down and the measure produced has increased. The personal computing machine market is a absolutely competitory. Which means that monetary value of the products= fringy cost of the product= minimal mean entire cost in long-term equilibrium, and that there is free entry and issue. In the merchandise market, the house takes the monetary value of personal computing machines as given ( faces a horizontal demand curve. ) Entry of new houses into the personal computing machine industry does non impact the monetary value of inputs used by the industry. Which means the computing machine industry is considered as a constant-cost industry. In the market for personal computing machines, the industry demand curve has shifted rightward. Suppose the personal computing machine market was in an initial long-term equilibrium ten old ages ago and is in a long-term equilibrium today. Figure: Long tally Equilibrium of Computer Industry Even the supply increases more quickly than the demand for the computing machine, which consequence in the long term equilibrium that the monetary value of the merchandise falls. 6.0 Decision The emerging of computing machine market over last decennary was grown at a faster gait and the grounds for the growing in the computing machine market can be divided into three classs: proficient, Business and societal. The computing machine industry has undergone drastic proficient progresss in recent old ages and growing of computing machine market expected to be doubled in 2010 around 16 % comparing from the twelvemonth 2009 at 7.9 % . The most of import of this proficient alteration was due to faster processing of informations. Among the concern universe computing machine has taken its topographic point in such a manner where it seems to be impossible without this engineering. On the other manus, societal grounds for the market alteration in home-based computing machine systems are the desire of parents to do their kids to get by up with this engineering and enrich their accomplishments. This alteration, along with decreased production costs for computing machine constituents, has lowered the monetary values of place Personal computer ‘s. Competition among makers besides has kept monetary values down and has helped to promote purchases of computing machines for place usage. Computer monetary values have dropped by 65 per centum from 1988 to 1994, capable to the application of a monetary value deflator. In other words, a computing machine bought in 1994 would be merely 35 per centum of what it cost in 2010. Sing the alterations in both quality and monetary values of the most recent Personal computer theoretical accounts, engineering has brought this industry into a different epoch. hypertext transfer protocol: //www.answers.com/topic/computer-reseller-business-plan-computech-management-3 hypertext transfer protocol: //www.bplans.com/computer_hardware_reseller_business_plan/market_analysis_summary_fc.cfm Worldwide Desktop PC Forecast, 2010 – 2014 Published by Market Intelligence & A ; Consulting Institute ( MIC ) Published 2010/03 hypertext transfer protocol: //www.cambridgecomputer.com/market_analysis.cfm hypertext transfer protocol: //en.wikipedia.org/wiki/Personal_computer hypertext transfer protocol: //www.stanford.edu/dept/HPS/TimLenoir/Startup/VolumeDrafts/Univ-Ind_Bkgrnd/Bresnahan_97.pdf Published: Goolsbee, Austan. “ Competition in the Computer Industry: Online versus Retail. ” Journal of Industrial Economics 49, 4 ( December 2001 ) : 487-99 www.csus.edu/indiv/h/hattonl/ … /ComputerIndustryAnalysis8-06.ppt hypertext transfer protocol: //www.learnmarketing.net/porters.htm hypertext transfer protocol: //www.cals.ncsu.edu/course/are012/lectur20.pdf hypertext transfer protocol: //www.buzzle.com/articles/demand-and-supply-analysis.html hypertext transfer protocol: //en.wikipedia.org/wiki/Supply_and_demand Avi J. Cohen, “ ‘The Laws of Returns Under Competitive Conditions ‘ : Advancement in Microeconomics Since Sraffa ( 1926 ) ? “ , A Eastern Economic Journal, V. 9, N. 3 ( Jul.-Sep. ) : 1983 ) hypertext transfer protocol: //www.ecoteacher.asn.au/Demand/dslide1/d30.htm hypertext transfer protocol: //www.econ.ohio-state.edu/jpeck/Econ501aL7.pdf The consequence on the demand curve of a lessening in the monetary value of a complement Journal Atlantic Economic Journal Publisher Springer Netherlands ISSN 0197-4254 ( Print ) 1573-9678 ( Online ) Issue Volume 10, Number 4 / December, 1982 hypertext transfer protocol: //www.sparknotes.com/economics/micro/supplydemand/demand/section2.rhtml hypertext transfer protocol: //wiki.answers.com/Q/What_are_the_factors_affecting_supply_in_economics hypertext transfer protocol: //nos.org/318courseE/L-16 % 20WHAT % 20AFFECTS % 20SUPPLY.pdf Futures Monetary values in Supply Analysis, by Bruce L. GardnerA A© 1976A Agricultural & A ; Applied Economics Association hypertext transfer protocol: //vlad1mir.tripod.com/lt_equilibrium_under_perfect_competition_.html hypertext transfer protocol: //tutor2u.net/economics/content/topics/competition/long-run_output.html
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '24', 'language_id_whole_page_fasttext': "{'en': 0.901740550994873}", 'metadata': "{'Content-Length': '43813', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:I2ZFO6IAP6WWCKMZWKXQZEFV76W4JH2T', 'WARC-Concurrent-To': '<urn:uuid:b5a1d369-8f8c-49fe-978b-122ba7eb4507>', 'WARC-Date': datetime.datetime(2019, 3, 26, 13, 58, 11), 'WARC-IP-Address': '104.27.142.220', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3OKGS2DVYODEXLIDP4D5TAUBOYV2WQGJ', 'WARC-Record-ID': '<urn:uuid:cd6833cf-e27f-4d77-a3b0-501a1f922a85>', 'WARC-Target-URI': 'https://bluecrewsportsgrill.com/economic-interpretation-of-computer-industry-economics-essay/3093/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:bd87efdd-7afe-415a-991b-fa654c44cf29>', 'WARC-Truncated': None}", 'previous_word_count': '3547', 'url': 'https://bluecrewsportsgrill.com/economic-interpretation-of-computer-industry-economics-essay/3093/', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-143-92-167.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06467700004577637', 'original_id': '5ff890208498f73811d0ed2cd0d5811e64a7bd431fa5b7383e97374146f4c96d'}
1. Forum 2. > 3. Topic: Educators 4. > 5. Incomplete Conjugation Tables… Incomplete Conjugation Tables in Tips and Notes I've noticed some inconsistencies in the conjugation tables in the tips and notes section of Duolingo vs. Duolingo schools, specifically in Portuguese. Notice in the first picture, from Duolingo's Portuguese Basics 2 Tips and Notes, the present tense conjugation of the verb ser with Portuguese personal pronouns. In the second picture from Duolingo Schools' Basics 2 Tips and Notes, the only information in the table is the english equivalent of each portuguese conjugation. It appears that the table is cut off, as the footnotes column on the far right is gone, but the actual notes themselves ("The good news is...") are still there, under the table. Has anyone else noticed this, and is it a mistake? First Picture: https://drive.google.com/open?id=0B2F-4ZET8wxpU3ZpbWgwZDdQVXc Second Picture: https://drive.google.com/open?id=0B2F-4ZET8wxpeDVOeXdlZmNCQ2M May 17, 2017
