text stringlengths 3 7.38M | source_data stringclasses 5 values | info stringlengths 83 12.5k |
|---|---|---|
Why Almost Everything You Have Learned About Online Casino
Other state plans will need to get removed or backed by tax gains as nations have become reliant on gambling revenue. This, together with the fact, using very few exceptions, with no real prosperity is produced by gambling, means that state authorities are no longer behaving as agents of the widespread public attention.43 State authorities have united the gambling industry in bulk civic manipulation. So it is something of a societal and political disgrace to view America’s local and state authorities purchase into and encourage gambling with the excitement of pit supervisors. It cannibalizes instead of nurtures local markets. Even worse, gambling operations frequently do this while claiming to gain some universal great like schooling, economic advancement, the surroundings, or even the elderly.
Gambling begets gambling. It generates no new riches.44 The gambling sector is by character parasitic and predatory. Some countries allow gambling for ages 18 and up to 21 and upwards, based on https://globallshare.com/ the specific casino, others based on the specific casino game. The specific pleasure below could be infectious, and a visit to the racetrack could offer a great chance connected with pace. These applications often cost you nothing to join, but they can make your swag, totally free gambling credit, free foods, and free remains in very pleasant suites. That is why gambling isn’t a”victimless crime” What is harmless play, one’s cash becomes a harmful and expensive influence on the individual and the neighborhood.
This arrangement Is why Yeti Casino provides access to Automobile Roulette, Shared Draw Blackjack, Caribbean Stud, Casino Hold’em, along with Immersive Roulette. This may be done in one of 2 manners: 1 States can privatize state lotteries, thus getting countries from their possession and promoting gambling activities. This, obviously, could be painful. 2 States can suspend state lotteries, lottos, and other types of state-sponsored gambling, such as race tracks. 1. Eliminate country government sponsorship and marketing of all types of gambling. Through astute country marketing, legislators will be asked to replace revenues made by state gambling businesses. You’ve got to be in New Jersey’s state boundaries to perform an NJ internet casino. Throughout the last few decades, gambling proponents have dropped more competitions than they have won. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '12', 'language_id_whole_page_fasttext': "{'en': 0.9396055936813354}", 'metadata': "{'Content-Length': '25623', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5ZXG7ZODZH5YC3ODALQV4MLPU47OJRH7', 'WARC-Concurrent-To': '<urn:uuid:009a5bef-dde2-4fad-ae1c-d621c36fd1b3>', 'WARC-Date': datetime.datetime(2022, 11, 26, 12, 40, 1), 'WARC-IP-Address': '167.71.3.151', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:55PKQ3HVUIBPOEJEZUPUAVXYC3O6BQYN', 'WARC-Record-ID': '<urn:uuid:cad109a2-39f2-47ae-a319-f907f9a13d35>', 'WARC-Target-URI': 'https://www.youforgotpoland.org/why-almost-everything-you-have-learned-about-online-casino/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:367c5381-3c99-4704-9b31-453cf6d182a7>', 'WARC-Truncated': None}", 'previous_word_count': '375', 'url': 'https://www.youforgotpoland.org/why-almost-everything-you-have-learned-about-online-casino/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-196\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08441758155822754', 'original_id': '3833a0ba05ffc8dba1cbe72d8f4ddcb7915329e194697b40c9c3d75ffcde9903'} |
---
abstract: 'Measurement combined with feedback that aims to restore a presumed pre-measurement quantum state will yield this state after a few measurement-feedback cycles even if the actual state of the system initially had no resemblance to the presumed state. Here we introduce this mechanism of [*self-fulfilling prophecy*]{} and show that it can be used to prepare finite-dimensional quantum systems in target states or target dynamics. Using two-level systems as an example we demonstrate that self-fulfilling prophecy protects the system against noise and tolerates imprecision of feedback up to the level of the measurement strength. By means of unsharp measurements the system can be driven deterministically into arbitrary, smooth quantum trajectories.'
author:
- 'H. Uys'
- Humairah Bassa
- Pieter du Toit
- Sibasish Gosh
- 'T. Konrad'
bibliography:
- 'xbib.bib'
title: 'Quantum Control through a Self-Fulfilling Prophecy'
---
Introduction.
=============
The control of individual quantum systems, for example of trapped atoms and ions or single photons, enabled experimental tests of quantum theory and its foundations as well as the application of quantum effects for information processing, communication and metrology purposes. The monitoring of observables based on continuous or sequential unsharp (sometimes called weak) measurement [@Diosi1988; @Belavkin1989; @Wiseman1993; @Carmichael93; @Korotkov2001; @Audretsch2001] has paved the way for quantum control in real-time with closed-loop feedback. This kind of control already has been applied to photons in microwave cavities [@Sayrin2011] and superconducting qubits [@Vijay2012].
Here we introduce a new control scheme called self-fulfilling prophecy (SFP), which is related to quantum state monitoring [@Doherty.et.al00; @Diosi2006; @Oxtoby2008; @KonradUys2012]. Both schemes are based on the convergence of different states to a common state subject to sequential measurements with the same measurement results. SFP allows to prepare quantum systems in a target state and protect it against decoherence in the presence of noise and feedback errors. Moreover, it can be employed to drive the system into target dynamics and protect these dynamics.
The SFP technique uses unitary feedback to return the system into a particular pre-measurement state. The pre-measurement state can also be restored probabilistically by means of filters or additional measurements. Such measurement reversals have been used to suppress decoherence [@KoashiUeda1999; @KorotkovKeane2010; @LeeJeong2011] or to protect entanglement [@ManXia2012; @KimLee2012].
In what follows, we first revise the formalism for measurement and feedback and describe the protocol of SFP. Then we address the question which measurements are needed for SFP for systems with finite-dimensional Hilbert space and prove the convergence to the target state for the ideal case without noise or feedback errors. By means of numerical simulations we study the asymptotic fidelity in the presence of noise and imperfect feedback for two-level systems. In addition, we employ SFP to protect Rabi oscillation against noise. We close with two examples of driving two-level systems into target dynamics – a figure of eight on the Bloch sphere and accelerated Rabi oscillations.
Quantum measurements {#Section:fidelity}
=====================

The statistics of measurements in quantum mechanics can be described by means of positive operators $E_i$, so-called [*effects*]{}, whose expectation values determine the probabilities for the measurement results numbered by the index $i= 1, 2, \ldots$. $$p_i(\psi)= {\langle \psi|}E_i{|\psi\rangle}\,.$$ Since the probabilities sum to unity for any state ${|\psi\rangle}$, the effects sum to the identity operator, $\sum E_i = \mathbb{I}$, and generate a so-called positive-operator valued measure (POVM). On the other hand, the state of the system after the measurement in general depends on the measurement result $i$ and can be expressed by so-called Kraus operators $M_i$: $${|\psi\rangle}\xrightarrow{\mbox{result}\, i}{|\psi_i\rangle}\equiv \frac{M_i}{ \sqrt{p_i}}{|\psi\rangle}\,.$$ The Kraus operators can be decomposed like complex numbers into [*phase*]{} and [*modulus*]{}: $$M_i = U_i |M_i|\,,$$ where the [*phase*]{} operator $U_i$ is unitary and can be interpreted as measurement-outcome dependent feedback [@Wiseman1993], while the modulus is related to the effect via $|M_i|\equiv\sqrt{M_i^\dagger M_i}= \sqrt{E_i}$. An unsharp measurement of a non-degenerate observable $O=\sum_{j=1}^d o_j {{|o_j\rangle}{\langle o_j|}}$ with measurement results $o_1, \ldots, o_d$ is given by a POVM with commuting effects $$E_i= \sum_{j=1}^d \lambda_{i j} {{|o_j\rangle}{\langle o_j|}}\quad\mbox{where } (\lambda_{ij}) \mbox{ is invertible},
\label{nondegenerate}$$ such that from the statistics $p_i(\psi)={\langle \psi|}E_i{|\psi\rangle}$ the probability to measure any $o_j$ can be determined via $|{\langle o_j|} \psi\rangle|^2 = \sum_i\lambda^{-1}_{i j} p_i (\psi).$ For example, for a two-level system a measurement of the (pseudo-) spin z-component, $\sigma_z={{|\uparrow\rangle}{\langle \uparrow|}} - {{|\downarrow\rangle}{\langle \downarrow|}}$, is given by the effects: $$\begin{aligned}
E_0&=&(1-p_0)|\downarrow\rangle\langle\downarrow| + p_0|\uparrow\rangle\langle\uparrow|\nonumber\\
E_1&=&p_0|\downarrow\rangle\langle\downarrow| + (1-p_0)|\uparrow\rangle\langle\uparrow|\,, \label{unsharpm}\end{aligned}$$ Here the squared difference between the eigenvalues of $E_0$, $0 < (\Delta p)^2= (2p_0 - 1)^2 \le 1$, measures the strength of the measurement with $ (\Delta p)^2 = 0$ a fully weak and $(\Delta p)^2 = 1$ a strong (von Neumann) measurement of $\sigma_z$ [@Audretsch2001; @KonradUys2012].
Protocol of self-fulfilling prophecy
====================================
Self-fulfilling prophecy transfers a quantum system with Hilbert space $\mathcal{H}$ of finite dimension $d$ into a target state ${|\psi_T\rangle}\in \mathcal{H}$ by assuming that the system is initially in the target state ${|\psi_T\rangle}$ (even though it may not be). After a measurement unitary feedback is imposed which would return the system into its pre-measurement ${|\psi_T\rangle}$, had the assumption been correct. The condition for the unitary [*reversal*]{} feedback $U_i$ after a measurement with Kraus operator $|M_i|=\sqrt{E_i}$ thus reads $${|\psi^T\rangle}\xrightarrow{\mbox{result}\, i} {|\psi_i^T\rangle}\equiv\frac{U_i \sqrt{E_i}}{\sqrt{w_i}}{|\psi^T\rangle}= {|\psi^T\rangle}\,,
\label{feedback}$$ where the normalisation constant is given by $w_i = {\langle \psi^T|}E_i{|\psi^T\rangle} $. The SFP protocol consists of a number of consecutive executions of the measurement-feedback cycle described above on a system in an unknown state.
Mechanism of convergence
========================
Executing the SFP protocol with suitable measurements, the state of the system comes on average closer to the target state in each measurement-feedback cycle. This is explained graphically for the special case of a qubit measurement in Fig.\[Blochsphere\]. The proximity (similarity) between the actual state ${|\psi\rangle}$ and the target state ${|\psi_T\rangle}$ can be quantified by the target fidelity, i.e, the squared modulus of the overlap between both states: $$F(\psi,\psi^T)=\vert\langle{\psi}{|\psi^T\rangle}\vert^2\,.$$ The change of fidelity $\Delta F$ due to a measurement with feedback averaged over the possible measurement results amounts to $$\begin{aligned}
\label{eq:DeltaF}
\Delta F &= \sum_i p_i \vert{\langle \psi_i|}\psi^T_i\rangle\vert^2~-~\vert{\langle \psi|\psi^T \rangle}\vert^2.\nonumber \\
& = \sum_i \frac{\vert{\langle \psi|}E_i{|\psi^T\rangle}\vert^2}{w_i}~-~\vert{\langle \psi|\psi^T \rangle}\vert^2.\end{aligned}$$ In general, any measurement carried out on two equal systems with the same measurement result brings an arbitrary pair of states ${|\psi\rangle}, {|\psi^T\rangle}\in \mathcal{H}$ on average closer together or keeps the fidelity the same (monotonicity of the average fidelity of selective operations). This can be seen by rewriting the average change of fidelity $\Delta F$, and observing that it is positive or zero: $$\begin{aligned}
\label{eq:DeltaF2}
\Delta F= \sum_i \frac{\vert{\langle \psi|}(\mathbb{I} - {{|\psi^T\rangle}{\langle \psi^T|}}) E_i{|\psi^T\rangle}\vert^2}{w_i} \ge 0\,.\end{aligned}$$
For SFP, we choose the measurements such that the average fidelity change due to measurement combined with feedback is strictly positive unless the system is in the target state, i.e., ${|\psi\rangle} = {|\psi^T\rangle}$. This implies that on average the fidelity between the state of the system and the target state grows due to the sequence of measurements until the system reaches the target state. Since the target state is invariant under the action of SFP, the system remains in the target state subsequently.
Here we show that there are different kinds of measurement that lead to ${|\psi\rangle} = {|\psi^T\rangle}$ (i.e. $F=1$) being a necessary and sufficient condition for $\Delta F=0$. For this purpose, we express the state of the system without restriction of generality as ${|\psi\rangle}=\alpha{|\psi^T\rangle} + \beta{|\psi^R\rangle}$, where ${|\psi^R\rangle}\in \mathcal{H}$ is orthogonal to the target state ${|\psi^T\rangle}$. It follows that $\alpha={\langle \psi^T|}\psi\rangle$. Moreover, $$\begin{aligned}
\label{eq:DeltaF3}
& \Delta F= 0 \Leftrightarrow \sum_{i\in\Omega} \frac{\vert{\langle \psi|}(\mathbb{I} - {{|\psi^T\rangle}{\langle \psi^T|}}) E_i {|\psi^T\rangle}\vert^2}{w_i} = 0.\end{aligned}$$ Since each summand in the last equation is greater or equal to zero, all summands must vanish. This is the case if, and only if, $$\begin{aligned}
\label{eq:DeltaF3}
&{\langle \psi|}E_i {|\psi^T\rangle} = w_i{\langle \psi|}\psi^T\rangle\,\,\mbox{ for all}\,\, i\in\Omega\,.\nonumber \\
& \Leftrightarrow (\alpha^*{\langle \psi^T|} + \beta^*{\langle \psi^R|})E_i{|\psi^T\rangle} = w_i{\langle \psi|}\psi^T\rangle\,\mbox{ for all}\, i\in\Omega\,.\nonumber \\
& \Leftrightarrow \quad \beta^*{\langle \psi^R|}E_i{|\psi^T\rangle} = 0 \,\,\mbox{for all}\,\, i\in\Omega\,.\end{aligned}$$ Hence, $\beta^*=0$ and thus $|\alpha|^2\equiv F=1$ if, and only if, the vectors $E_i{|\psi^T\rangle}$ span the Hilbert space $\mathcal{H}$ of the system, i.e., for all states ${|\psi^R\rangle}\in{\mathcal H}$ there is a measurement result $i$ such that ${\langle \psi^R|}E_i{|\psi^T\rangle}\not= 0$. Thus we found a criterion for SFP to drive a quantum system in the absence of noise into the target state. Accordingly, SFP works for any target state ${|\psi^T\rangle}\in \mathcal{H}$ with informationally-complete measurements, which possess effects $E_i$ that span the space of linear operators on $\mathcal{H}$. This follows from $$\begin{aligned}
& 0={\mbox{Tr}\left[{|\psi^T\rangle}{\langle \phi|} E_i\right]}= {\langle \phi|}E_i{|\psi^T\rangle}\, \mbox{ for all}\, i\in\Omega\,\nonumber\\ & \Rightarrow {|\phi\rangle}=0\,.
\end{aligned}$$
![Demonstration of convergence of state preparation fidelity. Even though the actual initial state of the system was orthogonal to the target state, an asymptotic fidelity $F=1$ is reached. Here the dashed red line gives the average over 200 runs, while the black run shows the evolution of the fidelity in a single run.[]{data-label="StatePrepFig"}](StatePrepConvergence.png)
Another important kind of measurement suitable for SFP are unsharp measurements of a non-degenerate observable. For such measurements with results $i=1,\ldots d$ the vectors $E_i{|\psi^T\rangle}$ form a basis if, and only if, $$\begin{aligned}
\label{get}
&0 \not=\det(E_1{|\psi^T\rangle}, \ldots, E_d{|\psi^T\rangle})=\det(( \lambda_{ij}\langle o_j {|\psi^T\rangle})) \nonumber\\
&\Leftrightarrow 0\not= \det (\Psi \lambda) = \det(\Psi) \det (\lambda)\,.\end{aligned}$$ This means that neither the determinants of $\Psi\equiv\sum_{l} \langle o_l {|\psi^T\rangle} {{|l\rangle}{\langle l|}}$ nor the determinant of $\lambda\equiv \sum_{ij} \lambda_{ij}{|j\rangle}{\langle i|}$ must vanish for SFP to work. This condition requires the target state to be a superposition of all eigenstates ${|o_l\rangle}$ of the measured non-degenerate observable. Note, that $\det (\lambda)\not= 0$ is satisfied for sharp and unsharp measurements of non-degenerate observables (Eq. (\[nondegenerate\])).
We now study the performance of the SFP protocol numerically for qubit control with unsharp measurements. Figure \[StatePrepFig\] shows convergence of the state preparation fidelity as a function of the number of measurement- and feedback steps taken. In this case we chose the target state to be $|\psi^T\rangle = e^{-i\frac{\pi}{8}\hat\sigma_x}|\!\!\downarrow\rangle$, and the initial actual state orthogonal to it. The solid black line represents the fidelity in a single run of the simulation, while the dashed red line is the average over 200 runs. The individual measurement strength was $p_0=0.45$. It is conventional to define the strength of a sequence of measurements as $\gamma=\Delta p^2/\tau$, where $\tau$ is the measurement periodicity. Thus in this case $\gamma=0.01$ in units of the inverse measurement periodicity. Asymptotically a fidelity of $F=1$ is clearly reached demonstrating that successful state preparation was achieved.
![Comparison of loss of asymptotic state preparation fidelity due to dephasing noise (black diamonds) or noise in the reversal operations (blue circles). In both cases a white noise spectrum was assumed.[]{data-label="NoiseFig"}](NoiseFig.png)
In this first example we assumed the absence of any external noise influences. Now we test the behaviour of the asymptotic fidelity both under the influence of dephasing noise and imperfections in the measurement reversal feedback angle. In both cases we assume that the noise obeys a white noise spectrum and we characterize the strength of the noise by comparing the root-mean-square angular deviation, $\theta_{Noise}$, that the noise causes between successive measurements, to the measurement reversal angle, $\theta_R := \arccos (\mathbb{R}\textnormal{e}({\langle \psi^T|}U_{i}^\dagger{|\psi^T\rangle}))=\arccos(\mathbb{R}\textnormal{e}({\langle \psi^T|}\frac{ \sqrt{E_i}}{\sqrt{w_i}}{|\psi^T\rangle}))$, where $\mathbb{R}\textnormal{e}$ indicates the real part. In Fig. \[NoiseFig\] we plot the asymptotic fidelity by averaging over 6000 measurement and feedback operations in a state preparation run, having used the target state $|\psi^T\rangle = (|\!\!\downarrow\rangle + i|\!\!\uparrow\rangle/\sqrt{2})$. Above 90% state preparation fidelity can be achieved as long as $\theta_{Noise}\lesssim\theta_R/2$ for both dephasing noise, circles, and noise in the reversal, diamonds. The error bars indicate the root-mean-square deviations above and below the mean. This demonstrates that the feedback scheme can preserve qubit states asymptotically long with high fidelity while tolerating modest noise influences. The scheme does require that the target qubit state is known.
![SFP forces a qubit oscillating at frequency $\Omega_R=1$ (red, dashed durve) to oscillate instead at a target frequency $\Omega_T=1.01$ (black curve). Measurement without reversal allows state estimation [@KonradUys2012], but also leads to significant broadening of the oscillation spectrum (blue curve).[]{data-label="FreqShiftFig"}](FreqShiftv2.png)
Now we employ the measurement reversal protocol to influence a separate underlying unitary dynamics. In particular we study a qubit undergoing Rabi oscillations at an angular frequency of $\Omega_R=1.00$. We desire that the qubit oscillates instead at a target angular frequency of $\Omega_T=1.01$. In addition, a target state is taken to initially be orthogonal to the initial actual state. The actual- and target states are then time evolved by Rabi oscillations at the actual- and target frequencies respectively. To control the actual frequency a self-fulfilling prophecy approach is again used. We simply assume that the actual state is undergoing the dynamics of the target state. A sequence of unsharp measurements are made on the actual state, but each time the measurement is reversed by assuming that it is instead in the target state as predicted by the target dynamics. In Fig. \[FreqShiftFig\] we plot the discrete Fourier transform of the probability for the qubit to be in the upper state. Without measurement and reversal the dashed red line indicates that the system is oscillating at the Rabi frequency $\Omega_R=1$. The blue curve indicates that attempts to monitor the qubit using unsharp measurements induce significant measurement noise, leading to significant broadening of the oscillation spectrum. Once the reversals are initiated the noise is suppressed and the frequency shifts to the target frequency. This approach works as long as the sequential measurement strength, $\gamma$, is larger than the frequency detuning $\delta=\Omega_R-\Omega_T$.
![Suppression of noise using SFP. The red curve shows the spectrum of a qubit oscillating in the presence of white noise on the drive field amplitude. The black curve shows the stabilized spectrum. []{data-label="StabilizationFig"}](NoiseStabilizedv4.png)
SFP can also be used to suppress noise present in the unitary dynamics. In Fig. \[StabilizationFig\] we show the noise spectrum of a qubit oscillating in the presence of white noise on the amplitude of the drive field. The root-mean white noise field amplitude was $1/2$ the drive field strangth, thus leading to the broadened spectrum (red curve). Implementing SFP with $\gamma=0.4$ clearly leads to a strong suppression of the noise. We used 40 measurements per Rabi oscillation cycle and $p_0=0.45$.
Finally, we show that the state preparation scheme can be adapted to elicit qubit dynamics on its own, without an additional unitary dynamics. To this end we imagine the target state to change dynamically and adapt the feedback reversal to the instantaneous target state, but still execute the same unsharp measurement. As long as the imagined dynamics is slow compared to the timescale of convergence the actual state will follow the target dynamics. This expectation is clearly borne out in Fig. \[TrajectoryFig\].
![A target dynamics forming a figure of eight on the Bloch sphere is imagined. SFP forces a qubit to execute this dynamics. Here the different gray curves are due to different choices for the actual initial state. Each curve quickly converges onto the target dynamics.[]{data-label="TrajectoryFig"}](Trajectoryfigv2.png)
Here we chose a figure-of-eight trajectory on the Bloch sphere for the target dynamics and three different starting points for the actual state. Over the trajectory completion time 10 000 measurements were executed using $p_0=0.45$ as the strength of individual meausurements. In units of the trajectory completion time $\gamma=100$, indicating that the dynamics is strongly dominated by the measurement and feedback. From all three starting points the actual state quickly converges to the target state and then dynamically follows it. In the continuous measurement limit this constitutes a new class of measurement and feedback driven qubit dynamics. Unlike pure unitary evolution the dynamics can be preserved in the long time limit even in the presence of modest noisy influences.
The work in this paper was supported in part by the National Research Foundation of South Africa through grant no. 93602 as well as an award by the United States Airforce Office of Scientific Research, award no. FA9550-14-1-0151.
| mini_pile | {'original_id': 'af3688f69b57ee7403f82652acdef869c486e18b45df94e42dc9f3d4f6fe63c0'} |
Non-Profits & Fundraisers
Partner with us for free. Car washes and bake sales are wonderful, yet why not offer your patrons refreshing, wanted and needed products? What if, as a school, church, or synagog leader you could offer a TOXIC FREE and ORGANIC solution? What if you could raise far more, at every fundraiser, with your own FREE website? Discover how one fundraiser with 200 orders can generate $2,400.00 in retail commissions (shown in red below).
Non-Profit Fundraiser Form
Essanté Organics provides a free $29.95 lifetime wholesale website to all non-profit organizations:
Essanté Organics is committed to providing a free global website (Business Center) to every non-profit organization. If your company is not-for-profit, you qualify for a free website. Simply complete the form located at the top or bottom of this page and include your tax exemption number. The President of Essanté Organics, Dr. Jonathan Levine, or another corporate member, will personally welcome you and ensure your verified, non-profit organization receives a complimentary lifetime website, no strings attached. Why does Essanté Organics do this? For the same reason we developed the Essanté Foundation. When a company gives back, they not only make a positive difference in people’s lives, they set an example for humanity.
Brand Partners: As you refer a non-profit to Essanté Organics, you'll receive commissions as usual. Qualified Essanté Organics Executives (Brand Partners) receive commissions on all sales each non-profit generates, as outlined under Company - Essanté Earnings.
How does it work and is it "no strings attached"?
Essanté Organics products are certified to contain zero toxins, so you will rest easy knowing you are offering your fundraiser patrons the highest quality products available. You be able to raise funds for your organization and, the best part is, everyone who purchases will be helping themselves and the planet go green. As a non-profit, you will be gifted a lifetime Essanté Organics Website (a $29.95 value), at no cost or obligation. It will be customized, with your name and photo and it will be unique to you. You and your organization may order directly from your free Essanté Organics website, and Essanté Organics Corporate will do the rest: we stock, pack, ship and pay you each week, every time someone makes a purchase.
Is it easy?
Yes. You’ll never again have to worry about baking cakes, hosing down cars, or having your children go door to door. Gone are the days of making minimal money with exhausting fundraising endeavors. With Essanté Organics fundraisers there is no inventory to maintain and no cash box to keep track of. Essanté Organics products are highly consumable products that people need and use every day. Every time these popular daily-use products are purchased from your free website, your website rings up the sale, so fundraising occurs for you organically! Essanté Organics keeps the fun in fundraising.
How long should my fundraiser last and how do I set it up?
A fundraiser should last 1-4 weeks (one full calendar month is typical) however, Essanté Organics can be used as a perpetual fundraiser (or a profitable home-based business). Your fundraiser can be done in two ways: (1) Promote your website and ask everyone to visit and purchase, Or (2) Set up a weekend booth, have a catalog and order forms on hand, and take orders in person. Either way, you’ll process all of your orders through your free website and Essanté Organics will handle the rest, we even offer a 30 day satisfaction guarantee to everyone who purchases directly from your website.
Once you've had your first fundraiser or two, you'll be a pro. At this stage, you may decide you would like to offer "instant gratification" to your fundraiser patrons - fundraiser pros often purhase products in bulk, at a discount, from their own website and sell products at full markup during thier fundraisers. This allows each fundraiser patron to buy on site and walk away with the product in hand. If you choose this method, you are in charge of offering sales receipts and handling returns and exchanges (if your fundraiser patrons order online, Essante Organics provides an emailed receipt and handles returns and exchanges).
Does my free global website (Business Center) operate differently?
No. You will operate your free Essanté Organics global e-commerce website (Business Center) in the same way every one else does. Our Essanté Executives (Brand Partners) purchase their website through the JOIN & SAVE button at the top of this website, and they operate their home-based, global e-commerce website (Business Center) for profit. You will also be an Executive (Brand Partner) yet what you choose to do with the fund-raising profits you generate with your free website is up to you.
How do I generate income and what do I do with it?
Here's a good analogy: just as you would create a fund raising car wash, and collect $10.00 per car that is washed.... you can create a "Living Life Toxic Free" fundraiser and collect $12.00 in retail commissions, for every head of hair that is washed (every shampoo & conditioner combo that is sold at retail - see the example in red below). Non-profits share their website and products with their members and others. Non-profits use their website as a hub to send their fund raiser patrons to. Some non-profits direct the funds they raise back into their non-profit organization or they use the funds for field trips, etc. All non-profits may generate funds by sharing 1 or 2 things: (1)Share Essanté Organics 100% certified Toxic Free and organic products. (2) Share Essanté Organics global e-commerce Wholesale Websites (Business Center Ownership). Non-profits may share either or both of these 2 benefits with their members and others. Only other non-profit organizations may receive a free website (direct them to this page) everyone else must order and pay for their $29.95 Wholesale Website through the JOIN & SAVE button at the top of each website. .
Do I have to share Website Ownership or with others?
No. Only those who are interested in receiving an override commission on the production efforts of other people's websites will want to engage in the networking aspect. It’s much like offering franchises to others. You may share the benefits of Wholesale Website Ownership (Business Center Ownership) with others if you choose to. Only those who choose to share the benefits will receive profits from said websites, because the person who helped them discover and open their “wholesale storefront” deserves compensation for referring them. Most people ARE interested in owning their own Wholesale Website, if only for the ability to purchase products at wholesale. Reveiw the JOIN & SAVE button (above) and you'll discover there are 2 ways for folks to join: As a Wholesale Member (a customer only), or as a Brand Partner (a business owner who may refer others and earn commissions if they choose to. No one is ever under any obligation to refer others (promote the business or products), yet only Brand Partners are paid the highest referral fees in the industry (we pay commissions weekly, in 6 ways, as shown under DISCOVER CENTER - BUSINESS CENTER (See Essante Earnings).
Do I have to spend money to make money, or can I just offer the products at Retail?
You do not need to spend money to make money. If you are only interested in Retailing products (earning retail profits from the Retail sales processed on your website), simply direct your fundraiser patrons (and others) to your website SHOP. There is absolutely NO PERSONAL PURCHASE NECESSARY FOR YOU TO RECEIVE RETAIL COMMISSIONS. Retail commissions generated are paid weekly to everyone who owns a website, regardless if they personally purchase products or not.
Ask your visitors to order toxic free products at retail, in your SHOP, and you will receive, on average, a 30% retail commission paid weekly on all product purchases. In other words, you can earn up to $30.00 every time your website sells $100.00 in retail products. Again, no purchase is necessary on your part. Retail sales are separate and are not related to the network portion of Essanté Organics. Retail sales are just that… retail. It’s like owning your own “storefront”, but instead of brick and mortar, it’s click and order. Oh and you get to operate your global “storefront” from your smart phone or your home-sweet-home. It’s that easy.
Ok, I know several people who would switch to toxic free shampoo & conditioner, for a good cause and for their family’s well being:
Great. Let’s say you have 200 members who are willing to make a positive choice. They are willing to stop using their toxic shampoo and toxic conditioner and they are willing to start using Essanté Organics shampoo and conditioner. Two things will happen. Those lucky 200 people are now much safer and healthier (and so is Earth's water supply). And, because these 200 people are now buying Essanté Organics shampoo and conditioner (from your website) they will be very proud to know they collectively raised $2,200.00 a month in recurring fundraising profit (retail profit), as they continue to order shampoo and conditioner each month. Here’s how…
How much income can I expect my fundraiser to generate?
Here is a lowball, hypothetical demonstration. Let’s say you’ve chosen to operate your website using only the retail aspect (1 of 6 ways we pay commissions). Here’s what you can expect to raise in funds: For example, let’s say you have 200 members in your non-profit congregation or school, etc. They are all washing and conditioning their hair daily, most likely with products that contain cheap, harmful, toxic chemicals. As you share Essanté Organics shampoo and conditioner with those 200 people, and as they switch from buying at Wal-Mart to buying from your free website (and subsequently their place of worship or their school, etc.), you will generate $2,400.00 per month in funds:
200 orders (# of members who order shampoo and conditioner at your fundraiser)
x $12.00each (the Retail profit from each order of 1 shampoo & 1 conditioner)
= $2,400.00 month (total earned in retail commission / fundraiser income as 200 people reorder each month)
Retail commission is paid weekly so you would receive $600.00/week as 200 members order monthly
Essanté Organics has an entire catalog of products including home products, baby products, essential oils, pH nutrition products and more, so consider showing off the catalog at your next fundraiser because that action can result in a far more profitable fundraiser.
What if someone wants a refund?
This is a great question. Most individuals who order at a fundraiser do not ask for their money back. If they buy a cake that is dry, or receive a car wash that is less than shiny, they smile and say, “It was for a good cause”. Yet if anyone does want a refund, the Essanté Organics fundraiser is the epitome of professionalism. As long as they order directly from your website, Essanté Organics offers a 30 day 100% satisfaction guarantee. If anyone is not completely happy with their 100% certified ToxicFree™ and organic product, they may call or email Essanté Organics Corporate and allow the customer support team to make it right. All returns require an RMA# (Return Authorization #) and are subject to shipping fees and a 15% processing fee, as outlined on each receipt.
I’m ready to promote a healthier, fun and more profitable fundraiser using my FREE, no-strings-attached website. How do I get started?
It’s quick and easy to get started; just complete the form below, scan it and email it to
Non-Profit Fundraiser Form
Dr. Levine, our President, or one of our support members will contact you and the person who referred you, upon receipt of your form. Enjoy! Thanks for becoming a Fundraising Partner with Essanté Organics and thanks for making a difference! | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.922740638256073}", 'metadata': "{'Content-Length': '59915', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4J2B46UZYSMGOEGCBSX2DZYY675E4BSO', 'WARC-Concurrent-To': '<urn:uuid:5fef2fb1-e02d-4a54-9560-92d4ab79fe1d>', 'WARC-Date': datetime.datetime(2019, 1, 19, 4, 15, 33), 'WARC-IP-Address': '66.3.41.151', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ELP4ND7MELIWMKQQ45SMBF5V7GMQTCFF', 'WARC-Record-ID': '<urn:uuid:a12af24c-2301-4b16-bcd5-42f74f9ab7c6>', 'WARC-Target-URI': 'http://www.essanteorganics.com/membertoolsdotnet/shoppingcartv4/MainCartv4.aspx?SCCRoutingCode=NonProfits&MG=35', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:159efae8-70ef-41f2-a8e7-e78a4cd8280f>', 'WARC-Truncated': None}", 'previous_word_count': '1864', 'url': 'http://www.essanteorganics.com/membertoolsdotnet/shoppingcartv4/MainCartv4.aspx?SCCRoutingCode=NonProfits&MG=35', 'warcinfo': 'isPartOf: CC-MAIN-2019-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-101-220-24.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018426895141601562', 'original_id': 'd28336c0f9a742a7a80d514219e209b4ecf53d463156127a567870831415a7ab'} |
When the Nebraska Legislature voted in May to ban the death penalty in the state – overriding the governor’s veto – supporters of the ban shared some of the credit with religious leaders who had spoken out on the issue, including several Catholic bishops. In fact, many large religious groups have taken positions in opposition to the death penalty even though that stance is sometimes at odds with the opinions of their adherents.
The Catechism of the Catholic Church says the death penalty is acceptable if it is “the only possible way of effectively defending human lives.” In recent years, however, both the U.S. Conference of Catholic Bishops and Pope Francis have spoken firmly against capital punishment.
They are not the only religious leaders to take this position; when it comes to the official teachings of large U.S. religious groups, opposition to the death penalty is more common than support for capital punishment. This is in contrast with public opinion: A majority of U.S. adults (56%) still favor the death penalty, although support has been dropping in recent years.
There also is a disparity between religious groups’ positions and the views of their adherents, particularly among mainline Protestants. Two-thirds of white mainline Protestants (66%) favor the death penalty, but several of the biggest mainline churches are against it. This includes the United Methodist Church, the Evangelical Lutheran Church in America, the American Baptist Churches USA, the Presbyterian Church (U.S.A.) and many others.
Roughly half of U.S. Catholics (53%) – including a majority of white Catholics (63%) – also favor the death penalty, in contrast with church leaders’ stance.
Seven-in-ten white evangelical Protestants in the U.S. (71%) support the death penalty, a position held by many of their churches. Two of the largest U.S. evangelical denominations – the Southern Baptist Convention and the Lutheran Church-Missouri Synod – teach that the death penalty is acceptable. The Assemblies of God, a major Pentecostal denomination, does not have an official stance on the issue, although the church’s website cites a “common interpretation that the Old Testament sanctions capital punishment.”
The Church of Jesus Christ of Latter-day Saints (Mormon church) also does not take an official position on the death penalty. Neither does the National Baptist Convention, the largest historically black Protestant denomination, although most black Protestants (58%) oppose the death penalty (in contrast with the U.S. public overall).
Indeed, there is a significant racial divide when it comes to views on the death penalty, with blacks and Latinos more likely than whites to oppose it. The National Latino Evangelical Coalition recently came out against the death penalty.
Among non-Christian faiths, teachings on the death penalty vary. The Reform and Conservative Jewish movements have advocated against the death penalty, while the Orthodox Union has called for a moratorium. Similarly, Buddhism is generally against capital punishment, although there is no official policy.
Hinduism also does not have a clear stance on the issue. In Islam, the death penalty is widely seen as acceptable (based on the Quran), and Islamic courts in countries such as Saudi Arabia and Iran routinely hand down death sentences. Some U.S. Muslim groups, however, have spoken out against the death penalty; for example, the Council on American-Islamic Relations has called for a moratorium.
Religiously unaffiliated Americans – atheists, agnostics and those who say their religion is “nothing in particular” – are split on the death penalty, with 48% in favor and 45% opposed. | mini_pile | {'original_id': '1b4c093bd34d4ebcfec6e9d6c96ead8b696d7e062bf2fe84fa4ed5404f75f469'} |
WASHINGTON - In a surprisingly swift move last Thursday night that could have
wide-ranging implications, the United States Senate passed a bill containing
broad unilateral sanctions to punish foreign companies that export gasoline to
Iran or help expand its domestic refinery capabilities.
The voice vote came at the eleventh hour before the chamber recessed so
legislators could go home to campaign. The bill cannot come before the
president to be signed into law until a
conference procedure combines it with a similar house bill, the Iran Refined
Petroleum Sanctions Act, passed in October.
The senate move reveals an administration losing control of even its own party
in foreign policy dealings, as US President Barack Obama has tried to maintain
engagement with Iran aimed at curbing its nuclear program, which the Islamic
Republic insists is for peaceful purposes.
Along with scores of Democrats who favored the bill over the administration's
objections, the effort was supported by Iran hawks, including Republican
co-sponsor John Kyl and neo-conservative independent Joe Lieberman, and was
characterized by Senate minority leader Mitch McConnell as a shot at Obama.
"If the Obama administration will not take action against this regime, then
congress must," McConnell said.
The administration had raised its issues with the bill in a December letter
from Deputy Secretary of State Jim Steinberg to Senator John Kerry, chairman of
the Senate Foreign Relations Committee, complaining that the bill limited the
president's flexibility.
Secretary of State Hillary Clinton also made late December comments urging
caution in applying broad sanctions that might harm and alienate the struggling
Iranian opposition movement, asking instead for sanctions that targeted the
Iranian Revolutionary Guards Corps, thought to be responsible for crackdowns
against opposition demonstrators.
The contents of the bill require the president to impose the wide-ranging
sanctions, restraining the traditional presidential foreign policy waiver to a
line-by-line exemption that forces Obama to spend political capital.
However, after senate majority leader Harry Reid - beset by a host of political
problems from slow economic recovery to stalled health care reform - made it
clear that he intended to pursue the bill, the administration dropped its
public opposition, perhaps hoping that it could change the bill with amendments
or in conference.
But a compromise scuttled amendments in Thursday night's brief deliberations.
In a dramatic twist reported by ForeignPolicy.com, Republican Senator John
McCain tried to introduce an amendment to the bill that would name, shame and
sanction specific Iranian human-rights violators - a theme that echoes the
administration calls for more targeted sanctions.
But McCain dropped his amendments at the behest of Lieberman. The leadership of
both parties was apparently concerned that if amendments were introduced, the
process would be slowed and the bill might not come to a vote in time.
And Patrick Disney, the assistant policy director of the National Iranian
American Council (NIAC), which supports engagement, said that even in
conference, it will be difficult to remove the language that binds Obama's
hands.
"I wouldn't be surprised if they expedited the conference," he told Inter Press
Service (IPS). "I don't know if they'll be able to take that part out because
it's the main central architecture of the bills."
The rushed vote with almost no debate came a week before France, which supports
sanctions on Iran, is to take the presidency of the United Nations Security
Council from China, which has balked at punishing Iran as negotiations are
ongoing. Passing the bill as the administration negotiated with the Security
Council was viewed as diplomatically problematic.
But Richard Sawaya, the president of USA*Engage, a group that opposes
unilateral sanctions, told IPS that passing the bill before or during Security
Council negotiations was "a distinction without a difference".
Another aspect of the bill, introduced by Senator Chris Dodd, raising eyebrows
is the codification into law of an embargo against Iran imposed by president
Bill Clinton in the 1990s. The Dodd bill requires congress to approve the
lifting of the embargo.
Disney of NIAC said that the bill, rather than giving the president more tools
for negotiating with Iran, virtually takes the embargo off the table as a US
bargaining chip.
"This means that no president can lift the embargo without certifying to
congress that Iran has met a laundry list of demands that no president in his
right mind will certify," Disney told IPS.
"All of the things that this bill sought to do, the president had the power to
do already," he said. "By congress passing these bills, it removed the
president's ability to walk things back without congress."
One of the prime dangers of pursuing such draconian sanctions is that, while
Obama's tentative year-end deadline for negotiations to bear fruit has passed,
a slow-paced back and forth between Iranians and the multilateral team
including the US is still evolving.
The US has not even responded to the latest Iranian counter-offer for a uranium
swap proposal.
The situation is also complicated by the resilient Iranian opposition, which
has maintained its struggle against Iran's hardline leadership after alleged
widespread voter fraud in the June election that re-installed Mahmud
Ahmadinejad as Iran's president.
While the Obama administration has taken a considerably more cautious tone
since June - and especially in the subsequent months, as the opposition has
refused to cower in the face of a brutal crackdown - hardliners in congress
appear to be deaf to the fluid realities on the ground in the Islamic Republic.
"I would think the first rule is the physician's rule, which is 'do no harm,'"
said Sawaya of USA*Engage.
Furthermore, "crippling sanctions", as broad-based gas sanctions are often
called, is a potential checklist item on a path to military confrontation with
Iran. But some think imposing and enforcing the sanctions themselves could be
tantamount to war.
"Even half of the people that proposed [gas sanctions] say the only way to
really impose that is a naval blockade," said Sawaya. "Well, that's an act of
war."
In a statement on Friday, Debra DeLee, president of Americans for Peace Now,
urged that the bill be modified when members of the house and senate meet to
reconcile their respective versions of the legislation.
"The house-senate conference offers the last chance for congress to do the
right thing here: to amend this bill to make it consistent with a rational
approach to Iran, with the national interests of the United States, and with
the multilateral approach that is being pursued by the president of the United
States," she said. | mini_pile | {'original_id': '4bf3a0ce088df7b63de68ee4c49ed05d425621e35234cd16dcbbfa2805d071cb'} |
Canadian Jewish Political Affairs Committee
Greetings from the Prime Minister
It is with great pleasure that I extend my warmest greetings to the Jewish community in Canada as you celebrate the 60th anniversary of the State of Israel.
Since its formation in 1948, Israel has grown in strength and stature. “The Miracle in the Desert” transformed an arid Mediterranean plain into an abundant and productive landscape. The Jewish people built a nation of freedom and peace with perseverance and enduring faith. Israel’s very existence is a testament to the spirit of its people and the power of hope.
As fellow Canadians, we can all take pride in the pivotal role Canada played in crafting the United Nations resolution that led to this defining moment in history. Through six decades of triumph and tragedy, Canada has been a stalwart friend to Israel and we will continue to stand together to realize the goal of freedom, democracy, human rights and rule of law for all people in the region.
On behalf of the Government of Canada, please accept my best wishes for a memorable and enjoyable celebration.
Prime Minister of Canada | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.918400764465332}", 'metadata': "{'Content-Length': '26278', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4MNKYMQFZ4KCQMNYPBJ3V3SMB2ZF55Y2', 'WARC-Concurrent-To': '<urn:uuid:133275b2-d86e-4088-8889-50198c66d8bf>', 'WARC-Date': datetime.datetime(2021, 2, 27, 9, 49, 16), 'WARC-IP-Address': '216.201.101.58', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:27FF3AQAS7AHQCAAXNEO6PK3GZFKN5HW', 'WARC-Record-ID': '<urn:uuid:2715a45c-cccc-41a4-a721-52fae80325f2>', 'WARC-Target-URI': 'https://cjpac.ca/greetings-from-the-prime-minister/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:299459aa-5404-48f2-beaf-b7c2c8688334>', 'WARC-Truncated': None}", 'previous_word_count': '196', 'url': 'https://cjpac.ca/greetings-from-the-prime-minister/', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-119.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03768026828765869', 'original_id': 'd22acb7a043d39f1050855e091e4ab311ca02973a86b53f92477b941437218cf'} |
Bishop's Message
The root of grievance
on .
Bishop's Message
The title of this article is not the exact term used in the Bible. Rather, Hebrews 12:15 says: “See to it that no one fails to obtain the grace of God; that no ‘root of bitterness’ springs up and causes trouble, and by it many become defiled” (ESV).The root of bitterness is the source of many grievances.
Aggrievement arises out of a sense of injustice. When being unjustly treated, the first taste is bitterness. It is something that makes one wince. When that feeling recoils inward, bitterness is planted and grows a root from which other evils spring.
The fertile ground in which bitterness germinates is a compound of several elements. Rejection, competitive jealousy, and covetousness could have been in Simon (the sorcerer) when he was warned by Peter: “For I see that you are in the gall of bitterness and in the bond of iniquity.” (Acts 8:23, ESV)
As one who earned a living by magic, Simon craved the tremendous power the apostles had when they ministered with signs and wonders. He had just recently been baptised, but was still a babe in spiritual matters; he offered money to the apostles so that he could get that power.Peter could discern that Simon’s heart was not right before God and that what he desired was wickedness (not only in the sense of being evil, but also that it twisted the value and purpose of spiritual power).
Certain habits and traits may make us predisposed to bitterness. Hebrews 12:16 elaborates with the case of Esau. He was already immoral (as in sexual) and unholy (as in godless, profane); God was not a factor in his life. So he was quick to sell his inheritance for just a bowl of soup, simply because he was famished. When he later realised what he had done, the root of bitterness had already sprung up in his heart.
We may not use the word bitterness, as it sounds just like what it tastes. A more politically-correct word is “grievance”. It denotes a sense of being victimised, which is a sure way of gaining sympathy and support.
Grievance has a way of radicalising our views and actions and distorting them out of proportion, like Simon and Esau. We may even justify them by believing that we are really on a holy crusade against those we identify as our enemies.
How do we treat such bitter grievances? For Simon, he immediately repented, upon being rebuked by Peter (Acts 8:22-24). For Esau, however, his bitterness turned to hatred for his brother Jacob (Genesis 27:41). When one leaves bitterness untreated, it has the power to damage its host.
The remedy recommended by Paul in Ephesians 4:31-32 is clear: “Let all bitterness and wrath and anger and clamour and slander be put away from you, along with all malice. Be kind to one another, tenderhearted, forgiving one another, as God in Christ forgave you.” (ESV)
For one who experiences bitterness, the pill to swallow is forgiveness. It is not just a human response of goodwill. The source of this remedy is the way Christ forgives us. It would be ideal if we could always face the person(s) whom we perceived to have grieved us and work out the presenting issues. However, that is not always possible, as in the case of Christ, who spread a blanket of forgiveness over all people so as to cover their many sins, and not just those of His contemporaries, but through all eternity. He wiped away all their sins, and remembers their sins no more.
[Updated on 29 August 2014]
Contact Us
The Methodist Church in Singapore
70 Barker Road, Singapore 309936
+65 64784786
Send Feedback | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '105', 'language_id_whole_page_fasttext': "{'en': 0.9723431468009948}", 'metadata': "{'Content-Length': '29568', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:N4UT4VNLZNWHAXJ7SBFA3GM2MIUE3BAJ', 'WARC-Concurrent-To': '<urn:uuid:2f3d1b11-951f-4f7e-b72d-14b1604512ba>', 'WARC-Date': datetime.datetime(2019, 3, 23, 0, 7, 25), 'WARC-IP-Address': '101.100.204.16', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OK7JMRGFYWD4W5THR6GUEURDUDX3LWFR', 'WARC-Record-ID': '<urn:uuid:f924b9d9-4205-46ea-8513-67360318399e>', 'WARC-Target-URI': 'http://methodist.org.sg/index.php/bishop-s-message?start=56', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ab686526-42a2-4e44-a3e5-8e37f77c95fb>', 'WARC-Truncated': None}", 'previous_word_count': '650', 'url': 'http://methodist.org.sg/index.php/bishop-s-message?start=56', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-13-253-122.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.028623759746551514', 'original_id': 'd42b075115819d5e352953a1e6f306ffd32d5bd0eed79ba3be6ea6c2b5ce60b4'} |
Hardgainers Unite
Finding ways to win the battle to go from scrawny to brawny
January 19, 2006
Not everyone out there is trying to lose weight. There are many scrawny men who've been trying to put on the pounds, but can't. We're here to help. Here are some excerpts of conversations in our forums about how to go from scrawny to brawny.
What about us skinny guys?
Look, I know that weight loss is of a major concern to most people but let's not forget us skinny guys. We have it just as bad as other people, same coin, different side. Im 5' 11" and weigh about 130 pounds. My body doesn't have an ounce of fat on it, I have a well defined body and I feel as if I could look just like some of these guys that I see in these pictures. Where is all the advice about gaining the right weight in the right places. I don't go to a gym because I feel very out of place there. I can't lift as much as other people and having some women watch me lift small amounts of weights makes me want to run. I don't even wear shorts in the summer because of my twiggy legs. Where's the advice that's going to make a difference? Oh sure... eat more food. Do you think our stomachs can hold that much food without throwing up? It's time for us skinny guys to stand up and say "Hey! What about us?" - Northshore71ne
The Best Book for Gaining Weight
Check out the book Scrawny to Brawny for a comprehensive training/nutrition program. Simply eating more won't cut it. You will be eating more, but you need to be eating right. There are guys here in the forum who are on this program. You can find the book at major booksellers. - Ibizan
Eat, Eat, Eat!
It is pretty simple, you need to eat more. What do you want, a get ripped quick pill? Just like the overweight people have to eat less, you need to eat more.
If you can't handle a lot of food in one sitting, eat 8 times a day, every 2 hours. Eat calorie-dense food and you'll gain weight. It may be tough, but it isn't easy for overweight people to lose that weight. - EdChap
Feed Your Muscles
I have exactly the same problem. I used to be 6' 1" and about 143 lbs. I started going to the gym, but no real results came... then one of the trainers took me aside and told me possibly the most obvious and effective way of putting on mass. She said, "You have to eat, and you have to eat a lot." So I did... At first I couldn’t stomach it. So I ate as normal and also used meal replacement powders, which didn’t fill me up as much. It eventually kickstarted my previously non-existent appetite. I have since gone off that and only take pure protein powder after workouts and before bed. My appetite has increased substantially and I make sure I eat constantly throughout the day and combine this with 3-4 gym sessions a week. 8 months later I weigh 182 lbs. And I’m glad to say that it’s basically all been good weight. As much as "eat more" sounds like a terrible and result-free option... it’s the only way you’re going to put on mass. Just be ready to buy new shirts. - ILJF85
Stick it Out
I'd suggest since your stomach is small you could eat oatmeal with rasins, a protein bar or shake and go work out. If you go to the gym, wear long pants and do some weighted squats and the stair climber. That will work those leg muscles. Try to keep in mind everybody has had to start somewhere. I remember being in the weight room, lifting small weights. But now they're medium weights, because I got stronger. I noticed when people at the gym have never seen you before they will tend to look at you just because they haven't seen you before. Go a couple times and after a while they will be used to seeing you. - Tiffy
Go on to the next page for more advice on packing on the pounds...
Helping a Hardgainer
I felt the same way when I started reading these postings. I was stuck on about 160 lbs and I thought I was eating enough good food while working out 4 times a week, but still wasn't putting on pounds. I started taking whey protein shakes 2 times a day...one about 10 a.m. and the other 30 minutes prior or after my evening workout. The shakes are good ways to get protein without stuffing your stomach. Be sure to eat a lot of meals even if they're small so your body doesn't go hungry. Get some healthy snacks and keep them with you all day. My weight gain was really slow, but steady...so keep after it! - Cmlakey
Making a Transformation
I lift with my cousin and he's always been a rail. Nothing he did would add any significant muscle mass to his frame. Last year, he bought the Scrawny to Brawny book and his results have been a night and day difference. He used to be envious of my progress but now the tables are turned since he has no problem staying cut. - Max_Payne
Scrawny to Brawny Workout
I'll have to agree. I'm 34 yrs. old, 5' 8", 130 lbs -- I haven't gained any weight in 18 years. I've been doing the scrawny to brawny workout for about 2 1/2 months, and I've actually seen results. I can feel muscles in my chest getting more dense. Finally, something after all these years has encouraged me to keep working out. - NotKONG
Get packing!
Boy, let me tell you guys, it isn't easy. Just like overweight people, food is the enemy. I have been stuffing myself since I started this 5 week program. It's not about filling your gut constantly with calories, it's more about what you put in it. I believe healthy food will make a huge difference, but again I'm a little confused on what and when. When is the right time to eat more carbs or protein. Before a workout, after a workout? I'm still doing research but again any advice would be extremely helpful. -Northshore71ne
Do you know how a skinny guy can pack on weight? Click here to help these guys out! And if you're looking for weight-gaining advice, show up here on Tuesday, Jan. 24 at 12 p.m. (EST) for a live chat with Men's Health exercise advisor and strength coach Michael Mejia, C.S. C. S., coauthor of Scrawny to Brawny, the one-of a-kind fitness and nutrition program that unlocks the secrets to getting the body you never thought you could have. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '24', 'language_id_whole_page_fasttext': "{'en': 0.9737210273742676}", 'metadata': "{'Content-Length': '121717', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FBSTP67YORE4XUBI3N5RXYQ7B2Y5QD5X', 'WARC-Concurrent-To': '<urn:uuid:a49ef57a-fe02-4ae1-be3e-12e27c51cd38>', 'WARC-Date': datetime.datetime(2017, 3, 25, 15, 44, 53), 'WARC-IP-Address': '104.16.164.154', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:MJV7CYAD5WHIBJZT7YGVNYDS2RGB2TVB', 'WARC-Record-ID': '<urn:uuid:b703217f-2f8d-4f80-823e-25acffcab2eb>', 'WARC-Target-URI': 'http://www.menshealth.com/fitness/tips-for-gaining-weight', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0a847b28-9930-4555-afd5-7c9ce5eeef0f>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1109', 'url': 'http://www.menshealth.com/fitness/tips-for-gaining-weight', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019168615341186523', 'original_id': '2625067360fb98b9789ce0fd7831ab524ae6105709dc7f52da3221c744befccd'} |
From Ekay. From RunAddict Sound. Officially BURN-ADDiCT
About me
BURN-ADDiCT's music taste is very diverse and some times has nothing in common with the style of music he produces; Electronic Dance Music (EDM). In 2014, RunAddict Sound was born; RAS is the independent record label founded by BURN-ADDiCT and hip-hop artist DollR (Mluleki Mtsweni). Misty Thoughts was released as the first digital album in 2014, making it BURN-ADDiCT's first compilation release; containing some of his earlier work (which was basically tribal house and some experimental work). 2015 was the year of release of the second compilation album titled "This Is Not A Sentence"; this was mostly progressive house and electronica. As you probably can already tell; The genre does not matter, what matters is the emotion of the song and the manipulation of energies of the listener. BURN-ADDiCT had a shift in music production to produce genres surrounding progressive house and dubstep. Headache is a single released by BURN-ADDiCT, this rather fictional, dubstep song was the first of BURN-ADDiCT's songs to be played on one of South African national radios.
*this space is left intentionally blank to make way for the achievements to come in the future*
well... that's that for now | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9607640504837036}", 'metadata': "{'Content-Length': '12985', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CJL3AL5DEYIHPRNO26ZQ76TH4RSU4LJK', 'WARC-Concurrent-To': '<urn:uuid:7f12ec38-70a6-4cf5-b075-7a6c1d0d894b>', 'WARC-Date': datetime.datetime(2019, 5, 19, 9, 26, 8), 'WARC-IP-Address': '104.27.141.45', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:H23E3S73GBHFRGHDBRK3L4WFZ2TTZKJC', 'WARC-Record-ID': '<urn:uuid:e0e77b2b-1d6f-4211-b9b2-36daec8c1bb9>', 'WARC-Target-URI': 'http://www.burn-addict.co.za/bio.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:329395b7-e5e3-4217-bb04-1cef688a32f5>', 'WARC-Truncated': None}", 'previous_word_count': '199', 'url': 'http://www.burn-addict.co.za/bio.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-99-168-2.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3992299437522888', 'original_id': '08aa5b8ae5afc996de04aee3e0d1e93da6c844e7b46469023da562bdc050001a'} |
Skip to main content
Job Interview Tips
Your Posture Speaks Louder than Words
By Paulo Vargas on June 6, 2015
While school taught many of us how to crunch numbers and write well, there are scant subjects on how to convey confidence.
Conveying confidence isn't just about looking like you can do the job, it's also portraying the best image you have of yourself. The more confident you are and the more you let yourself shine through, the more people will trust you and want to be around you.
There are many mental and emotional strategies you can use to boost your confidence just like there are many ways to convey confidence with your body.
Try out these kinds of body language for size and slowly fake it til you make it.
1. Power posing
[caption id="attachment_2229" align="aligncenter" width="500"]Overcome your nerves by striking a confident pose Overcome your nerves by striking a confident pose[/caption]
According to social psychologist Amy Cuddy, posing in stances associated with confidence and power helps do away with nerves.
In a study Cuddy conducted, she found physiological differences between a group of people who power posed for two minutes and people who did not power pose.
Those who held their heads high, puffed their chest out, and propped their arms on their hips experienced a 25% decrease in cortisol levels. Cortisol is also known as the stress hormone.
Power-posers also had an 8% increase in testosterone.
“Our non-verbals govern how we think and feel about ourselves. Our bodies change our minds,” says Cuddy.
Here are more power poses to try.
2. Avoid slouching
[caption id="attachment_2226" align="aligncenter" width="500"]Match your look with your resume Bad for your prospects, bad for your back[/caption]
Your strict teachers in elementary school are right. Slouching conveys lack of confidence, disinterest, and low self-esteem. It is the opposite of power posing.
People who slouch noticeably look smaller because of the curved back and the drooping shoulders. Looking small is not what you want in your job interview.
Instead, lift the crown of your head, drop your shoulders, and lift your sternum. You are a mountain and you are going to get that job.
3. First impressions last and the small things count
[caption id="attachment_2227" align="aligncenter" width="500"]Look the part Look the part[/caption]
Your job interview actually starts from the moment you enter a company's lobby. Everyone you meet on your way affects you chances of getting the job. Instead of spending your time frantically searching for your resume in a folder, you should be calm and collected. The guy standing next to you in the elevator may be your interviewer.
An interview is like going on a date. You want to impress the person you're with, without coming off too strong.
When meeting your interviewer, a firm handshake goes a long way. Never underestimate the power of good eye contact, but realize the difference between an intimidating stare and a good gaze.
According to body language consultant and author of the Definitive Book of Body Language Allan Pease, most cultures accept a gaze that meets another person's about 60% to 70% of the time. That means holding a look in the eye, then shifting to another part of the face.
Mirroring, or covertly imitating the posture and action of the person you're talking to, is also good way to get on their good side.
4. Don't sweat it
[caption id="attachment_2228" align="aligncenter" width="500"]Loud is not necessarily confident, quiet is not timid Loud is not necessarily confident, quiet is not necessarily being timid[/caption]
Successfully getting a company's attention can be as easy as fixing your resume. However, interviews are completely different. For fresh grads, there are plenty of advice we can give you. What to wear, what to say, or what to do. But no matter the kind of preparation, there are things only you can master, like your nerves.
Nerves are an applicant's worst enemy. Even the best of us fall victim to pitfalls that involve sweaty palms, cracked voice, and slouched shoulders. Even with an impressive resume, applicants are turned down because of their lack of confidence, often betrayed by their body language.
Prepare enough but also know when it's time to breathe and let your preparations work for you.
Sometimes, the best preparations become your own undoing. If you focus on every little details, you can get distracted to what's really important.
Try all these techniques out one by one and see how people react to you as you change. Observe anything worth sharing? Let us know in the comments below. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '20', 'language_id_whole_page_fasttext': "{'en': 0.9450250864028932}", 'metadata': "{'Content-Length': '28791', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WBKAL6H6V3EV3MAFAIXHWW54YZEDX3I5', 'WARC-Concurrent-To': '<urn:uuid:5cab82f0-f393-4f96-9de3-deb9f58193b9>', 'WARC-Date': datetime.datetime(2018, 7, 17, 5, 31, 34), 'WARC-IP-Address': '104.25.152.20', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4D45RGFMGGDZ4LGJTFKGXIQLNEU4UVXH', 'WARC-Record-ID': '<urn:uuid:89cb5c95-786b-4f69-80df-774548675461>', 'WARC-Target-URI': 'https://www.kalibrr.com/advice/2015/06/your-posture-speaks-louder-than-words', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5c7f1b44-dbfa-4968-8a6d-b8e847c7338a>', 'WARC-Truncated': None}", 'previous_word_count': '747', 'url': 'https://www.kalibrr.com/advice/2015/06/your-posture-speaks-louder-than-words', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-201-248.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11075425148010254', 'original_id': '565427fb59a7ef529f5b686b65f8989d768a116f5ef72edd76d43cd2cf30f3ae'} |
\section{Compact Space is Sigma-Compact}
Tags: Compact Spaces, Sigma-Compact Spaces
\begin{theorem}
Every compact space is $\sigma$-compact.
\end{theorem}
\begin{proof}
By definition, a $\sigma$-compact space is the union of countably many compact sets.
A compact space is the union of exactly one compact space.
Hence the result.
{{qed}}
\end{proof}
| math_pile | {'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '36269f85691d249730015fa5c58aef55ccf4a592ac117ccde1ea0e31b1a15dd7'} |
There has been much talk about how the gaming world is too toxic, too negative, too full of anger and rage. Jimquisition argues there might be just the right amount of it. The issue is in how it's used.
Anger is a powerful weapon, but like all powerful things, it must be handled with care. Venom can be harnessed to our benefit, provided we be careful not to let it spill into our own faces.
Jim Sterling is The Escapist's reviews editor and produces Movie Defense Force and Jim & Yahtzee's Rhymedown Spectacular, alongside Jimquisition. He also hosts The Dismal Jesters podcast, and does videos on his stupid YouTube channel. He wears good quality ties, not great, but nice enough.
You can see the whole panel with Jim and more in Escapist Expo. | mini_pile | {'original_id': 'b404c376fbea717e20ca4c098849a8bb71bd6c997f62c23284f9dbd4af438f0f'} |
Senate Votes to Extend An AIDS Drug Effort
Published: September 30, 1988
The Senate today approved a six-month extension of a Federal program that provides the drug AZT to victims of AIDS who cannot afford the costly treatment.
The program will expire Friday if the extension is not passed by the House and signed by President Reagan by the end of the day.
''This is an emergency measure, absolutely essential, literally a matter of life and death,'' said Senator Edward M. Kennedy, Democrat of Massachusetts.
The bill, approved by voice vote, authorizes $15 million for programs that provide azidothymidine, or AZT, to those AIDS victims who do not have private health insurance who cannot afford to pay themselves but who are not poor enough to qualify for Medicaid assistance. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.956934690475464}", 'metadata': "{'Content-Length': '32656', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:V3A5PMUB4VQAYN5K253J43ECDVPO2WPZ', 'WARC-Concurrent-To': '<urn:uuid:a620641a-4bd5-488d-a5e9-8a78680891b0>', 'WARC-Date': datetime.datetime(2013, 12, 20, 7, 43, 24), 'WARC-IP-Address': '170.149.168.130', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:L6TSS2VVJLLHJRWR523SUBH4JRHRIJNL', 'WARC-Record-ID': '<urn:uuid:3e94d513-92fd-4c47-abdc-846d93077fb0>', 'WARC-Target-URI': 'http://www.nytimes.com/1988/09/30/us/senate-votes-to-extend-an-aids-drug-effort.html?src=pm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:adfa0b06-87d9-4bcc-b589-61a92db49401>', 'WARC-Truncated': None}", 'previous_word_count': '129', 'url': 'http://www.nytimes.com/1988/09/30/us/senate-votes-to-extend-an-aids-drug-effort.html?src=pm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.027604520320892334', 'original_id': '81581297bd13f55549216a944a7d8572136aeb66065c7c81420ac7a038825909'} |
WoW: GWJ Alliance Guild Primer
Just applied for a transfer of my lvl 80 mage from Tanaris to Blackhand. Hopefully it will go through soon.
Well, you guys have sold me. I've been playing WAR for the last year but that game is in very bad shape, so bad I believe it will never recover. I think I'm going to reactivate my account and I'm hoping you guys will have a spot for me. I've been a long time member of GWJ forum but mostly a lurker.
Just a question on classes because I always tend to play the class that is having the biggest issues. I have a lvl 70 Shaman on Blackhand still, elemental spec'd, but I also have a 70 Priest and Hunter on another server that I can transfer. I know the standard response is play what you want but I would just like to know, for someone that likes to PvP a lot and casually raid, which class is in decent shape with all the changes and which should I maybe steer clear of? I loved playing my shaman in TBC and raided a ton with him, usually topping the DPS charts, but I've read that elemental is not as good a caster dps in the expansion. I'm also interested in maybe trying to the Death Knight. Never played a tank in WoW but I do like tanking.
I would love some input from you guys. Shaman, Priest, Hunter, Death Knight? Out of those 4, which is the more balanced/in good shape for PvP and raiding.
We have a number of DKs... But with the upcoming 3.2 changes you would have the... advantage? Of playing your DK after the "nerfs" to the class, and not knowing any better. Otherwise, shaman, priest, or hunter, all three classes are pretty good at the moment. Shaman are getting some nice UI upgrades with the totem bar, and there's always a need for another Heroism bot. I'll let other, more knowledgeable folk go into greater detail.
NSMike wrote:
Heroism + Elemental spec is why I loved my shaman. Our raiding group consisted of myself, elemental shaman with totem of wrath, boomkin, scorch mage and 2 others depending on the situation. But yeah, you can imagine the caster dps we could generate with that combination of totem of wrath, boomkin aura, scorch debuff and then add in heroism and you could just watch our group climb the DPS charts (I also had a friend who was discipline priest and he would give me power infusion I <3 1 second lightning bolts). Once we got fights down really well, I would ninja-activate my heroism ability and usually either the boomkin or the mage would die because they would get aggro. LOL
Play what you want! As far as the guild's needs, we need good caster DPS imho.
Of the classes you mentioned:
Shaman - I believe no one's main toon is main-spec Ele. My alt is, and I enjoy it, but I raid on my Ret Pally.
Priest - we have a number of Priest healers, but NO raiding shadow priests atm. Well, I think we have one alt that raids 10s a little, but we never have any spriests in 25s.
Hunters - we have more Hunters than DKs, but I can't count that high.
DKs - everyone and their mom has one. Strangely, we go from having 4 in a 25-man, to 2 one week, to occasionally one. But I wouldn't list DKs, melée, or plate among our "needs".
Thanks Fed. Elemental shaman it is.
I'm considering getting back in and would have to roll a new character to play with GWJ (my old one is horde on a PvP server). Since I'd have to either start from the beginning or roll a death knight, and I'm assuming I'd have to do most of my leveling solo, do people have any suggestions on classes? The only character I've played past 15 or so is a Warlock, so I'd prefer a non-cloth class for a change of pace.
I don't have much to add to my previous thoughts. Welcome aboard!
How bad is it to level a paladin? I tried at launch and it was painfully slow, but that was a long, long time ago.
I levelled mine to about 50 in vanilla, and it was very boring. I didn't really realize HOW boring it was compared to other classes until much later, though.
AFAIK it's still just Judgement, auto-attack, and Consecrate (if your mana allows for it) until get get enough talent points to get Art of War, for instant Exorcisms (Exo can now be used on any target, but has a cast time without an Art of War Proc).
Agree with Fed, it's boring, but easy. 1-70 for me in less than a month, 70-80 in about two weeks.
How about warriors?
Druids seem like they would be fun, but I'd be looking at the same shapechange models for 80 levels. Are there flavors of druid that aren't shifted all the time?
I may be a little biased as my main is a druid, but they're probably the single most versatile class in the game. There's no other class that can fulfill every role the game has to offer, and do them all well. If you get bored of your druid, a new class is a talent respec away, so the long term sustainability is excellent.
Some of the best parts about being a druid?
-Insta-cast flight form. Got a hordie sneaking up on you? Jump off the nearest cliff, switch to flight form in mid-air and watch him fall to his death if he's dumb enough to follow.
- Many quests where you have to pick up items off the ground can be done in flight form, so no killing 37 mobs to pick up one relic, just swoop down, pick it up while they beat on you a bit and fly out of range. Collection quests are FAST.
- Stealth past everything! Wanna solo Anzu for a shot at the Raven God mount? You're the ONLY class that can do it.
Oh, and there are different feral models in the game now. If you get bored with one, just go to the barber and change your hair color.
Seriously, I've played many classes and druids are by far the most fun.
Question! I have a level 80 Rogue decked out in early-dungeon blues. I've been a hordie for a long time, but my guild has fallen apart and I'd love the chance to actually see some of this Lich King content before the next expansion. With the faction change I could now be of use to the Alliance ...
Do the GWJers on Blackhand need a Rogue? Do folks do 5-mans anymore? Etc, etc?
There are quite a few five mans going on on a regular basis with the EoC and daily heroic quest changes. We don't have many rogues at the moment I think, but we don't worry much about how many of a class we have (aside from making snide snarky comments once in a while :-D).
w00tz. After great experiences with my new Blackhand lowbie I'm definitely moving my main over. Yay!
I've been away from the game for about six months and I'm currently downloading the updates...I'll see you on Blackhand soon hopefully.
I've been soloing on Suramar for a while since my guild disbanded some time ago. I wouldn't mind some casual dungeon runs or raiding.
What's the current state of the GWJ guild? What's the connection to the server from around the flyover country?
My toons:
Shaerlas - 80 Death Knight
Tarand - 70 Night Elf Rogue
Raelic - 73 Dranei Shaman
Alladriel - 72 Dranei Mage
Davian - 71 Night Elf Druid
Malich - 60 Tauren Hunter
Kaldieb - 70 Human Paladin
I played the DK in beta, had to make one in retail and it was so much fun it was the only one i leveled to 80.
Ive been on for a few days now and haven't noticed noticed the officers who are named in this thread. I'll keep trying, but FYI my toon is Cruunch.
crunchy wrote:
Just do a "/who GWJ" in game and send a tell to anyone in the list. They'll be able to let you know if an officer is online, and there usually is, at least during evening and weekend hours. A lot of the officers play alts, so if you're waiting to see specific names, it could take a while
crunchy wrote:
A /who GWJ should give you a list of guild members online. Just ask any of them to find an officer for you -- there's almost always one on at any given time.
The GWJ guild is healthy and alive, although we seem to be a bit short on raiders at the moment thanks to typical summer vacations, etc. That said, we still field at least a 10 man run or two a current tier content every week, which are organized in the threads you see here in the forum.
Also FYI, don't insult journey. Or do, it leads to much hilarity, a temporary gkick, and wiping soda off my monitor.
Sticky cleaned and updated
I've never been this happy to be called a fairy princess....
Err.. that doesn't sound right..
See you in the realm
Hi all, I've been having a great time hanging around in guild chat with people so far - hopefully I'll be high enough level to participate in fun stuff with everyone soon.
Also, I'm very glad to see the new guild band listed officially.
Hey all,
Just joined you over the weekend and looking forward to it. Did a server and faction needed a support group
Character's name is Belmirus, so look me up if anyone needs help or wants to group.
Thanks for all the info here. Have to admit I was late to reading it because I was drawn in more by Mr. Zenke and others.
But I'll do my homework, promise!
Just wanted to say hello to everyone. I also did the server and faction transfer tonight (after listening to Darren and Michael talk about the guild in a recent podcast) with my freshly dinged 80 Priest. I'm willing to help as needed and will be on in the coming weeks working on badges etc... Looking forward to meeting you all.
Hypothetically, if someone was to want to get in on some dungeon runs (5/10/25 man, whatever), what would be the class least represented?
Been playing horde side for a long time and have a few 80s. I'm recently on WoW hiatus, but the itch is coming back. Probably my best geared 80 is a feral druid (more tank focused than dps), but I have decently geared shaman (Healing or Elemental) and Priest (Disc currently) as well as a few other 80s in pretty crap gear.
Normally, I'd just say "bring my favorite", but I love all my children equally. Are there any roles that typically are needed more than others?
Normally, I'd just say "bring my favorite"
That's the standard guild line too.
Hopefully someone will correct me if I'm wrong, but I think our current representation of the class/spec combos you listed is as follows:
Feral druid: one active raider, does both tank and DPS in equal amounts.
Shaman: one active resto/elemental who runs resto more often, one active enhance, a few less actively played toons/alts of various specs.
Healing priest: two to three active, quite a few less actively played toons and alts. Disc or holy I don't really know, I'm just a dirty DPSer.
Obviously this changes quite often though as people join or leave or decide to make an alt their new main. So really you should just bring whatever you like playing the most. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '71', 'language_id_whole_page_fasttext': "{'en': 0.9741658568382264}", 'metadata': "{'Content-Length': '111960', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WS5URLFGD3XGFQDBESOZY3V4MRMUHUH7', 'WARC-Concurrent-To': '<urn:uuid:6c92d0bd-ff5a-4777-9e92-d82e10d8afbc>', 'WARC-Date': datetime.datetime(2019, 4, 24, 5, 54), 'WARC-IP-Address': '104.25.45.6', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:UMNRY7LCME4ICVNFLU24E5TYPFJE74MI', 'WARC-Record-ID': '<urn:uuid:d983e6ee-e0a9-4fb6-834e-43acef24b598>', 'WARC-Target-URI': 'https://www.gamerswithjobs.com/comment/6127646', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:54bd2470-b512-4ecb-ba9c-af978ac7a753>', 'WARC-Truncated': None}", 'previous_word_count': '2055', 'url': 'https://www.gamerswithjobs.com/comment/6127646', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-93-200-49.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04370534420013428', 'original_id': '8a9e08b344fd73974426a8a30d5b351b7f7aca921d95ffcc4ba89e9d705f50a4'} |
Allah Controls the World
1. What does Al Qadar mean?
Al Qadar means ‘Divine fate’ or ‘Destiny’.