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '3', 'language_id_whole_page_fasttext': "{'en': 0.8285109996795654}", 'metadata': "{'Content-Length': '11530', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WE2PVIULAUGN6EKNOG2X3BZXATWSUR74', 'WARC-Concurrent-To': '<urn:uuid:f5730f55-e180-4761-9cdd-1990576425e7>', 'WARC-Date': datetime.datetime(2021, 1, 17, 19, 1, 6), 'WARC-IP-Address': '52.73.66.230', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DFHPKIW4IBJ6JXSW2OX7QTRAOZX6CWVM', 'WARC-Record-ID': '<urn:uuid:7890203b-364f-42ba-bc0e-e77aeae25207>', 'WARC-Target-URI': 'https://forum.duolingo.com/comment/22660546/Incomplete-Conjugation-Tables-in-Tips-and-Notes', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e8bc47e1-0859-489a-b827-95e0b41975fc>', 'WARC-Truncated': None}", 'previous_word_count': '156', 'url': 'https://forum.duolingo.com/comment/22660546/Incomplete-Conjugation-Tables-in-Tips-and-Notes', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-23.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11975610256195068', 'original_id': '2cdcd1af3cfe1e6c246762966f7ce85e9873e455244e63e121ece86d8578aa68'}
Fancy Ladies' Gloves, Ladies' Silk, Men's, and Men's Fancy Solid Leather, Pretty Boxes, and Mittens, Waists, Slippers, Suspenders, Suit Cases, Dolls, 20c to $3.50, 15c to $2.12, $2.98 to $10.50, $3.50 to $4.50, $4.95 to $7 to $12.00. Games, CHRISTMAS AGAIN! Toilet Books, EVERYTHING NEV AND UP TO DATE. Sets, Pictures, TIMELY CHRISTMAS SUGGESTIONS, Smoke of MEN'S FINE SUITS and LADIES' and CHILDREN'S Sets - Black OVERCOATS, FINE SHOES, Toys. Boards, A Kohn Bros., or Bell System, union made, high grade All at special prices during the big holiday sales. In our Alhambra, or overcoats for exclusive style, fit and quality. We have a stock you will find the very latest styles, leathers and shapes, some late arrivals specially priced for our Christmas trade, at from the best manufacturers in the United States. We assure you that we can fit you to your comfort and satisfaction—in fact, Fine quality that is one of the things upon which we pride ourselves, the satisfaction of feet. Come in and see our stock and prices. Christmas 25c, 50c. and 75c - $1.00. SHOES and $1.00. Men's $12.50. Children's and Ladies' FANCY GLOVES, MEN'S OVERCOATS, Christmas Hose, $5.50. Ladies' FANCY SLIPPERS, $1.50. Men's $1.50 - Ladies' Gloves, so much worn. $0.95, $2.50, $3. Christmas The Ramsay Dry Goods Co. ALWAYS LOWEST PRICES. Boys' " " $7.50 Xmas. Gloves. Ladies' Suits Men's Handkerchiefs Brussels Rugs Men's Shirts, Millinery at Hand Bags, 19c to $1.00 33¢ off 5¢ to 50¢ 89¢ to $5.50. One-Half Price 25¢ to $3. The Increase In Our Business This Year Has Proven That We Have The Best Stock, The Best Prices, The Best Service OF ANY PLACE IN THE TOWN. OUR STOCK IS STILL COMPLETE. AND From Now Until Christmas Day We Will Make Some Big Reductions On Cut Glass and Holiday Goods. WE WISH YOU A MERRY CHRISTMAS. THE SEATON DRUG COMPANY.
common_corpus
{'identifier': 'sn86063206_1906-12-21_1_5_1', 'collection': 'US-PD-Newspapers', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1906.0', 'title': 'None', 'creator': 'None', 'language': 'English', 'language_type': 'Spoken', 'word_count': '312', 'token_count': '572', '__index_level_0__': '7147', 'original_id': 'ad94e99acbbad79cbc03dc924dc39c05db8698a4da78c16956c101ce02bc2ce2'}
Skip navigation and go to main content Shared Stories: Common themes in myths and legends across cultures People of the Underwater World - a common theme in African, South American and Asian myths Numerous cultures share a belief in an underwater world in which people live the same way, to a greater or lesser degree, as humans do on the surface world. One possible explanation for similar themes in the mythology of diverse cultures is that ideas are exchanged when two cultures come into direct or even indirect contact. Another explanation is 'independent invention'. Humans on different sides of the globe, even never having learnt about each other, are not that different after all, and our imaginations tend to take common routes. The Underwater Kingdoms of the Mermaid Goddesses (Cameroon) The legends of the Duala and other coastal ethnic groups Cameroon tell of kingdoms under the seas and rivers. These underwater worlds are not unlike the human world - with people, houses and all the trappings of human life. Water deities of both genders rule these magical realms. The female deities are called miengu, and have the form of mermaids. These mermaids are said to sometimes take the form of human women to walk in the surface world. Human males who answer their call and go the underwater world are never seen again. It is said that during the Ngondo Festival in Douala, worshippers would dive to the subaquatic realm, stay underwater for up to hours, and return to the surface appearing completely dry! This religious ceremony is off-limits to children and non-Duala.1 Encante, the Sub-Aquatic Realm of the River Dolphins (Brazil/Peru) In the indigenous lore of the people of the Amazon, pink river dolphins can take human form to lure mortals away to their underwater realm, the Encante. Though this belief bears some passing resemblance to Sawa traditions of shapeshifting mermaids luring mortal men to the subaquatic realm, the shapeshifting seducers of the Amazon could be dolphins of either sex. Both human men and women have been taken by their dolphin lovers to the Encante. For human visitors, the Encante does not appear too different from surface world, except that everything is much better there. Modern believers describe the Encante as a place with cities, churches, cars, and hospitals.2 The Underwater Realms of the Dragon Kings (China/Japan) The underwater realm of the Dragon Kings is a recurring theme in East Asian folklore. These realms are inhabited by aquatic animals that can shapeshift to anthropomorphic representations e.g. fish attendents, shrimp soldiers and crab commanders of the Dragon Kings' armies. Aquatic dragons, such as sea, lake and river royalty, can take human form if they wish. They are said to live in palaces just like kings in the surface world. In one version of the Japanese tale of Urashima Taro, a young fisherman rescued a turtle from the torment of children. In gratitude, the turtle carried him to the beautiful undersea palace of the Dragon King. There he met Otohime, the Dragon King's daughter, who appeared in the form of a woman. The palace staff of fishes entertained him lavishly, but Taro eventually asked to return to the surface world, with unhappy results.3 In the Chinese folktale of the Dragon Woman of Dongting Lake, a young scholar Liu Yi met an unhappy shepherdess. She claimed to be a daughter of the Dragon King of Dongting Lake. She had married the dragon prince of a river, only to be ill-used by her husband and in-laws. The dragon princess asked the young man to take a message to her parents. The scholar went to Dongting Lake, gave a secret signal and was conducted to a splendid crystal palace by shrimp soldiers and their crab officers. The dragon king of the lake appeared in the form of an old man to receive his daughter's letter from Liu Yi's hand. The scholar did not see the true form of his