2. List the four aspects of Al Qadar. 1. Al Ilm – Divine Knowledge: Allah first knows what will happen
2. Al Kitabah – Written Destiny: The angels write what will happen
3. Al Mashee’ah – Divine Will: Allah wills and permits what is written to happen when its time comes.
4. Al Khalq: Creation: Allah creates and makes His Will happen in the real world.
3. List the main three actions in relation to humans. List at least one example for each of these actions:
a) Action: Actions within us
Example: Blood circulation, heartbeats etc.
b) Action: Actions upon us
Example: Weather, accidents
c) Action: Actions from us
Example: Praying, helping or harming others
4. Describe briefly four benefits of the belief in Al Qadar:
• Believers in Al Qadar receive Allah’s mercy
• Believing in Al Qadar teaches acceptance of pains and courage in times of calamities
• It brings contentment to the believers’ hearts
• Believing in Al Qadar protects the Believers from social diseases such as envy, jealousy, suicidal tendencies, drug addiction etc.
2. Related Text: Identify and write the translation of the hadeeth on patience and perseverance:
“The attitude of the believer is amazing. All of his matters are righteous. This is only for the believer. If a joy is brought to him, he thanks Allah for it. This is better for him. If a calamity befalls him, he is patient. This is also good for him”.
3. Imagine someone approaches you claiming that man has no free will. “If God has already ordained what I will do, I have no free will”, he claims. “God has already chosen my path”. How would you respond? Write a convincing answer to this man’s claim that man has no free will.
This is far from truth. The belief in Al Qadar does not mean that we are passive individuals who have no part to play in our lives. Al Qadar does not prevent a person from exercising his free will to choose a course of action. Allah does not force people to do anything. He only encourages His servants to do the good and avoid the bad. It is entirely up to the individual as to whether he or she chooses to obey or disobey Him. Allah gave man free will to choose his actions, whether good or bad.
2 thoughts on “Allah Controls the World
1. Assalam-o-Alaikum
I need notes for Uloom-ul-Hadeeth and What is Fiqh What is Shariah?
Please do the needful if anyone have
Feel Free to Comment and Share Your Ideas :)
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '27', 'language_id_whole_page_fasttext': "{'en': 0.8989024758338928}", 'metadata': "{'Content-Length': '184844', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:V3P7Y4YLAOBPN57PJPCMJV5BT5XFS5OU', 'WARC-Concurrent-To': '<urn:uuid:d106bfaf-5441-421a-87e4-b3f345e152aa>', 'WARC-Date': datetime.datetime(2019, 4, 20, 14, 32, 6), 'WARC-IP-Address': '192.0.78.13', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:HYQPZL4W7M65X4EIA76ME3WK2ITX3JKU', 'WARC-Record-ID': '<urn:uuid:f650e76e-aed4-42bf-a8c8-262b89babc4a>', 'WARC-Target-URI': 'https://muqith.wordpress.com/2017/09/19/allah-controls-the-world/?shared=email&msg=fail', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1db2a022-605e-43b3-9acf-ed162fb772af>', 'WARC-Truncated': None}", 'previous_word_count': '487', 'url': 'https://muqith.wordpress.com/2017/09/19/allah-controls-the-world/?shared=email&msg=fail', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.13803541660308838', 'original_id': '91afbdf03ac77f4795a84e73034bd86834273d7a33ab463ac36a6421cee34755'} |
Case: 18-11578 Document: 00515421654 Page: 1 Date Filed: 05/19/2020
IN THE UNITED STATES COURT OF APPEALS
FOR THE FIFTH CIRCUIT
United States Court of Appeals
Fifth Circuit
FILED
No. 18-11578 May 19, 2020
Lyle W. Cayce
UNITED STATES OF AMERICA, Clerk
Plaintiff - Appellee
v.
GILBERTO GOMEZ,
Defendant - Appellant
Appeal from the United States District Court
for the Northern District of Texas
Before HIGGINBOTHAM, STEWART, and ENGELHARDT, Circuit Judges.
PATRICK E. HIGGINBOTHAM, Circuit Judge:
In 2017, a jury convicted Appellant Gilberto Gomez of drug-trafficking
and firearms offenses. His first appeal to this Court resulted in a resentencing
proceeding at which his term of imprisonment was reduced by nearly 200
months. Gomez now raises two challenges to his revised sentence. First, he
argues that the First Step Act of 2018 invalidated the 25-year mandatory-
minimum sentence he received for one of his firearms offenses. Second, he
contends that the district court erred by failing to orally pronounce the special
conditions of supervised release that it later imposed in his written judgment.
Finding no error, we affirm.
Case: 18-11578 Document: 00515421654 Page: 2 Date Filed: 05/19/2020
No. 18-11578
I.
On a tip from a confidential informant in November 2015, the Dallas
Police Department initiated an undercover investigation of Appellant Gilberto
Gomez and his co-defendant Felix Cantu. The investigation revealed evidence
that Cantu was selling methamphetamine at Gomez’s direction, and that
Gomez was distributing other drugs, including cocaine and marijuana, in
addition to methamphetamine. A March 2016 search of Gomez’s residence
turned up large amounts of cash, drug paraphernalia, “bags of marijuana,
cocaine, methamphetamine, [and] alprazolam pills,” and seven firearms.
Gomez was indicted on six offenses: conspiracy to possess with intent to
distribute methamphetamine (count one); possession with intent to distribute
methamphetamine, cocaine, and marijuana (counts two, four, and seven,
respectively); and two counts of possession of a firearm in furtherance of a drug
trafficking crime (counts three and five).
The two firearm counts were charged under separate subsections of 18
U.S.C. § 924(c)(1), which prohibits the use, carry, or possession of a firearm in
furtherance of a drug trafficking crime or a crime of violence. Count three was
charged under § 924(c)(1)(A)(i), which imposes a five-year mandatory-
minimum sentence for a first-time offense. Count five was charged under
§ 924(c)(1)(C)(i), which, at the time, imposed a 25-year mandatory-minimum
sentence for any “second or subsequent conviction under this section.” 1 Gomez
had not been convicted of a weapons offense in any prior prosecution. Instead,
the Government used Gomez’s simultaneous conviction on count three as the
predicate for imposing § 924(c)(1)(C)(i)’s repeat-offender enhancement on count
five. At the time, it was common practice to “stack” simultaneous § 924(c)(1)
offenses by charging one as a first-time offense and all others as successive. In
1 18 U.S.C. § 924(c)(1)(C)(i) (2006), amended by First Step Act of 2018, Pub. L. No.
115-391, § 403, 132 Stat. 5194, 5221–22.
2
Case: 18-11578 Document: 00515421654 Page: 3 Date Filed: 05/19/2020
No. 18-11578
fact, this approach had been endorsed by the Supreme Court in 1993 when it
held that a defendant charged simultaneously with multiple § 924(c)(1)
offenses was subject to the enhanced repeat-offender minimum on all but the
first count. 2
Gomez proceeded to trial and was convicted on all counts in March 2017.
The district court sentenced him to a total of 652 months’ imprisonment. The
court also imposed a five-year term of supervised release (“TSR”) “subject to
the standard conditions provided by the Sentencing Commission as well as the
mandatory conditions.” However, Gomez’s written judgment also included four
special conditions of supervised release that had not been mentioned at
sentencing or in his presentence investigation report (“PSR”).
Gomez appealed, arguing that the district court had sentenced him
under the erroneous belief that it could not vary downward on the drug counts
despite considering his Guidelines range “excessive.” We agreed, and in
September 2018 we issued a limited remand for the district court to reconsider
Gomez’s sentence. 3 On November 26, 2018, the district court resentenced
Gomez to the statutory minimum term of 480 months’ imprisonment. In
addition to reduced terms on the drug charges, this sentence included the
mandatory minimum of 60 months on Gomez’s first firearm count and a
consecutive mandatory-minimum sentence of 300 months on the second. The
court also re-imposed a five-year TSR “subject to the same terms and
conditions as previously stated” in Gomez’s first judgment. Gomez’s revised
judgment listed the same four special conditions as the original.
Gomez filed this appeal on December 5, 2018, raising two objections to
his revised sentence. First, he argues that the First Step Act of 2018
invalidated the 25-year mandatory-minimum sentence he received for the
2 Deal v. United States, 508 U.S. 129, 131–33 (1993).
3 United States v. Gomez, 905 F.3d 347 (5th Cir. 2018).
3
Case: 18-11578 Document: 00515421654 Page: 4 Date Filed: 05/19/2020
No. 18-11578
successive firearm violation. Second, Gomez argues that the district court
erred by imposing special conditions of supervised release in his written
judgment without orally pronouncing them at sentencing.
II.
A.
The First Step Act of 2018 (the “Act”) was signed into law on December
21, 2018, “introducing a number of criminal justice reforms.” 4 Among those
reforms, § 403 of the Act amended 18 U.S.C. § 924(c)(1)(C)(i), the provision that
imposes a 25-year minimum sentence for repeat firearms offenders, to reduce
the severity of “stacked” charges. Before the Act, the 25-year minimum was
triggered by any “second or subsequent conviction under this subsection.” 5
Now, it is triggered only by a repeat “violation . . . that occurs after a prior
conviction under this subsection has become final.” 6 In other words, the 25-
year repeat-offender minimum no longer applies where a defendant is charged
simultaneously with multiple § 924(c)(1) offenses. Now, to trigger the 25-year
minimum, the defendant must have been convicted of a § 924(c)(1) offense in a
prior, separate prosecution. 7
Although § 403 of the Act is not retroactive, Gomez urges us to construe
it as applying to defendants who, like him, were sentenced before December
21, 2018 but whose cases remained pending on direct appeal on that date. 8
4 United States v. Hegwood, 934 F.3d 414, 416 (5th Cir. 2019).
5 18 U.S.C. § 924(c)(1)(C)(i) (2006), amended by First Step Act § 403.
6 First Step Act § 403.
7 See United States v. Jordan, 952 F.3d 160, 171 (4th Cir. 2020).
8 The parties dispute when Gomez’s sentence was “imposed” for purposes of our First
Step Act analysis: the date of the original sentencing hearing (June 19, 2017), or the date of
the resentencing hearing (November 26, 2018). We need not decide the issue because both
dates are prior to the Act’s enactment.
4
Case: 18-11578 Document: 00515421654 Page: 5 Date Filed: 05/19/2020
No. 18-11578
Because this is “a question of pure statutory construction,” our review is de
novo. 9
B.
It is undisputed that if Gomez were charged with the same offenses today
as he was in 2016, he would not face the enhanced minimum sentence for
repeat firearm offenders. Instead, his two weapons counts would each carry a
mandatory minimum of five years. 10 While we recognize the grave effect of this
infelicitous timing, we find no support in the statute or the case law for
applying § 403 retroactively to cases pending on direct appeal on the First Step
Act’s effective date.
First and most importantly, the Act itself plainly states that § 403 is not
retroactive: It applies to an offense committed before its December 21, 2018
effective date only “if a sentence for the offense ha[d] not been imposed as of
such date.” 11 A sentence is “imposed” when the district court pronounces it, not
when the defendant exhausts his appeals. 12 Second, all other circuit courts to
consider Gomez’s argument—six at the time of this writing—have rejected it,
“uniformly support[ing]” our reading of the statute. 13
9 United States v. Ahmad, 101 F.3d 386, 389 (5th Cir. 1996); see also United States v.
Snyder, 930 F.2d 1090, 1093 (5th Cir. 1991) (“We review de novo questions of statutory
construction.”).
10 See Jordan, 952 F.3d at 171.
11 § 403(b), 132 Stat. at 5222; see United States v. Carabali-Diaz, No. 19-20261, 2020
WL 1861972, at *1 (5th Cir. Apr. 13, 2020) (unpublished) (per curiam).
12 Grene v. United States, 460 F.2d 580, 582 (5th Cir. 1972); see Jordan, 952 F.3d at
172; see also United States v. Gonzalez, 949 F.3d 30, 42 (1st Cir. 2020) (“A sentence is
customarily understood to be imposed either when it is pronounced or entered in the trial
court, regardless of subsequent appeals.”).
As the Government points out, even if the Act were ambiguous about retroactivity, the
general federal saving statute would preclude relief. See 1 U.S.C. § 109 (providing that “[t]he
repeal of any statute shall not have the effect to release or extinguish any penalty . . . incurred
under such statute, unless the repealing Act shall so expressly provide . . . .”); see also Dorsey
v. United States, 567 U.S. 260, 272 (2012) (explaining that “the word ‘repeal’ applies when a
new statute simply diminishes the penalties that the older statute set forth”).
13 Jordan, 952 F.3d at 172; see id. at 163 (“§ 403 of the First Step Act does not apply
retroactively to cases pending on direct appeal when it was enacted.”); United States v. Cruz-
5
Case: 18-11578 Document: 00515421654 Page: 6 Date Filed: 05/19/2020
No. 18-11578
Finally, we see no merit in Gomez’s claim that § 403 is “analogous to . . .
a clarifying amendment to the United States Sentencing Guidelines,” which
“may be considered on direct appeal even when [it was] not effective at the time
of sentencing.” 14 To state the obvious, § 924(c)(1) is a statute, not a Sentencing
Guideline, and Gomez cites no authority for extending conventions of
Guidelines interpretation to statutes. Instead, he relies on the fact that § 403
is titled “Clarification of Section 924(c) of Title 18, United States Code.” 15 In
his view, the word “clarification” evinces congressional intent to make § 403,
like clarifying Guidelines amendments, retroactive to cases on direct appeal.
However, it is well established that “the heading of a section cannot limit the
plain meaning of the text,” which in this case refutes any implication of
retroactivity. 16 Despite its title, § 403 did more than clarify existing law; it
abrogated Supreme Court precedent that had endorsed the stacking of
§ 924(c)(1)(C)(i) sentences. 17
Rivera, 954 F.3d 410, 412 (1st Cir. 2020) (declining a defendant’s invitation to “read [§ 403(b)]
to mean the amendment applies to cases (like his) that were pending on direct review, and
so were not final, when the Act was passed”); United States v. Richardson, 948 F.3d 733, 737
(6th Cir. 2020) (holding that a defendant resentenced before December 21, 2018 “cannot
benefit from the First Step Act”); United States v. Hodge, 948 F.3d 160, 162 (3d Cir. 2020)
(rejecting the argument “that any defendant awaiting resentencing when the First Step Act
became law may benefit from the reduced § 924(c) mandatory minimum”); United States v.
Hamilton, No. 17-10490, 2020 WL 362943, at *2 (9th Cir. Jan. 22, 2020) (unpublished) (per
curiam) (“Section 403 of the First Step Act excludes [a case pending on direct appeal] because
[the defendant’s] sentence has already been ‘imposed.’”); United States v. Garcia, No. 17-
13992, 2019 WL 7503482, at *1 (11th Cir. July 9, 2019) (unpublished) (per curiam)
(“[A]lthough [the defendant’s] sentence has not yet become final because it has not yet been
affirmed on appeal, the date that matters” for purposes of § 403 “is the one on which the
district court sentenced him.”).
14 United States v. Meza, 250 F. App’x 651, 655 (5th Cir. 2007) (unpublished) (per
curiam) (citing United States v. Anderson, 5 F.3d 795, 802 (5th Cir. 1993)) (“Amendments to
the guidelines and their commentary intended only to clarify, rather than effect substantive
changes, may be considered even if not effective at the time of the commission of the offense
or at the time of sentencing.”).
15 § 403, 132 Stat. at 5222 (emphasis added).
16 Bhd. of R.R. Trainmen v. Balt. & O.R. Co., 331 U.S. 519, 528–29 (1947); see United
States v. Johnson, 632 F.3d 912, 924 (5th Cir. 2011).
17 See Richardson, 948 F.3d 733, 748 (rejecting a similar argument on the ground that
the Act “changed the law rather than clarified what the law always meant”); see also United
6
Case: 18-11578 Document: 00515421654 Page: 7 Date Filed: 05/19/2020
No. 18-11578
For all these reasons, we reject Gomez’s reading of the statute and
instead join our sister circuits in holding that § 403 of the Act affords no relief
to defendants whose cases were pending on direct appeal on the law’s
December 21, 2018 effective date. The date that matters in the § 403 inquiry
is when the district court imposed the defendant’s sentence—not when the
defendant exhausted his appeals.
III.
A.
Gomez next argues that the district court erred by imposing special
conditions of supervised release in his written judgment without orally
pronouncing them at his resentencing hearing. The district court’s obligation
to orally pronounce its sentence is grounded in the defendant’s right to be
present at sentencing, which in turn is derived from the Fifth Amendment’s
Due Process Clause. 18 We have long recognized that the oral-pronouncement
requirement applies to certain conditions of supervised release as well as to
custodial sentences. 19 Our notice-based method for determining the
appropriate standard of review has also remained consistent. If the defendant
had no opportunity to object to the unpronounced conditions in the district
court, we review for abuse of discretion; 20 if he had the opportunity but failed
to object, plain error review applies. 21
States v. Meehan, 798 F. App’x 739, 741 (3d Cir. 2020) (unpublished) (per curiam) (“[B]ecause
Congress made clear in § 403(b) that § 403(a) of the First Step Act applies only to defendants
who had not been sentenced as of the date of enactment, the use of the term ‘clarification’ in
§ 403’s heading is not relevant to the retroactivity determination.”).
18 See United States v. Gagnon, 470 U.S. 522, 526 (1985) (per curiam).
19 See United States v. Bigelow, 462 F.3d 378, 381 (5th Cir. 2006).
20 United States v. Mudd, 685 F.3d 473, 480 (5th Cir. 2012).
21 United States v. Huor, 852 F.3d 392, 398 (5th Cir. 2017). Under the four-prong
framework of plain-error review, a defendant must demonstrate (1) an error that (2) is “clear
or obvious” and that (3) “affected [his] substantial rights.” Puckett v. United States, 556 U.S.
129, 135 (2009). If the first three prongs are satisfied, we may exercise our discretion to
correct the error only if it (4) “seriously affects the fairness, integrity or public reputation of
7
Case: 18-11578 Document: 00515421654 Page: 8 Date Filed: 05/19/2020
No. 18-11578
Just recently, however, our en banc Court in United States v. Diggles
established a new framework for determining which conditions of supervised
release require oral pronouncement and what counts as notice to the
defendant. 22 Formerly, only “special” conditions of supervised release had to be
pronounced; all others—including mandatory conditions, standard conditions,
and a hybrid category known as “recommended” conditions—were exempt.23
Although nominally pegged to distinctions drawn by the Sentencing
Guidelines, this taxonomy grew complex and confusing over time. Diggles
replaced it with a simple, statutorily based dividing line: “A sentencing court
must pronounce [only] those conditions that are discretionary under
18 U.S.C. § 3583(d),” the statute that governs supervised release. 24 If a
condition is required by the statute, “making an objection futile, the court need
not pronounce it.” 25
Diggles also established that the district court’s “oral adoption” at
sentencing of a document listing proposed supervision conditions satisfies the
oral-pronouncement requirement and provides notice to the defendant, such
that a failure to object will result in plain-error review on appeal. 26 Although
the document orally adopted in Diggles was a PSR, the Court noted that any
document listing proposed conditions of supervised release will suffice so long
as the district court ensures that “the defendant had an opportunity to review
it with counsel” and orally adopts it “when the defendant is in court.” 27
judicial proceedings.” Id. (internal alterations omitted) (quoting United States v. Olano, 507
U.S. 725, 736 (1993)).
22 No. 18-40521, 2020 WL 2048025, at *8 (5th Cir. Apr. 29, 2020).
23 United States v. Torres-Aguilar, 352 F.3d 934, 938 (5th Cir. 2003).
24 Diggles, 2020 WL 2048025, at *8.
25 Id. at *4.
26 Id. at *8.
27 Id. at *6 n.5.
8
Case: 18-11578 Document: 00515421654 Page: 9 Date Filed: 05/19/2020
No. 18-11578
B.
The four conditions of supervised release listed as “special” on Gomez’s
revised judgment require him to participate in (1) domestic-violence and (2)
substance-abuse treatment programs, (3) make timely child-support
payments, and (4) provide his probation officer with any requested financial
information. Applying the new Diggles framework, we see that all four of these
conditions are discretionary under § 3583(d). 28 Thus, they are all subject to the
oral-pronouncement requirement.
The next question is what standard of review governs Gomez’s
unpreserved oral-pronouncement challenge. The record shows that at Gomez’s
November 2018 resentencing hearing, the district court orally adopted the
special conditions it had listed in Gomez’s first written judgment the year
before. 29 While we do not know if Gomez had a physical copy of the first
judgment before him at the resentencing hearing, it had been in the record for
more than a year, giving the defense ample notice of its contents and
opportunity to object to the re-imposition of its supervised-release provisions.
Furthermore, given his prior appeal from the first written judgment, there is
no doubt that Gomez had had an opportunity to review its contents with
counsel prior to the November 2018 resentencing.
Thus, we review for plain error, and just as in Diggles, we conclude that
Gomez’s challenge “do[es] not clear even the first of the four plain-error hurdles
28 The statute lists participation in a domestic-violence treatment program as a
mandatory supervised-release condition, but only “for a defendant convicted for the first time
of a domestic violence crime . . . .” 18 U.S.C. § 3583(d). Because Gomez was not convicted of
such a crime, the district court’s imposition of a domestic-violence treatment condition was
discretionary.
29 We note that the district court likely did violate the oral-pronouncement
requirement at Gomez’s first sentencing hearing in 2017. Neither Gomez’s PSR nor the court
itself made any mention of the conditions that later appeared on Gomez’s written judgment,
depriving him of notice and an opportunity to object. However, this appeal concerns only
Gomez’s second, 2018 resentencing proceeding, so our analysis is unaffected by any error that
might have occurred at the first.
9
Case: 18-11578 Document: 00515421654 Page: 10 Date Filed: 05/19/2020
No. 18-11578
for there was no error at all.” 30 The district court “pronounced” Gomez’s
conditions of supervised release when it stated that his new TSR would be
“subject to the same terms and conditions as previously stated” in his first
written judgment. 31
IV.
For the foregoing reasons, the revised sentence imposed by the district
court is affirmed.
30 Diggles, 2020 WL 2048025, at *5.
31 Although the district court did not identify the first written judgment by name, its
oral adoption of the “previously stated” conditions leaves little doubt about which document
it intended to incorporate. After all, Gomez’s first judgment was the only place in the record
where the previously imposed special conditions appeared. Moreover, Gomez has not
asserted, much less shown, that the conditions at issue were included in his first judgment
as the result of a mistake or are substantively inappropriate.
10
| mini_pile | {'original_id': 'a47177fdcd264a6295eef5f04ef3da0fbcfdc0f64055a55afe5479cbccffa810'} |
Third Party Access
Authorizing Access to Data
According to the federal Family Educational Rights and Privacy Act (FERPA), students in higher education institutions are considered to be adults with exclusive rights over their student records. Students are the only ones who can authorize the release of information from their student records, including their financial records.
Third Party View
Granted by the student, to enable a third party access to the student's financial records, academic records and billing reminders.
• Third parties are often family members of the students. Please note that without third party access to a student's account, no information can be disclosed to anyone but the student. This includes parents calling regarding the student's billing account.
• The student at any time can modify access privileges.
Enrolling a Third Party
The third party (i.e. parent) must:
1. Visit the following site and click on the link to create a UCLA Logon ID
2. Accept the terms of creating a UCLA Logon ID
3. Create a username and password
4. Provide the student with their new UCLA username and password so the student can assign access to their third party
5. Have the UCLA Logon ID available when contacting Student Accounts to discuss the student’s account
The student will then need to:
1. Login to MyUCLA
2. Build a profile for their third party by entering in the third party's username, first and last name and relationship to the student
3. Assign access for the third party, selecting the level of access the student wishes to grant the third party
4. Inform the third party that they will now be able to sign into MyUCLA to view the functions assigned to them | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9416181445121764}", 'metadata': "{'Content-Length': '30796', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:O7I7NHMKGV4EMAHL4YY3ZLUNENEPXWLQ', 'WARC-Concurrent-To': '<urn:uuid:6d901739-47b0-4906-aef3-2f1a3f45b937>', 'WARC-Date': datetime.datetime(2019, 4, 24, 6, 37, 15), 'WARC-IP-Address': '50.112.252.56', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AILPNMOPFMK2SRTASWEWP2VJVAPJS4XN', 'WARC-Record-ID': '<urn:uuid:b9e2a28c-5b65-4475-be3f-6effa6c113c5>', 'WARC-Target-URI': 'https://www.finance.ucla.edu/business-finance-services/student-accounts/third-party-access', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8a251a3f-b8e3-495f-89fc-4e6da7cd1e1e>', 'WARC-Truncated': None}", 'previous_word_count': '274', 'url': 'https://www.finance.ucla.edu/business-finance-services/student-accounts/third-party-access', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-229-41-121.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.28724074363708496', 'original_id': 'a3f2f978d609065ba5fa222fa1ed8189099bafa758e5eeda1bb1c029d46f96c7'} |
How to Create Memorable Characters
When I give workshops that teach writers how to develop characters, I usually provide participants with a character sheet, not unlike character sheets you might find for role-playing games, because they are, essentially, character creation sheets. Writers can develop their own or look for them in a variety of online writing resources. Basically, a character sheet has three major aspects: (1) the physical features of the character; (2) the biographical-historical background, and (3) the emotional-psychological features of the character.
As the categories suggest, the physical features tell us how tall, heavy, the color and length of hair, the eye color and shape, the shape of the body, identifying marks, hand and foot size, what fingers and toes look like, clothing size, teeth condition, nose and nostril type, neck, etc. It helps to have a picture of someone real, or to create analogies: swan-like neck, flared nostrils, chunky fingers and toes, spade fingernails, etc.
When describing biographical-historical background, we decide how old the character is, birthdate, place of birth, race, nationality, residence, family, relatives, languages, education, skills, places lived, their work, religion, memberships, training, jobs held, and all other types of things you might find in the most comprehensive biodata and curriculum vitae ever.
Third, and probably the most difficult, is establishing the emotional-psychological profile of the character. This includes quirks, beliefs, superstitions, attitudes, intellect, viewpoint on various topics from politics to art and culture to family, personality type, phobias, preferences, desires, weaknesses, dreams, and anything else that reflects their psyches. Finally, every character must have that fatal or tragic flaw. That one thing that is the character’s Achilles heel, the one thing that will affect the character’s success. It can be one or more of the character’s phobias or weaknesses that prevent success, but definitely one thing that within the character that works against overcoming the problem they face in the story. This is the humanizing factor that makes readers more sympathetic towards fictional characters, because we all know that nobody is perfect.
While I have presented a great deal of details that can go into the creation of a character, that is not to say every single detail must be present. As an aid to determining how much detail to include when creating a character, let me just say that the detail should be commensurate to the length of the story. The shorter the story, the less detail; longer, epic stories will need greater detail, because then, characters are exposed to the reader’s scrutiny in a greater variety of situations. They meet more characters, do more things, have more to accomplish or overcome; hence, they need to be more well-thought out, more fleshed-out, more real to account for every possibility along the way. This also makes them more realistic and, ultimately, more sympathetic. Readers will admire heroes but they adore heroes who succeed despite their flaws. In fact, the more flawed the hero, the more sympathetic and, in the end, the more sweet the triumph.
I still want to get a shirt that says: “Beware. Novelist. I’m watching you. I just might write you into my next novel.” Novelists do write people they know into their novels, because it’s the people they know best who provide them with the best fodder to humanize a character. If you want to paint them as the antagonists, however, heed Norman Mailer’s advice: don’t make your characters too much like the people you live with, because then, you’d have to live with them and they’d never let you live it down. They can make your life unbearable, so be careful what you write about them or how you write them into your novel. Especially if it’s your spouse. Unless they don’t read your novels at all, then you’ll be perfectly fine. Still and all, I think it one of the most fun and entertaining things to do as a writer, to include bits and pieces of real people into my characters. I’m sure every great writer has picked traits from people they have encountered to make their characters more interesting and real. The trick is to change the physical characteristics and biography so the real people aren’t easily recognizable. Try it on some character sketches and have fun!
2 thoughts on “How to Create Memorable Characters
1. Pingback: Character Types: Round vs Flat | Cindy Lapeña: Creativity Unlimited
2. Pingback: TWP Weekly Writing Post™ 2016 Feb 6-12 Edition | The Writing Pool
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '637', 'language_id_whole_page_fasttext': "{'en': 0.9489989876747132}", 'metadata': "{'Content-Length': '85452', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4ZD5XFU3WSHVI5UWNY3IIORV6NQ26TR4', 'WARC-Concurrent-To': '<urn:uuid:2ba9d638-fc92-4075-b7b3-68cd8d49cb69>', 'WARC-Date': datetime.datetime(2019, 12, 6, 16, 20, 11), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FP7EOX4R2EFUI7ZBXIMYNKTMVMMZ3Q6U', 'WARC-Record-ID': '<urn:uuid:503ecc50-4430-4539-9946-50af657ae126>', 'WARC-Target-URI': 'https://cindylapena.com/2015/12/13/how-to-create-memorable-characters/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:62983365-a5ee-4229-b8a7-175bbb2a0e6f>', 'WARC-Truncated': None}", 'previous_word_count': '1356', 'url': 'https://cindylapena.com/2015/12/13/how-to-create-memorable-characters/', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-207.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04367530345916748', 'original_id': '3e601a5a0cc730ec5b78982acbd447c7895920425fa0f331f22a4831c3743543'} |
What is the Queer Unit?
We organise events, want to be contact persons, provide a space for queer people, ensure their visibility, and represent their interests. We also network with local groups and other gay/lesbian/trans*/queer units from other universities. We stand up for the interests of all gay/lesbian/trans*/queer students and try to address many areas of marginalized life, such as lesbian, gay, trans* and inter’ from different perspectives, and actively fight against heteronormative structures.
Feel free to contact us with ideas, event suggestions, or if you need help!
By queer, we mean sexual and gender diversity. All people should have the possibility to freely live their gender, sexuality, and idea of life. In society, normative ideas are often taken for granted without being questioned, although they do not necessarily correspond to the realities for all people, which is why those affected are often subject to discrimination. The term queer can thus be summarised as a collective term for alternative identities and/or ideas of life. People who feel connected to this issue and question the norms and discrimination mentioned above often call themselves queer.
We also believe that the term can, therefore, be used by heterosexuals and does not refer exclusively to gays and lesbians. The important thing is: queer is a self-designation!
Where to find us?
Building 5, 1st floor
AStA Frankfurt UAS
Kleiststraße 5
60318 Frankfurt am Main
+49 69 1533-3262 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9474032521247864}", 'metadata': "{'Content-Length': '83843', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QVCPDXJ3IEYJB5PZULWCDCSKJY3B55FX', 'WARC-Concurrent-To': '<urn:uuid:755a72b0-df6e-41ec-95bc-6743786190d1>', 'WARC-Date': datetime.datetime(2021, 5, 16, 22, 12, 27), 'WARC-IP-Address': '80.67.17.93', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TW4B2M26V3D3EQCTYKWD4XC3RVCJFNVN', 'WARC-Record-ID': '<urn:uuid:8b2fa8fb-20b3-477d-9ce5-a41aff2ac530>', 'WARC-Target-URI': 'https://asta-fra-uas.de/en/queer/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:69f5a426-2205-4317-8746-376ef41a0ced>', 'WARC-Truncated': None}", 'previous_word_count': '233', 'url': 'https://asta-fra-uas.de/en/queer/', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-67.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1129651665687561', 'original_id': 'ef66a229dc5eea45dcf083bd5f6a2c38c6f3f126b55e99446c682fdae5566225'} |
Who Failed With #amazonfail?
I just read two very interesting articles from two commentators I respect immensely: Clay Shirky's The Failure of #amazonfail and Mary Hodder's Why Amazon Didn’t Just Have a Glitch. I won't do their arguments justice here, but I'll try to summarize as best I can.
Hodder argues that, even if, as it seems, the "glitch" is responsible for the recent #amazonfail twitter event, the algorithm itself contains values and assumptions, made by humans, that drive the results. I try to argue this to my students whenever this subject comes up: computers are not beings remote from us. They are us. Especially software, which represents an act of writing not very different from a polemic, a poem, or a magazine article--software, after all, is covered under copyright.
When a students says, "I'm not interested in computers, I'm interested in people" I always try to make it clear that this is a false duality. We make our computers--our "computing" is a cultural expression. One of my favorite projects over the past year was the work of my friend Christopher Martinez over at ASU. He talks about different, culturally sensitive ways of interacting with machines, a new form of computing based on practices that don't employ the typical keyboard-and-mouse Western industrialized mode. It's brilliant work and underscores how historically and culturally bounded our ideas of computers are.
Shirky argues that, even if this is true, the glitch is not the source of the #amazonfail outrage. He states that the scale of the reaction would not have been nearly as widespread or as virulent if a technical flub had been the source of the deranking of LGBTQ books. Rather, the anger comes from a sense of malice on the part of Amazon--hence the threat of boycotts and other actions at an entity held to be active persecuting its authors of gay literature.
Mmmmmmmmmmaybe. My objection is that the event got dubbed amazonfail and not amazonevil. Amazon failed to build a system that would preclude the pairing of "gay and lesbian issues" with "adult/sexual". Sarah Warn wrote a beautiful article during the "storm" that points out how often, in pop culture, the concept of "gay person" gets tied to the concept of "sexual", while the concept of "straight person" is not. My opinion, reflecting Hodder's, is that this equation made its way into the algorithm behind the glitch. I've worked with enough systems to know that this is a difficult thing for a computer to do by accident--someone with this idea built it in, even if unintentionally.
Shirky acknowledges that as a possibility, but finds it irrelevant. If the crowd behind #amazonfail had this in mind beforehand, that would've been one thing. Instead, they were reacting to something else. But, to take it back to #amazonfail versus #amazonevil, I think there was an acknowledgement, on the part of at least a large number of people, that Amazon's system failed. Yes, it failed because the people behind had a backward, if not outright evil, assumption, but the reaction was against failure, not outright persecution.
I'm sure I'm wrong about a pretty big portion of other people though--so maybe that's the point. We can't really say that the people contributing the Twitter during/on #amazonfail (is it an event? a body of writing?) were of one mind. I, for one, was initially interested in it as a phenomenon and later, when I decided that something bad had happened, reacted against what I thought was driving the algorithm by tagging up books. Yeah, puerile vandalism--I can't say I wasn't carried away by the spirit of the thing. But I do think, like the many other people who tagged deranked (and non-deranked) books on the site with "amazonfail" that we were addressing the (perceived) source of the injustice--a broken, manipulated, insecure algorithm that (we hoped) could be set right with group action.
Shirky is very right, though, that our hindsight is "20/400". So, don't take my word about my own behavior. Here are my posts related to #amazonfail. You can decide what my motivations were. And if you agree (or disagree) with me, post up your own results, and let's look at ourselves together, dispassionately, and see who's castle we thought we were storming.
Update: Fixed an embarrassing typo. mikefail.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.9717760682106018}", 'metadata': "{'Content-Length': '17352', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2OLWTJRFV2TUEY2Q7A5GVIUNCIKU5ZHE', 'WARC-Concurrent-To': '<urn:uuid:99f2c5c7-fa5b-45a6-8d61-e87d8550c54d>', 'WARC-Date': datetime.datetime(2018, 12, 14, 14, 37, 32), 'WARC-IP-Address': '75.119.209.194', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:HYADUOAAZWAR5VH25OQNTC4DBRMJA2RP', 'WARC-Record-ID': '<urn:uuid:bdedf6dd-da73-45c6-a7ae-3f384ca22c60>', 'WARC-Target-URI': 'http://onearmedman.com/node/440', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ddc53186-9112-415f-a82f-3a5a5525aaa7>', 'WARC-Truncated': None}", 'previous_word_count': '706', 'url': 'http://onearmedman.com/node/440', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-150-135-54.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.22855395078659058', 'original_id': '72127674d3012a86c18930ce0ef56d69bc61e38f87c6d313084061849840d3a0'} |
Em at 1 Month!
Technically Em has been a month for a week and a day now... but I'll give you the update of where we're at. Last week we went back to Duke for her 1 month evaluation and Em passed everything with flying colors. The physical therapist was showing me a bunch of exercises to be working on at home with her, in hopes that she would do these things eventually, and Em was doing them all right then and there on the spot!
The neonatalogist showed me the MRI from when she was born compared to the one from when I was pregnant, and the two MRIs were night and day. While she still doesn't have two complete hemispheres to her brain, and she doesn't have her corpus callosum, her brain actually looks a lot healthier. Without trying to sound smarter than I am... I'll try my best to explain. So a normal human brain has a lot of wrinkles and folds right? Well to a certain degree, that's kind of a measure of your intelligence, or your capability to be intelligent. When I was pregnant, Em's brain had pretty much no wrinkles and folds. Her brain was pretty much smooth for the most part. The MRI from when she was born showed that her brain had all the same amount of wrinkles and folds that every other newborn baby is supposed to have. Amazing right? The doctors are attributing that to why she is doing so well. They keep telling us we have the best case scenario, and if they didn't have those MRI's they would never have thought anything was wrong with her. We've seriously been super blessed. There is still a good chance that she could have some physical and developmental delays, but right now, she's right on track.
Now onto the fun facts about Em at 1 Month:
• 9lbs 7.8oz 21 3/4 inches tall
• She screams her brains out every night from roughly 7pm-10pm
• She is however, sleeping through the night as of 2 days ago
• She is either ravenously hungry, or wants nothing to do with food
• She takes one nap during the day from 12-4, like Jay
• She smiles, and they melt my heart
• She doesn't fit into newborn clothes
• Jay, Derek, and myself, are all obsessed with her!
Fun fact: Jay slept through the night at exactly 1 month and 2 days of age, and Em did at 1 month and 7 days of age. So... Derek and I are going to have to pay big time for this luck later down the road, I'm almost positive.
1. Such a beautiful picture of your Sweet Girl!
What a miracle and huge blessing to have a girl who is suppose to be sick, defying the odds! Thank the Lord! Reading this brought tears to my eyes! I am so happy for your family and your Sweet Girl!
And whew! There is nothing sweeter to an exhausted Mommy's ears than a sweet baby sounds asleep for hours at a time!
2. I'm so glad that things are going so well!!! That is so amazing to hear. She is the cutest! | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9864431619644164}", 'metadata': "{'Content-Length': '193018', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BWA3LPJEJ5PIVFVJLJ3SYDF36KIMSHGN', 'WARC-Concurrent-To': '<urn:uuid:661640de-643f-4af1-a56a-df9269b2d0b2>', 'WARC-Date': datetime.datetime(2020, 1, 18, 10, 18), 'WARC-IP-Address': '172.217.7.211', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:Z7VW2BYJUJB6GA5D2JK5LZJVVVHLDWY4', 'WARC-Record-ID': '<urn:uuid:b1055bb5-46f1-4469-aaf6-dcdb5205727f>', 'WARC-Target-URI': 'http://www.thehappyflammily.com/2014/09/kinsley-at-1-month.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:26e05eb4-d45c-40c6-88e0-a044f129e2b1>', 'WARC-Truncated': None}", 'previous_word_count': '534', 'url': 'http://www.thehappyflammily.com/2014/09/kinsley-at-1-month.html', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-154.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09454333782196045', 'original_id': '2767cb1096f56811b43dab222aa5bef3fce5e56fcefcc05ff66f1d6dc6f29a2e'} |
Arab Nationalism: Mistaken Identity
Martin Kramer, “Arab Nationalism: Mistaken Identity,” Daedalus, Summer 1993, pp. 171-206. Original pdf.
daedaluslogoThree lines of poetry plot the trajectory of Arab national consciousness. “Awake, O Arabs, and arise!” begins the famous ode of Ibrahim al-Yaziji, penned in 1868 in Lebanon.1 George Antonius deployed the line as the epigraph of his influential book of 1938, The Arab Awakening, as the first utterance of a nascent Arab desire for independence from Ottoman rule.2 “Write down, I am an Arab!” begins the renowned poem of resistance by the Palestinian poet Mahmoud Darwish, written in 1963 to assert an Arab identity denied by Israel and the West.3 The poem immediately entered the Arab nationalist canon, to be recited from memory by a generation of schoolchildren. In the century that separated these two lines, millions of people gradually awakened and arose, insisting before the world and one another that they be written down as Arabs.
“Are we Arabs one big lie?” This line ends a poem of anguish written in the midst of the 1991 Gulf crisis by Nizar Qabbani, the most widely read contemporary Arab poet and critic.4 Too much had gone wrong to sustain exclamation points of awakening and defiance; they were replaced by a question mark of doubt. Once half of Europe and a Superpower had admitted to living a lie for most of this century, the Arabs could not suppress their own doubt any longer. Their god had also failed, spectacularly so. It had been called Arabism, or Arab nationalism, or pan-Arabism, and by the time Qabbani posed his question, it had been in full retreat for a generation.
At present, many Arabs have suspended their belief in the Arab nation, and now openly doubt whether there is a collective Arab mission. Those recently swept up by Islamic activism prefer to think of themselves first and foremost as Muslims, and do so without apology. At times, their lexicon has turned “the Arabs” into a derogatory label, implying wastefulness, incompetence, and subservience. Other Arabs plainly prefer to be known as Egyptians, Syrians, Jordanians, Moroccans — citizens of over twenty independent states, each with its own flag and own interests. Some have even taken to referring to themselves as Middle Easterners, in anticipation of an Arab-Israeli peace and a new regional order of cooperation modeled on Europe. A few intellectuals keep the Arab flame alive. Yet they are most often abroad, in London or Paris, where they command dwindling audiences of Third Worldists and “pro-Arabs.” For a decade they have quarreled over whether pan-Arabism and Arab nationalism are simply in remission or beyond all resuscitation.
A sense of “Arabness” still persists. It has existed for as long as the Arabs have walked the stage of history, and it has been subject to negotiation by every generation for nearly a millennium and a half. In this generation, this sense of “Arabness” must come to terms with the growth of loyalty to separate Arab states, a burgeoning Islam, the global triumph of liberal democracy, the ascendancy of market capitalism, and the prospect of peace with Israel. All were anathema to Arab nationalism as it evolved over most of this century. “Arabness” can doubtless accommodate the new challenges, as it has always done. Arab nationalism, a modern creation of this century, may well disappear altogether under their impact.
But whatever the prospects of Arab nationalism, its history to this point represents one of the most remarkable instances of the rapid birth, rise, and decline of any modern nationalism. That history deserves a new telling, for it has not been invoked in the broader debate over the growing instability of identity that marks the end of this century. There was a time when Arab nationalism did enjoy a place of some prominence in the comparative study of nationalism, but later it became the domain of specialists, which was perhaps just as well. Arnold Toynbee and Hans Kohn, who first attempted to integrate Arab nationalism into some wider comparative framework, became its virtual partisans between the world wars despite their own reservations about nationalism in general. In a spirit of mea culpa — Toynbee’s for British policy, Kohn’s for Zionist — they accepted the most extravagant slogans of Arab nationalism as statements of sociological fact or incontrovertible moral claims, and saw none of the contradictions beneath its surface.
When the Arab states gained independence after World War II, these contradictions surged to the fore in all their complexity, and kept later theorists at arm’s length. “No brief summary of the long and intricate history of the Arab world could hope to disentangle the forces which have shaped its states and peoples,” wrote Rupert Emerson in scarcely concealed exasperation. “For a full-scale analysis it would be necessary to evaluate the whole record of Arab experience, including such matters as the tribal, sectarian, and other divisions, the effects of Ottoman rule, the machinations of the European powers, and the role of Islam and of the Arab language and culture.”5 In short, it was a job for someone else who knew it better. But even the comparativists who did know Arab nationalism quite well chose not to make it the pivot of their comparisons, perhaps for fear of losing the general reader in a labyrinth.6
Nor did Arab nationalism originate as a straightforward reaction to Western imperial rule, of the kind familiar elsewhere in Asia and Africa. Some Arab peoples experienced over a century of direct Western rule, while others experienced none at all. As a result, Arab nationalism followed distinct courses of development in the Fertile Crescent, the Arabian peninsula, the Nile valley, and the North African coast. Each of these zones encountered the West on different terms, at different times. Variations on Arab nationalism multiplied, sometimes even inspiring separate classifications, such as Nasserism and Ba’thism, and even more arcane subclassifications, such as neo-Ba’thism. Many of these became rivals, even to the point of bloodshed. This has made it difficult to generalize about Arab nationalism, and treacherous to deploy such generalizations in the larger debate over nationalism.
The purpose in the following pages is not to attempt the treacherous. It is to attempt what Emerson wished, as a prelude to comparison: to trace the political trajectory of Arab nationalism plotted by the poets, to walk an idea briskly through its historical phases, and to characterize its relationship to those other ideas and identities that have appealed to “the speakers of the dad,” that sound which is unique to Arabic. It is the story of a nationalism that arose fitfully, spread dramatically, then faltered and failed. It is an account of how millions of people imagined themselves to be Arabs and then, as though in a case of mistaken identity, claimed to have been someone else all along.
The Emergence of Arabism
Arabism first arose in the nineteenth century not as a direct reaction to Western rule, but as a critique of the state of the Ottoman Empire, whose reach had extended over most of the Arabic-speaking peoples since the early sixteenth century. For nearly four hundred years, these Arabic speakers had been fully reconciled to their role in the Empire. The seat of the Empire was in Istanbul, and its vast domains were administered in Ottoman Turkish. But the Ottomans professed Islam, as did the overwhelming majority of their Arabic-speaking subjects. Their state evolved as a partnership in Islam, embracing all of the Ottoman sultan’s Muslim subjects, whatever language they spoke.
Those Muslims who spoke Arabic retained a pride in their language: God revealed the Qur’an in Arabic to an Arab prophet in the seventh century. They also celebrated the history of the early Arab conquests, which carried Islam from the Oxus to the Pyrenees. And they took pride in their genealogies, which linked them to Arabia at the dawn of Islam. But that very fidelity to Islam bound them to Muslims who spoke other languages and prided themselves on other genealogies, and who brought new vitality to the defense and expansion of Islam. Since the fifteenth century, the Ottomans showed precisely this vitality, harnessed to an Islamic zeal that had carried Islam to the very gates of Vienna. All the Muslim subjects of the Ottoman house saw themselves as participants and beneficiaries in this shared Islamic enterprise, and they drew no distinction between Arab and Turk.
But with the relative decline in Ottoman power, especially in the nineteenth century, the foundations of this symbiosis began to weaken. The great Ottoman carpet was being rolled up at both ends: by Europe’s Great Powers, locked in imperial rivalry, and by the discontented Christian subjects of Ottoman rule in Europe, whose struggles for independence took a nationalist form. The Ottomans embarked on a succession of Westernizing reforms but eventually lost their footing in the Balkans, the Caucasus, North Africa, and Egypt. As the Empire dwindled, so did the confidence of its remaining subjects, and some discontent even appeared in the remaining Arabic-speaking provinces of the Empire, in Arabia and the Fertile Crescent — a discontent that would come to be known as the Arab “awakening.”7
Many controversies still surround the nature and extent of this discontent, but it is generally agreed to have drawn upon two sources. First, there were the minority communities of Arabic-speaking Christians, much influenced by European currents, who worked to transform Arabic into a medium of missionary work and modern learning. From about the middle of the nineteenth century, their efforts did much to kindle interest in secular Arabic belles-lettres, through adaptation of Arabic to the modern conventions of the press, the novel, and the theater. The Arabic literary revival, centered in Beirut, did not translate immediately into Arab nationalism. But it did argue for the existence of a secular Arab culture, to which Christians and Muslims had supposedly contributed in equal measure. By elaborating upon this shared Arab legacy, the Christian minority sought to erode the prejudice of Muslim majority and to win Christians their full equality as fellow Arabs.
Arabism also arose from a second source. Rivalries had always absorbed the Arabic-speaking Muslim elite, especially in the keen competition over appointments to Ottoman government positions and bureaucratic sinecures. The grievances of those passed over for such spoils by Ottoman governors occasionally turned into the demand that Istanbul accord the Arabic-speaking provinces more autonomy in the conduct of their own affairs. As the twentieth century opened, this Arabism spread to all the major cities of the Ottoman Empire where Arabic was spoken, but it centered upon Damascus, where its adherents began to organize. While the Arabism of Muslims resembled that of Christians in its pride of language, it differed fundamentally in its deep attachment to Islam. It appealed to Muslims by arguing that the greatness of the Arabs resided in their privileged understanding of Islam. The Arabs, acting in the name of Islam, had created a great empire and civilization, and only the Arabs could restore Islam to its pristine grandeur. There was nothing secular about this assertion of Arab genius, which became closely associated with Islamic apologetics and reformism.
This “Arab awakening,” Christian and Muslim, failed to produce a trenchant social criticism or a truly modern language of politics. Ultimately it would defeat itself by its apologetic defense of tradition and religion.8 But it did go far enough to shake the confidence of some Arabic-speakers in the legitimacy of Ottoman rule. A few pamphleteers even tried to conjure up Ottoman fears (and foreign subsidies) by publishing tracts in the name of an “Arab movement.” Most of these appeared in Europe, and some journals of opinion in Europe’s capitals began to debate “the Arab question.” The debate was premature. In 1907 the English traveler Gertrude Bell gave the commonplace assessment of these stirrings:
Of what value are the pan-Arabic associations and inflammatory leaflets that they issue from foreign printing presses? The answer is easy: they are worth nothing at all. There is no nation of Arabs; the Syrian merchant is separated by a wider gulf from the Bedouin than he is from the Osmanli, the Syrian country is inhabited by Arabic speaking races all eager to be at each other’s throats, and only prevented from fulfilling their natural desires by the ragged half fed soldier who draws at rare intervals the Sultan’s pay.9
Yet by the eve of World War I, Arabism did begin to take a more palpable form against the two challenges of Turkification and Zionism.
Turkification threatened the cultural status quo. The Turkish-speaking subjects of the Ottoman Empire had been exposed to European-style nationalism, largely through its penetration into the Balkans. Turkish-speaking Muslims then began to construct for themselves a new identity as Turks, a trend strengthened by Western philologists and romantics who sought to establish the greatness of an ancient “Turanian” civilization.10 As the Ottoman Empire stumbled, Ottoman authorities attempted to give the polyglot Empire more the character of a European nation-state by enforcing the use of Turkish at the expense of other languages, including Arabic. This policy, never fully implemented, caused some apprehension in the Arab provinces on the eve of World War I, and may have helped to rally the supporters of cultural Arabism to a political purpose.
Zionist settlement in Palestine threatened the political status quo. Ottoman authorities tolerated the influx of Jewish immigration in the belief that it would ultimately benefit the Empire, as it had in successive waves since the Spanish Inquisition. But not all of the sultan’s subjects concurred, since this latest wave of immigrants saw the land on which they were settling not merely as a refuge but as a state in the making. As the pace of Zionist immigration and settlement increased, their immediate neighbors grew apprehensive about the looming possibility of dispossession. From the turn of the century, Ottoman policy toward Zionism became a matter of growing debate and criticism in the Arabic press.11
Arabism thus arose from a growing unease about the pace and direction of change. Yet, while the Ottoman Empire lasted, this Arabism did not develop into full-fledged nationalism. Its adherents pleaded for administrative decentralization, not Arab independence, and they had no vision of a post-Ottoman order. They imagined a solution in the form of an accountable government, and professed a vague admiration for the liberal democracies of the West, especially of France and England, although they had an imperfect grasp of the meaning behind the slogan of “liberty.” Above all, they were practical. They did not indulge in dreams of Arab power. Their grievances, in the words of a critic of later Arab nationalism, “were local and specific; they related to the quality of government services or to the proper scope of local administration; and those who sought redress for such grievances were mostly men well known in their communities, able perhaps to conduct a sober constitutional opposition but not to entertain grandiose, limitless ambitions.”12 On the eve of World War I, they were probably still in the minority, outnumbered by Arabic-speaking Muslims and Christians who raised no doubt about the legitimacy of Ottoman rule, and even stood prepared to defend it.
The Arab Nation and the European Empires
World War I forced a choice upon the adherents of Arabism. After some hesitation, the Ottoman Empire entered the European war on the side of Germany, prompting Britain and France to fan every ember of dissent in the Empire. The Allies held out the prospect of independence for something they called “the Arab nation,” and they eventually found a partner in a local potentate of Mecca, the Sharif Husayn. The Sharif had an ambitious vision of a vast “Arab kingdom” for his family, and in 1915 he secured commitments from Britain regarding its future independence and frontiers. In 1916, he finally raised the standard of revolt against Ottoman rule.
The Arab Revolt that began in Arabia had little to do with the Arabism that had emerged in the Fertile Crescent. It more faithfully expressed the dynastic ambition of the Sharif, and the enthusiasm for British guns and gold among Arabia’s desert tribes. However, the Sharif’s sons, the Emirs Faysal and Abdallah, also established contacts with the existing Arab societies in Damascus, and the revolt recruited dissident Arab officers who had deserted Ottoman ranks. These officers had attended Ottoman military academies, where they had imbibed the idea of the army as the “school of the nation” from the German officers who had trained and advised them. The revolt thus made for a volatile mix, whose diverse participants dreamed the different dreams of Arab kingship, desert anarchy, liberal constitutionalism, and military dictatorship. While the revolt lasted, they suspended their differences in the drive for independence.
In 1918, as the Ottomans retreated before British arms in Palestine, the Arab Revolt culminated in triumph when Faysal led his followers into Damascus and there formed an “Arab Government.” In 1919, he went to Versailles, where he asked that “the Arabic-speaking peoples of Asia” be recognized as “independent sovereign peoples,” and that “no steps be taken inconsistent with the prospect of an eventual union of these areas under one sovereign government.” Finally, in 1920, a “General Syrian Congress” declared the independence of a “United Kingdom of Syria” including the entire Levant, and proclaimed Emir Faysal king. From Damascus, an “Iraqi Congress” also proclaimed Iraq independent, under the kingship of the Emir Abdallah.13
An Arab nation had entered the game of nations, and from the outset, its members made far-reaching claims that ran up against other claims. Most notably, Britain had made wartime commitments to France and the Zionist movement. The first, the so-called Sykes-Picot agreement, secretly recognizing most of the northern Levant as a zone of French privilege; the second, the Balfour Declaration, publicly supporting a Jewish national home in Palestine. Britain also had strategic and economic interests in the territories demanded by the Sharif Husayn and his sons. The contradictory claims were sorted out in April 1920, at the San Remo conference, where Britain and France settled on the division of occupied Ottoman territory, which they planned to administer as separate League of Nations’ mandates. On the basis of these agreements, French forces drove Faysal and his followers from Damascus in a brief battle in July, and imposed French rule on Syria that would last for a quarter century. At the same time, Britain began to fulfill its commitment under the Balfour Declaration by opening Palestine to more extensive Zionist immigration and settlement. Arab violence against Jews first broke out in April, presaging the strife between Arab and Jew that would become a fixture of the British mandate for Palestine. In June, a widespread insurrection against the British broke out in Iraq, which British forces suppressed by force.
Increasingly, Arab nationalists charged that Ottoman rule had been replaced by British and French imperialism, government even more alien than its Muslim predecessor. Britain did move to compensate the leaders of the Arab Revolt in 1921: it appointed Faysal as the king of Iraq in expanded borders, and carved an emirate of Transjordan out of the Palestine mandate, which it then exempted from Zionist immigration and turned over to Abdallah. But the Arab nationalists now nursed a deep grievance against Britain and France over the partition of the territories they wanted, and the denial of independence in Palestine and Syria, which they believed had been promised to them. Arab nationalism, once inspired by the West’s liberalism, began to redefine itself as a negation of its imperialism.
The Arab nationalist lament against the arbitrary partition of the Fertile Crescent had much validity. None of the new states was commensurate with a political community. Syria, Lebanon, Iraq, Transjordan, Palestine, Lebanon — these names derived from geography or classical history, and their borders largely reflected the imperial jostling for strategic position or oil.14 Only the idea of Lebanon had some historical depth, since the Maronite Christians of Mount Lebanon maintained a strong sense of separate identity and had achieved some autonomy even in the late Ottoman period. But the Maronites were too few, and the borders of Lebanon drawn in 1920 by the French (at Maronite insistence) included large numbers of Muslims. Maronites would later attempt to manufacture the idea of a Lebanese nation, distinguished by a seafaring commerce and culture dating back to the Phoenicians — safely before the rise of any of Lebanon’s contemporary religions. But the Maronites failed to persuade the Muslims in Lebanon that the idea of “eternal Lebanon” expressed anything more than the sectarian solidarity of the Maronites themselves. Half of Lebanon’s population regarded their forced inclusion in Lebanon as still another trick of imperialism, as cruel as the other tricks the Arab nationalists thought had been played against them in 1920.15
But the idea of an Arab nation seemed just as arbitrary to most of its supposed members. It satisfied the makers and backers of the Arab Revolt, who regrouped in Iraq after their flight from Syria, and there established another Arab nationalist state. But in the fragmented societies of the Fertile Crescent, few persons were accustomed to regarding themselves as Arabs. As in Ottoman times, most continued to classify themselves by religion, sect, and genealogy. They were Muslims or Christians, Sunnis or Shi’ites, Maronites or Druzes, members of this or that clan, family, tribe, village, or urban quarter. They did not wish to be ruled by foreigners from over the sea. But neither did they desire to be ruled by strangers from across the desert, even if those strangers spoke Arabic. During the war, some of them had made their own diplomacy, to secure separate independence.16 After the war, their allegiance proved difficult to win, as the Arab nationalists soon discovered. The Arab nationalist state under Faysal in Damascus proved to be chaotic, and his subsequent reign in Iraq rested on the bayonets of the British. In correspondence, the British called Faysal “The Great Imposed,” a stranger to his subjects, who had been awarded a fragmented polity in arbitrary borders. The Arab nationalists in Faysal’s entourage dreamed of a great Arab state, but it was all they could do to keep together the would-be Arabs whom they ruled.
Faced with masses of people who had not chosen to be Arabs, the Arab nationalists developed a doctrine that denied them any other choice. Between the wars, the Arab nationalists progressively discarded the French idea of the nation as a voluntary contract, formed by individuals to secure their liberty. Increasingly their nation resembled the German Volk, a natural nation above all human volition, bound by the mystery of language and lore. Only the unity of this nation could restore its greatness, even if the price of unity meant the surrender of freedom.
This struggle had to be conducted not only against imperialism, but also against the would-be Arabs themselves. Not all of them were eager to be Arabs, and some openly professed to be something else. In such instances, Arab nationalism assigned itself the task of educating them to an Arab identity, preferably by persuasion but if necessary by compulsion. According to Sati’ al-Husri, Arab nationalism’s first true ideologue and a confidant of Faysal,
Every person who speaks Arabic is an Arab. Everyone who is affiliated with these people is an Arab. If he does not know this or if he does not cherish his Arabism, then we must study the reasons for his position. It may be the result of ignorance — then we must teach him the truth. It may be because he is unaware or deceived — then we must awaken him and reassure him. It may be a result of selfishness — then we must work to limit his selfishness.17
This ominous passage presaged the drift of Arab nationalism away from the liberal model of a voluntary community. “We can say that the system to which we should direct our hopes and aspirations is a Fascist system,” wrote al-Husri in 1930, raising the slogan of “solidarity, obedience, and sacrifice.”18 The idea of the nation as an obedient army immediately appealed to the army itself, especially its officers. It went hand in hand with a growing militarism, and the belief that only the armed forces could rise above the “selfishness” of the sect and clan, enforcing discipline on the nation. Iraq pioneered this trend. The country became independent in 1930, and joined the League of Nations in 1932. Less than a year later, the army conducted a massacre of the Assyrian (Nestorian Christian) minority, accused of infidelity to the Arab cause. In 1936, a coup d’état established a thinly veiled military dictatorship, in the name of national unity. Finally, in 1941, a junta of colonels led Iraq into war of “liberation” with Britain, which it promptly lost, and in the course of which the nationalists inspired a pogrom against the Jews of Baghdad.
Mistreated minorities, military strongmen, lost battles — in retrospect, Iraq’s early experience of independence anticipated an entire era of Arab nationalism. Yet this nationalism, and its extravagant extrapolation, pan-Arabism, gained immensely in popularity from in the 1930s. Accelerated migration from desert encampment to settled town, from village to city, began to unloose primordial ties, diminishing resistance to nationalist ideology. With the expansion of education, Arab nationalist pedagogues indoctrinated masses of young people, from primary school through university. The spread of literacy and the growth of the Arabic press brought the message of Arab nationalism into every classroom, clubhouse, and coffee shop. In the public arena, Arab nationalism gradually achieved a firm hold on political discourse, and all other loyalties became unspeakable.19
It also began to spread beyond the Fertile Crescent, to include first Egypt, then North Africa. Arabic-speaking Africa had come under foreign rule earlier than Arabic-speaking Asia. France began colonization of Algeria in 1830 and occupied Tunisia in 1881, while Britain occupied Egypt in 1882. In every instance there had been resistance to foreign rule. But it had been formulated as local patriotism, in most instances strongly tinged with Islam. Until the 1930s, few Egyptians saw themselves as Arabs, and the earliest Arab nationalists did not include Egypt in their vision.20 In North Africa, a large proportion of the population spoke Berber, and resistance to foreign rule took an Islamic form, since only Islam united its inhabitants. But no definition of the Arab nation based on language could long exclude Arabic-speaking Africa, and the very geography of imperialism created a potential bond of solidarity between the Algerian and the Syrian, the Egyptian and the Iraqi. In time, a growing number of Egyptians and North Africans began to see themselves as Arabs. Paradoxically, the empires of Britain and France linked together Arabic-speaking lands which had enjoyed few if any organic ties in Ottoman times, inspiring for the first time the idea of an Arab world from the Atlantic Ocean to the Gulf.
At the time, the division of this world did not yet seem permanent, and the message of Arab nationalism, calling for the full independence and unity of all Arabs everywhere, did not seem completely contrived. After World War II, weary Britain and France began to divest themselves of the more troublesome portions of their empires. Syria, Lebanon, and Transjordan became independent. Egypt and Iraq, their independence effectively revoked by Britain during the war, began to renegotiate the terms of British withdrawal. Full independence for the great majority of Arabs seemed only a matter of time. It would be acquired piecemeal by individual states, but Arab nationalists hoped that an Arab commonwealth might emerge from this fluid situation. Elaborate plans for Arab unification proliferated.
But these plans quickly ran aground. By now each state possessed its own ruling elite, bureaucracy, flag, and anthem. Their proposals and counterproposals, for “Fertile Crescent unity,” “Greater Syria,” and “Arab federation,” were schemes for self-aggrandizement.21 After much Arab negotiation and British mediation, the independent Arab states established the Arab League in 1945, a compromise that recognized the distinct sovereignty of each of them. In the end, independence did not alter the map drawn by imperialism. The member states of the Arab League promised to assist one another, but none would sacrifice their prerogatives of sovereignty, which the Arab League charter meticulously upheld. In particular, Article 8 of the charter upheld the principle of non-intervention: “Each member state shall respect the systems of government established in the other member states and regard them as the exclusive concern of those states. Each shall pledge to abstain from any action calculated to change established systems of government.”22
Yet the article of non-intervention, while sanctifying the status quo, pointed to its greatest weakness. Not all of these states and their rulers commanded the unencumbered allegiance of their citizens and subjects. By their own rhetoric, they admitted as much. They invariably justified their actions as advancing a larger Arab purpose, even when they were pursuing their own parochial purposes. Especially in the Fertile Crescent, states created without reason lacked the confidence to openly invoke reasons of state. The paradox could pass so long as Arab nationalism remained a loose mélange of slogans about independence and solidarity. But a growing number of intellectuals and officers, abhorring ambiguity, turned their Arab nationalism into a rigorous doctrine. They saw the Arab nationalism professed by rulers and states as posturing and began to argue the need for revolution. Their moment came when the fragile Arab order stumbled over Israel.
Arab Revolution
The rhetorical gap turned into a chasm in 1948, after the United Nations authorized the partition of Palestine into two states, one Jewish and one Arab. When the neighboring Arab states moved against Israel in 1948, they claimed to be fighting in concert, to uphold their brotherly commitment to the Arabs of Palestine. In fact they did just the opposite: each waged its own war to defend its own interests, each sought a separate modus vivendi with Israel. It was a hard-fought war, which ended with Israel in possession of even more territory than had been allotted to her by the United Nations, and with the Arab states as reluctant hosts to seven hundred thousand Arab refugees.
The events of 1948, like those of 1920, shifted the ground from beneath Arab nationalism. While the Arab states negotiated fitfully with Israel, disaffected intellectuals and officers began to stir. The intellectuals, exemplified by the Syrian historian Constantine Zurayk, leveled a withering criticism against the conduct of the war, and made it difficult for Arab states to present 1948 as anything less than a rout. Then the officers moved, charging the politicians and senior commanders had stabbed them in the back. Syria’s old-guard nationalist leadership was turned out by a military coup in 1949; two more coups followed that year, with another in 1952, and yet another in 1954. Abdallah, who in 1949 renamed his kingdom Jordan, and in 1950 annexed the adjacent remnant of Arab Palestine as his “West Bank,” was assassinated in 1951 for his dealings with Israel. The monarchy barely held on. In 1952, a group of “free officers,” invoking Egypt’s failure in the Palestine war and allegations of official corruption in its conduct, overturned the monarchy in a bloodless coup and established a revolutionary republic. By 1954, one of these officers, Gamal Abdul Nasser, had emerged as undisputed leader. In 1958, a sanguinary coup by more “free officers” destroyed the Iraqi monarchy, and the regicides established a “popular republic.”
Arab nationalism, which became “anti-imperialist” after 1920, became “revolutionary” after 1948. The Palestine war had demonstrated that the Arabs, despite their formal independence, remained politically disunited, militarily weak, and economically underdeveloped. The failure could still be blamed on imperialism, and much Arab nationalist thought went into drawing images of a global conspiracy, which allegedly implanted Israel to assure the West’s continuing domination of the Arabs. But some intellectuals also began to suggest the existence of intrinsic weaknesses in Arab culture and society, arguing that these had made the task of the Zionists easier. The new champions of Arab nationalism, fiery young colonels, now promised a social revolution that would overcome these weaknesses and propel the Arab world to unity, power, and prosperity. In the spirit of the times, they usually defined this revolution as socialism — or, more precisely, Arab socialism, lest it be alleged that the changes were not authentically Arab in inspiration. Arab nationalism no longer meant only literary revival and anti-imperialism. It meant land reform, extensive nationalization, and five-year plans, all in the name of “the revolution.” And if, in their new lexicon, Arab nationalists cast themselves as “revolutionaries,” then their opponents could only be “reactionaries.”23
The new dispensation took two parallel forms, which became known as Nasserism and Ba’thism. Nasserism married revolutionary nationalism to the personality cult of Gamal Abdul Nasser, who enjoyed immense prestige in the Arab world after he pulled a political victory from the combined British, French, and Israeli attack on Suez in 1956. Nasserism combined a program of socialist-like reform with the idea that Egypt under the charismatic Nasser constituted the very heart of the Arab world, and had the resources and will to lead all Arabs to unity. A strong streak of pragmatism ran through Nasserism, which evolved from day to day while Nasser held power. It was too makeshift to constitute an ideology, and relied more on Nasser’s warm glow than on any systematic doctrine. And while Nasser gave first priority to Egypt’s Arab character, at times he made Egypt out to be Muslim, African, or Afro-Asian — whatever served his particular purpose. But it was precisely that ambiguity which made Nasser all things to all Arabs, and permitted Egypt to imagine itself to be the bridge of Arab nationalism, linking the Arabs of Asia and Africa in the march to unity.
Ba’thism tended to be more ideologically stringent, if only because its founders were Sorbonne-schooled Syrians, mostly teachers hailing from minority sects, who had filled their spare time with academic debates and Nietzsche, Fichte, and Houston Stewart Chamberlain. They chose to call themselves the Ba’th, meaning resurrection, and they were “revolutionaries” as a matter of principle. Their constitution, adopted in 1947, announced that their goals could not be achieved “except by means of revolution and struggle. To rely on slow evolution and to be satisfied with a partial and superficial reform is to threaten these aims and to conduce to their failure and loss.” The first of these goals was the creation of a single Arab state, since all differences among Arabs were “accidental and unimportant. They will all disappear with the awakening of Arab consciousness.” And they regarded socialism as “a necessity which emanates from the depth of Arab nationalism itself.”24 As an early member attested, the Ba’th demonstrated all the characteristics of an ideological party: “Their interpretation of events was almost identical, but they did not trust one another; they loved the people, but hated the individual; they held the whole sacred, but they despised the parts.”25 The Ba’th spread its influence by penetrating the junior officer corps and eventually acquired power through military coups in both Syria and Iraq. The usual pattern was for the military wing of the local party to purge the civilian wing and install a military dictatorship, under the Ba’th slogan of “unity, freedom, socialism.”26
Nasser and the Ba’th carried Arab nationalism to the summit of its achievements. Nasser’s early gambles paid off because he was the first Arab nationalist leader who was positioned to play foreign powers against one another in a game he called “positive neutralism.” When the Americans refused to finance the Aswan Dam, the Soviets came to his rescue. When his nationalization of the Suez Canal and backing of the Algerian uprising provoked an attack by Britain and France (in league with Israel), the United States came to his rescue. The Arab world, glued to these maneuvers through the now ubiquitous radio transistor, stood breathless before Nasser’s high-wire act. The Ba’th in Syria longed to join it and pushed for negotiations with Nasser over unity. In 1958, the talks culminated in the birth of the United Arab Republic — a union of Egypt and Syria, offered to the Arab world as the first step toward a general Arab union. The names of Egypt and Syria disappeared from the map, replaced by a “southern region” and a “northern region.” Arab nationalism reached its high-water mark during Nasser’s first visit to Damascus, where enthusiastic crowds greeted him wildly. Other Arab leaders trembled as “Nasserists” filled the streets of their capitals to clamor for their long-awaited Bismarck. Lebanon invited American troops to stem the tide; Jordan accepted British forces. No Arab state seemed capable of withstanding the march of Arab unity on its own.
But in the end, it was the United Arab Republic that succumbed. The marriage of Nasser and the Ba’th turned into a struggle for domination within the camp of Arab nationalism. In this uneven contest, the Egyptians ran Syria like a colony — and a badly run colony at that. The union did not release some pent-up potential that only the combining of Egypt and Syria could tap. Quite the opposite: the union threatened to kill all productive initiative, especially in Syria, through the imposition of “Arab socialism.” In 1961, a Syrian coup ousted Nasser’s viceroy from Damascus and declared the union finished. The breakup demonstrated the salience of differences far too deep to be blown away by blithe slogans. There would be more negotiations between Nasser and the Ba’th in 1963, and more unity schemes and treaties. But there would never be a repeat of the United Arab Republic.27
In retrospect, the collapse of the Egyptian-Syrian union in 1961 marked the beginning of the long slide of Arab nationalism. The following year, Nasser contributed to its undoing by his massive intervention on behalf of the “revolutionary” side in Yemen’s civil war. Everything Egypt did in Yemen, including aerial bombing and napalming, had the opposite of the intended effect. A British journalist who watched the Egyptians at work in Yemen was amazed by their ignorance and arrogance:
It was one of the more piquant experiences of my post-revolutionary stay in Sanaa to be hailed by most of them with a chummy affability that implied as clearly as any words that they and I were somehow in this thing together as embattled representatives of civilisation in the midst of savagery. “What can you do with these people?” they would often laugh, in tones of vastly superior deprecation, “They are not like us, you see. . . .” Having come directly from British colonial Aden I recognised the symptoms all the more easily. Creeping imperialism is a catching disease, and those Egyptians were only a step away from clapping their hands together and shouting, “Boy!” when they wanted service.28
In Yemen, as in Syria, vast differences overwhelmed any remote similarity, leaving Arab to war Arab in a spirit of mutual incomprehension.
Nationalist theory had promised that unity would bring liberation from foreigners, but in the hands of actual practitioners it had become a whip of domination, wielded by some Arabs over others. The number of Arabs bearing its scars began to grow, as did the disillusionment. The Arabs, wrote one Syrian, were “like the inhabitants of an island who have been promised that the ship of deliverance will soon arrive. They have buried their tools and packed their meager belongings; but when the ship arrives, it is a slave boat.”29 The will to believe still remained strong in some quarters, but an edge of doubt began to show. Arab nationalism’s supply of persuasive words began to dwindle. Its champions responded by making more frequent use of the persuasive prisons of Abu Za’bal and Tura near Cairo, Mezze in Damascus, and the cellars of the Nihayyah Palace in Baghdad.