hosts until a fearsome dragon rushed out of the palace and flew off raging. It was the king's younger brother, uncle of the abused she-dragon, on his way to rescue his niece and and kill her husband.4 Some published versions of the traditional legends: The Underwater Kingdom of Dika (Indonesia/Malaysia/Singapore) The lore of Indonesia/Singapore/Malaysia tells of a world under the sea, inhabited by people and ruled by royalty, much like the surface world. Raja Chulan (or Suran) of Kalinga, India, descended into the sea and married Princess Mathabu'l-Bhari of the subaquatic realm of Dika. They had three sons, but Raja Chulan returned to his terrestrial kingdom, leaving his wife and sons behind. The three princes grew up and came to the surface world, establishing themselves as kings in Indonesia. The eldest became Raja of Minangkabau, the second became Raja of Tanjungpura, and the youngest became Raja of Palembang. This third prince, better known by his title Sang Nila Utama, would later found Singapura (now Singapore).5 1. Interview with M, a coastal Cameroonian 2. Sy Montgomery, Journey of the Pink Dolphins - An Amazon Quest 3. Liu Yi and the Dragon Woman 4. James J. Fox, Installing the Outsider Inside: the Exploration of an Epistemic Austronesian Cultural Theme and its Social Significance 5. Legendary Tales of Singapore (Asiapac Books)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9544323682785034}", 'metadata': "{'Content-Length': '21255', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:534R3HXDKKHJ2Y6DHGAYT66XTAGVV5SW', 'WARC-Concurrent-To': '<urn:uuid:e0e0784e-b60c-4929-a875-b46e4451c9c1>', 'WARC-Date': datetime.datetime(2018, 12, 10, 22, 34, 3), 'WARC-IP-Address': '65.182.101.115', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:SOGGQ2T2MCZCKJXSXLVFG2SHMWEQM467', 'WARC-Record-ID': '<urn:uuid:aff03668-245c-499c-a652-e3277ca68425>', 'WARC-Target-URI': 'http://www.colorq.org/articles/article.aspx?d=lore&x=underwater', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:85d321b6-1549-4618-9084-fbfb2fb3d98c>', 'WARC-Truncated': None}", 'previous_word_count': '863', 'url': 'http://www.colorq.org/articles/article.aspx?d=lore&x=underwater', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-214-234.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17060548067092896', 'original_id': '295d83723e6071c42ff90f1609c6b8a8d359478c734e04fab600931ad7e2352e'}
Articles in this section Frame rate control in MFormats SDK In MFormats SDK, the frame rate - also known as frame frequency or frames per second (FPS) - is what defines the time that a frame is displayed for on the screen. For example, 25 FPS means that every video frame is displayed for exactly 40 ms along with its synced chunks of audio. Frame rate control in MFormats SDK is implemented in receiver objects. MFPreview, MFRenderer, and MWriter receive samples and render them outside of the application. These objects are responsible for the display time of a frame (frame rate control). If a frame is sent to the preview, it will be displayed for a pre-defined time. Even if the next frame is received, the ReceiverPutFrame method will not return until the display of the previous frame is finished. This logic is implemented in MFormats SDK internally. Frame rate control with MFPreview MFPreview is used to render the video to the preview and to play audio to the sound device. Its behavior is a little different depending on whether the stream contains audio or not. When the frame contains both video and audio, the clock (timer) of the sound card is used to control the rate (the display of the video frames is adjusted to the audio stream).For video-only frames the system timer is used to control the rate: when the video frame is displayed, the SDK waits for the system timer to trigger the display of the next frame. Frame rate control with MFRenderer MFRenderer is used to send frames to a device (such as Blackmagic or AJA). When rendering to a device, the clock of the device is used to control the frame rate (the device itself controls playback according to the way it had been configured). See also the post about playing out to a device. Usually, devices have a buffer of at least 1 frame and can tell us when the display of the first frame is finished. MFormats SDK waits for the first frame to complete playback, and then only pushes the buffered frame out for display, at the same time sending the next frame to the buffer. At this moment the ReceiverPutFrame method is returned. Because of this, there usually is a delay of at least one frame between playback and output (this may vary due to the specifics of the output drivers and hardware). Frame rate control with MFWriter MFWriter encodes (compresses) and writes frames to a file or streams them to the network. The MFWriter object controls the frame rate according to its internal speed of processing the frames (usually defined by the speed of the encoder) - it returns the ReceiverPutFrame() method once the processing of the previous frame is finished and MFWriter is ready to receive the next one. How to use rate control The ReceiverPutFrame method has a _rtMaxWait parameter. Its value is measured in 10 ns as an integer (1 second is "10000000"): If rate control is not required, this parameter should be set to "0". In this case, the ReceiverPutFrame method doesn't wait: it returns immediately after the processing of this frame is finished (such as when encoding and writing to a file). If rate control is required, set this parameter to "-1". In this case, ReceiverPutFrame waits until the sink object complete the display of the frame. For example, it will wait for 40 ms if the MFRenderer is configured to play at 25 FPS via a Blackmagic card. When using several sink objects, this value will make this object the master object. In other cases, it can be set to a maximum value (such as "400000" for 25 FPS). Note, that waiting time is not yet implemented for some objects - so, it's best to use "0" and "-1" values for now. When there's only one source object and one sink object, the rate is either controlled by the sink object or not controlled at all (the frames are being processed at maximum speed - such as in the fast transcoding use case). When using several sink objects at the same time (for example, MFRenderer and MFPreview) it is recommended to use just one object for rate control - this object becomes the master object. It is best to use the last object in the cycle to control the rate. If the master sink works faster than the non-master sink than the non-master object will be dropping frames (for example, MFPreview will be dropping frames if you decide that encoding is more important and define MFWriter as the master object). Summary Here is a table with common examples of different receiver objects usage: MFPreview MFRenderer MFWriter MFPreview Decide what preview should be main and enable rate control for it. Use this "master" object (for which rate control is enabled) the last among your receivers: Note please that different formats requires different speed for encoding so you should use fast drivers for encoding in different formats.If result files have drop frames then enable rate control for all receiver objects.