The crisis finally broke in 1967. The Arabs may well have blundered into war with Israel that June, but once they were in the thick of it, they expected more than in 1948. Most assumed that they had been strengthened, not weakened, by nearly two decades of Nasser and the Ba’th, social revolution, and the militarization of politics, all under the banner of Arab nationalism and the struggle against Israel. Instead, they got less: a truly ignominious defeat, delivered in six days. Its territorial consequences included the Israeli occupation of East Jerusalem, the West Bank, and Gaza — all densely populated by Arabs — and of the Sinai and the Golan, two geographic buffers that had kept Israel at a distance from Cairo and Damascus. The defeat represented nothing less than “the Waterloo of pan-Arabism.”30 When Nasser offered to step down, the crowds filled the streets to demand that he continue as their leader. Through years of pounding indoctrination, Nasser and the Ba’th had managed to silence every other voice, and many only understood and spoke the limited language of Arab nationalism. But as defeat worked its way deep into the collective psyche, two other voices would be raised in opposition to Arab nationalism. One spoke the language of allegiance to individual states. The other spoke of loyalty to a universalist Islam.31
The Triumph of the State
Since their creation, individual Arab states had never hesitated to give priority to their separate interests. Yet they had been persuaded by their perceived lack of legitimacy to pledge formal fidelity to the Arab nation, and thus risked being dragged into crises generated by other Arab states, or being accused of breaking Arab ranks for staying out. As 1967 proved, however, such crises could deteriorate quickly into war, and exact a steep price in lives, territory, and prestige. Many of these states already lumbered under immense economic burdens. They did not have the means to assume the burdens of their neighbors, especially the weighty load of Palestine. Even mighty Egypt could no longer assume the sole custodianship of the Arab cause (an Egypt which sent tens of thousands of troops to defend the Arab cause as far away as Yemen, yet had difficulty feeding its own people at home.) If these states were ever to set their own priorities, they would have to openly justify their separate existence, and demand the primary loyalties of their citizens and subjects.
Paradoxically, Egypt led the way again, this time under Anwar Sadat. Sadat launched an attack against Israel in October 1973, but this time Egypt fought a strictly Egyptian war for the return of the Israeli-occupied Sinai. Although Egypt waged the war in tandem with Syria, it quickly broke with Syria in the war’s aftermath. By the decade’s end, Sadat had given Israel a peace treaty in return for the Sinai. Sadat’s recognition of Israel, his reliance on the United States, and his economic liberalization turned all the assumptions of Arab nationalism on their head — and Sadat offered no apologies for doing so. Instead, he made an explicit case for Egypt’s right to chart its own course and address its own problems first. Sadat paid for his policies with his life, and Egypt was briefly ostracized for its peace with Israel. But other Arab states cautiously followed suit. More often than not, they now justified their choices by invoking Syrian, Jordanian, Saudi, or Iraqi national interests, not Arab national destiny. And by legitimizing themselves as states, despite their origins in imperial map rooms, they came that much closer to legitimizing Israel, despite its origins in Zionist drawing rooms.
For the first time, it became possible to criticize the myths of Arabism, and to see the differences among Arabs not as “accidental” but as living realities, even deserving of respect. Lebanon’s most prominent historian, Kamal Salibi, criticized Arab nationalism for “deluding the general run of the Arabs into believing that the political unity they had once experienced under Islam was in fact an Arab national unity which they have subsequently lost, or of which they have been deliberately robbed.” This made it “difficult for them to properly accommodate to the political realities of the present.” Salibi called on intellectuals to
discount the erroneous Arab nationalist view of this history as a united national march that went wrong at some point, and correctly assess it as the parochial history that it normally was: an account of so many different Arab regional experiences of one kind or another, fitting more or less into a general pattern. No Arab country today need feel any guilt about accepting its actual existence as a willful or unwillful departure from an Arab national historical norm. It is only when the Arabs succeed in ridding themselves of the highly idealized Arab nationalist vision of their past that they will be able to live together in the modern Arab world as a coherent political community whose various members relate to one another constructively and without reserve.32
After 1967, this once-surreptitious view could be pronounced openly, and laid the intellectual foundation for the growing self-confidence of individual states.
But that self-confidence rested as much on power as persuasion. Despite their difficulties on the battlefield, these states had mastered the technologies of domestic surveillance. The regimes realized that defeat left them vulnerable, and resolved to forestall any dissent by using these technologies to make the state ubiquitous. The approach largely worked. Unlike the defeat of 1948, which inaugurated a bout of instability, the even more humiliating defeat of 1967 marked the beginning of an era of unprecedented stability, even immobility. The flood of oil income that followed the 1973 war also permitted regimes to buy off dissent. The state had not only become legitimate, it had become omnipotent. In the words of one Syrian intellectual: “The cancerous growth of the state has been accompanied by the increasingly diminished power of everybody and everything else, especially what some Arab thinkers and leaders enjoy calling ‘The People.'” As a consequence, “Arab society is on the whole cancelled out as a reality of political significance in the reckonings of all Arab regimes.”33
By the time communism collapsed, the Arab lands had become the last preserve of protracted one-man rule, and so they remain today. The king of Jordan has reigned now for forty years, the king of Morocco for thirty-two years. Libya’s leader made his coup twenty-four years ago. The chairman of the Palestine Liberation Organization (PLO) has held his title for twenty-four years. Syria’s president has held power for twenty-two years. Iraq’s ruler has held sway over the country for twenty-two years, the last fourteen as president. The emir of Kuwait has reigned for fifteen years, the king of Saudi Arabia for eleven years. Egypt’s president has held office for twelve years. Not one of these states could be categorized as a democracy, although after 1967 they laid unprecedented claims to the loyalty of their citizens and subjects, and intruded upon virtually every aspect of society.
Only Lebanon, the perennial exception, proved incapable of enhancing its legitimacy and its power over society after 1967. In this birthplace of Arab nationalism, social peace had come to depend on equilibrium between the myths of “eternal Lebanon” and “one Arab nation.” The Maronites agreed to march in step with the Arabs, so long as they could carry the flag of Lebanon; the Muslims agreed to parade behind the flag of Lebanon, provided the parade marched to an Arab cadence. By this understanding, Lebanon would supply intellectual rationales for Arab nationalism; others would provide the soldiers for its battles. For a time the equilibrium held, and Lebanon established a quasi-democratic public order and a free-market economy. In times of regional crisis, Lebanon did its duty by words, and managed to dodge war with Israel. But after 1967, Lebanon began to lose its balance. The Muslims, wracked by guilt, demanded that Lebanon finally take up the Arab burden of Palestine, and open its southern border to attacks against Israel. The Maronites, awed by Israel’s example, thought they could turn the state of Lebanon into something comparable: a small powerhouse, armed to the teeth, defiant of the Arab world around it. In 1975, the situation exploded in civil war, and Lebanon virtually disappeared under a checkered map of militia fiefdoms, crisscrossed by green and red lines. The only lines that did not count were Lebanon’s borders, and both Syria and Israel entered the fray. When Israel invaded Lebanon in 1982, it worked even more feverishly with its Lebanese allies to remake the country in its image, but to no avail. Since 1989, Syria has tried to do the same, with more resolve and success.
Aside from Lebanon, all other states exercised more confident power over their societies, and more independence from one another. Before 1967, Arab nationalism appeared to drain states of their legitimacy. After 1967, its slippage seemed to produce a surge of legitimacy that strengthened both states and incumbent regimes. This strength had severe limitations: Arab states still could not stand up to powerful external enemies such as Israel. But they could ward off interventions by one another, and enforce their will over their own societies with an almost ruthless efficiency.34
The Challenge of Islam
The voice of Islam also bid to fill the silence left by Arab nationalism. Arab nationalists had always regarded Islamic loyalty as a potential rival, and had tried to disarm it by incorporating Islam as a primary element in Arab nationalism. Even the Christians among them went out of their way to argue that Arab nationalism complemented rather than contradicted the Islamic loyalties still felt by so many Arabs. “The power of Islam,” affirmed Michel Aflaq, the founding ideologue of the Ba’th and a Christian by birth, “has revived to appear in our days under a new form, that of Arab nationalism.”35
But many Muslim Arabs saw this as a confidence game, and regarded Islam and any form of nationalism as mutually exclusive. For Sayyid Qutb, the Egyptian ideologue of Islam who was executed by Nasser in 1966, Arab nationalism signified “spiritual decadence.” If the Prophet Muhammad had so wished, he “was no doubt capable of setting forth a movement of pan-Arab nationalism in order to unify the strife-torn tribes of Arabia.” Instead, he called all of mankind, Arab and non-Arab, to submit to God. The Arabs thus enjoyed no privileged standing in Islam, of the kind claimed by Arab nationalism: “God’s real chosen people is the Muslim community, regardless of ethnic, racial, or territorial affiliation of its members.” Reflecting on early Islam, Qutb concluded that the “sole collective identity Islam offers is that of the faith, where Arabs, Byzantines, Persians, and other nations and colors are equal under God’s banner.” During his police interrogation, Qutb announced that Arab nationalism had “exhausted its role in universal history.”36
The Islamic critique of Arab nationalism extended beyond its theory to its practice. Arab nationalism had erred in breaking the primary bond of Islam during the Arab Revolt — a bond that linked Arab and Turk. The Arab nationalists betrayed their fellow Muslims in order to side with the British, who naturally betrayed them — a just reward for those who placed their trust in unbelievers. The Arab nationalists then compounded their error by abandoning reliance on God and his divine law, in order to become liberals, fascists, and socialists, in mimicry of foreign ideological fashion. And while they professed respect for the faith of Islam, they filled their prisons with the truly faithful, whom they accused of subversion for preaching the word of God. Who did not doubt that the rout by the Jews, and the falling of Jerusalem into Zionist hands, constituted a punishment for straying from God’s path? Did not Israel itself prove the power of religion and state combined?
This brand of Islamic loyalty enjoyed an immense appeal among the members of two underclasses. The first was composed of Shi’ites, who formed a majority in Iraq and Bahrein, the largest single confessional community in Lebanon, and important minorities in Saudi Arabia and the Arab Gulf states. Arab nationalism acknowledged them as fellow Arabs, but it glorified precisely that “golden age” of Arab history that the Shi’ites mourned as disastrous, during which their heroes were martyred by the very same caliphs lionized in Arab nationalist historiography. In the present, the institutions of Shi’ite Islam, and even many Shi’ite families, straddled the divide between the Arab states and Iran, so that many Shi’ites regarded Arab nationalism as an artificial division, incompatible with the Arab-Persian symbiosis of contemporary Shi’ism. After Iran’s revolution in 1979, many Shi’ites in Arab lands identified so strongly with its success that they declared their allegiance to the revolution’s leader, Ayatollah Khomeini, and repudiated both Arab nationalism and loyalty to the individual states in which they lived. Lebanon’s Hizbullah took this the furthest, professing absolute obedience to the leader of the Islamic revolution, and denouncing “the Arabs” for self-worship and their capitulation to Israel.
The other underclass consisted of the tens of millions of indigents who had abandoned the countryside and flooded into the cities, and whose lot worsened as populations grew and oil incomes fell. In the slums and bidonvilles of Cairo and Algiers, not only did the doctrines of Arab nationalism sound obsolete, but the promises of prosperity made by states also rang hollow to those in the grip of grinding poverty and unemployment. In growing numbers, the dispossessed gave their loyalty to Islamic movements that employed a more familiar vocabulary and called for the reinstitution of Islamic law as the panacea for all political, social, and economic ills. These Islamic movements were prepared to work within existing states, but only as matter of convenience. They professed loyalty only to Islamic law, and committed themselves to fight for its implementation wherever possible, even in distant Afghanistan, where many thousands of Arab Muslims fought as volunteers against Soviet forces and their “atheistic” Afghan clients. For these believers, their political community did not end at the border crossing of any state, or even where Arabic ceased to be spoken. It extended to any place where Islam reigned supreme or had to be defended.
In the void left by Arab nationalism after 1967, two ideas of community thus competed for primacy. On the one side stood those who argued that the inhabitants of any one state constituted a distinct people in a political sense. Regimes championed this idea, for it legitimized their claim to act solely in the interests of the state — identified increasingly with one ruling group or one ruler. On the other side stood those who believed that all Muslims constituted a universal political community, standing above any narrower political authority. This idea suited opposition movements, since it denied legitimacy to all existing regimes. An immense gap separated these two visions, but their adherents agreed on one point: Arab nationalism had failed irredeemably, having either been too broad or two narrow to satisfy the quest for identity.
Arab Nationalism Adrift
And what of the remaining Arab nationalists? After 1967, their numbers and influence steadily dwindled, except among intellectuals. Many intellectuals actually did live a pan-Arab reality. They wrote in Arabic for an audience that stretched “from the Ocean to the Gulf,” and published in pan-Arab journals that circulated just as widely. They jetted from capital to capital for conferences on the state of the Arabs. They had one foot (and sometimes both) in the West, where the freest Arabic press and publishing houses did their business. In this rarified atmosphere, the myths of Arab nationalism could still be sustained. For the most part, these intellectuals did not regard the defeat of 1967 as a failure of their idea, but rather as a failure of its implementation by others, who were criticized for not being sufficiently radical or sufficiently ruthless. Much of the Arab nationalist “self-criticism” after 1967 pushed even further toward advocacy of violent change. But intellectuals lacked an Arab Bismarck who would revive an idea whose time had come and nearly gone. Nasser had faltered, and in 1970 he died. The Ba’th in Syria, after more twists and turns, came to rest in 1970 under Hafiz al-Asad, a master of realpolitik who put Syria above all. For lack of better alternatives, Arab nationalists fixed their hopes first on the Palestinians, and finally on Saddam Hussein.
The Palestinians were a desperate choice, since they themselves had largely despaired of other Arabs. At the height of Nasser’s powers, they had allowed themselves to believe in him, and to see him as their redeemer. Nasser also prompted the creation of the PLO in 1964, under the auspices of the Arab League. But even before the Arab armies collapsed in 1967, Palestinians had begun to transform the PLO into an instrument of their own. The dominant Fatah component had no pan-Arab pretensions. Fatah demanded the moral support of the Arab states, and even exterritorial zones of operation, especially along Israel’s frontiers. It was prepared to fight to assure the independence of these bastions. But it promoted no message of Arab revolution, and it gave first priority to the establishment of a Palestinian “entity,” presumably a state, which would fit into the existing Arab state system.37
But other Palestinian groups took a different course, announcing they would work to topple the “petty bourgeois regimes” of the Arab states as a stage in their struggle to liberate Palestine. This was the pan-Arab promise of the so-called Arab Nationalists Movement and its most flamboyant offspring, the Popular Front for the Liberation of Palestine (PFLP), both founded by students at the American University of Beirut. Their high-strung rhetoric and hijackings made them the heroes of many Arab intellectuals who, like their New Left contemporaries in the West, demanded “revolution” now.
The fedayeen, the Palestinian guerrillas in the rock-strewn hills opposite Israel, became the symbols of this struggle. Living on the edge and citing Mao and Guevara, they were themselves celebrated in poetry and song by the pan-Arab intellectuals. But although the fedayeen sought to imitate the methods of guerrilla warfare that succeeded elsewhere, they completely failed to liberate any part of Palestine or the Arab world, and they provoked Jordan’s ruthless suppression in 1970. As Jean Genet recorded, the Palestinian “revolution” could be summed up in the phrase, “to have been dangerous for a thousandth of a second.”38 As the second passed, Arab nationalist enthusiasm for the Palestinian fringe waned, and even the fringe finally endorsed the mundane demand for a Palestinian state alongside Israel — one more Arab state, prepared to make one more compromise. “Our future is with Israel,” the spokesman of the PFLP, Ghassan Kanafani, told a French academic in 1970 — two years before his assassination by Israel. “Neither Europe, nor China, nor the Soviet Union, nor the Arab states, collectively or individually, are interested in us or would do anything decisive for us.”39 The Palestinian uprising that began in 1987 in the West Bank and Gaza was just that: a Palestinian uprising, relying not on the massive quantities of arms in Arab arsenals, but on stones and knives. The Palestinians would fight their own fight, in an effort to win the far more valuable sympathy of the West.
The choice of Saddam as the pan-Arab hero represented an even more desperate step. If anything, Saddam had done more than any modern Iraqi ruler to cultivate a specific Iraqi loyalty, drawing upon the legacy of ancient Mesopotamian civilization. In art, architecture, and poetry, the state encouraged the use of Mesopotamian motifs, and it lavished funds upon archaeological digs and restorations. Since no loyalties had survived from antiquity (which well predated the Arab conquest), all Iraqis could be accommodated by the Mesopotamian myth — Arabs and Kurds, Sunnis and Shi’ites. After Saddam blundered into war with Iran in 1980, Iraq billed herself as defender of the eastern Arab flank against the Persian hordes — all the better to justify the demand for war loans from Gulf Arab states. But Saddam was no ardent pan-Arabist, and in 1982 he dismissed the pan-Arab vision as an idea whose time had passed:
The question of linking unity to the removal of boundaries is no longer acceptable to present Arab mentality. It could have been acceptable ten or twenty years ago. We have to take into consideration the change which the Arab mind and psyche have undergone. We must see the world as it is. . . . The Arab reality is that the Arabs are now twenty-two states, and we have to behave accordingly. Therefore, unity must not be imposed, but must be achieved through common fraternal opinion. Unity must give strength to its individual partners, not cancel their national identity.40
Those twenty-two states, on which unity “must not be imposed,” included Kuwait.
In 1990, Saddam’s Iraq invaded Kuwait, declaring it a province of Iraq. Possession of Kuwait would have filled the Iraqi treasury in perpetuity (a treasury that held a cash reserve of $30 billion back in 1980 but groaned under a debt of more than $100 billion a decade later). Significantly, Iraq did not formally justify its invasion as an act of Arab nationalist unification. Iraq claimed that Kuwait belonged properly to the state of Iraq, and that the annexation asserted an Iraqi legal right, not an Arab moral claim. But Arab nationalists seized upon Saddam as though he were a reincarnation of Nasser, and an improvement at that, for being far more reckless and ruthless. While he lacked Nasser’s charm, he had oil, missiles, nerve agents, and nuclear potential — power, he hinted, that would be put at the service of all the Arabs. He would be their sword, much like the four giant swords he had cast for his victory arches in Baghdad, dedicated at a ceremony in 1989 during which he paraded upon a white horse.41
Hichem Djaït, the preeminent Tunisian historian, exemplified the euphoria of the intellectuals. In 1978, in a sober mood, he wrote that “it would not be healthy to pin all hopes on achieving some sort of absolute unity,” and that an attempt by any Arab state to use its power for that purpose would be “not only dangerous but doomed to failure.” No Arab state had sufficient power to effect such unity, and no Arab could “entertain the notion that America, Europe, or Russia would allow so cohesive a unity to be founded in the heart of the Old World.”42 The analysis makes perfect sense to this day, yet Djaït threw it to the winds after Saddam annexed Kuwait. Thanks to Saddam Hussein, he declared, “a new perspective is opening up, that of unification. And Iraq is its pole and motor.” If that meant war, or even defeat, it still represented a start:
I don’t have to tell you, as Europeans, that your nations were born out of wars. In annexing Kuwait, Saddam Hussein has entered the dynamics of history. He was trying to make sure of a source of wealth for himself, material means. In addition, he was undertaking the beginning of the unification of the Arab world. Sometimes legitimacy is more important than legality.43
“Our goal let us seek by the edge of the sword / For our goals we pursue are thus surely secured.” This verse from Yaziji’s ode of 1868 anticipated the preference for coercion that ran beneath the surface of Arab nationalism. Once its slogans no longer swayed millions, Arab nationalism gave up even the pretense of persuasion, to worship raw power. But Saddam had not amassed enough of that power; despite incredible military expenditures, Saddam’s Iraq, like the Palestinian fedayeen a generation before, could only be “dangerous for a thousandth of a second.” In the end, Djaït was right when he wrote in 1978 that an attempt by any Arab state to force unity would be “doomed to failure.” In battle, the Iraqi “motor” of unification immediately broke down, and the scenes of surrendering Iraqi soldiers and burned-out armored columns recalled nothing so much as the defeat of 1967. And in the end, Saddam was right when he said in 1982 that the “Arab mind and psyche” would not accept the imposition of unity or the removal of existing borders. Most of the Arab states joined the international coalition against him, to uphold a state system that had become their own, even if it originated long ago in an imperial partition. And it was not only Arab governments that rejected the invasion: the publics in the Arab coalition states, according to polls, never took Saddam seriously as a pan-Arab savior.44 The Arab nationalists called 1991 a defeat of the Arabs as a whole, analogous to 1967. But it was not analogous. In 1967, three Arab states were defeated, Arab territory was lost to foreign occupation, and all Arabs felt humiliated. In 1991, only Iraq was defeated, the sovereignty of an Arab state was restored, and millions of Arabs in Casablanca, Cairo, Damascus, and Riyadh considered themselves the victors.
In the war’s aftermath, the United States, the Arab states, and Israel moved to translate that victory into a new regional order that would represent the ultimate undoing of Arab nationalism. That order, Middle Eastern rather than Arab, and would include Israel as a legitimate state among states, to be recognized by all Arab states following a negotiation of peace and a definition of Israel’s borders. The new order would also include Turkey, and perhaps other states that wished to define themselves as Middle Eastern. The rationale for the idea of the Middle East, made most fully by some Cairo intellectuals, argued that the Arab nationalist vision had become anachronistic. It was ideological in a post-ideological age, and it pressed for continuation of a costly Arab cold war against Israel, although the Arabs could no longer count on any outside support following the end of the Superpower Cold War. The moment had come to shift priorities to the domestic agenda of economic growth, lest the Arab world sink under the weight of its swollen populations. As the unification of Europe seemed to demonstrate, the economic future belonged to regional formations composed of many nations. These cooperated to promote economic growth and collective security, relieving economies of the massive burden of military expenditure. Water, arms control, the environment, trade, tourism — these and hundreds of other issues could not be negotiated to a resolution by the Arabs alone. Arab states were also Middle Eastern states, and while they belonged to an Arab state system, they also belonged to a Middle Eastern regional order. The shape and content of that order would evolve over time; a first step would be the progress of Arabs and Israelis at the negotiating table.45
The idea of the Middle East as a framework of identity faces many obstacles. It has nothing like the depth of the idea of Europe. The Middle East is a term that was first put into wide currency by an American naval strategist, who in 1902 described it as “an indeterminate area guarding a part of the sea route from Suez to Singapore.”46 It remains a colorless and inaccurate term, but the idea of an Arab nation “from the Ocean to the Gulf” is no older, and the term Middle East passed long ago into common Arabic usage. Its translation into an organizing principle of regional relations would constitute the final triumph of the real map over the imaginary map. All now depends on adding the last touches to the real map — the mutually agreed borders that will define Israel.
Talking Democracy and Islam
Is it true, as Fouad Ajami wrote, that this signifies the “end of Arab nationalism”? Do its defenders, mostly in exile, inhabit “fortresses at the end of the road that are yet to receive the dispatches that all is lost and the battle is over”?47 Arab nationalism has suffered yet another blow, and has retreated almost to its point of origin, inspiring a few societies and clubs in Beirut, and some newspapers and journals published in Europe. With the exception of Libya under the mercurial Mu’ammar al-Qaddhafi, no Arab state makes any pretense of championing Arab nationalism. Yet Arab nationalists have not lost hope that from their last fortresses, they might return triumphant to recapture the center. Did that not happen in the case of Iran, where an old ayatollah, banished to one of the last bastions of Shi’ite Islam, launched a revolution and swept to power? The return of political Islam from purgatory holds out hope to Arab nationalists that they might do the same. Their desperate gamble on Saddam failed, but there are other avenues of return, provided Arab nationalism can adapt to the changing spirit of the times.
Arab nationalism has never been totally averse to such adaptation. The core of its message has never changed, and remains the existence of one Arab nation, destined to be drawn together in some form of unity, and poised antagonistically against an array of external enemies. But in the past, Arab nationalism borrowed supplementary themes and vocabulary from liberalism, fascism, socialism, radicalism, and messianism. As the division of the Arab world became ever more established and recognized, this borrowing achieved less, so that Arab nationalism became ever more utopian in its presumptions. But given the immense economic and social problems that face Arab societies, there are Arab nationalists who believe that any moment might become a revolutionary one. They intend to be there.
Since the “defeat” of 1991, they have bid to stay in the contest by presenting Arab nationalism as the natural ally of democracy and Islam. In theory, Arab nationalism never required a commitment to either, and in practice it showed a strong preference for revolutionary dictators and a strong aversion to Islamic movements. In their prime, Arab nationalists had no qualms about banning political parties and executing Islamic activists, all in the name of Arab unity. That they now have fixed upon democracy and Islam is less a matter of conviction than convenience. They understand that the prevailing order has two weaknesses. First, it is not democratic. Its aging rulers, in power now for a generation, are under pressure from a populace that gets younger every year, and that yearns for a measure of political participation. Second, it is not legitimate in the eyes of the growing numbers of frustrated people who have filled the ranks of Islamic movements. They genuinely yearn for a measure of authenticity, which they believe can only be achieved by the creation of an Islamic state under Islamic law. Somewhere in the Arab world it is possible that a regime might succumb to one of these weaknesses. Arab nationalists hope to join the resulting fracas and perhaps emerge triumphant by championing either democracy or Islam or both.
From a reading of the leading journals of pan-Arab opinion, it appears that the slogan of Islam has been more difficult to sing. There is plenty of common ground with Islamic discourse, most notably in the shared conviction that the Arab world still suffers from imperialist domination and that Israel’s presence must not be normalized. But Islam already has its champions, in the form of well-organized and disciplined mass movements, and these express almost no interest in an alliance with the discredited stragglers of Arab nationalism. The lengthy round-table debates among Arab nationalist intellectuals about their possible relationship with Islamic movements are not reciprocated by the Islamists, whose leaders have no need for guidance from others, especially those who once persecuted them.48 Still, some Arab nationalist intellectuals, from their perches in Europe and America, have offered their intellectual services to the defense of Islamic movements before Western opinion — something Islamic movements have been ill-prepared to undertake themselves. This has created the foundations of a relationship, although not all Arab nationalists are pleased or prepared to become apologists for varieties of Islam which, only a few years ago, they denounced with all their polemical force.
In contrast, the slogan of democracy is easier to appropriate. There are no mass democracy movements, and while virtually every Arab regime now claims to be committed to democracy, their late conversion often seems less credible than that of the Arab nationalists themselves. And so the pan-Arab journals brim with articles, conference proceedings, and study-group reports on the methods and means of promoting democracy in the Arab world. The assumption underlying this sudden enthusiasm for political pluralism and free elections is that if the people were only allowed to express themselves, they would endorse the Arab nationalist program: greater Arab unity, repudiation of the United States, and withdrawal from the Arab-Israeli peace process.49 This belief flies in the face of the existing attitudinal surveys, which show a continuing shift of self-identification away from the Arab nation, and toward either the state or Islam. The results of those relatively free elections held to date show a similar polarization between the party of the state and the party of Islam. No Arab nationalist parties have been a factor in these elections. And while there is a constituency for some elements of the Arab nationalist program, it clearly belongs to Islamic parties, whose platforms incorporate similar repudiations of American hegemony and Israel, but are couched in the language of Islam.
In these circumstances, the commitment of Arab nationalists to democracy remains as superficial as that of the Islamists and the regimes. It is deployed as a slogan for mass mobilization against the existing order, and then as a shield against the revenge of a triumphant Islam. But even as the Arab nationalists speak of democracy, their eyes remain fixed on the horizon, awaiting the next Nasser, the next Saddam — the man who will save the Arabs from themselves and unite them. Even now, when the slogan of democracy is on everyone’s lips, half of the Arab nationalist intellectuals in a recent survey believe that Arab unity can only be achieved by force, not by democracy.50
But Arab nationalism, having lost almost everything, now has little to lose, and its endorsement of democracy and Islam has been made in just that spirit. That Arab nationalism should now cast itself as the defender of freedom and the faith is ironic. The irony is not lost on the Arabs themselves, who have a strong sense of history and long memories. They discarded Arab nationalism because it failed to keep its promise of power, even as it exacted an exorbitant price in freedom and faith. It was not the only utopian ideology to do so at the time. And perhaps the more useful comparison, when the perspective is longer, may be between Arab nationalism and Soviet communism: two great myths of solidarity, impossible in their scale, deeply flawed in their implementation, which alternately stirred and whipped millions of people in a desperate pursuit of power through the middle of the twentieth century, before collapsing in exhaustion — and stranding their last admirers in the faculty lounges of the West.
© Martin Kramer
1 Ibrahim al-Yaziji, “Tanabbahu wa istafiqu” (“Awake and Arise”).
2 George Antonius, The Arab Awakening: The Story of the Arab National Movement (London: H. Hamilton, 1938).
3 Mahmoud Darwish, “Bitaqa hawiyya” (“Identity Card”).
4 Nizar Qabbani, “La buda an asta’dhina al-watan” (“I Must Ask the Homeland’s Permission”).
5 Rupert Emerson, From Empire to Nation: The Rise to Self-Assertion of Asian and African Peoples (Cambridge: Harvard University Press, 1960), 126.
6 See, for example, Ernest Gellner, Nations and Nationalism (Ithaca: Cornell University Press, 1983); and Elie Kedourie, Nationalism, 4th ed. (Oxford: Blackwell, 1993).
7 First assessed by George Antonius, The Arab Awakening. For subsequent accounts, see Zeine N. Zeine, Arab-Turkish Relations and the Emergence of Arab nationalism (Beirut: Khayat’s, 1958); Sylvia Haim, Arab nationalism: An Anthology (Berkeley and Los Angeles: University of California Press, 1962), pp. 3-72 (introduction); Albert Hourani, Arabic Thought in the Liberal Age 1798-1939 (London: Oxford University Press, 1962; reprint, Cambridge: Cambridge University Press, 1983); C. Ernest Dawn, From Ottomanism to Arabism: Essays on the Origins of Arab Nationalism (Urbana, Ill.: University of Illinois Press, 1973); Philip S. Khoury, Urban Notables and Arab nationalism: The Politics of Damascus 1860-1920 (Cambridge: Cambridge University Press, 1983); A. A. Duri, The Historical Formation of the Arab Nation, trans. Lawrence I. Conrad (London: Croom Helm, 1987); Bassam Tibi, Arab nationalism: A Critical Inquiry, 2d ed., trans. Marion Farouk Sluglett and Peter Sluglett; (New York: St. Martin’s Press, 1990); and Rashid Khalidi et al., eds., The Origins of Arab Nationalism (New York: Columbia University Press, 1991).
8 For the most systematic critique of the “awakening,” see Hisham Sharabi, Arab Intellectuals and the West (Baltimore: The Johns Hopkins University Press, 1970). For its difficulties in creating a modern vocabulary of politics, see Ami Ayalon, Language and Change in the Arab Middle East: The Evolution of Modern Arabic Political Discourse (New York: Oxford University Press, 1987).
9 Gertrude Bell, The Desert and the Sown (London: W. Heinemann, 1907), 140.
10 Turkish nationalism, inspired by Balkan nationalisms, in turn inspired much of the outlook of early Arab nationalism. On its genesis, see David Kushner, The Rise of Turkish Nationalism, 1876-1908 (London: Frank Cass, 1977).
11 See Neville J. Mandel, The Arabs and Zionism before World War I (Berkeley and Los Angeles: University of California Press, 1976).
12 Elie Kedourie, “Pan-Arabism and British Policy,” in Elie Kedourie, The Chatham House Version and other Middle-Eastern Studies (London: Weidenfeld and Nicolson, 1970; reprint, Hanover, N.H.: University Press of New England, 1984), 213.
13 On Arab politics in the immediate postwar period, see Zeine N. Zeine, The Struggle for Arab Independence: Western Diplomacy and the Rise and Fall of Faisal’s Kingdom in Syria, 2d ed. (Delmar, New York: Caravan Books, 1977).
14 For the genesis of the names that filled the postwar map, see Bernard Lewis, “The Map of the Middle East: A Guide for the Perplexed,” The American Scholar 58, no. 1 (winter 1988-89): 19-38.
15 The deep debate in Lebanon over the very definition of its history is considered by Ahmad Beydoun, Identité confessionnelle et temps social chez les historiens libanais contemporains (Beirut: Université libanaise, 1984); and Kamal Salibi, A House of Many Mansions: The History of Lebanon Reconsidered (Berkeley and Los Angeles: University of California Press, 1988).
16 While the story of the Arab Revolt has been told many times, most famously by T. E. Lawrence and George Antonius, there are fewer accounts of the rival campaigns for separate independence in different parts of the Fertile Crescent. For a widening of the perspective, see Eliezer Tauber, The Arab Movements in World War I (London: Frank Cass, 1993).
17 Quoted by William L. Cleveland, The Making of an Arab Nationalist: Ottomanism and Arabism in the Life and Thought of Sati’ al-Husri (Princeton: Princeton University Press, 1971), 127.
18 Ibid., 163-65.
19 On this evolution, see C. Ernest Dawn, “The Formation of a Pan-Arab Ideology in the Inter-War Years,” International Journal of Middle Eastern Studies 20 (1988): 67-91.
20 On the Egyptian debate over identity, see Israel Gershoni and James P. Jankowski, Egypt, Islam, and the Arabs: The Search for Egyptian Nationhood (New York: Oxford University Press, 1986).
21 These plans have been considered in great detail by Yehoshua Porath, In Search of Arab Unity 1930-1945 (London: Frank Cass, 1986).
22 J.C. Hurewitz, The Middle East and North Africa in World Politics: A Documentary Record, 2d ed., vol. 2, British-French Supremacy, 1914-1945 (New Haven: Yale University Press, 1979), 736. For the development of inter-Arab relations in this period, see Bruce Maddy-Weitzman, The Crystallization of the Arab State System, 1945-1954 (Syracuse: Syracuse University Press, 1993).
23 For a contemporary discussion of the transition to ideological politics, see Leonard Binder, The Ideological Revolution in the Middle East (New York: John Wiley, 1964).
24 Translation in Haim, Arab nationalism: An Anthology, 233-41.
25 Sami al-Jundi, a member of the Ba’th from its earliest years who wrote a devastating account of the party, as quoted by Elie Kedourie, Arabic Political Memoirs and Other Studies (London: Frank Cass, 1974), 201.
26 For the early history of the Ba’th, see Kamel S. Abu Jaber, The Arab Ba’th Socialist Party: History, Ideology, and Organization (Syracuse: Syracuse University Press, 1966); John F. Devlin, The Ba’th Party: A History from Its Origins to 1966 (Stanford: Hoover Institution Press, 1976); and Kanan Makiya [Samir al-Khalil], Republic of Fear: The Politics of Modern Iraq (Berkeley and Los Angeles: University of California Press, 1989), 149-257.
27 For this period, see Malcolm H. Kerr, The Arab Cold War: Gamal ‘Abd al-Nasir and His Rivals, 1958-1970, 3d ed.(London: Oxford University Press, 1971); and P. J. Vatikiotis, Conflict in the Middle East (London: George Allen and Unwin, 1971).
28 David Holden, Farewell to Arabia (New York: Walker, 1966), 101.
29 Abdul Aziz Said, “Clashing Horizons: Arabs and Revolution,” in People and Politics in the Middle East, ed. Michael Curtis (New Brunswick, N.J.: Transaction, 1971), 279.
30 Fouad Ajami, “The End of Pan-Arabism,” in Pan-Arabism and Arab nationalism: The Continuing Debate, ed. Tawfic E. Farah (Boulder, Colo.: Westview Press, 1987), 98.
31 The most thought-provoking account of the post-1967 crisis of Arab nationalism remains Fouad Ajami’s The Arab Predicament: Arab Political Thought and Practice Since 1967, updated ed. (Cambridge: Cambridge University Press, 1992). Other works representative of the reassessments made by Arab intellectuals include Abdallah Laroui, The Crisis of the Arab Intellectual: Traditionalism or Historicism?, trans. Diarmid Cammell (Berkeley and Los Angeles: University of California Press, 1976); Samir Amin, The Arab Nation (London: Zed Press,1978); Hisham Sharabi, Neopatriarchy: A Theory of Distorted Change in Arab Society (New York: Oxford University Press, 1988); and Paul Salem, Bitter Legacy: Ideology and Politics in the Arab World (Syracuse: Syracuse University Press, 1994). For a variety of assessments by non-Arabs, see Michael Hudson, Arab Politics: The Search for Legitimacy (New Haven: Yale University Press, 1977); Jacques Berque, Arab Rebirth: Pain & Ecstasy, trans. Quintin Hoare (London: Al Saqi Books, 1983); David Pryce-Jones, The Closed Circle: An Interpretation of the Arabs (New York: Harper and Row, 1989); and Olivier Carré, Le nationalisme arabe (Paris: Fayard, 1993).