mini_pile
{'original_id': 'b19557c89047e8f0b4e0ea39ba6f85f4a60d084ff52601cd2616ea5f8ad16d9d'}
Movie Review: Fantastic Beasts & Where to Find Them I thoroughly enjoyed a return to the wizarding world, in the company of my mom, sister Linda and grandson Dayan. We were a mixed group, in regards to familiarity with the Harry Potter universe, and that did not affect anyone’s receptivity of the film or the shared joy we experienced in viewing it.  Fantastic Beasts and Where to Find Them stars Eddie Redmayne, Katherine Waterston, Alison Sudol, Dan Fogler, and Colin Farrell. The fantasy adventure was directed by David Yates. This was the debut screenplay for JK Rowling, who also authored the book that the movie is based upon. The film carries a PG-13 rating, for adult themes and mild fantasy violence, and has a run time of 2 hours and 13 minutes.  Newt Scamander (Redmayne) is newly arrived to New York City, in 1926. He carries a mysterious suitcase, from which emanates the growls and roars of wild beasts. Newt immediately creates a stir in the city when one of his magical creatures, a Niffler, escapes from the suitcase.  Amid the chaos created as Newt attempts to capture the thieving little Niffler in a bank, the young wizard from England meets two unlikely allies. Jacob Kowalski (Fogler) hopes to secure a bank loan to fund his dream of owning a bakery. Jacob is a Muggle, in British terms, a No-Maj (non magical person) as the Americans call them. Friendly and genuine, Jacob accidently grabs the wrong suitcase when he and Newt part company.  Tina Goldstein (Waterston) observes Newt using magic as he at last captures the mischievous creature. Alarmed that he will expose the wizard community, she takes him into headquarters for questioning. Tina also expresses concern that Jacob left without having his memory wiped.  However, the American President of Magic and her council aren’t interested in Newt or his suitcase. There is a dark presence making itself known in the city. Newt and Tina are sent away while the council discusses how to discover what is terrifying the people of NYC and how to protect the wizard community.  Only Percival Graves (Farrell), Director of Magical Security, senses there is more to Newt and his seemingly innocent arrival.  After finding Jacob and retrieving his suitcase, Newt realizes several beasts have escaped into the city. His fear is not that the magical animals will hurt the citizens of NYC, but that humans will harm his creatures. Newt’s desire is that those in the wizarding world will come to understand and appreciate the fantastic beasts he’s been collecting, studying and writing about. He intends to publish a book about his creatures.  With Jacob, Tina and her sister Queenie (Sudol) helping him, Newt searches for the missing beasts. As the animals lead them on merry chases throughout the city, the sinister darkness grows, and becomes a threat that must be dealt with when a human life is taken.  Fantastic Beasts was an incredibly fun and interesting movie to watch. I am familiar with the Harry Potter movies but one does not have to be to appreciate this latest film from the creative genius of JK Rowling. Set approximately 70 years before Harry Potter heads off to Hogwarts School, this story is another adventure set in the same universe, and not a prequel.  There are, however, plenty of connections between the two stories. As Fantastic Beasts is set to be told in five movies, it is very possible that more bridges between the worlds of Newt Scamander and Harry Potter will be formed. The obvious first link is that the book Newt writes, “Fantastic Beasts and Where to Find Them” is later seen as a textbook used by Harry Potter and his friends in the Hogwarts Library.  I found much to love about this movie. Eddie Redmayne played the somewhat shy wizard perfectly. I first watched Redmayne portray Stephen Hawking in Theory of Everything. He is a gifted and versatile actor who brought charm and compassion to the role of Newt.  And I couldn’t help but adore Jacob, the No-Maj in the group. He has a good heart, an easy smile, and big dreams. The sisters completing the group of friends bring respectability and warmth into the relationships, with Tina being earnest and rule abiding while Queenie’s tender heart and feelings for Jacob made the audience sigh.  My own emotions and reactions ran the gamut during the film. I laughed and cheered and sighed, and teared up more than once. It was painful and revealing to watch a major character live under rigid self imposed repression. Such severe denial of self had catastrophic consequences…and I felt sorrow for what the character endured. There is a strong reminder there for me, for all of us, to live as authentic people, whether wizards or muggles, embracing our gifts and sharing them openly with the world, for the benefit of all.  I left the theater with questions and a great deal of speculation about what will happen next to these endearing characters introduced in the first film. I am filled with anticipation for the next installment in the Fantastic Beasts movies.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '3', 'language_id_whole_page_fasttext': "{'en': 0.9546452164649964}", 'metadata': "{'Content-Length': '117150', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PXGVP5NWTFAVEQUEYL6BBCPZEJCSTXCC', 'WARC-Concurrent-To': '<urn:uuid:5a4e8142-74e7-4928-8da2-4f1b50728b3b>', 'WARC-Date': datetime.datetime(2018, 8, 18, 22, 20, 1), 'WARC-IP-Address': '77.104.162.139', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7SRVLGEK5TDET4IE5KODLK3QGSXCAIIF', 'WARC-Record-ID': '<urn:uuid:c1453ed0-a402-4ad7-950a-50caad478858>', 'WARC-Target-URI': 'http://cindygoesbeyond.com/2016/12/07/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5962e6be-ce76-47a7-875c-0532d51a8da4>', 'WARC-Truncated': None}", 'previous_word_count': '846', 'url': 'http://cindygoesbeyond.com/2016/12/07/', 'warcinfo': 'isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-230-0-77.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05311381816864014', 'original_id': 'b6bec9d8292c15a3a82328366052ca3d964e0185604ab9f776bfd2f14cfaae1d'}
Article Written by : Legendary Videos #4.  Chitty Chitty Bang Bang It is probably the butt-ugliest car on the list.  It looks like it was built in a tweakers garage and they just threw together whatever they had lying around and then called it a car.  What makes this car freaking incredible is the one unique feature that no other car has — it can fly!  Literally, it can sprout wings and take off, flying through the air with the greatest of ease.  But, if flying isn’t impressive enough for you, Chitty Chitty Bang Bang can also transform into a boat that is completely sea-worthy.  Something that you might not know is that the movie Chitty Chitty Bang Bang is based on the children’s book, “Chitty Chitty Bang Bang:  The Magical Car” which is written by Ian Flemming who is best known for creating James Bond.  In 1964, Flemming had a major heart attack and while he was recovering he decided to turn the bedtime stories he had been telling his son Casper, into a book for children.  This book became Chitty Chitty Bang Bang:  the story of the adventures of inventor Commander Caractacus Potts, his wife Mimsie, their two children Jeremy and Jemima and the wonderful Chitty Bang Bang car which could float on water and even fly!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9755113124847412}", 'metadata': "{'Content-Length': '50294', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:K4JCFJCZ5H7NDOFJKREZUQ3QGYUMCCN2', 'WARC-Concurrent-To': '<urn:uuid:da34ccad-fe21-4fb8-b1ab-01ad5a5759ef>', 'WARC-Date': datetime.datetime(2021, 9, 20, 4, 8, 58), 'WARC-IP-Address': '172.67.209.181', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:EEZONYGWVAKLCI7SNBYCHLZG3MVEQ7UJ', 'WARC-Record-ID': '<urn:uuid:b77a1ab6-e83b-477b-b192-6e743b8c1317>', 'WARC-Target-URI': 'https://www.legendaryspeed.com/10-fictional-rides-bring-little-kid-us/4/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6397739f-a190-4a51-816c-46ae47ebddee>', 'WARC-Truncated': None}", 'previous_word_count': '232', 'url': 'https://www.legendaryspeed.com/10-fictional-rides-bring-little-kid-us/4/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-22\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.21413445472717285', 'original_id': 'c737fdf4e571675a4c9109578eed840bf632154d6909947399a4671c1d12017b'}