32 Salibi, A House of Many Mansions, 218, 231.
33 Kamal Abu-Deeb, “Cultural Creation in a Fragmented Society,” in The Next Arab Decade: Alternative Futures, ed. Hisham Sharabi (Boulder, Colo.: Westview Press, 1988), 165.
34 The strengthening of the Arab state served as the theme of a multiyear project on “Nation, State and Integration in the Arab World,” which generated four volumes of detailed studies. The most significant of these studies are collected in Giacomo Luciani, ed., The Arab State (Berkeley and Los Angeles: University of California Press, 1990).
35 Michel Aflaq, Fi sabil al-ba’th (Beirut: Dar al-Tali’a, 1963), 55.
36 Quoted by Emmanuel Sivan, Radical Islam: Medieval Theology and Modern Politics (New Haven: Yale University Press, 1985), 30-32.
37 On the evolution of this approach, see Moshe Shemesh, The Palestinian Entity 1959-1974: Arab Politics and the PLO (London: Frank Cass, 1988).
38 Jean Genet, Prisoner of Love, trans. Barbara Bray (London: Picador, 1989), 239.
39 Quoted by Olivier Carré, Le nationalisme arabe, 175.
40 Quoted by Amatzia Baram, Culture, History and Ideology in the Formation of Ba’thist Iraq, 1968-89 (London: Macmillan, 1991), 121. The book includes a detailed discussion of the issue of identity in Iraqi politics, and the genesis of the Mesopotamian myth.
41 See Samir al-Khalil [Kanan Makiya], The Monument: Art, Vulgarity and Responsibility in Iraq (Berkeley and Los Angeles: University of California Press, 1991).
42 Hichem Djaït, Europe and Islam, trans. Peter Heinegg (Berkeley and Los Angeles: University of California Press, 1985), 140-41.
43 Quoted by Kanan Makiya, Cruelty and Silence: War, Tyranny, Uprising, and the Arab World (New York: Norton, 1993), 242. The second half of this work is devoted to the rush of Arab nationalist intellectuals to endorse Saddam Hussein before and during the Gulf crisis.
44 David Pollock, “The Arab Street”? Public Opinion in the Arab World, Policy Papers, no. 32 (Washington: The Washington Institute for Near East Policy, 1992), 29-41.
45 An example of this trend is the article by the Egyptian intellectual Lutfi al-Khuli, “Arab? Na’am wa-lakin sharq awsatiyin aydan!,” Al-Hayat (London), 20 May 1992.
46 Roderic Davison, “Where is the Middle East?,” in The Modern Middle East, ed. Richard Nolte (New York: Atherton, 1963), 16-17.
47 Fouad Ajami, “The End of Arab nationalism,” The New Republic, 12 August 1991.
48 For an example of such a debate, see the proceedings of a roundtable of Arab nationalist intellectuals on the possibility of a nationalist-Islamist rapprochement, in Al-Mustaqbal al-arabi (Beirut) 161 (July 1992): 96-119.
49 For a typical statement of this view, see As’ad AbuKhalil, “A New Arab Ideology?: The Rejuvenation of Arab nationalism,” Middle East Journal, 46 (winter 1992): 22-36.
50 The survey was conducted by researchers at Yarmuk University, and included almost one thousand respondents from several Arab countries. See Al-Mustaqbal al-arabi (Beirut) 164 (October 1992): 27-33. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '638', 'language_id_whole_page_fasttext': "{'en': 0.95613831281662}", 'metadata': "{'Content-Length': '119076', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LHXGYMQF3WH4GCJ2DLEHM3VSI3VY46DG', 'WARC-Concurrent-To': '<urn:uuid:9110ab66-34de-4936-9d0f-5817b4080728>', 'WARC-Date': datetime.datetime(2019, 11, 16, 23, 38, 8), 'WARC-IP-Address': '206.188.193.132', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:TEETULIMLAUDC3EXYXK3FKDT2THHRFH2', 'WARC-Record-ID': '<urn:uuid:575d9258-ac1d-4f6e-afa8-766b222c047f>', 'WARC-Target-URI': 'http://martinkramer.org/sandbox/reader/archives/arab-nationalism-mistaken-identity/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4d51085c-718a-4b55-9ea4-0f2e04c70187>', 'WARC-Truncated': None}", 'previous_word_count': '13956', 'url': 'http://martinkramer.org/sandbox/reader/archives/arab-nationalism-mistaken-identity/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-254.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03392869234085083', 'original_id': '1adbfdf2a5f377a7d3728345e6abb505c66456eeac01a266b952d7a91180ddaf'} |
Nj Mart
The Way to Success
Category: Career Advice
The Top 6 Benefits of Becoming an Engineer
Engineering, the application to solve physical problems offers a wonderful career. Through the 4 year engineering course, you can not only learn about different tools, devices but can also acquire physical skills by working himself on the machines and benefits. Students opt for engineering because of several reasons. Whether it is the through parents will or it is through own choice, students would surely get benefits from the engineering. But one thing is compulsory student needs to do engineering degree in particular branch without utmost seriousness and sincerity. If you are serious right from the beginning then only you can make a better career in engineering. This article provides you essential information about top 6 benefits that can be acquired by becoming an engineer.
1. Jobs
The first and important benefit of selecting engineering is that a person can get the job at very early age. Unlike other professions in which persons need to spend pretty much time in gaining experience, in engineering a student can stand on his/her feet just after a span of four years. Also, people would not have the fear of losing engineering jobs after acquiring it once. Pretty much satisfication is provided by engineering jobs. Last but not least engineering jobs provide increment more early than the government and other profession jobs. Earn decent amounts of money and work for lesser times by selecting the engineering degree.
2. Huge Career Opportunities
career apportunity
If you are new to engineering, then you need to know that you can mould your career in different pathways after once selecting the B.Tech degree. Whether you want to become an astronaut, a scientist, a president or a filmmaker, you can do that by studying the specific degree. According to your choice and requirements, you can earn decent amount of money by selecting the specific engineering course. Along with the regular 4 year degree, students can also learn other medical and law courses. Thus, you can enhance your different skills by selecting the engineering degree.
3. Difficult Work
Hard Work
You need to know that any engineering job is not very easy. You need to learn a lot about working on different tools and machines. You would be assigned tough tasks that need to be completed in shorter durations. By operating the mind in different strategies, students acquire a better knowledge of any particular work. He/she gets good information for finishing specific work. Only an engineer who had practice a lot on different tools can perform difficult and complicated work.
4. Creativity
By spending pretty much time on certain numerical and questions, candidates acquire certain mental skills. They learn how to solve difficult tasks in the lesser amount of time. By working on various machines, tools and machines students develop large number of skills. If students themselves work on tools, they observe the changes and never forgot the strategy of implementing particular tasks. In particular 6-week and 6-month training, students are made to work on real-world problems; open-ended system and other applications. They are made to find the solutions to the problems by using their mind. All these things result in creativity and innovation. Students come up with better results and go on acquiring more and more success in specific technology.
5. Need
Another benefit is that engineering profession has a very bright future. It is impossible to calculate the time when we would not require electronic gadgets, cars, motorcycles and other machines. We can imagine our life without all these machines. Therefore, particular mechanical, electronics and software engineers are needed for designing the materials needed by the society. One thing is assure that you can’t sit idle after doing a four year bachelors degree.
6. Financial Benefits
Financial Benefit
Along with other benefits, engineer also avail some financial benefits. IT companies offer very high packages to meritorious and bright engineering students. Also, candidates get travelling and accommodation charges from the companies. After spending 3 months in the software companies, candidates get great amount of growth. It would be not wrong in saying that engineers enjoy a lavish lifestyle.
Many wonderful benefits can be availed by becoming an engineer. A person can get the decent job by completing the 4 engineer degree. According to the preference an engineer can become an astronaut, a scientist, a president or a filmmaker. Candidates acquire huge sense of creativity in the four-year engineer course. It is important to realize that engineering has a very bright future. Engineers can enjoy a lavish lifestyle because of very high salary.
Recent Post : Requirements for engineering high School.
What qualification required for MBA admission?
The MBA or Master’s in Business Administration program has become a much sought after degree in India and especially Punjab. Over the years the demand for higher education has sky rocketed with more and more students acquiring college degrees. Employers in major corporations, including tech and IT are looking for MBA graduates in Sales, finance, marketing and even Economics.
Mba admission
The level playing field has been raised and the job market in India has become even more competitive than before. More and more students in India and Punjab are opting out of the conventional engineering or medical fields to pursue MBA programs in the hope of broadening their career options. The MBA program offers not only broader career options, but better salaries, business opportunities and better management positions in MNC’S as well other large corporates.
The year 2013-2014 saw a meteoric rise in the number of B-Schools offering MBA programs. The approximate surge in B-schools climbed from only 3000 in 2009-10 to a staggering 4500 in 2013-14. As more students opted for the degree, the rising demand necessitated the creation of several tier 3 and tier 4 business schools. Most if not all these b-schools offer the MBA program in regular, part time as well as distance learning formats. While most students choose the regular format of attending B-schools because of the obvious benefits of networking and being part of a larger consolidate business network, many still opt for the part time and distance learning formats to earn the MBA degree, which by itself promises better career options.
While different schools, including the leading IIM’s and other top schools such as the Indian School of Business (ISB) and S.P. Jain Institute of Management have certain special MBA qualification requirements, on the whole, the basic qualification requirements for an MBA degree remain the same.
Let’s look at the basic qualification requirements for an MBA program in India:
1. You should have passed your 10+2 exams.
2. You should have secured at least 50% in any subject in a graduate/college degree or 45 % for SC/ST or persons with disability (PWD) category.
Note: The Bachelor program should be a minimum format of at least 3 years or 4 years.
1. As mentioned above there are 3 different ways of securing the degree: distance learning, regular and part time.
2. In the event of a CGPA system the equivalent percentage would be based on the equivalence certified by the university / institution from where they have obtained bachelor’s degree.
3. Take either the CAT OR MAT exams. (CAT is the common admissions test for MBA’s and MAT is the Management aptitude test.)
4. Depending on how you score, in any of the above exams, you can qualify for different top B-schools in the country.
Here is a short list of the best B-schools in India:
1. IIM, Ahmedabad
2. IIM, Delhi
3. IIM, Calcutta
4. IIM, Bangalore
5. ISB
Recent Post : The top benefits of becoming an Engineer.
Powered by WordPress & Theme by Anders Norén | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9523473978042604}", 'metadata': "{'Content-Length': '28002', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JKCVX7ATODAEKQREKFAGNEXZM4XS52BZ', 'WARC-Concurrent-To': '<urn:uuid:f52684b6-f6a0-4663-81b7-4da3ad8c8b9f>', 'WARC-Date': datetime.datetime(2017, 3, 24, 17, 46, 23), 'WARC-IP-Address': '108.179.232.94', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:TZZP5VWYBYQL4FLHCSQ3KIQL6GYVH2ZC', 'WARC-Record-ID': '<urn:uuid:df1f147a-6e4d-428c-9e3e-d79406666d4d>', 'WARC-Target-URI': 'http://njmart.in/category/career-advice/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f2acecc7-6166-4763-b354-bf1d302b562a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1286', 'url': 'http://njmart.in/category/career-advice/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04288434982299805', 'original_id': 'e2a601dd1daee52b0544ff3a0d4b82bdc3049c8a01be90ee411f95fb17725c61'} |
Potential role of the oropharyngeal microbiota in stunted childhood growth
Stunted growth is the consequence of chronic malnutrition, probably initiated or exacerbated by recurrent enteric infections and poor hygiene. Affected children seem to present a gut dysbiosis characterized by the unexpected presence of oral and pharyngeal microorganisms.
Stunted growth affects one quarter of children under 5 years old in the world. One possible cause is pediatric environmental enteropathy (PEE), a syndrome responsible for malnutrition that associates repeated bacterial gut infections (caused by poor hygiene) and chronic inflammation attributable to SIBO*. According to a French study on children with stunted growth (from Madagascar and Central African Republic), this syndrome is not the only factor.
Translocation of the oral microbiota
Despite genetic, environmental and nutritional differences between the two countries, researchers discovered that affected children from either community have a gut microbiota colonization by bacteria from the oropharyngeal microbiota. Species belonging to Haemophilus, Neisseria, Moraxella or even Porphyromonas genera (that usually colonize the oral flora) were observed in the 57 gastric samples and 46 duodenal samples collected. However, according to the scientific literature, some of these bacteria are associated with inflammatory diseases (including gastrointestinal cancers, type 2 diabetes, cardiovascular diseases).
A fecal marker with diagnostic value
These oropharyngeal bacteria were also found in the duodenal samples and overrepresented in the 404 perirectal samples collected from children with stunted growth, and not in children from the control group. Enteropathogenic bacteria belonging to the Escherichia coli/Shigella and Campylobacter genera were also more abundant. A decrease in Clostridiales was also found in affected children. These bacteria produce butyrate, a short-chain fatty acid (SCFA) that feeds epithelial cells and participates in the resistance of the host against opportunistic bacteria proliferation. The stool of affected children could thus contain a characteristic signature of stunted growth combining oropharyngeal bacteria, enteropathogens and low level of Clostridiales. This could pave the way to the development of non-invasive markers.
New hypothesis
The authors suggest that the presence of oropharyngeal bacteria in the fecal microbiota could be a contributing factor to PEE physiopathology. Proliferation of these oropharyngeal bacteria in the small intestine and colon could lead to inflammation. Associated to the presence of enteropathogens and decreased rates of butyrate, it could prompt chronic malnutrition in children, and thus result into stunted growth. This hypothesis could be confirmed by the cohort study of 1,000 children which is currently in progress. | mini_pile | {'original_id': '19128e79a2593f0a01c04e687822238ea052084dd9bfb2ad31ab544021a30971'} |
Friday, August 03, 2012
Too much CSI
There is such a thing as watching too much CSI!!! Someone backed into my car the other day, while it was parked in the parking lot. I was actually amazed to find a note on my windshield with a telephone number and an apology.
At first I thought that the number would be a "fake" - my CSI mind had started in overdrive because I was angry about the hit. I thought that the offenders felt they had to do something because the parking lot would have been full of employees from the building who also park in the lot and they would have gotten the license number and then it would have been hit and run - right!
Wrong - a very charming voice at the other end apologized and asked if I wouldn't mind getting 2 estimates and then they would give me a cheque for the damage. I was relieved. This was Thursday, July 26. By Monday, I had the 2 estimates and both were around $1,000.00. I called. The charming voice answered and said that he would pay the lower of the two estimates; but he couldn't do that until Wednesday because he was going to Montreal on business. I was dismayed, but I accepted and hung up.
Then I got to thinking - Wait a minute. Today was July 30 and Wednesday would be Aug 1. The accident happened in the parking lot of The Box Spot, a moving store. That's it!!! Once he found out that the damage was actually just under $1,000.00 the legal limit - anything over $1,000.00 you are required by law to register with the police, he decided he didn't have to pay and since he was moving out of the province on Tuesday - the end of the month - I was going to be left holding the bag!!!
I called back and got the answering machine. I was angry. I left a cryptic message. RATS. I did a google search. I got his address. I couldn't assess from the google map whether his house had a for sale sign on it - but at least I had an address. I was going to go up in the morning.
Well surprise, surprise. His wife called in the morning and suggested that I come and pick up a cheque. Amazing! It turns out that they were very lovely people just doing the right thing. I hated myself for all the negative thoughts. Now I have to get the car fixed so I can drive my 1998 Honda Civic another 14 years. Here is what $1000.00 looks like.
Honestly have a wonderful day!!
1. I'm not an insurance expert, however, if he bailed in the end and you at least had a phone number you could still report the incident and claim on your insurance since you're not at fault.
Any decent skip tracer would easily be able to hunt the culprit down (which they would).
2. Oh but parking lots are a tricky place............luckily there are still a handful of good souls out there and we all should be hopeful. Great story .....I will tune in again to see whats been developing in your next do make me smile.♥Debi | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9889373183250428}", 'metadata': "{'Content-Length': '105372', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:364NJWL6IF5MZ3ZUFK5XOUHLLO7UJLEM', 'WARC-Concurrent-To': '<urn:uuid:f01902ec-f869-464a-adb2-2ce0dd80e584>', 'WARC-Date': datetime.datetime(2018, 12, 14, 13, 45, 15), 'WARC-IP-Address': '172.217.3.51', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TUM35EIYBIN623FW36VFJ2R5BTOZRQLX', 'WARC-Record-ID': '<urn:uuid:be380fa8-6f02-4007-a005-ade58aa02f19>', 'WARC-Target-URI': 'http://www.lifeiswhathappens.ca/2012/08/too-much-csi.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d453cd6d-c283-496e-bcbc-5fa9fb22f848>', 'WARC-Truncated': None}", 'previous_word_count': '516', 'url': 'http://www.lifeiswhathappens.ca/2012/08/too-much-csi.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-168-82-48.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06670886278152466', 'original_id': 'ff044c2d2a5b4654f23a86030a39b1ab25fa0ec3b8b4131dbace4b6bf1bd8b68'} |
Average Outstanding Balance
Amount owed to a lender, including the balance after the last monthly payment and any interest accrued over time
What is the Average Outstanding Balance?
The average outstanding balance is the amount owed to a lender, including the balance after the last monthly payment and any interest accrued over time – usually after a month.
Average Outstanding Balance
A credit balance or installment that is subject to an interest rate qualifies to be an average outstanding balance. It includes only an average amount of loans that clients have not settled or savings that clients have not withdrawn over a period.
Although the average outstanding balance serves many functions, it is mainly used as an instrument to evaluate interest on the debt. The type of average outstanding balance methodology employed determines the amount of interest to be paid by a client.
• Average outstanding balance is a technique used by credit issuers to determine the outstanding loan portfolio.
• The average outstanding balance is generally calculated daily but can also be calculated on a monthly or an annual basis.
• While average outstanding balances are reported to credit reporting agencies to determine borrowers’ credit scores, it does not qualify as part of credit scoring methodologies.
Calculating Interest Using Average Outstanding Balances
A majority of credit card issuers calculate interest on revolving credit card loans using an average daily outstanding balance approach. A revolving credit card loan is the debt given after the last monthly repayment. As cardholders pay for purchases throughout the month, they accrue outstanding credit card balances.
Credit card providers use the average daily outstanding balance method to come up with slightly higher interest rates that not only factor into the credit card user’s balances in a period but also at the closing date.
A credit company can use average daily outstanding balance calculations to evaluate interest daily by compiling the average of the balances over the last month.
In most cases, credit providers obtain the average daily balance interest by multiplying the evaluated interest on cumulative days at the closing period with the average daily balance over the cycle of a statement.
Even so, the annual percentage rate divided by 365 days gives the daily periodic rate. Interest will be assessed based on the number of days in a statement cycle only if the evaluation of interest is cumulative at the closing date.
The average outstanding balance is also used in other methodologies. For example, a simple average outstanding balance may be used in a statement cycle by dividing the sum of the balance at the beginning and ending period by two, after which interest is evaluated as per the monthly rate.
Credit card issuers disclose their interest assessment methodology in the user agreement. Other credit provider institutions use monthly statements to detail procedures for calculating interest and average balances.
Average Outstanding Balance on Consumer Credit
Credit issuers report outstanding balances to credit reporting agencies every month. The total outstanding balance of a credit card is reported upon receiving the information.
However, while some credit providers may provide updates on their borrowers’ account status at the time a statement is issued, others opt to report outstanding balances on a particular day of every month.
Balances are reported for both revolving and non-revolving credit card users. Lenders also use outstanding balances to help in reporting delinquent payments that are late by sixty or more days. Borrowers’ credit scores are affected by the history and current capacity of outstanding balances.
Loan overdrafts and timeliness of payments are the main factors that determine consumers’ credit scores. In practice, multiple balances and late payments reflect a borrower’s risks of default and lead to limited credit access by credit companies. Usually, borrowers are required to maintain their total outstanding balances below 30%.
Nevertheless, borrowers that exceed the required limit can repair their credit score by making lump-sum payments to reduce the total overdrafts. As the total outstanding balance decreases, the credit score increases, leading to increased accuracy and credit access.
Timeliness is costlier to improve, as it often makes borrowers appear to be at high risk of default. As a result, late payments and delinquencies typically stay on credit reports for a longer time – usually seven years – even if the borrower pays the total outstanding balance in full.
However, if a borrower’s debt repayment or debt accumulation is exhibiting a drastic change over a short period, there will be a time lag in the outstanding balance reported to credit reporting agencies.
Calculating the Average Outstanding Balance
1. Find the average outstanding balance is to identify the time frame. In this example, the time frame is from November to December.
2. Gather all the information about the loan. Obtain the average debt amount at the start and end of a period, i.e., the ending balance of a credit account for two periods. In this case, the assumed ending balance for November is $50,000 and the ending balance for December is $70,000.
3. Find the average of the ending balance from November and the ending outstanding balance for December. For this example, ($50,000 + $70,000) / 2 = $60,000.
4. The average value is divided by the average number of accounts within the loan portfolio. Assuming that the number of accounts within the given period is 5, we get $12,000 ($60,000 / 5).
More Resources
• Banking Fundamentals
• Credit Score
• Bad Credit Causes
• Revolving Credit Facility
0 search results for ‘ | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '33', 'language_id_whole_page_fasttext': "{'en': 0.9374924302101136}", 'metadata': "{'Content-Length': '76203', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:E2SJ7XC7RWY3QFKKGYJ2WT6YFDEXGBNP', 'WARC-Concurrent-To': '<urn:uuid:8ed2b3ec-5cdb-4a99-87f2-05b4698a2c92>', 'WARC-Date': datetime.datetime(2022, 9, 30, 9, 26, 11), 'WARC-IP-Address': '160.251.76.207', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TCFHIZCVFOEAPGYJQYBEHD5UR7O7V4AE', 'WARC-Record-ID': '<urn:uuid:543939fb-3d30-4cda-a585-11d9b10a31a0>', 'WARC-Target-URI': 'http://embraceno.com/index-1335.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:93ae36c8-f9c0-4eed-877a-46b59e552ada>', 'WARC-Truncated': None}", 'previous_word_count': '933', 'url': 'http://embraceno.com/index-1335.html', 'warcinfo': 'isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1629820466041565', 'original_id': '0b470274f8db6086a318ad50ff8685aedee5af2dd2c8876afd78e3f3a5b96a9a'} |
Abu Dhabi, UAESaturday 20 April 2019
Why SWOT analysis is key to a successful business
Investors need to differentiate strong firms from those merely benefiting from a positive external environment
Identifying strong companies that can weather the storm is key for investors. Courtesy Getty Images
SWOT analysis has become a normal tool in business strategic planning. SWOT is an acronym for strengths, weakness, opportunities and threats. It works along two dimensions.
The first dimension is internal to the company versus external to the company. For example, the procedures and processes of a company are internal whereas the competition and the economy are external.
The second dimension of SWOT is positive or negative. For example, GDP growth of 5 per cent is considered a positive external event, whereas an unfilled CEO position is considered a negative internal event. The idea with SWOT is to build on strengths to take advantage of opportunities and defend against threats whilst at the same time working on improving weaknesses.
In the UAE, for a long time the external environment was strongly positive and there were plenty of opportunities. Even in 2008 during the global financial implosion and its aftermath, strong oil prices ensured a short-lived negative external event.
Today that is gone. The external environment has moved predominantly from opportunities to threats. Of course, threats can create opportunities as I will explain later but that needs the internal environment that is strong. And that is the million dollar question: Which companies are strong and which companies were simply enjoying a positive external environment? More importantly, in either case what can you do to respond to the changed external environment?
Let’s look at a company that might have been buoyed by the external financial environment and now faces the external issues of a challenging economy and a handful of unethical competitors. As with all solutions, there is the long-term resolution and a short-term phase that bridges the current situation to the proposed situation. In a previous article I wrote about the importance of effectiveness and not just efficiency.
Read more from Sabah al-Binali:
What Bitcoin can teach us about meaningful investing
Always dig beyond the ‘exciting’ headline to get to the facts of the story
Breaking down FAB's full-year numbers for a post-merger picture
To combat the two challenges that I outline above, a third element needs to be introduced: quality for money. In terms of surviving a large drop in the price of oil and its natural effect on the economy, competition increases. Why? Clients spend less and so companies must compete to grab market share from their competitors.
As chronicled repeatedly in this column, there has been a lot of work on efficiency as evidenced by large cuts in operating expenditure. This is not a guarantee of efficiency, as the cuts could be simply a decrease in production capacity or quality. But lets go with at least some efficiency. So if the cost wars are effectively ending, except for the desperate who sell below cost, what’s left? Quality.
Those companies that can increase the quality of their products and services whilst maintaining cost control will be able to grab market share from their competitors. Happily, this is also the solution when some of your competitors use non-commercial methods. If they cut corners with the regulators they will cut corners with their clients. If the regulators will not act, the clients will.
Finally, we come to the short-term bridge. It is corporate governance. A strong board can help a company. That means having independent non-executive directors. It also means having knowledgeable directors and good corporate governance. Such a framework will attract funding to businesses, which in turn allows them to transform into efficient quality providers of products and services.
Updated: October 7, 2018 12:21 PM
Editors Picks
Most Read | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9587488174438475}", 'metadata': "{'Content-Length': '196103', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IJNOWNFPDZ3XXOEDCDNFLUGUCH3KEWX7', 'WARC-Concurrent-To': '<urn:uuid:cf58ddbe-4082-47a9-8c84-28df21b2936a>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 56, 30), 'WARC-IP-Address': '13.249.44.94', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:EIICCN7YHR4OE2L4HKV26VNDV5KMBCIA', 'WARC-Record-ID': '<urn:uuid:1fbdcde5-2f0c-4727-965f-8f685472c225>', 'WARC-Target-URI': 'https://www.thenational.ae/business/comment/why-swot-analysis-is-key-to-a-successful-business-1.711414', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8c0d867e-30ca-4c89-a5e1-523d76c9489b>', 'WARC-Truncated': None}", 'previous_word_count': '651', 'url': 'https://www.thenational.ae/business/comment/why-swot-analysis-is-key-to-a-successful-business-1.711414', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-166-27-36.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.028166770935058594', 'original_id': '348fd56fcd7299a8dda45b0cd264dd01a36730ff37eeec0811fe273add24e44a'} |
Home Page arrow Chess Life Online arrow 2007 arrow September arrow USCL Week 3 Recap
USCL Week 3 Recap Print E-mail
By Robby Adamson
September 13, 2007
USCLmainlogo.jpg by Robby Adamson
In week three of the U.S. Chess League (August 29-November 28), the Boston Blitz emerged with the lone perfect score by crushing the Philadelphia Inventors 3.5-0.5. Meanwhile, the Dallas Destiny won against the Queens Pioneers to head up the Western division with 2.5/3.
Week Three Results
1. San Francisco Mechanics vs New York Knights TIE 2-2
2. Philadelphia Inventors vs Boston Blitz Boston 3.5-0.5
3. Baltimore Kingfishers vs New Jersey Knockouts TIE 2-2
4. Miami Sharks vs Carolina Cobras Carolina 2.5-1.5
5. Queens Pioneers vs Dallas Destiny Dallas 3-1
6. Seattle Sluggers vs Tennessee Tempo Seattle 3.5-0.5
Hikaru's Dubious Debut
The Monday night match featured division-leader San Francisco Mechanics and the winless but formidably stacked New York Knights.
GM-elect Vinay Bhat, who won his 3rd GM norm this summer in Spain knocked heads with GM Hikaru Nakamura.
Nakamura responded to Bhat’s somewhat surprising first move - 1.d4 (Vinay usually plays 1.e4) with 3…b5, a variation similar to the Benko Gambit, except white has not played c4, and achieved an advantage. Hikaru used almost none of his time the entire game, seemingly blitzing his way to an apparent victory. By move 30, Hikaru still had over 70 minutes left, while Vinay Bhat was using the 30 second increment to bounce just under and over one minute.
In the process of pressing for a win in an endgame that looked quite difficult to win, Bhat timely broke with 48. g4!, which caused Nakamura to later blunder with 57…Qf4+. Nakamura probably could have still drawn (though he had draws earlier) with 57…Ke8 with the idea of …Bd4+. Nakamura more than likely misassessed the ending as a draw. Bhat deserves a lot of credit for hanging in there against a top Grandmaster and understanding the critical nature of the position. This is one of two candidates for Game of the Week (and really a stronger candidate had Hikaru won a game where he completely outplayed Bhat).
Board 2 featured a solid win by IM Irina Krush over IM Vince McCambridge’s English Defense, which Irina won by mating Vince’s king in the middle of the board. Irina’s logical play and development of an attack on the kingside was quite effective. IM Jay Bonin from New York defeated fellow IM David Pruess on board 3 from a seemingly equal position. Finally, twelve-year old Gregory Young from the San Francisco Mechanics overcame a slight disadvantage on the black side of an Accelerated Dragon to defeat Matthew Herman. Because of Bhat’s win, San Francisco was able to tie the match with New York 2-2.
Wednesday night action
Wednesday brought the usual slate of 5 matches, starting with a matchup of the only two perfect 2-0 teams, the Boston Blitz and the Philadelphia Masterminds. Boston easily defeated Philadelphia 3.5-.5. With only GM Sergey Kudrin able to draw with GM Eugene Perelstheyn, Boston was able to win on boards 2-4. Jorge Sammour-Hasbun fought off a fierce attack from IM Bryan Smith, while Denys Shmelov topped Daniel Yeager and Chris Williams easily defeated the USCL-tough Elvin Wilson.
GM Joel Benjamin, leader of the New Jersey Knockouts, was unable to win a pawn-up but drawn rook ending against the Baltimore Kingfisher’s top board, GM Pavel Blehm, who was playing his first game of this year. Just when it looked like Baltimore would notch their second match win of the season after WGM Katerina Rohonyan defeated NM Victor Shen, and John Rouleau drew with New York’s 4th board Todd Lunna, the New Jersey Knockouts miraculously saved the match with Ippolito’s swindle of FM Enkhbat.
In the third match of the night, the Carolina Cobras narrowly defeated the Miami Sharks 2.5-1.5. The deciding games of the match was IM Jonathan Schroer’s exciting game against IM Blas Lugo and FM Oleg Zaikov’s defeat of IM Marcel Martinez.
Schroer defeated Lugo in a topical Botvinnik Semi-Slav, the other candidate for game of the week!
Oleg was able to grab Martinez’s sacrifice of his c-pawn and eventually win a seemingly difficult endgame.
In one of stranger matches in USCL, the Dallas Destiny defeated the expansion team Queen Pioneers 3-1, but not without some adventure. After IM Drasko Boskovic upset Alexander Stripunsky, and boards 2 and 3 were drawn, the Queen Pioneers seemed poised to draw the match. However, in the US Chess League, no position is completely safe. Michael Thaler played way too recklessly in the ending allowing Dallas’s WFM Bayarraa’s Zorigt to complicate the rook ending by activating her rook, and cheapoing Thaler in time pressure to preserve the match win.
In the final match of the night, Seattle continued their winning ways defeating the Tennessee Tempo 3.5-.5. Even though the result of the match was never in doubt, Board 1 featured an interesting match between Seattle’s IM Eric Tangborn, who defeated IM Marcel Martinez last week in an interesting game, and Tennessee Tempo’s IM Ron Burnett. In what appeared to be a dry middle game, the game heated up with some interesting tactics in the ending. Seattle continues to impress in the USCL.
Week four promises more excitement with Monday’s match between the New York Knights and the Boston Blitz. Could we see a match between Hikaru Nakamura against GM Larry Christiansen or GM Eugene Perelshteyn? Check out all the action and lots of numerous articles about the individual teams at U.S. Chess League.
FM Robby Adamson is the main chess.fm commentator for the U.S. Chess League. He is also the director of the Western Chess camp in Tucscon Arizona, where Robby is based. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9400026798248292}", 'metadata': "{'Content-Length': '30292', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:I34XD5O2M7FRL3HAEPJ7UPT4WXOJITRV', 'WARC-Concurrent-To': '<urn:uuid:112763d3-1757-49ed-a43b-c7d80495b7c2>', 'WARC-Date': datetime.datetime(2019, 5, 19, 21, 31, 44), 'WARC-IP-Address': '104.24.18.44', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:LBA44LBLCL7PWQA3U5PZDB5NIOE3V24D', 'WARC-Record-ID': '<urn:uuid:8bb6b8df-67c7-4947-8c7a-14228c84a2ed>', 'WARC-Target-URI': 'http://www.uschess.org/content/view/7871/381/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:be356d30-e010-4d97-9e99-1c955620cf88>', 'WARC-Truncated': None}", 'previous_word_count': '945', 'url': 'http://www.uschess.org/content/view/7871/381/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-186-87-179.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03480398654937744', 'original_id': '1312474f75402f2f37fc06bf5c3b4e6c5bb6697c8f3e9925e07554a6e962d1bd'} |
AASM News Archive
NHLBI Releases Executive Summary of Bariatric Sugery Workshop
|
|
Bookmark this page
|
Print
American Academy of Sleep MedicineTuesday, July 12, 2011
Recently the National Heart, Lung, and Blood Institute (NHLBI) released an executive summary of the 2011 NHLBI Bariatric Surgery Workshop that was held in January. Experts in bariatric surgery, cardiovascular disease, sleep disordered breathing, clinical trials, guideline development, and insurance coverage concurred with the need for randomized controlled trials as an important next step in developing a strong evidence base for bariatric surgery. They identified patients at high risk for cardiovascular disease as a priority population for clinical trials in bariatric surgery, while also identifying patients with sleep disordered breathing as an important sub-population to include. The workshop group also determined that shorter length trials should focus on recognized surrogate or intermediate markers such as changes in sleep disordered breathing as measured by the apnea-hypopnea index. | mini_pile | {'original_id': '6a93db761b8a45879be42fb1f1b1b804181ce0ce63929b335a5c5baeb2c0d246'} |
A man and a woman go for a walk with their two Border Collies (Mohssen Assanimoghaddam/Getty Images)
For the healthy, safe and secure, the coronavirus shutdown is also an opportunity to let go
I study the cost of being Always On to mental and physical health, including the immune system. Here's what I know
Matt Richtel
April 4, 2020 11:30PM (UTC)
We woke to thick raindrops in San Francisco on the first day of our semi-quarantine. Before my wife and kids got up, I sat in a chair looking out the window and petted a purring Pickles. I thought about a stark reality that might have dawned on you already about the novel Coronavirus of 2020.
Opportunity of a lifetime.
With the humblest recognition for all the suffering, the dying and desperation, I offer for the rest of us in relative safety the idea that we have the rarest chance to live in and with silence. With ourselves and our families.
On this society-wide Sabbath, a string of dark-lined Christmas Days with empty streets and tabled gatherings, we have permission to exhale, if we take it. That is no small ask.
Over the last decade for the New York Times and in books, I've studied the cost of being Always On to our mental health and physical well-being, including the immune system. I've studied the lure too of constant stimulation. It is powerful.
Modern times stoke with honed precision our primitive impulses to be on guard, respond to external stimulation, course with adrenaline. The daily commute, pack the lunch, hurry, a call from the boss — are you coming in today? — the latest poll numbers read on the train or heard on MSNBC or Fox, no time for exercise today, a call from school about a failed test or a bumped head, and then who the heck was supposed to make dinner?
On top of all of it, the call of the smartphone. No one on the other end, just you, playing Words With Friends, filling momentary vacancies with texts, lapsing into slack-jawed surfing. Why? Because it feels good, and because it helps you ignore the other pressures, the fact you've not accepted what you cannot change or changed what you can, and because the whole darn business model of the 21st century is capturing your attention.
Time to take it back. Right now. Don't finish this column if you don't want. I'd rather you do you. But if you want to go on, I'll give you some science, a few anecdotes, starting with the conversation I overheard that Saturday morning after the family rose.
"I need to get my dance bag together," my eight-year-old daughter said to my wife.
Not today, my wife told her. "It's a different kind of Saturday."
* * *
Stanford and Yale scholar Emma Seppala works with veterans who have killed, who have scooped the organs of dead and wounded friends, and some who have used terrible techniques during interrogation. She teaches the vets to breathe with deliberation, a version of meditation I won't belabor. It's the rationale and outcome I want to communicate.
When a vet with this kind of severe PTSD hears a door slam, he or she might dive under the table. The present becomes filled with triggers to horror. The soldier lives in a perpetual state of fight-or-flight, coursing with the hormones that drive our ability to survive in times of acute threat — even though there is no actual threat.
Dr. Seppala (and others doing similar work) has figured out that breathing can help turn off the physical response that has become associated with the memory. So when the door slams, or a car alarm sounds, the PTSD-plagued soldier gets a moment of clarity to decide: Is this really something to react to? The answer, most of the time, is no, and so the soldier need not go into fight-or-flight.