Login to BATTLE , Vote, or Talk Smack! Current date/time is Sat Feb 16, 2019 6:23 pm RUMBLE ZONE Help Center Use of cookies Use of cookies Login and Registration Issues Why can't I log in? Why do I need to register at all? Why do I get logged off automatically? I've lost my password! I registered but cannot log in! I registered in the past but cannot log in anymore! User Preferences and settings How do I change my settings? The times are not correct! I changed the timezone and the time is still wrong! My language is not in the list! How do I show an image below my username? How do I change my rank? Posting Issues How do I post a topic in a forum? How do I edit or delete a post? How do I add a signature to my post? How do I create a poll? How do I edit or delete a poll? Why can't I access a forum? Why can't I vote in polls? Formatting and Topic Types What is BBCode? Can I use HTML? What are Smileys? Can I post Images? What are Announcements? What are Sticky topics? What are Locked topics? User Levels and Groups What are Administrators? What are Moderators? What are Usergroups? How do I join a Usergroup? How do I become a Usergroup Moderator? Private Messaging I cannot send private messages! I keep getting unwanted private messages! Forum Issues Who wrote this bulletin board? Why isn't X feature available? Jump to:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.8935756683349609}", 'metadata': "{'Content-Length': '65608', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KD4LQ3NJVQZQXCAI5NP3TALWT4PKCSG2', 'WARC-Concurrent-To': '<urn:uuid:41f3d383-0880-4ae7-9725-7f2860c67c58>', 'WARC-Date': datetime.datetime(2019, 2, 16, 22, 23, 59), 'WARC-IP-Address': '94.23.150.222', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:VZACKUCIU3XEXEF7KLV3GWZVX7FM2SIM', 'WARC-Record-ID': '<urn:uuid:56c5f4a8-7f8e-4ecc-993a-f1846f7c730d>', 'WARC-Target-URI': 'http://collegerumble.forumotion.com/faq', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f8557f7b-1a67-47e2-a4ce-913e66b8bba6>', 'WARC-Truncated': None}", 'previous_word_count': '309', 'url': 'http://collegerumble.forumotion.com/faq', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-159-220-225.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '1.000006079673767', 'original_id': '50bfd0ad38cba553425c50e5a0f7fed4cf76ede6fc2fa85e7e73179f6bcb5251'}
As Rolling Stone was disavowing parts of its story on rape at the University of Virginia, lawyer Zerlina Maxwell argued in The Washington Post that "we should believe, as a matter of default, what an accuser says." Her logic: "The costs of wrongly disbelieving a survivor far outweigh the costs of calling someone a rapist," she wrote. "Even if Jackie fabricated her account, U-Va. should have taken her word for it during the period while they endeavored to prove or disprove the accusation. This is not a legal argument about what standards we should use in the courts; it’s a moral one, about what happens outside the legal system." To whom is "we" is referring in her article? The presumption seems to be that "we," as a society, need to collectively adopt a universal standard of credulousness to apply when individual rape allegations are made. But that isn't true. When a crime is alleged, different people have very different roles to play. If a student walks into a friend's dorm room, a trauma counselor's office, or an emergency room and says, "I was raped," he or she ought to be given help, advice, and solace. Certain resources should be available to all ostensible victims without any need for proof. Absent glaring red flags, the accuser ought to be believed. Similarly, when a person seeks out a close friend or attorney or priest or therapist to say they've been falsely accused, they ought to be believed, absent red flags, and supported insofar as they seem to be earnestly trying to prove their innocence. In stark contrast, detectives, prosecutors, campus tribunals, and journalists are charged with searching for the truth. They ought to be attentive, respectful, and sensitive to accusers as they tell their stories–and to be clear that their obligation to think critically about all alleged facts and to verify details doesn't imply that they find the teller unreliable. Fact-checking even credible-sounding claims is just what members of these professions do when serious charges are levied, both to do their jobs ethically and because society benefits from classes of people who labor to establish what is known. This is no more objectionable than insurance companies taking a close look at all fires, though few people intentionally burn down their own house, or the TSA scanning all luggage though almost no one has a bomb. Seeing skeptical questions as standard due diligence can take the sting out of them. Casting journalistic norms as "mistrusting victims" does victims a disservice. They erroneously believe they're being singled out for mistrust. What about the public? Ideally, people would be broadly aware that rape allegations (like allegations of most other crimes) are true far more often than false, prompting political support for reforms to increase our understanding of how often rape happens; to reliably punish perpetrators; and to reduce the number of victims. Yet that general response should be paired with a reticence to jump to conclusions en masse in individual cases, especially when we hear about them third-hand. With time and investigative journalism, criminal trials, or civil suits, the public can, at times, reach informed conclusions about allegations. But there's little to gain from a rush to judgment when a Conor Oberst or Bill Cosby is first accused, and much to be lost if a mob reaches the wrong conclusion. Maxwell doesn't seem to fully recognize these costs. She writes of false accusations: The accused would have a rough period. He might be suspended from his job; friends might defriend him on Facebook. In the case of Bill Cosby, we might have to stop watching his shows, consuming his books or buying tickets to his traveling stand-up routine. But false accusations are exceedingly rare, and errors can be undone by an investigation that clears the accused, especially if it is done quickly. This dramatically understates the potential harm. One can find suicides prompted by false accusations (as well as by prosecutions of allegedly false accusers). Emily Yoffe documents how a dubious allegation of rape and a wildly unfair judicial process wreaked havoc in the life of a University of Michigan student. It doesn't require much empathy for those who are falsely accused to realize that their travails are more traumatic than losing Facebook friends and a few weeks at work. In the most serious cases, innocents face criminal charges, like the Duke lacrosse players, or are sent to prison for rapes that they did not commit. False accusations also impose heavy costs on people other than the accused (and their families), as Julia Horowitz, an editor of UVA's student newspaper, must surely know. She writes: Ultimately, though, from where I sit in Charlottesville, to let fact checking define the narrative would be a huge mistake. “These events undoubtedly do occur here,” first-year Maddie Rita told me. “And while this report has clearly had factual flaws as well as rhetorical missteps, there are plenty of other fully corroborated accounts not only at this university, but at every university around the country.” Only eight to nine percent of sexual assault reports, at most, are later determined false. This statistic will not change, even if Jackie does lie with the minority. I don't understand this argument. Fact-checking confirms that false rape accusations are relatively rare–and suggests that the Phi Kappa Psi fraternity did not perpetrate a gang rape as part of a rush ritual on the night described in Rolling Stone. Both of those things are worth knowing. Both ought to shape the narrative. So what's wrong with fact-checking? On a university campus, a factually flawed accusation of premeditated gang rape understandably led many to conclude that serial gang-rapists were on the loose, engendering fear, anger, dismay and disgust. At UVA, "brothers of Phi Kappa Psi were moved out of their house after students threw bricks through the windows." Social rifts developed between supporters of the accuser and the accused. Some who'd thrive at the college were perhaps dissuaded from attending under false pretenses–it's one thing to think that "Jackie" was sexually assaulted by one or more men (that's my guess) and quite another to think group assaults are institutionalized into rush at a specific fraternity with specific members and alums. If Jackie was raped, but by two fraternity members acting in secret, or by people who aren't even in the Greek system, the needed reforms are meaningfully different than what's called for if she was assaulted as part of an initiation. The question isn't whether steps should be taken to reduce sexual assault on campus. The question is what steps are most appropriate. Fact-checking helps us decide.