In medical jargon it's called the Sympathetic Response. It sends blood pressure up, heightens awareness, puts your body into a state of emergency. It also dampens the immune system's response to disease. Why would that be? Because if you're going to get eaten by a lion, the head cold doesn't matter, not in the moment.
Trouble is, in modern life, our body reacts far too often as if there is a lion that ain't.
"In our day and age, we're running on adrenaline, running on fight-or-flight," Dr. Seppala told me. "It comes through every facet of your life, the constant stimulation of every electronic source, ambition, the financial pressure."
People embrace a life of high caffeine, of over-scheduling, of waiting until the last minute to get things done. You're supposed to be in fight-or-flight when you're in a life-threatening situation. The whole body mobilizes. It takes so much toll on your body. We volitionally pump it up and think it's the only way to function.
Right now, add in Pre-T-S-D. What might happen? Will I get sick? What will happen to my job? My parents, grandparents?
From the breathing and the vets, you have a new tool. Breathe and disentangle the memories and fears of the future from the physical response. React less to the external stimulation that would have you dive beneath the chair. See it for what it is — a threat — but you are sitting in the chair while the rain falls outside and your family, for the moment, is safe.
* * *
The day before it rained, at a lunch break, I stood across the court from a tennis partner. He has a newborn and a boy he and his wife kept out of school even before they closed the doors. He is a professional investor, the plummeting market his watchword. Just before we started to play, he said, "I feel such gratitude."
"I have a job," he continued. "I love my family so much."
Amen, I said. Where did that come from — just now?
"I used to have the worst sciatica," he said. "About 18 years ago, couldn't sit at my desk, couldn't do anything. I read a book by a back doctor and realized it was about stress. I was at a startup, dot com bust, and I figured last in, first out. I'd screwed up in high school and thought I'd never get a job after that, or get into college."
"I had to learn to let go."
Can others learn that? Can they learn, I asked him, to feel gratitude in the face of crisis?
He was skeptical; I think, he said, they have to first hit rock bottom. I know whereof he speaks. I once collapsed emotionally, and I learned to meditate and to accept the fear that comes and goes in an uncertain life. It's not that I don't experience the fear, but I tell you from experience that the power to not let it take a physical toll on me is as good as a superpower.
It leads to more sleep, which also protects the body from infection. More sleep, less stress. More gratitude, less stress. Less stress, less infection. Take this moment when you're not commuting and blessed to be inside with your family, maybe with rain outside, and breathe and fight two infections at once: the novel coronavirus, which preys on a weakened immune system, and the infection of modern life that chips away at the soul.
* * *
My wife and I walked our dog, Uncle Mort, down a desolate street. A neighbor poked her head out the window. What if, she asked, our kids got together and knocked on the door of elderly residents in the neighborhood and offered them any help they might need? A trip to the grocery store? Or the pharmacy?
We walked on and I bubbled with the idea.
"Why do you always feel so much joy?" my wife asked me.
Don't worry. I don't always feel so much joy. It's just that the particular joy I felt right then seemed out of proportion with the moment.
"I'm here with you, and I love watching the dog waddle down the street, with his crew."
* * *
This is a time to sow. Plant seeds of contentedness and gratitude. Let them rest in the torn and ruptured soil of your spirit. It will spring.
Matt Richtel
Matt Richtel is a Pulitzer Prize-winning New York Times journalist and the author of "An Elegant Defense: The Extraordinary New Science of the Immune System."
MORE FROM Matt Richtel
Coronavirus Editor's Picks Essay Immune System Mental Health Social Distancing Stress
Fearless journalism
in your inbox every day
Sign up for our free newsletter
• • • | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '34', 'language_id_whole_page_fasttext': "{'en': 0.9597145318984984}", 'metadata': "{'Content-Length': '95289', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PEJMTLCZOFDTPEZORDDHSR7OO6RDLUJM', 'WARC-Concurrent-To': '<urn:uuid:9b9a0730-a287-4d2f-929b-d86d9faf86cc>', 'WARC-Date': datetime.datetime(2020, 6, 3, 1, 9, 55), 'WARC-IP-Address': '104.16.246.94', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FZVZBW2K3SC77YSKTQC457W5TPPZIDTU', 'WARC-Record-ID': '<urn:uuid:668648d9-40c6-490d-bf84-c8402b974c9d>', 'WARC-Target-URI': 'https://www.salon.com/2020/04/04/for-the-healthy-safe-and-secure-the-coronavirus-shutdown-is-also-an-opportunity-to-let-go/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:36fd85b1-0f3c-4511-bec3-dd3adbe0419a>', 'WARC-Truncated': None}", 'previous_word_count': '1418', 'url': 'https://www.salon.com/2020/04/04/for-the-healthy-safe-and-secure-the-coronavirus-shutdown-is-also-an-opportunity-to-let-go/', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-182.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.041881680488586426', 'original_id': 'e417ebb1142f77fb226baf435b34c0fbb98fcaa61b6c1da6a075dbd42e50271d'} |
Hate washing your face? This is the makeup remover for you https://t.co/x1O268xBcn https://t.co/9lfhddJCfi | the_stack | {'hexsha': 'd6813fa4b9f563bf2ebfa4ef824fe02dc2036f41', 'size': '106', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'Data/train/health/icdjshqkda.txt', 'max_stars_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_stars_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_stars_repo_licenses': "['Unlicense', 'MIT']", 'max_stars_count': '7', 'max_stars_repo_stars_event_min_datetime': '2017-05-04T05:21:42.000Z', 'max_stars_repo_stars_event_max_datetime': '2021-01-15T12:16:04.000Z', 'max_issues_repo_path': 'Data/train/health/icdjshqkda.txt', 'max_issues_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_issues_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_issues_repo_licenses': "['Unlicense', 'MIT']", 'max_issues_count': '1', 'max_issues_repo_issues_event_min_datetime': '2020-05-10T02:09:02.000Z', 'max_issues_repo_issues_event_max_datetime': '2020-05-10T02:09:02.000Z', 'max_forks_repo_path': 'Data/train/health/icdjshqkda.txt', 'max_forks_repo_name': 'Harshit-Shrivastava/Tweet-Classifier', 'max_forks_repo_head_hexsha': '6d9f686e34f9d8a938c0b35329f44cc196eb9fa6', 'max_forks_repo_licenses': "['Unlicense', 'MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '106.0', 'max_line_length': '106', 'alphanum_fraction': '0.7830188679', 'original_id': '842858502eeb35e00db52045e8339dc04775ccd937825c5d65a9861108010bd9'} |
Log4j - Changing logger level for a particular logger instance
I use apache log4j for my application logging. I use log4j.xml to initialize the loggers when my application server starts. For each class, I invoke Loggers.getLogger("loggername") to get the logging instance to log details of that class.
For example:
in log4j.xml
<appender name="default" class="org.apache.log4j.RollingFileAppender">
<param name="File" value="${log.dir}/logs/serverout.txt" />
<param name ="Append" value="TRUE"/>
<layout class="org.apache.log4j.PatternLayout">
<param name="ConversionPattern" value="%d{[HH:mm:ss:SSS]|[MM-dd-yyyy]}|[%c]|[%p]|[%L]: %m|%n"/>
</layout>
<param name="MaxFileSize" value="10MB"/>
<param name="MaxBackupIndex" value="100"/>
</appender>
<logger name="com.mypackage" additivity="false">
<level value="INFO"/>
<appender-ref ref="default"/>
</logger>
And how I invoke in each class
private static Logger logger = Logger.getLogger(MPMyclass.class.getName());
My requirement:
Basically, I run an application server when there would be many user sessions. Each session has a unique sessionId. Each session is an instance of several classes. Each class has its own instance of Logger. If I want to enable log level for a particular class (MPMyclass) .. I can just get the logger name(com.mypackage) and set its level so that it changes the level overall. But I want it in a way so that I can set only to a particular session not overall.
If I have a class name MPMyclass , there are many instance of MPMyclass, my requirement is to change the logger level of an instance of that class not all instance.
Possible solution:
1. Each session/instance has a unique sessionId. So I can get/set levels. But this is too much complicated as there are many classes it would be clumsy to set/get.
2. I can have a Hashtable to store each instance of class with their unqiue sessionid, but it is also not recommended as there are too many classes and instance of classes it is deftly not a good soln.
I am working on to solve this with simple solution with the help of log4j or through Java design. Please suggest me if there is anything that I can work on.
Thanks
I suggest that you write a custom RollingFileAppender (or any other Appender) to control this thing and combine it with MDC and JMX.
It should look something like this:
public class MyRollingFileAppender extends RollingFileAppender implements MyRollingFileAppenderMBean {
private final Set<String> enabledSessions = new HashSet<>();
@Override
public synchronized void doAppend(LoggingEvent event) {
if (enabledSessions.contains(event.getMDC("sessionId"))) {
super.doAppend(event);
}
}
@Override
public synchronized void enable(String... sessionIds) throws JMException {
for (String sessionId : sessionIds) {
enabledSessions.add(sessionId);
}
}
@Override
public synchronized void disable(String... sessionIds) throws JMException {
// do the opposite here...
}
}
Follow this link to get the idea about MDC: https://blog.oio.de/2010/11/09/logging-additional-information-like-sessionid-in-every-log4j-message/
Instead of extending a particular appender, you could use the Decorator pattern to add this behaviour to any appender. Also note that this simple example doesn't allow to change log level but only to turn on/off logging.
@Pino You can set the Threshold attribute of the Appender instead of changing the logger level. It will have the same effect here. And yes, creating a decorator here will be a more generic solution.
@shlomi333 Yes, I know the threshold attribute but you haven't used it in your example. However, even changing this attribute you cannot control logging for each class as per requirement (though it could be enough to satisfy the real need).
@Pino I agree that it is not satisfying the need "verbatim" but I hope that the answer is good enough for the purpose of the OP
Thanks for the suggestion. So as you suggest, I put a entry for each logger instance and while setting the level I need to check the MDC value(sessionid in my case) and set the level accordingly? besides eventually it seems to be a Hashtable entry internally (in log4j) to map MDC.
If your final objective is to easily find log entries of a particular session (or a particular user) you could automatically add the session id (or the user id or even a custom transaction id) to each log entry. This can be done using a Nested Diagnostic Context or a Mapped Diagnostic Context. Google can give you many usage examples for them.
If you really want to change log level for specific class instances used by a specific session, I think it's not a good idea.
Thanks for the suggestion. Will check about MDC.
| common_corpus | {'identifier': 'https://stackoverflow.com/questions/25971598', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2014.0', 'title': 'Stack Exchange', 'creator': 'Pino, https://stackoverflow.com/users/199675, https://stackoverflow.com/users/3438166, https://stackoverflow.com/users/685806, kiddo, shlomi33', 'language': 'Norwegian Nynorsk', 'language_type': 'Spoken', 'word_count': '701', 'token_count': '1260', '__index_level_0__': '32643', 'original_id': '7cc6ac56f121e228955b4aa0a2d14e4cdc8ae19776647df05d1008f01637fe4d'} |
Editorial: Lawsuit targets only one of many
Many questions are being raised about the recent lawsuit filed by the Southeast Louisiana Flood Protection Authority-East against 97 oil and gas producers and pipeline companies. The suit alleges that the industry is responsible for causing much of the damage to Louisiana's disappearing coastal marshes that once afforded protection to New Orleans - as well as the rest of the coast - from hurricanes.
But many experts agree that there are many who share in that responsibility.
Is it fair to go after only one of them?
We think not.
Even the lawsuit itself fixes the oil industry's culpability at 36 percent.
For that matter, would it be fair to go after any of them?
Robert Twilley, an oceanographer at Louisiana State University in Baton Rouge, told The Daily Advertiser on Tuesday there is "no one root of the problem."
And much of what was done to the coast was done with good intentions and often, with good reason, Twilley said.
The Army Corps of Engineers built the levee system, with the goal of building the largest navigation system in the world, Twilley said, and to protect cities and towns, like Baton Rouge and New Orleans, from river flooding.
But isolating the Mississippi from the coastal marshes has deprived the wetlands of the river sediment it needs to constantly rebuild itself.
Most of the oyster reefs, which served as part of the system of offshore barriers, were removed by companies that supplied oyster shells for south Louisiana parking lots during the first half of the 20th century, said Don Briggs, president of the Louisiana Oil and Gas Association and a member of The Daily Advertiser's Editorial Board.
Even the ubiquitous nutria, originally imported from South America to be raised for their fur, have contributed to coastal erosion, Briggs said and Twilley agreed.
And then, there is the oil and gas industry. The dredging of canals has contributed to land loss, especially in the earlier days of operations.
But the industry's practices are far different today than in those earlier times, Briggs said. In the 21st century, companies work to mitigate whatever impact their operations have on the surrounding land.
And these operations have also been responsible for providing employment for generations of Louisianians and is probably the single largest factor in bringing prosperity to the state.
These and other topics relating to the lawsuit are being considered by the joint House- Senate Transportation Committee.
The committee chairman, state Sen. Robert Adley, R-Benton, worries about sending a message that "you can do business in our state 50 years ? and we'll sue you," according to an article from Gannett Baton Rouge reporter Mike Hasten.
That is a legitimate concern.
John Barry, vice-chairman of the levee board, countered that the suit is about protecting people from hurricanes.
That is also valid.
Twilley said the arguments are "strong on both sides," but he sees a different solution.
Twilley believes that since the state has sacrificed its coast to supply the nation with fuel for nearly a century, the federal government should return adequate funding to Louisiana to mitigate coastal damage.
That would be reasonable and fair.
Louisiana's oil and gas industry sends about $7 billion to the Treasury each year in revenues. While the federal government returns 50 percent of oil and gas revenues to other states through revenue sharing, coastal states get only a small fraction of that. In 2017, that is set to go up to 37.5 percent, but that is still years away, in spite of efforts on the part of Louisiana's representatives and senators in Congress.
So, Louisiana is left searching for a way fund efforts to protect itself from another Katrina or Rita.
The biggest problem, Twilley said, is finding an equitable way to determine who will pay for that protection.
There are no easy answers to this question.
It wouldn't be fair to expect only the citizens of the levee district to bear the cost.
But it would be equally unfair to make the oil and gas industry bear the entire burden.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
Email this article
Editorial: Lawsuit targets only one of many
Many questions are being raised about the recent lawsuit filed by the Southeast Louisiana Flood Protection Authority-East against 97 oil and gas producers and pipeline companies. | mini_pile | {'original_id': 'b16df8f8c891e55d10a8f198c25afdf3b766d6fcd834ec2c7a418b2e18d0bbd3'} |
This is not a UNHCR publication. UNHCR is not responsible for, nor does it necessarily endorse, its content. Any views expressed are solely those of the author or publisher and do not necessarily reflect those of UNHCR, the United Nations or its Member States.
Events of 2006
In our World Report 2004, Human Rights Watch noted with alarm in an essay titled "Above the Law" the Bush administration's efforts post 9/11 to dramatically expand executive power at the expense of judicial or legislative protection for individual rights. It now appears we underestimated the extent and tenacity of those efforts.
In the past five years the administration has authorized torture and other abusive interrogation techniques, "disappeared" dozens of suspected terrorists into secret prisons, twisted domestic law to permit indefinite detention without charge of persons suspected of links to terrorism, and confined hundreds at Guantanamo Bay without charge while denying them information about the basis for their detention and meaningful opportunity to contest it. The administration has sought to exempt its actions from court oversight.
Wholly outside the counterterrorism arena, the executive branch has continued to slight its obligation to protect the human rights of US residents, particularly those who are accused or convicted of crimes, or who are immigrants.
In 2006 the Supreme Court provided an important check on some of the administration's counterterrorism policies, striking down the military commissions originally authorized by President George W. Bush to try Guantanamo detainees and calling into question the legality of the administration's secret detention program. The president, in response, asked Congress to authorize a system of military commissions akin to those that had been struck down, and to redefine the humane treatment requirements of the Geneva Conventions so that the CIA's "enhanced" – and abusive – interrogation program could continue. The legislation Congress ultimately passed did not give the administration everything it wanted. Congress left intact the humane treatment requirements and insisted abusive interrogation techniques such as waterboarding (mock drowning), induced hypothermia, and extended sleep deprivation remain prosecutable war crimes. But the legislation also endorsed deeply troubling provisions that violate international human rights protections. These include provisions that curtail the fundamental right of non-citizens to contest their detention and define "combatant" in a way that allows for the military detention and trial of civilians who did not participate in armed hostilities.
The United States appeared in 2006 before the United Nations Committee against Torture and Human Rights Committee regarding its compliance with the Convention against Torture and the International Covenant on Civil and Political Rights. With regard to US counterterrorism policies, both committee of experts rejected most of the administration's justifications, issuing strong and thorough critiques of the US record on torture, detention without charge, and lack of accountability for abuse. The Human Rights Committee also issued a robust critique of US criminal justice, detention, and immigration policies, including the practice of sentencing juveniles to life without parole and the overbroad "material support to terrorism" bars on admission that put asylum seekers at risk of being returned to countries where they fear persecution.
Guantanamo Bay, Indefinite Detention, and Military Commissions
Approximately 450 men remain in long-term, indefinite, and largely incommunicado detention at Guantanamo Bay. The United States continues to assert its authority to hold these men as "unlawful enemy combatants" without charge and without regard to the laws of armed conflict.
In late 2005 Congress passed a law preventing non-citizen Guantanamo detainees from bringing any future court challenges to their detention, their treatment by US officials, or their confinement conditions. In September 2006 Congress extended and made these provisions retroactive – applying them to pending cases and to non-citizens in US custody anywhere in the world. Unless found unconstitutional, this measure could result in courts dismissing the more than 200 pending habeas corpus cases brought on behalf of Guantanamo detainees, as well as the pending habeas challenge brought by Ali Saleh Kahleh al-Marri, the only so-called unlawful enemy combatant still detained in the United States, and a handful of habeas cases brought on behalf of detainees in Afghanistan.
In response to litigation brought by the Associated Press, the US publicly disclosed in early 2006 the names of the Guantanamo detainees and transcripts of administrative proceedings regarding their continued detention. These documents suggest that, contrary to the claims of the Bush administration, only a small proportion of the detainees are alleged to have engaged in armed conflict against the United States.
The Department of Defense has been working through a second round of administrative reviews to determine whether individual Guantanamo detainees are still a "threat" or of intelligence value that warrants their continued detention. At this writing, the military Administrative Review Boards have slated 166 detainees for transfer or release, although fewer than a third have actually left Guantanamo. Some countries have refused to take back nationals declared "enemy combatants" by the US or to accept US requirements for their monitoring or continued detention. In other cases, detainees had substantial grounds for believing they might be tortured if returned. Rather than allowing some of these detainees into the United States – including men who have been cleared of any wrongdoing – the Bush administration continues to hold them in Guantanamo.
Alleged "enemy combatant" Ali Saleh Kahleh al-Marri remains in custody in the United States. A Qatari who had been living in the US on a student visa, he was charged in 2002 with credit card fraud, but just weeks before his trial the US administration declared him an "enemy combatant," and sent him to a military brig in South Carolina, where he has been held in solitary confinement for three years, essentially incommunicado; his only contact is with his lawyers, who had to sue in US court for access to him. The charges against al-Marri are based on a single hearsay declaration relying heavily on accusations by a man widely reported to have been tortured in a secret Central Intelligence Agency (CIA)-run detention center. The government has filed to dismiss al-Marri's habeas challenge to the lawfulness of his detention – citing the court-stripping provisions in the Military Commissions Act. As of this writing, the court had not ruled on the government's request.
In June 2006 the US Supreme Court, in Hamdan v. Rumsfeld, struck down the military commissions set up to try non-citizens accused of participating in or supporting terrorist acts against the United States. In response to Hamdan, in September Congress legislated a new system of military commissions (the Military Commissions Act of 2006). The new commissions contain important improvements over the previous ones. For example, Congress has specified that the accused have access to the same evidence as is considered by the fact-finder, and that they may appeal convictions to a civilian appellate court (though such review is limited to legal findings, not factual ones, so actual innocence would not be a basis for overturning a verdict). But the new rules still contain troubling provisions: for example, statements obtained through "cruel, inhuman or degrading treatment" prior to December 30, 2005, are admissible so long as a judge finds they have probative value and are "reliable" (a contradiction in terms).
Perhaps the most disturbing aspect of these new commissions is their expansive jurisdiction. The commissions are authorized to try any non-US citizen, including longtime US residents, who falls within a definition of "unlawful enemy combatant" that is far broader than the definition ordinarily used under the laws of war. Because the definition includes anyone who "purposefully and materially supported" hostilities against the United States, it potentially turns ordinary civilians – such as an individual who sends money to a banned group – into "combatants" who can be placed in military custody and hauled before a military commission.
At this writing no charges have been brought against detainees under the new military commission rules, and the first trials were not expected until summer 2007 at the earliest.
Torture Policy
In late 2005 Congress – over the Bush administration's objections – passed the Detainee Treatment Act, which prohibits the use of cruel, inhuman, or degrading treatment by any US personnel operating anywhere in the world. The Supreme Court stepped in here as well, ruling in Hamdan that the US is bound to treat al Qaeda detainees in accordance with the minimal provisions of the Geneva Conventions' Common Article 3.
In response, in July 2006 the Pentagon ordered the military to ensure that all of its practices complied with these standards, and in September it announced new interrogation rules that repudiated many of the abusive techniques reportedly used by US interrogators in the past, including waterboarding, painful stress positions, and prolonged sleep deprivation or exposure to cold. Ironically, that same day the Bush administration proposed legislation effectively rewriting the humane treatment standards of Common Article 3, permitting the CIA to continue using the abusive interrogation techniques now banned by the Pentagon.
Congress rejected the administration's proposal, but with mixed results. It retains most of the War Crimes Act, which exposes interrogators to criminal prosecution for both torture and "cruel and inhuman treatment" (defined as conduct that causes serious physical or mental pain or suffering). As two of the primary authors of the legislation, Senators McCain and Warner, have stated that the definition of prohibited conduct is intended to criminalize a wide range of abusive interrogation techniques. However, the law narrowed prosecutable offenses under the War Crimes Act by creating a higher threshold for inflicting serious physical pain or suffering, preventing prosecution for non-prolonged mental abuse occurring prior to the new law, and eliminating as a war crime the punishing of a person after an unfair trial.
Most seriously, the legislation prohibits any detainee the US government has labeled an "unlawful enemy combatant" from ever challenging in court his treatment while in US custody, even after his release.
Secret Prisons
In early September 2006 President Bush admitted for the first time that the CIA had maintained secret detention centers abroad to interrogate terrorism suspects. He announced that his administration was shutting them down and had moved the 14 people still being held in those centers to Guantanamo Bay (where they have since been visited by the International Committee of the Red Cross). Bush was unrepentant when he announced the existence of the secret prisons, and his administration kept open the option of restarting the program of enforced disappearances of terrorist suspects.
The administration has not identified the other people whom it held in the secret prisons, nor has it disclosed their current whereabouts. Human Rights Watch has identified at least 15 other people we believe were held in those prisons. Those persons remain "disappeared" under international law until the US can account for them.
Accountability for Detainee Abuse
Despite a number of official investigations into abuse of detainees in US custody in Afghanistan, Iraq, and Guantanamo Bay, the United States has done little to hold those involved accountable. Joint research conducted by New York University Law School, Human Rights First, and Human Rights Watch documented over 330 cases in which US military and civilian personnel were credibly alleged to have abused or killed detainees. While these cases involved at least 600 US personnel and over 460 detainees, only a small percentage have been prosecuted: approximately 90 military personnel, no CIA agents, and one civilian contractor. Only 10 of the convicted abusers were sentenced to a year or more in prison.
The US persisted in thwarting efforts by victims of abuse to seek redress in court. Asserting claims of "state secrets" and "national security," the government moved to dismiss claims brought by Khaled el-Masri, a German citizen who was seized in Macedonia, transferred to a CIA-run prison in Afghanistan, beaten, and held incommunicado for several months, and by Maher Arar, a dual Canadian-Syrian citizen detained by US authorities on his way home to Canada and sent to Syria, where he was imprisoned for 10 months and tortured. Lower courts dismissed both cases on the grounds that the court should not second-guess – or even investigate – the government's actions. Both Arar and el-Masri have appealed. A Canadian commission of inquiry into Arar's case found that the US deported him to Syria based on Canadian authorities' erroneous claims that he was linked to terrorism. The inquiry concluded "categorically" that there was "no evidence to indicate that Arar has committed any offense."
The US continues to assert that it may lawfully send detainees to countries that regularly engage in torture, so long as it has obtained "diplomatic assurances" – i.e. promises by the receiving government not to mistreat the detainee. But these promises cannot be enforced and, indeed, there is little incentive for the governments involved to uncover any breach of the assurances. The US has stated that it will rely on such assurances in moving detainees from Guantanamo Bay.
Incarceration
With more than 2.2 million men and women in US jails and prisons, a preponderance of whom are low-level nonviolent offenders, the United States has the highest incarceration rate in the world. The burden of incarceration falls disproportionately on the poor and members of racial and ethnic minorities.
Many prisons and jails are dangerous, plagued by high rates of violence and illness, and devoid of productive programs and activities for prisoners. The private bipartisan Commission on Safety and Abuse in America's Prisons released a report in June 2006 concluding that overcrowding and prisoner idleness promotes disorder and tension that can escalate into violence. Staff members engage in unnecessary as well as excessive use of force to respond to minor prisoner misbehavior.
As of the beginning of the year, prison policies in six states permitted use of aggressive unmuzzled dogs to intimidate and even attack prisoners who did not obey orders to leave their cells - four of those states used dogs for this purpose. This practice was virtually secret, even within the corrections community, until Human Rights Watch revealed it in October. Advocacy by Human Rights Watch helped persuade three states to change their policies. At this writing, only one state continues to use dogs to help prison officers remove prisoners from their cells.
In July 2006 a Department of Justice Bureau of Statistics (BJS) report found that formal complaints of sexual violence filed in adult prisons and jails increased nearly 16 percent between 2004 and 2005, from 5,386 to 6,241; more than half concerned staff sexual misconduct or harassment. As the BJS acknowledges, these numbers underestimate the level of sexual violence in prison because inmates are reluctant to make complaints for fear of retaliation, among other reasons. The National Prison Rape Elimination Commission held four public hearings this year during which witnesses testified to the causes and consequences of staff and inmate-on-inmate rape and sexual abuse.
In an investigation of two high-security juvenile facilities for girls in New York state, Human Rights Watch and the American Civil Liberties Union found that young girls were subjected to excessive use of a face-down "restraint" procedure in which girls were thrown to the floor, often causing injury, as well as incidents of sexual abuse, and inadequate educational and mental health services.
Prisons struggle to provide quality medical care without adequate resources or qualified staff. A federal judge put the entire California prison medical system under receivership because care was so abysmal that one prisoner died from medical malpractice or neglect every six to seven days. In Florida, over 300 inmates who have been found mentally incompetent to stand trial had been left to languish in jail, despite a law requiring the state to move them to hospitals or other mental health facilities where they can get the treatment they need.
The Death Penalty and Other Cruel Sentences
State and federal governments executed 51 prisoners between January and November 2006, bringing the total number of men and women executed in the country to 1055 since 1977. Almost all were killed by lethal injection. Mounting evidence indicates that contrary to public belief, lethal injection may be a very painful way to die. Execution logs from six recent executions in California and toxicology reports from executions in Missouri and North Carolina suggest that some prisoners may have been conscious and suffering at the time of their executions. Despite being used for almost 30 years, state lethal injection protocols were never subjected to scientific, medical, or public scrutiny until recent litigation prompted some judges and officials to examine them.
In the United States, youth who were below the age of 18 at the time of their crimes may be tried and sentenced as adults. Courts in the US continue to impose life sentences without the possibility of parole on many such youthful offenders. The more than 2,225 youthful offenders serving life without parole are disproportionately African American or Hispanic. The UN Committee against Torture, the Human Rights Committee, and the Secretary-General in his study on violence against children worldwide all rebuked the United States in 2006 for imposing life without parole sentences on young offenders. On the legislative front, the Colorado legislature eliminated the sentence, although it substituted a mandatory term of 40 years' imprisonment. A package of bills to eliminate the sentence remained under serious consideration in Michigan.
Immigrants and Other Non-Citizens
The two houses of Congress remained in a stalemate over the correct approach to immigration reform, with the Senate embracing the concept of a guest worker program, and the House focusing solely on immigration restrictions and enforcement. Just before the November 7, 2006 elections, Republican Party leaders in the House re-introduced previously failed legislation that would allow fencing of 700 miles of the US-Mexico border, give state and local officials the authority to enforce immigration law while shielding them from accountability for errors, and reverse two Supreme Court decisions that had found indefinite detention of non-citizens unconstitutional. None of these measures were considered in committees, and instead were rushed to a vote and passed by the House, though only the border fence legislation had passed the Senate and won the approval of President Bush at this writing.
As of late 2006 hundreds of asylum seekers faced return to their countries of origin by the United States and thousands of refugees are being denied resettlement inside the US due to overbroad definitions of terrorism and terrorism-related activity in the Immigration and Nationality Act. Anyone who associated with, or provided any "material support" to any armed group is denied asylum, including civilians caught up in civil wars who are forced at gunpoint to provide food to rebel forces.
HIV/ AIDS
Massachusetts, Delaware, and New Jersey made progress toward ensuring injection drug users' access to sterile syringes, recognizing their human right to obtain lifesaving HIV/AIDS information and services without fear of punishment. Massachusetts enacted legislation permitting non-prescription sale of syringes; Delaware approved its first needle exchange program; and the New Jersey legislature considered legislation to increase access to clean needles, including by establishing needle exchange programs.
California Governor Arnold Schwarzenegger vetoed legislation that would have permitted condom distribution to prevent the spread of HIV/AIDS in state prisons, rejecting the example of jurisdictions in the US and abroad that have taken such measures to protect inmate health. | mini_pile | {'original_id': '4da9442171b913c39fc575b6f362aedd56303f958c7bb7d288181aac9817a664'} |
Sunday , 1 March 2015
Home -> Issues -> 2014 May/June -> Symposium // Can Religious Pluralism and an Official Rabbinate Coexist in Israel?
Symposium Editor George Johnson
Interviews by Dina Gold, Rachel E. Gross, George Johnson & Sala Levin
In 1947, future Prime Minister David Ben-Gurion, hoping to shore up support for the State of Israel, wrote a letter to the head of the Orthodox Agudat Yisrael party promising that in the future Jewish state, Saturday would be a day of rest, kashrut would be maintained in all government kitchens, a religious group could oversee their own education and family law issues—divorce, marriage and burial would stay in the hands of the religious courts. This became known as the “status quo agreement” and has guided the relationship between religion and state in Israel ever since. And thus, Israel’s official chief rabbinate was born. Over the years the institution has grown increasingly ultra-Orthodox, sparking frustration and calls for reform among non-haredi Israelis as well as Jews in the diaspora. Moment asks a wide range of scholars, activists and religious leaders to suggest if and how religious pluralism and the chief rabbinate can coexist.
Ruth Calderon
There is an official rabbinate, and there is religious pluralism in Israel. The question is how do we make all the ways of Jewish living flourish without hurting or stopping any one of them and still have the official rabbinate? Now there are two rabbis and each of them speaks for only one kind of community. It just is not working. Most of the Jews in the world and in Israel don’t have a voice.
I don’t want a culture war between the pluralistic and the Orthodox. Orthodoxy adds a lot to our cultural scene. I wouldn’t like to live in an Israel that didn’t have haredi Jews. But just as much as their Jewish needs deserve to be met, so do mine. In Israel you have many secular or unaffiliated Jews who still are connected and for whom Judaism is a very big part of their lives, but the North American denominations don’t fit them. The Jewish world is moving toward a post-denominational era, and I think that is a good thing. Let each community choose the right way for them to be Jewish, give them as many services as possible without giving names and labels. Let communities choose their own rabbis—build the rabbinate from the bottom up.
It’s not about the organizations or the streams or the denominations; it’s about the Jews. I would give Jewish Israeli citizens a voucher to choose what kind of Jewish institution and what kinds of Jewish services they need today. The organizations that get more vouchers would receive more funding. And then there might be an Orthodox rabbinate, but next to it there would be rabbis who are progressive in different ways.
Ruth Calderon is a Member of Knesset from the Yesh Atid Party and is the founder of two secular yeshivas.
Jonathan Rosenblum
An official rabbinate cannot itself be pluralistic, for the very simple reason that the differences among the so-called streams of Judaism are so wide that they can’t be encompassed in one body. It’s like saying, can the Pope also be the head of the various Protestant congregations around the world?
From its conception, it was never thought that the Israeli chief rabbinate would be anything other than an Orthodox body. The impetus for a chief rabbinate doesn’t come primarily from the so-called haredi community, which I consider myself a member of, but from the national religious Zionist community. Ben-Gurion himself saw Jewish identity as the glue that would hold together people coming from countries around the world. If Judaism is a binding glue, there have to be some minimal basic standards for who is a Jew. The chief rabbinate provides a common denominator, certain acknowledged rules so that Jews can marry one another, confident in the Jewish identity of their spouse, functioning as that type of societal glue. Once you open marriage—and certainly conversion—processes to multiple interpretations, then Judaism ceases to be a binding glue for the larger Israeli society.
Once the state went to such efforts to bring in everyone, including close to 500,000 former residents of the old Soviet Union who had a drop of Jewish blood but who were not halachically Jewish, it became inevitable that we would have civil marriage in Israel. Obviously, a modern democratic state cannot be in a situation where a number of people are incapable of marrying in any fashion. But at the same time, there’s no sense in pretending and distorting what it means to be Jewish. It is in some sense a miracle any time a person takes on the full burdens, responsibilities and joy of being Jewish. But the truth is that most Russian immigrants have found that they have no real need to convert to feel integrated into Israeli society.
There are worse things than a separation of state and religion. Rather than religion becoming falsified by its conjunction with the state and serving the state’s needs, it would be better to separate the two. In other words, if the chief rabbinate were to become an instrument of falsification of Judaism—for example through state pressure to approve conversions— it would be better to sever the relationship.
Jonathan Rosenblum’s columns appear in the magazine Mishpacha and numerous other haredi publications as well as in the mainstream Israeli press.
Our grandparents had pulled off the miracle with their own coarse and stubborn hands. But we, too, require no miracles and no rabbinates. Our sort of Israel is human-made, and it ought to keep reinventing itself.
Susan Silverman
I think we need to just get rid of the rabbinate. We don’t need it. What does it do? It’s out there screaming and yelling about things like who can put up a kosher sign in their restaurant and what shape potato or cheese burekas have to be. It’s completely irrelevant. We have 50,000 refugees in Israel whom we’re treating badly. There are hundreds of thousands of orphans at risk in the world, and this is what our rabbinate is yelling about? It’s absurd.
The rabbinate is like putting a roof over our heads instead of the sky. We can all deal directly with God within our Jewish communities. Trying to encapsulate Judaism into a single form is idolatrous, because the assumption is that there are people who know what God wants of us without a shadow of a doubt. If you can know what God wants without a shadow of a doubt, then God is small enough to fit in your mind, and that’s no different from holding God in your hand. There’s no purpose for the rabbinate; in fact it’s detrimental. Anyone who wants to take political power as a spiritual religious guide is inherently problematic in my mind. They want to use religion as their power. It’s counter-productive and counterintuitive.
Susan Silverman is a rabbi, an activist and a member of Women of the Wall.
Donniel Hartman
Religious pluralism and an official rabbinate can coexist as long as there isn’t one rabbinate. Since the Jewish people don’t agree about Judaism, the notion of one rabbinate for all Jews ranges between insane and nonsensical and consequently counter to religious pluralism. Five or six chief rabbinates sounds just about right.
The biggest hindrance to moving toward pluralism is secular Israelis, not the ultra-Orthodox. The ultra-Orthodox don’t want it, I understand. The fact that secular Israelis have been willing to be complicit with an institution that is irrelevant and doesn’t speak to them is the profound shortcoming of religious life in Israel. As long as secular Israelis, who make up about 45 to 50 percent of Israeli society, allow this to be perpetuated, it will be perpetuated. There isn’t a large enough Conservative, Reform, or Liberal Judaism to serve as a counterbalance to the close to 50 percent who are either ultra-Orthodox, Orthodox or Masorti [Traditional]. You don’t need a majority, but you need a group of people who get up and say, “I’ve had enough. I’m not taking it anymore. I want a Jewish wedding.”
Secular Israelis have changed over the past 15 years. Jews do a lot of stuff Jewishly in Israel. But in the public sphere, they’re very, very passive. Until secular Israelis feel empowered or committed enough to shape Judaism in the public sphere, we’re going to continue to have one rabbinate.