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '30', 'language_id_whole_page_fasttext': "{'en': 0.9718623757362366}", 'metadata': "{'Content-Length': '149523', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:C6DXECRQLTLSDKBUBOBBBQH57UBGFB3M', 'WARC-Concurrent-To': '<urn:uuid:b6c4e2fc-3e0a-4b66-a145-acb0616b93da>', 'WARC-Date': datetime.datetime(2017, 5, 23, 19, 6, 29), 'WARC-IP-Address': '192.33.31.162', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P6SYY7W77W2JLRGWWOPXQT7OLPSXYKV4', 'WARC-Record-ID': '<urn:uuid:a77df59d-807e-46b6-a138-e4f1449a356a>', 'WARC-Target-URI': 'https://www.theatlantic.com/politics/archive/2014/12/against-universal-responses-to-rape-allegations/383552/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ea27df39-9500-4e79-84a3-6de42c9f121a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1085', 'url': 'https://www.theatlantic.com/politics/archive/2014/12/against-universal-responses-to-rape-allegations/383552/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17637372016906738', 'original_id': '13573b5a6417fba31fdde23be818bc44b2bedad517dd0d5e9998bb5a0bc02a3c'}
Friday, May 18, 2018 Unpopular Opinion Time: "This is America" is not all that genius There's nothing more annoying than the guy who says, "It's good.  But it's not as good as everyone says it is." You can't argue with that guy.  If you try to point out why it's really that good, he just responds, "Dude, I agree with you.  I already said it's good. I'm just saying it's not as good as everyone says it is." And the thing is... he's probably right.  Nothing is as good as everyone says it is.  So he's defending a no-lose proposition. ...that being admitted, I'm going to be that annoying guy for today. The amount of lavish praise that "This is America" has been garnering has been slowly irritating me.  And today when I saw yet another friend (someone roughly my age--not a star struck teenager) call this video "genius" on Facebook, I decided I was going to have to write this post after all. Look, it's good.  I'm not saying it's not good. It did take while to grow on me though.  I was initially unimpressed with the boring monotonous beat of "This is America. Don't catch you slipping now. Don't catch you slipping now..." But after listening to it a couple times, I've decided I liked the various sub-rhythms and sub-harmonies that are going on besides the main beat. The choral "Ooh-ooh-ooh-ooh-ooh, tell somebody, You going tell somebody..." sections are catchy, and compliment the main beat nicely.  And I also like the "1, 2, 3 get down..." beat at the end. And when I caught myself humming the song as I was walking around my apartment, I had to admit it had gotten to me. And Donald Glover is right as far as he goes.  America really is a messed up place right now. It's just that... as far as he goes doesn't go very far.  There's no real meat to this song.  There's nothing there. Take away the music video (imagine that you only heard this song on the radio) and the songs lyrics are really unimpressive.  A catchy beat, sure, but what is he really saying that's all that profound? I mean, the is mostly just "This is America" repeated over and over again.  He's right, but he's not genius. And the video is well done.  Nicely shot and choreographed and everything but... But what am I missing here?  Why is everyone praising this video so much? I've heard so many people praise it as genius (both professional commentators, and people I knew) that I thought I must be missing something. So I watched a number of Youtube videos that explained all the symbolism.  And they didn't really tell me anything I didn't already know. Yes, I already knew the music video was a commentary on gun violence.  I was able to work that much out myself, thank you very much. Look, don't get me wrong.  I love protest music.  But why is this particular song getting so much praise?  Why is everyone saying "This is America"  is so deep?  Hasn't this same thing already been done so much better before by Bob Dylan or Phil Ochs or Public Enemy? ...I have a theory. My theory is that with pop music being so corporate the last few decades, we haven't had any protest songs go mainstream in years.  (What was the last protest song on the big charts?) So people are just hungry to praise anything that even attempts any kind of message. Rachel said... If you haven't seen it already, Doreen St. Felix had an interesting article about this in the New Yorker. Her reaction was also mixed: Joel Swagman said... Thanks for the link. I enjoyed that article. I found that, while she does indeed have mixed emotions about this song, her concerns are entirely different than mine. But... that's the way it works I guess. Everyone comes to this stuff with their own pre-existing biases and perspectives, which colors how they view the song. Sidenote: I am finding that after the news of yet another gun massacre, I'm feeling frustrated with America, and I'm finding the repeating lyrics of "This is America" somewhat cathartic whereas I had previously found them banal. I guess the changing perception based on outside events is also part of how this works.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9810887575149536}", 'metadata': "{'Content-Length': '180814', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AJVJVLC4XOZJKF4SB5YB53QFVUBMODJN', 'WARC-Concurrent-To': '<urn:uuid:6d17982b-90ca-4262-852b-44c9ea1a91ae>', 'WARC-Date': datetime.datetime(2018, 10, 16, 23, 21, 13), 'WARC-IP-Address': '172.217.5.225', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:44JHYCHYQ736OJNWTEOEGIHN5PZYGDJF', 'WARC-Record-ID': '<urn:uuid:17f877f9-4e35-431d-8700-8a3a9e178dc0>', 'WARC-Target-URI': 'http://joelswagman.blogspot.com/2018/05/unpopular-opinion-time-this-is-america.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:238a9b96-f1c1-4b8e-b949-fdfe7ee390dc>', 'WARC-Truncated': None}", 'previous_word_count': '708', 'url': 'http://joelswagman.blogspot.com/2018/05/unpopular-opinion-time-this-is-america.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-45-10-135.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.5051301121711731', 'original_id': '866017fd43b3b0dd0a058175bd84e3076571c3f316e3f2d6af401b54e80b99e4'}
The Democrats are very busy currently. So busy that Matt Drudge is telling people that they must have an exit plan.  Drudge is Jewish, and can no doubt feel the cold draft from the Oval Office. Item: Chuck Schumer is calling for changes in election law bringing the US formally closer to a one-party system. Item: Barack Obama has announced his attention to, in practice, do away with congress and rule by himself. Now, of course Schumer is the fellow who in 2008 fired the first shots against American banks when he singlehandedly caused a mini-run against IndyMac.  Far as I remember, he was supposed to be investigated by the FBI, but the thing somehow evaporated. But one should never despair. There are, so far unconfirmed, reports that Polar Bears are changing their diet in order to handle climate change.  Simply send the whole of the Democratic Party off on a Polar Inspection tour.  The bears will eat well for a year, the warm hysterics will disappear, and so, like by magic, will the Democrats! And with them the cancer of fascism. “Please to inspect my tongue. Just ate a librul. Burrpp..” Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s %d bloggers like this:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9093936681747437}", 'metadata': "{'Content-Length': '76759', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3JQRFCWUCFECH7BKCJ7Q2YVYBLMYKQ6Y', 'WARC-Concurrent-To': '<urn:uuid:27d464ee-5f37-477e-9cd3-dbe5c572818e>', 'WARC-Date': datetime.datetime(2017, 5, 23, 18, 50, 41), 'WARC-IP-Address': '192.0.78.12', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7VNJZ6RERJ32URWLPUXN3UHIYFV2FBYW', 'WARC-Record-ID': '<urn:uuid:134210c3-cf71-4ce6-ace9-e3316dcb12fd>', 'WARC-Target-URI': 'https://junipersec.wordpress.com/2014/01/28/coup/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d9a4b62a-a2cc-4078-90b8-2e6572ee3235>', 'WARC-Truncated': 'length'}", 'previous_word_count': '252', 'url': 'https://junipersec.wordpress.com/2014/01/28/coup/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03136926889419556', 'original_id': '09287569714993840ab47533e7dd210acdb03a0084f606127f1f6a5355f46eff'}
K.Barry Sharpless 2001 Nobel Prize in Chemistry | Scripps Institute, United States Barry Sharpless is an American chemist known for his work on stereoselective reactions. He was awarded a half-share of the Nobel Prize in Chemistry in 2001 for his work on stereoselective oxidation reactions (Sharpless epoxidation, Sharpless asymmetric dihydroxylation, Sharpless oxyamination). The other half of the year's Prize was shared between William S. Knowles and Ryōji Noyori (for their work on stereoselective hydrogenation). He also successfully epoxidized (using racemic tartaric acid) a C-86 Buckminster Fullerene ball, employing p-Cresol as solvent. More recently he has been an important figure in the new field of click chemistry. This involves a set of highly selective, exothermic reactions which occur under mild conditions; the most successful example is the azide alkyne Huisgen cycloaddition to form 1,2,3-triazoles. Supporting organizations Show all
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '96', 'language_id_whole_page_fasttext': "{'en': 0.8318300843238831}", 'metadata': "{'Content-Length': '45056', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IMUBGCHEON4A4GNWEKVGFFJ5HZFITTFV', 'WARC-Concurrent-To': '<urn:uuid:c2e04b3e-4102-478c-baf6-f2314539bec7>', 'WARC-Date': datetime.datetime(2021, 9, 20, 1, 57, 52), 'WARC-IP-Address': '31.192.231.189', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:2PMOJFUU4754L56U525D3FP6F3CD3TZZ', 'WARC-Record-ID': '<urn:uuid:100cbdee-48ce-462f-b811-ed4efa103df9>', 'WARC-Target-URI': 'https://molecularfrontiers.org/people/131?mini=2021-06', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9622551b-e496-4b03-85a4-24ee09f4d8e3>', 'WARC-Truncated': None}", 'previous_word_count': '126', 'url': 'https://molecularfrontiers.org/people/131?mini=2021-06', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-150\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14146560430526733', 'original_id': '53f0a079ccb1f26e632470b7ab7a86ad6c49f1d40e3baf4545ac00aab612e6f3'}
Jump to main content. Ukraine International Activities Image: Globe on a table. Other Resources Global Methane logo The Global Methane Initiative Exit EPA is an international initiative that advances cost-effective, near-term methane recovery and use as a clean energy source. The world's ninth largest coal producer, Ukraine has experienced a precipitous decline in coal production since 1990. Ukraine's annual coal production has stabilized at approximately 80 million raw metric tonnes in recent years. The state owns the coal mines and resources, including methane, but many successful mines are leased. In 2000, Ukraine had 232 active coal mines, all but three of which were underground. Most mines use longwall production. Ukraine has two main bituminous coal basins, the Donetsk in the southeast and the Lvov-Volyn in the northwest. Ukraine is the world's fourth largest emitter of methane emissions from coal mining activities (31.9 million metric tonnes of CO2 equivalent in 2000). Most of the attention to coal mine methane (CMM) development has been focused on the Donetsk basin due to its vast coal and methane reserves, large number of coal mines, high ranked coal deposits, and great depth of mining (often in excess of 2000 feet). Only about 4% of CMM liberated in Ukraine is used, presenting ample opportunities for coalbed and coal mine methane development. Local Navigation Jump to main content.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '7', 'language_id_whole_page_fasttext': "{'en': 0.9428523778915404}", 'metadata': "{'Content-Length': '12649', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LBQU444EX4CPXRVTL7UNSUZ4WR2W4LMF', 'WARC-Concurrent-To': '<urn:uuid:8b7d9ae4-5e57-4719-b6bb-4c4fb8382201>', 'WARC-Date': datetime.datetime(2014, 7, 24, 13, 46, 10), 'WARC-IP-Address': '134.67.21.34', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:U7RJHGCUSPHFZB2UCFQB4KQA76LBQD54', 'WARC-Record-ID': '<urn:uuid:90da81dd-627b-416f-846f-b642460dc319>', 'WARC-Target-URI': 'http://www.epa.gov/coalbed/international/ukraine.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7fba6bb3-7756-4f2f-acd9-f62a7f4cf78d>', 'WARC-Truncated': None}", 'previous_word_count': '219', 'url': 'http://www.epa.gov/coalbed/international/ukraine.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-131-23.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02114027738571167', 'original_id': '5deb9e4b08c5e02d024750662d4cd68c909a2293f1de625f2f979ae04f222a2f'}
Hydrogen Cyanide, bonus poem from the “Periodic Table of Poetry” series (for Hydrogen, element #01, H) by Chicago poet Janet Kuypers Hydrogen Cyanide Janet Kuypers bonus poem from the “Periodic Table of Poetry” series (#01, H) started 9/5/13, edited 9/19/13 and 9/21/13, finished 9/22/13 He was once a college chemistry professor, so he hoped he was a shoe-in to work with the Waffen-SS. He ended up working at the Rundfunkhaus — a Berlin radio station broadcasting Nazi propaganda. But after his university was bombed, he took what he could get and was grateful for work that didn’t require him to use a gun. But when the Science and Research Department at the Reich Main Security Office gave him orders to go to the Dachau camp to retrieve paperwork, he solemnly went home to pack for his two-day trip, driving there one day, returning home the next. He’d seen the Sachsenhausen concentration camp, 35 kilometres north of Berlin, but Sachsenhausen was more of a training centre for Schutzstaffel officers before the SS men were sent to oversee other camps. And although Dachau was small, it was essentially the first, and set the standard for all of Hitler’s camps. He felt the tension knot in his stomach grow, even before saying goodbye his wife and two children. Arriving at the camp the next afternoon, he learned the lieutenant general was away from his office, so he could only get the necessary paperwork the next morning. Which left him alone at the camp, in a stranger’s office. He paced. A part of him didn’t want to go out there, there was safety inside these office walls. Here he could remain separate from the war. After nearly an hour of pacing, he decided to just go out there. Face it. Get it over with. And when he stepped outside the air felt heavy; he could feel the weight of the move he made, the weight of his legs grew heavier; he dragged his feet, making his way to the open walkway. Although there was that heavy haze in the air, he knew what chemical reactions had occurred to leave that distinct smell in the smoke and haze working it’s way through the air. He saw across the clearing the doors close to the “showers”, so he walked with a determination to bring himself to the hall. He could hear the sounds of people inside grow louder, but he then caught a glimpse of a guard that just made his way to the roof. As he got closer, he watched the soldier open what looked like a can, then shake it into the vent at the centre of the building, before closing the vent and walking across the roof before taking the ladder back down. From the moment anything from that can made it’s way into that building, with every subsequent step he took, he could hear the wails and screams get louder and louder from the Jews inside. He stopped for a moment. Look, he thought, he knew what this was, get used to this, was all he could think to himself to get his heavy feet moving again. He caught the soldier walking down the ladder from the building, and quickened his pace to catch him before he got far from the building. Not able to see the ranking on his uniform shirt, he quickened his pace to not yell for the soldier. With the soldier still holding the jar in his hand, he asked if he could see the can. Once he had it in his hands, he looked at all elements on the label. Zyklon B. Hydrogen Cyanide. He knew this poisonous liquid boiled just above room temperature, so he knew that all they had to do was drop some from a sealed can into the open hall, poisoning thousands in only twenty minutes. He knew the Germans first thought of using this Prussic acid against Napoleon in eighteen thirteen — and if they had, it would have been the first time Hydrogen Cyanide was used in warfare… But look at him now, the chemistry professor, reduced to thinking of how all the Jews inhaled the bitter almond smell of Hydrogen Cyanide, until it combined with their red blood cells, causing death from oxygen starvation. He suddenly felt he needed to take a deep breath, get in all the oxygen he could. He saw the blue stains on the concrete walls, then walked back to the soldier to give him the empty can, when the soldier, making small talk, said “one of the older Jews pleaded to me, ‘I’m a decorated vet from WWI, I was in an artillery battalion, we shot gas shells at the British and Americans, I shouldn’t be here, my paperwork’s with my luggage—’ And they just kept telling him to go into the showers…” And he knew in WWI we shot these shells into trenches in France, so he shrugged and gave a slight grin, to commiserate with the soldier, but he knew that everyone fights their own battles in this war. He was only a lieutenant, a lower-ranking attache than the colonel who sent him on this job, but he still held rank over this soldier, so he told the soldier that once there were no screams inside and they opened the doors to bring everyone to the crematoriums, he wanted to be notified. Then he walked away. At fifty metres he clutched at his pockets to find his cigarettes and lighter; he wanted anything to calm him down and help him focus on anything else until it was time. He stood in the field, chain smoking, until he heard the running footsteps in the distance. He looked at his pocket watch. Twenty minutes had passed, as he saw a soldier running toward him. He looked at the gas chamber and saw they had opened the doors, so he started his methodical walk back to where he was destined to go. He acknowledged the soldier with a wave, and quickened his pace to the building. He saw a few different soldiers this time, all waiting until the cloud of gas was cleared from the chamber so they could work. He walked to the doorway. It was dark, but he could make out a pyramid of people toward that small now closed centre vent. From what he could tell, it looked like the Jews tossed the babies and small children toward the top, in an effort to keep the children alive. One of the soldiers passed him as he stared, so he asked him how long he had been doing this. “Nearly a year,” he answered. So he had to ask if doing this, if seeing this, bothered him. The man only answered, “If you do something long enough, you get used to anything.” With that, he nodded slightly, and knew he saw enough. He walked away. Early the next morning, he came back to the offices at the Dachau concentration camp, so he could get his paperwork as quickly as possible, so he could get out of there as quickly as possible. The tension knot grew smaller in his stomach the closer he got to his home in that drive, but as he came to his home, he saw his wife sitting outside their home, with all the widows open. Once he got out of the car, he could hear her coughing, sounding more and more hoarse with each gasp. He only wanted to hold her, but concern overtook him as she explained that she just used a pesticide fumigant throughout the house, and she could no longer breathe while inside those walls. He looked to the second floor of the house for the children, and she told him they were each staying the night at friends homes. And suddenly he imagined that fumigant that’s killing the vermin inside their home — Hydrogen Cyanide was now in their home. A form of Zyklon B was now in their home. All she was trying to do was kill the vermin, and he thought of the propaganda ministry he now worked for, telling the nation to believe that the Jews are the rats, the Jews are the vermin. So he looked at their home, and told her they would get out of here tonight, as far as they possibly could. He then held her close before they walked away, holding hands.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9800445437431335}", 'metadata': "{'Content-Length': '59649', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J552D5PKJ5KIATYSH5I4IL43APNF2JLI', 'WARC-Concurrent-To': '<urn:uuid:96378b6f-2c89-4fa0-a7c9-3669dfdaa707>', 'WARC-Date': datetime.datetime(2022, 11, 27, 4, 24, 36), 'WARC-IP-Address': '172.67.165.60', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:D2B3XY2P7AJGE664XVRUBPXTU5CR7MI7', 'WARC-Record-ID': '<urn:uuid:4224089b-c8ef-4064-81f3-3db9dcab7351>', 'WARC-Target-URI': 'https://www.artvilla.com/tag/heavy-haze-poem/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9ae1e6e5-12e2-420e-92a4-3d4662c68acd>', 'WARC-Truncated': None}", 'previous_word_count': '1391', 'url': 'https://www.artvilla.com/tag/heavy-haze-poem/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-8\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14945709705352783', 'original_id': 'de22a8ab03463885780105a7219dd02bb5c850b09b7270c5f54b2cc31c394a4d'}
package core import ( "encoding/json" "fmt" "io/ioutil" "time" ) //DataServiceArea Service area //describes e.g. a branch office, temporal allocation of certain resources //* Name, Designation //* Address, geo-coordinates for starting point //* Capacities per qualification type DataServiceArea struct { ID string `json:"id" gorm:"primaryKey"` CreatedAt time.Time UpdatedAt time.Time Name string `json:"name"` Location TLocation `json:"location" gorm:"embedded"` Requirement []DataRequirement `json:"requirement" gorm:"foreignKey:ServiceAreaRef"` PostCodeArea []DataPostCodeArea `json:"post_code_area" gorm:"foreignKey:ServiceAreaRef"` Holidays []DataAbsencePeriods `json:"holidays" gorm:"foreignKey:ServiceAreaRef"` } func InitOrgaDB(iMode int) error { //Data Server.DB.AutoMigrate(&DataServiceArea{}) if iMode == 1 { //Test-Modus - Daten initialisieren Server.DB.Where("id <> ''").Delete(&DataServiceArea{}) Server.DB.Where("service_area_ref <> ''").Delete(&DataRequirement{}) loadTestDataOrga() } return Server.DB.Error } //********************************* func loadTestDataOrga() { var test struct { ServiceArea []DataServiceArea `json:"service_area_list"` } fmt.Println("loadTestData: orga.json") data, err := ioutil.ReadFile(Server.Path + Server.TestfileOrga) if err != nil { fmt.Println("error:", err) return } err = json.Unmarshal(data, &test) if err != nil { fmt.Println("error:", err) return } Server.DB.Save(&test.ServiceArea) fmt.Println("loadTestData: in DB verbucht") }
common_corpus
{'identifier': 'https://github.com/jankstar/go-skydisc/blob/master/core/orga.go', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'go-skydisc', 'creator': 'jankstar', 'language': 'Go', 'language_type': 'Code', 'word_count': '142', 'token_count': '548', '__index_level_0__': '42515', 'original_id': 'c16da01f9951598615e1b5a6a90e17f83197e040078d11447a16bd8dfeedb167'}