One potential game-changer is the 5 percent of “Jewish non-Jews” of Israel, the people who came to Israel under the Law of Return from the former Soviet Union. They are about 350,000 people, not an insignificant number, who are integrating into Israeli society but can’t get married or converted under the rabbinate. If you add maybe another 5 or 10 percent committed liberal Jews in Israel, there might be a 10 to 15 percent coalition to change this reality.
The ultra-Orthodox should be the first to allow for other approaches, because ultra-Orthodoxy, in its rejection of Zionism, should allow Israelis to do whatever they want to do, as long as they are free to have their own institutions. But the ultra-Orthodox started to realize that thousands of jobs are being distributed. They also want to protect their hegemony as the authentic Jew. So, both ideologically and economically, they’re very, very invested. On the Modern Orthodox side, the religious Zionist side, what happened over the past 30, 40 years is that most of their creative energy has been to develop a new Torah that connects to the centrality and holiness of the land of Israel. They have not focused on religious pluralism or the relationship between religious and secular. A whole slew of us religious Zionists are trying to develop a modern Orthodoxy for Israel, but it hasn’t emerged in sufficient enough numbers yet.
Donniel Hartman is president of the Shalom Hartman Institute in Jerusalem and a rabbi ordained by the same institute.
Fania Oz-Salzberger
An official rabbinate, at least in its present form, cannot exist alongside genuine religious pluralism in Israel, nor can it live peacefully and respectfully alongside a thriving secular Jewish culture. Our mainstream culture, based on the spectacular Zionist accomplishment of a modern Hebrew language, literature and public sphere, was almost wholly the work of pioneers who shed off the orthodoxy of their parents without abandoning the great chain of textuality that kept Jews afloat and creative during the past two and a half millennia.
The early Zionists did not wholly abandon religion. They kept what I propose to term a residual religiosity, which had three major facets. First, it propelled them to re-inhabit the biblical homeland. Second, it brought them closer to the Bible and to every other Hebrew-language text that Jews have ever produced, in the ancient homeland and in all of their diasporas. Thirdly and fascinatingly, these pioneers maintained a quasi-religious, even messianic, astonishment with the return of modern Jews to the land of Israel.
Modern Israel was not erected by God but by men and women. But Jewish identity, Hebrew creativity and the marvel of newly secular Torah students still burned like torches in their bodies and soul.
Of course, there is a great gap between the ultra-Orthodox leaders and the national-religious faithful, which include West Bank settlers. Most of the former resent Zionism and dislike the State of Israel but easily allow the army and treasury of the apostates to defend and subsidize them. The national-religious, by contrast, proudly claim they are the true heirs of early Zionism.
Both of these orthodoxies want me and the likes of me to repent. To be kosher again. To leave off the sins of Tel Aviv and the laxity of the kibbutzim and the cosmopolitanism of a Modern Hebrew culture that was able to mix Agnon with Dostoevsky, Isaiah with Socrates. To become inward looking, meta-historical, aloofly oblivious (or openly hostile) of all goyim and goyim culture. To admit that God, not women and men, is responsible for Jewish history in all of its twists and turns.
But the Israel I inhabit, and the Israelis who are trying to continue the sword, the tractor and the book of our pioneer forebears into the technological and textual creativity of the 21st century, cannot allow either orthodoxy to undo the Jewish secularity of the 20th century. We need it for an ongoing conversation with the rest of the world, Jewish and non-Jewish. It is the stalwart of our collective identity and of our concept of justice.
“No miracle happened to us,” we sang in my kibbutz on Hanukkah. Our grandparents had pulled off the miracle with their own coarse and stubborn hands. But we, too, require no miracles and no rabbinates. Our sort of Israel is human-made, and it ought to keep reinventing itself.
Fania Oz-Salzberger is a professor of history at the University of Haifa. Her most recent book, co-authored with Amos Oz, is Jews and Words.
Dov Lipman
The role of the chief rabbinate should ultimately be ceremonial in nature. In a Jewish state, it’s nice to have a chief rabbi, someone who inspires the people and perhaps travels the world and brings inspiration as well, based on Jewish values. But the concept of there being one set of rules—and I’m speaking as an Orthodox rabbi—creates religious coercion, both within Orthodoxy and among those who are not religiously observant. It actually does damage to Judaism and the Jewish state. When people feel coerced, their nature is to move away from whatever is being offered. When I travel around Israel I meet young secular Israelis who say to me, “We hate Judaism,” and then they continue and say, “And we hate that we hate Judaism.” Meaning they’re not looking to rebel against Judaism or God but the Judaism being offered to them is not what they want.
We have worked very hard, religious and secular together, on a civil union bill that creates two tracks: a marriage track, which will be religious, through a rabbinate that is much more moderate and embracing in nature, and also a civil union track, which is more like a civil contract, with full rights as a couple and the like, but not defined as marriage.
Change in the rabbinate itself takes time. But as the haredi community becomes part of the broader Israeli society through army or national service or, most importantly, the workforce, and as we instill far more general education and even higher education, that community will become more moderate. It will take time—a generation or two—before you see any real leaders in the community speaking openly on these issues.
Moderation on the secular side will occur through the same process. When secular Israelis see changes—as a result of the legislation we just passed on the draft, tens of thousands more haredim will enter the workforce—and as secular and higher education increases, religious people will be seen more as people with whom they can identify. Along with less coercion in terms of invasiveness of state religion in their own lives, I believe secular Israelis will reconnect and be more embracing of the idea of Judaism and be more accepting of religious people.
Dov Lipman, a member of the Yesh Atid party, is an Orthodox rabbi and the first U.S.-born Member of Knesset in the past 30 years.
Dorit Beinisch
What is important is that the government not subsidize and encourage only one denomination. Ensuring equality in the allocation of public resources is certainly within the purview of the Supreme Court, and it has followed this rule in every case that raised a claim of unequal treatment. The Court also has promoted equality when it comes to the rights of women for equal representation, including in religious bodies. But it’s not enough. It is difficult to change the current situation and allow for full recognition of other denominations by the state, alongside the Orthodox group, given the political situation in the country. Achieving a solution will require dialogue among the different groups in Israeli society and a social compromise that will allow for a more pluralistic approach by the state.
The Supreme Court can review the decisions of the rabbinical courts in its capacity as the High Court of Justice. Rabbinical courts are similar in this regard to any other government authority. In addition, the jurisdiction of the rabbinical court is limited only to personal status issues, primarily marriage and divorce. It is important to note that even when rabbinical courts decide cases within their jurisdiction, they must apply secular law if an issue arises that is not directly related to personal status. For instance, the division of property between spouses in divorce proceedings must be done according to secular law. The rabbinical court does not always comply with the Court’s decisions, but in that case the party that loses can come to the Supreme Court. If we have any way to give a remedy on a case-by-case basis, we do render those remedies. But the legal situation is complex, and the Supreme Court is limited in its ability to offer remedies where the law assigns exclusive jurisdiction to the rabbinical courts.
The lack of non-Orthodox marriage in Israel is certainly troubling. There are some religious leaders—I’m not talking about political leaders or the Orthodox political parties, but legal and “halachic” experts—who support the idea of civil marriage to solve part of the problem, especially problems of women who are agunot [“chained women”]. I think that there should be a way for everyone to be able to freely choose a partner and to conduct a ceremony that reflects their beliefs.
Dorit Beinisch served within the Israeli Ministry of Justice for 28 years before becoming the first female president of the Supreme Court of Israel from 2006 to 2012.
Nitzan Horowitz
The only way to maintain a modern, tolerant, inclusive, democratic Israel is to separate religion and state. Currently hundreds of thousands of citizens, who are not recognized as Jewish by the rabbinate, are denied their legitimate rights. Because Israel has no constitution, every religion is acknowledged as part of the state apparatus—including ten different Christian denominations. This amalgam of state and religion has created a stunning array of problems touching on every aspect of family law. At present, whether you see yourself as a person of faith or not is immaterial. The state classifies you as a Jew, Muslim or whatever for the purposes of government records. Once designated, when it comes to family matters, every citizen is obliged to address the relevant religious institution.
I have no objection to the existence of the rabbinate, but I object to coercion. My proposal is to make religious affiliation wholly voluntary, with a civil alternative available. No one should be forced to submit to halachic law. All attempts so far to enact bills in the Knesset to reform the system have failed because of raw politics. The religious courts have huge political clout, and the political parties pander to them in order to gain power.
Unfortunately, civil rights are overshadowed in Israeli national elections by other issues such as defense and economics. When sufficient numbers of MKs get elected who support the move to create an alternative path and a civil option is passed in the Knesset, it will greatly improve the personal lives of Israelis.
Nitzan Horowitz, a member of the Meretz Party, is chair of the Knesset Caucus for Civil Equality and Pluralism and the first openly gay Member of Knesset.
Michael Oren
Israel makes the claim to be the nation state of the Jewish people. Israel’s existence is predicated on Jewish peoplehood. And yet, we have a situation today in which the nation state of the Jewish people does not entirely recognize the validity of a significant section of the Jewish people, particularly those who belong to the Reform and Conservative movements. It’s not just not recognizing the Conservative and Reform movements. Orthodox rabbis also have problems securing recognition of their conversions in the United States from the State of Israel. The status quo is not sustainable. Israel has to move toward fulfilling its own self-stated role of being the nation state of the Jewish people.
We have to have a serious discussion about our relationship with diaspora Jewry, particularly diaspora Jews who practice their Judaism in different ways. We have to have a discussion about the Jewish people in the State of Israel, as well, about civil marriage and civil burial. We have a situation here where thousands of Israelis travel abroad, mostly to Cyprus, every year in order to get married. I’m speaking personally. My own son was married when I was in Washington by U.S. Supreme Court Justice Elena Kagan in my house and then got married again in Israel with the Reform rabbi who was the rabbi of both my son and his wife. This was because the State of Israel wouldn’t recognize their marriage. I was Ambassador of the State of Israel. By the way, Shimon Peres came to that wedding and made a very important statement there about pluralism. So it is clearly an issue on which we have to have a serious discussion in Israeli society—with input from Jewish leaders throughout the world.
Is discussion between the Orthodox and non-Orthodox possible? We’ve had discussions. For example, we were able to reach an accommodation on the Western Wall issue through discussion with haredi, Conservative and Reform leaders. It was a long and complicated process, but in the end, I think we reached a viable compromise. So I’ve seen firsthand how different streams of Judaism can reach accommodations. But it requires flexibility on all sides and the desire to preserve and strengthen Jewish unity.
Secular Israelis also can be brought in. If you look at all the surveys of Israel, the levels of Jewish tradition and respect for tradition are very high. There is, among a significant majority of Israelis, a respect for religion. The majority of Israelis observe some aspect of Jewish tradition. Totally, utterly secular people are actually a minority here. That’s the foundation for conducting this discussion successfully.
Michael Oren is the former ambassador from Israel to the United States. He is the author of Power, Faith, and Fantasy: America in the Middle East: 1776 to the Present.
Since the Jewish people don’t agree about Judaism, the notion of one rabbinate for all Jews ranges between insane to nonsensical and consequently counter to religious pluralism. Five or six chief rabbinates sounds just about right.
Maurice Roumani
Both Zionism and the State of Israel were founded by largely secular Ashkenazi Jews who to this day constitute a sizeable majority in Israel. A recent study found that only 20 percent of Israeli Jews, excluding the haredim, define themselves as Orthodox. However, according to another study, Mizrahi [North African and Middle Eastern] Jews not only have a stronger, though not necessarily Orthodox, Jewish identity than their Ashkenazi brethren, but fully 50 percent of these Mizrahi Jews define themselves as traditional, and only 9 percent as non-religious or anti-religious. For the Ashkenazim, the figures were 19 percent as traditional and 34 percent non-religious or anti-religious.
Mizrahi Jews, unlike other immigrants, not only have an ambivalent attitude toward Orthodox Judaism, but also have problems with religious pluralism as defined in Western countries. They would define themselves only as Jews or Israelis, and if pressed to define their religious observance, they would say they are traditional. Among these traditional Jews, one finds some haredi observance, but most observe in a manner similar to a Conservative or Reform Jew. However, they will never accept such labels. This is because, as a group, they recognize Judaism as having one halacha and one rabbinate, and they do not challenge its official representatives. But for many of them, their actual behavior is like those who advocate for religious pluralism.
Maurice Roumani was the founder and director of the Center for the Study of Sephardi Heritage at Ben-Gurion University of the Negev in Israel.
Uri Regev
The notion of the chief rabbinate is antithetical to Israel’s essence as a Jewish and democratic state. The modern State of Israel has explicitly promised in our Declaration of Independence religious freedom and “social and political equality” regardless of religion. A coercive institution in the framework of a chief rabbinate is anathema and in direct contradiction to these necessary principles. The Israeli Jewish population is predominantly secular, and the chief rabbinate ironically is accepted as a religious authority neither by the secular majority nor by most of the Orthodox Jewish minority. At this point, the haredi community, whose leaders decide the identity of the chief rabbi, rejects the authority of those very chief rabbis because they are not deemed by that community to be of religious and halachic authority. Nor is the chief rabbinate accepted by many in the modern Zionist Orthodox community, who reject it because of its non-Zionist, non-modern character.
So why do we have the chief rabbinate? We have it solely because of political manipulation. The continued existence of the chief rabbinate, the monopolistic rabbinic Supreme Court and the religious council serve a political purpose as a trading item for the secular political powers to the haredi political parties in return for their support of the coalition government. All polls of the Jewish community in Israel point to the fact that the majority does not want to see it continue in its present monopolistic, coercive fashion.
One should not confuse the great importance of the institution and function of rabbis in the Jewish tradition and the institution of the chief rabbinate. Rabbis are of utmost importance to the perpetuation and growth of Jewish religious life. But a chief rabbinate is antithetical to the concept of “select unto yourself a rabbi,” which is based on voluntary association and not on coercive external appointment.
Uri Regev is an Israeli Reform rabbi and lawyer who heads the nonprofit Hiddush—For Religious Freedom and Equality.
Seth Farber
In the current legal constellation, the answer is an emphatic “no.” However, I think that we have an opportunity now, more than ever before, to create an official rabbinate that would in fact promote religious pluralism, but this would depend upon how we define religious pluralism. My definition promotes a culture of tolerance, respect and accessibility, and my vision is of a rabbinate that could meet all these criteria.
When I speak of tolerance, I believe that religious coercion must cease. A rabbinate that would promote tolerance can promote Jewish values and even halacha, but it needs to set its sights on inclusivity. Respect is a really important piece. It means that even if people don’t do it the rabbinate’s way, and even if they choose to not be connected to it, that’s something the rabbinate can respect. Right now, there’s a lot of conceit. There is a sense that coerciveness about Jewish marriage has protected the Jewish people and the Jewish line for thousands of years. I think that kind of boastfulness and the pompous attitude that accompanies it is destructive. It demeans people who opt for an alternative. The premise of this attitude is simply not true, because it does not take into account the diversity of the Jewish world or the historical record that demonstrates that not everyone got married exactly the way the rabbinate is insisting on today. As for accessibility, my vision is of a rabbinate that is embracing. It would be confident enough in its values to enable people to access the system in the way that they want to access it.
As an Orthodox rabbi and someone who identifies strongly with the Orthodox community and a strong belief in halacha as an expression of the Divine, I believe that halacha has room for the kind of pluralism I am describing. Actually, it might be at its core value. There is a way to have a halachic rabbinate that can coexist with religious pluralism in Israel, and I don’t think that it demands that halacha be changed. I think what it demands is making a strategic decision to be as inclusive as possible. Religious pluralism isn’t a goal. It’s a tool toward a healthier and more dedicated Jewish people.
Seth Farber is a Modern Orthodox rabbi and founder and director of ITIM: The Jewish Advocacy Center.
David Golinkin
Unfortunately, given the track record of the chief rabbinate of the State of Israel for the past 65 years, the chief rabbinate must be abolished as soon as possible in order to allow Judaism to flourish in Israel.
The two new chief rabbis were elected in July 2013 after a lengthy political campaign because they are the sons of previous chief rabbis and because they are beholden to haredi political parties, which do not recognize the chief rabbinate. Rabbi Yonah Metzger, Ashkenazic chief rabbi from 2003 to 2013 and a puppet of the Ashkenazi haredim, was arrested in June, and again in November, of 2013 on suspicion of taking bribes, fraud, money-laundering, obstructing justice and suborning witnesses.
The chief rabbinate holds a monopoly on conversions. For years it did not recognize Conservative and Reform conversions. In recent years, it likewise refused to recognize most Orthodox rabbis in the United States. In May 2008, the High Rabbinical Court of the Chief Rabbinate retroactively annulled the many thousands of conversions performed by Israel’s National Conversion Court from 1999 to 2008. Although this decision was repealed because of intervention by Israel’s Supreme Court and the Tel Aviv Rabbinical Court, it serves as a deterrent to thousands of Russian immigrants who are considering conversion. The chief rabbinate also holds a monopoly on kashrut. I recently asked the owner of a pizza shop why he did not have a kashrut certificate. He replied that the kashrut supervisor shows up once a month for five minutes and he has to pay him thousands of shekels. More and more Israelis who care about kashrut are looking for alternatives.
The sad fact of the matter is that the chief rabbinate of Israel is a coercive bureaucracy without a constituency. It is disliked by haredim, religious Zionists, Conservative and Reform Jews and secular Israelis alike, and many of its actions are a Hillul Hashem, or desecration of God’s name. It only exists at this point so that political parties can use it as a tool of influence and patronage.
What is the alternative? Here are a few general guidelines: Civil marriage and divorce must be legalized because a democracy must provide these options. There are a few areas where the State of Israel must provide religious services. For example, there must be kosher food in the IDF so that all soldiers can serve in the army.
It is not the State of Israel’s job to decide who is a “real” rabbi or which form of Judaism is more authentic. Let the public decide just as they do in the diaspora. Let every Israeli Jew choose his or her rabbi for kashrut, marriage, divorce and conversion. Let the rabbis compete in the free marketplace of ideas. The result will be that more and more Jews will love Judaism and respect rabbis.
David Golinkin is a professor at the Schechter Institute of Jewish Studies in Jerusalem and the author or editor of 19 books on Conservative halacha.
Marc Gopin
The problem with the chief rabbinate is its legal authority. The chief rabbinate in principle could become like the Israeli presidency, which is basically an inspirational position. But the history has been different. Instead, as part of the bargain to obtain the support of the anti-Zionist ultra-Orthodox in the war against the Arabs, the chief rabbinate was given power over kashrut [what is fit] everywhere. In my opinion, making things kosher has been the great corruption of Orthodoxy in general. Even though creating professional oversight is a good thing, the problem is that it immediately becomes a bargaining chip if you’re in an adversarial relationship with other people. It also becomes a corrupt way to make a lot of money because basically, you can favor Orthodox people over non-Orthodox and non-Jewish people. You can declare things in need of kashrut that don’t need kashrut.
Now, the chief rabbinate in principle does not have to be that. You could make the rabbinical courts privatized and voluntary. In other words, you would have civic definitions of Judaism or Jewishness. You could say the following 5,000 or 10,000 rabbis are qualified to say that this person is Jewish, and you go to whichever courts you want to as an Orthodox Jew. If you are not an Orthodox Jew, you do not go to courts at all. You have a civil path. I am talking about the separation of religion and state, but not necessarily about dismantling the system of rabbinic inspiration.
Every place where religion starts to be freed up from the state, you get an explosion of spiritual interest because the search for higher meaning is innate to being human. What makes people actually hate this stuff is when it is controlled, especially by a corrupted patriarchy. In Israel today there is a lot of that hatred, but people in their 20s and 30s are moving ahead anyway with their own spiritual expression. It is the lack of resolution of Arab-Jewish co-existence that makes it impossible for Christians and Muslims to be a mutually reinforcing liberalizing force for pluralism in all sectors. The system of adversarialism and second-class citizenship is just making it impossible for all but the very, very forward thinking to try to escape the patriarchal tradition. Also, some of the younger Arab Muslims have a much more respectful approach to their elders, but they’re also trying to innovate. So, it is actually an interesting role model for Jews who are seeking some sort of middle way between their Jewishness and the old patriarchy. I see a lot of synergy in the future if we can move forward on Arab-Jewish coexistence and de-politicize religious power. Both of those seem to be crucial to the evolution of religious pluralism.
Marc Gopin directs the Center for World Religions, Diplomacy and Conflict Resolution at George Mason University.
Amy Beth Oppenheimer
Religious pluralism in Israel exists, but not in a way Americans are used to. There was a time when there was a clear dichotomy in Israel between religious and secular, where religious meant Orthodox and secular just meant really not religious. Now there’s a lot more in between. So when we say religious pluralism, it’s important to check ourselves and ask: Are we actually looking at what is different in Israel, what are the trends, the desires, the manifestations of religious pluralism? Or are we really just operating from an American framework, and trying to do a cookie-cutter copy and paste?
For example, the Masorti [Conservative] movement launched a marriage campaign a number of years ago to encourage people to be married by a non-Orthodox rabbi. The chief rabbinate challenged this before the Supreme Court of Israel, arguing that the only way to marry in Israel is through an Orthodox rabbi. But the Supreme Court upheld the Masorti movement’s right to launch this campaign.
So a lot of baby steps are being made toward pluralism that in the eyes of American Jews would be very positive things. Does that mean we’re going to have a female chief rabbi in the next couple of decades? No. Does that mean there are going to be three parallel rabbinate structures: Orthodox, Reform, Conservative? No, because that really doesn’t reflect the makeup of Israeli society. However, have Israeli politicians and the Israeli public expressed a willingness to accommodate American flavors of Judaism, and, to a certain extent, if not embrace then at least tolerate different flavors of Judaism? Yes. And I think that’s a victory that should be celebrated by American Jews.
Guy Ben-Porat
Theoretically, you could think of a model in which church and state recognize more than one religious strand. But I think it won’t happen for two main reasons. First the Orthodox will not give up their monopoly position. And second the Israeli public is not too committed to religious pluralism. Israelis can lead secular lives, but when they need a service, they’re mostly accepting of the Orthodox ones. They might complain about the service they get, they might complain about the inflexibility of Orthodoxy, but at the end of the day most Israelis accept the monopoly as legitimate.
So what we have is pluralism that is happening informally, outside politics, which on the one hand allows for some freedom, but on the other hand also allows for the monopoly to stay intact. For example, marriage. Israelis who don’t want to marry with the Orthodox rabbinate can fight for change, and they have had all kinds of campaigns to allow civil marriage. These campaigns have all failed.
But Israelis find ways to circumvent the system. If you’re concerned with marriage, if you belong to a Reform temple and you want to be married by your Reform rabbi, the state tells you that you can’t. You can try and organize a campaign and fight this thing, but there’s not enough energy, there’s not enough people to support your campaign. What you can do is fly to Cyprus to get married. So you solve your problem with about 1,000 dollars. And that’s what most people do. So you do have a kind of pluralism, but it’s not through the system. There is an underground plurality; this is how people live.
Professor Guy Ben-Porat studies public policy and multiculturalism at Ben-Gurion University. His latest book is Between State and Synagogue: the Secularization of Contemporary Israel.
Menachem Friedman
Israel is a land of paradoxes. The rabbinate is recognized as an official institution of the state—with a monopoly on issues of personal status such as marriage and divorce. Nevertheless, in other aspects of life it has no status whatsoever. From the foundation of the state there were loopholes, and more continue to be created.
The “status quo ante bellum” is a crucial concept in Israeli law. Under the Ottoman Empire’s “millett” judicial system, minorities were categorized by religion and permitted separate legal courts dealing with “personal law” matters. Different communities operated their own legal systems—sharia for Muslims, canon law for Christians and halacha for Jews. During the British Mandate era, the millett system persisted and the British recognized the rabbinate as representing the Jewish community in Palestine – even though the newcomers in the 1920s and 30s were mostly non religious. Today’s chief rabbinate harks back to the British Mandate era.
One profound paradox is that, simply because the rabbinate is located in Israel, it has been far easier to enable “improvements” in the lives of ultra-Orthodox Jews living there than in the United States and other democratic states where state and religion are separate. Take the appalling problem of “chained” women who are denied a get by their intransigent husbands, rendering them unable to remarry. The Israeli rabbinate feels the heat of public opinion and press criticism and is duly influenced to force a man to grant his former wife a get. With no official rabbinate in the United States and elsewhere, no such pressure can be brought to bear.
Another practical solution by the Knesset has been to create the bizarre legal status of Yeduah Be Tzibur—“known in public,” or “common-law wife.” When a married man and wife split up but do not get a divorce and the man subsequently lives with another woman, on his death the common-law wife inherits his assets and his pension rights.
Marriages overseas are legal, so if one partner is not recognized by the Rabbinate as Jewish a potentially tragic hurdle is overcome.
Where issues considered vital to the national interest are concerned, and public opinion runs counter to the rabbinate, the Knesset steps in. Conversion is a case in point. Some half a million new immigrants, particularly from the former Soviet Union, many with children serving in the armed forces, were not recognized as Jews by the rabbinate. Some members of the Beit Din held fast to untenably strict demands on would-be converts. The government simply established a new Beit Din with more moderate members and solved the problem.
Religious pluralism can coexist alongside an official rabbinate so long as the ultra-Orthodox remain a minority and the government does not fall under its dictate. But their fertility rates suggest that within 20-30 years they could constitute a majority, although other problems, such as economics, would take precedence.
Menachem Friedman is emeritus professor of sociology at Bar Ilan University, Ramat Gan. He is an expert on the confrontations between religious and secular Judaism and the modern process of halachic decision-making.
Father Michael B. McGarry, CSP
The institutions that have a major influence on religious pluralism are the Ministry of Interior, the municipal zoning authorities, the Ministry of Foreign Affairs and the army.
Christian life in Israel is limited by the non-granting of building permits. Housing development in East Jerusalem is curtailed as the local municipality rejects applications. Another major problem has been the re-zoning of Christian properties, re-designating them from private to public ownership, after which no construction or any building alterations can be carried out. The army also plays a crucial role. Easter permits to visit Jerusalem and other places in Israel were granted to some 25,000 West Bank Christians to visit Jerusalem over the Holy Week. This looks good in the press, but on the ground the soldiers do not always honor these permits, sometimes dividing families from those who are allowed in from those who are not.
A profound internal struggle is underway now within Israeli society. Amongst the ultra-Orthodox community, there are extreme xenophobic and anti-Christian views and a desire to squeeze anything that appears foreign. This has a negative effect on Christians. However, other sectors of Israeli society are keen to expand religious freedoms and reflect on how Jews suffered discrimination in other countries over the ages, especially during the Holocaust, and say, “Shame on us.” We need to be better. We want to live up to our declaration of independence.
Despite all the difficulties, Christian Arabs are much better off in Israel (and to an extent Lebanon and Jordan) than in any of the surrounding Muslim states. Catholic schools in Israel are often superior to their religious Jewish or Muslim counterparts and, as a result, have significant numbers of Muslim pupils enrolled.
Father Michael B. McGarry, CSP, is president of the Paulist Fathers and served as rector of the Tantur Ecumenical Institute in Jerusalem 1999-2010.
One comment
2. Christians and Krishnan Hindus may be said to worship the first person through a second person, i.e. the experiential Universe or “Universal” Absolute Supreme Being (Allsoul or Supersoul), called Son/Christ or Vishnu/Krishna; represented by Michael (Supreme Archangel), Jesus (teacher and savior of souls), and others. The Allsoul is that gestalt of personal human consciousness, which we expect will be the “body of Christ” (Mahdi, Messiah, Kalki or Maitreya) in the second coming – personified in history by Muhammad, Jesus Christ, Buddha (9th incarnation of Vishnu), and others.
For more details, please see:
Samuel Stuart Maynes
Leave a Reply
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '907', 'language_id_whole_page_fasttext': "{'en': 0.9568448662757874}", 'metadata': "{'Content-Length': '94852', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UAVHSDU7BUTUOBT4DDKLSW5KNITTTHNN', 'WARC-Concurrent-To': '<urn:uuid:30c1ed68-9fbd-442b-8024-abb8f631f2cc>', 'WARC-Date': datetime.datetime(2015, 3, 1, 10, 56, 41), 'WARC-IP-Address': '181.224.147.234', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:65AGZF5KUYMXZUBWHHZHFT62WOTPZIY5', 'WARC-Record-ID': '<urn:uuid:21a7c459-87bd-4d7b-be7c-df1baf779275>', 'WARC-Target-URI': 'http://www.momentmag.com/symposium-can-religious-pluralism-official-rabbinate-coexist-israel/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b71010b5-ddb5-4739-a570-9e4774d0b76b>', 'WARC-Truncated': None}", 'previous_word_count': '7897', 'url': 'http://www.momentmag.com/symposium-can-religious-pluralism-official-rabbinate-coexist-israel/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03928399085998535', 'original_id': 'ff8970b7c604bd14170551bca8167d6a688736aa1f5713685f1797c8c28ed44d'} |
Dekiru 1 pdf command
Lines will become editable geometry and text will become editable text. A smart program that can edit, convert and create pdf. Below are handy pdfs for hiragana writing practice. Put the mercy button in your offhand slot to spare them. Windows 10 features a builtin print driver that converts documents to pdf. When used in a command line, script, or batch file, % 1 is used to represent a variable or matched string. Taylor assumed her current position as the command sergeant major for the u. Pdf bookmark sample page 1 of 4 pdf bookmark sample sample date. This document was generated on 20 may 2018 using a slightly modified version of the texi2html translator version 1. Creating a batch file in microsoft windows in windows, you can create a batch file using the steps below or the steps mentioned in the msdos command line section. This article presents a list of commands used by dos operating systems, especially as used on x86based ibm pc compatibles pcs. With that in mind, i have included this brief dos command reference to aid. Complete list of msdos commands heres every single msdos command there ever was.
Accessing this web site constitutes consent to monitoring at all times. Join millions of people who are already learning for free on memrise. The command form is often used at the time of an emergency, or for signs, such. The copying of this document, distribution to others, and communication of the. List of japanese verbs all levels japanese verb conjugator. List of ms dos commands wikipedia, the free encyclopedia page 4 sur 28. You are accessing a department of defense interest web site. How to make a batch file below are steps on how to make a batch file on any computer running a microsoft operating system, e. Lightly press top of strip and grab tab, stretch slowly straight down along wall. Csm taylor is a native of killeen, texas, and began her career in january of 1993 where she attended basic training and ait at fort mcclellan, alabama as a military police. Optionsf number specifies the first page to convert. Copy and paste the following code to link back to this work ctrl a cmd a will select. The telit wireless module family is compliant with.
Access all available commands based on your current context. For example, in a microsoft batch file, % 1 can be used to print what is entered after the batch file name in the example below, using the % 1, the batch file will print hello xxxx its nice to meet you, where xxxx is whatever you enter after the name of the batch file. Optionally, click settings to change the conversion options if youre converting an image file to pdf. Help data set along with a description of each, enter the help command as follows.
Copy originalfile destinationfile where originalfile and destinationfile are file names, separated by a space. You can modify the dir command so that it displays only one screen of information at a time. Then place an always active and chain mode command block with the command facing up. Group 1 verbs always end up with words containing usound. To do that, simply rightclick it and select the run as administrator option. Accessing command prompt in administrator mode windows 8.
A dekiru a nyelvtanulassal, nyelvtanitassal es ertekelessel. Learn how to get network information using the ss command in this tutorial from the archives. Generally, a switch consists of a forward slash that is followed by one or more letters or numbers. Use this pdf to find the documentation resources and other technical information that you need to learn about the command shell, and to automate command line tasks by using scripts or. The command can be used to merge several files into one file since the originalfile parameter can be a list of. Free japanese lessons japanese verb conjugation ichidan. The above mentioned rip software is really old pre2005 i guess. All based on our own pdf technology and with a comprehensive 70page manual. From development to security to productivity to administrationif you have to get it done, linux is there to serve. Rightclick the more info sign to receive a mercy button.
How to looking for window 8 in cmd, win 8 start cmd as administrator. There are various ways to create a pdf file using acrobat. Read out loud from the current page to the end of the document. List of msdos commands from wikipedia, the free encyclopedia in the personal computer operating systems msdos and pc dos, a number of standard system commands were provided for common tasks such as listing files on a disk or moving files. If you deal damage to a hostile mob, they will not want to fight.
Tivoli netview for zos command reference volume 1 version 5 release 1 sc31885700. Army command structure, which includes all army commands acom, army service component commands ascc and direct reporting units dru. Usaf including usaf personnel at the region liaison offices. Save instructions for damagefree removal or visit 1.
Disk 1 extended create simple volume using diskpart we can do the same thing with diskpart command line tool. How to convert a pdf to a dwg in autocad autocad 2020. He writes troubleshooting content and is the general manager of lifewire. Autolisp is active only visible to an objectarxdefined command 64.
Coherent pdf command line tools give you a wide range of professional, robust tools to modify pdf files. It was a predictable pattern that kate would overcome her past issues and accept an submissive role. Army network enterprise technology command, june 28, 2018. Schedule 1 form 1040 or 1040sr department of the treasury internal revenue service additional income and adjustments to income attach to form 1040 or 1040sr. Continue stretching at least 6 inches 15 cm until strip releases from wa l. The dir command also displays other important information like the hard drives serial number, the total number of files listed, their combined size, the total amount of free space left on the drive, and more. When you used the p switch with the dir command, you specified that msdos should pause after it displays each screen of directory list information. Take into account that using acrobat 4 to create acrobat 3 compatible files sometimes does not work properly. Kate and matts story includes of kates history and matts making you think it wouldnt get started from history. With the release of autocad 2017, using the pdfimport command, it is now possible to import pdf content directly into autocad drawings. Strategically located with office locations in central missouri and southwest missouri, command 1 is positioned to quickly serve customers throughout missouri and surrounding states.
Usaf, commands all civil service and military members of the u. This default behavior can be changed through command line options andor customization style sheets. Convert word docdocx, html, rtf, text to pdf, png, jpg, tiff, bmp, and much more. Try launching acrobat in safe mode, to do so follow the steps. View and download digidesign command 8 manual online. I guess there are a reason why the flycommand is broken in 1. Displays status of various daos manager operations. For detailed reporting and filing information, see the instructions for schedule. Saving or exporting from some format to pdf can be accomplished using a free pdf creator. Dos command reference 87 dos command reference even if the systems you support, upgrade, and repair are all running the latest version of windows, you will inevitably find yourself occasionally troubleshooting these systems from the dos command line. Use this pdf to find the documentation resources and other technical information that you need to learn about the command shell, and to automate command line tasks by using scripts or scripting tools.
When opening a pdf document from a command shell, you can pass the parameters to the open command using the a switch with the following syntax. Some of these tools dont have graphical equivalents, while others are just plain faster to use than their graphical interfaces. The accuracy of the resultant autocad content is largely dependent upon the quality of the original pdf, so results may vary. This tutorial gives you an opportunity to try basic msdos commands. Diskpart commands help you manage your computers drives disks, partitions, volumes, or virtual hard disks. To use the for command in a batch program, specify %%variable instead of %variable. Dekiru 1 megoldasok japan alapitvany budapesti iroda.
Overview this sample consists of a simple form containing four distinct fields. Option to make du include even files in its output. Pc dos typically derives the version from an internal string in command. All you have to do is print the document the way you usually would, and then choose the pdf option as your printer.
Other dos operating systems are not part of the scope of this list. To change group 1 verbs to potentialform, change the usound to esound in the last word. To download all zipped mp3 and pdf files from dropbox, click here. Page 2 this list identifies the codes used on schedule k 1 for beneficiaries and provides summarized reporting information for beneficiaries who file form 1040 or 1040sr. Pdftotext converts portable document format pdf files to plain text pdftotext reads the pdf file, pdf file, and writes a text file, textfile.
Nov 16, 2019 when used in a command line, script, or batch file, % 1 is used to represent a variable or matched string. Just like with the godan verbs, a negative can be made by adding nai ex. If textfile is not specified, pdftotext converts file. In reality, its just a simple way to convert pretty much anything to pdf. Generate a pdf quickly by using menu commands, dragginganddropping files onto the acrobat application icon, or converting clipboard data. Before you can use diskpart commands, you must first list, and then select an object to give it focus. By clicking the get a free quote button below, i agree that an adt specialist may contact me via text messages or phone calls to the phone number provided by me using automated technology about adt offers and consent is not required to make a purchase. Apr 23, 2016 rightclick the more info sign to receive a mercy button. Create a pdf from anything using windows 10s builtin pdf printer. Learn vocabulary, terms, and more with flashcards, games, and other study tools. Linux includes a fairly massive array of tools available to meet almost every need. There are some things you can only do from the command lineeven in windows. Some commands were built into the command interpreter, others existed as.
Reflow a tagged pdf, and return to unreflowed view. Legal notices this guide is ed 2008 by digidesign, a division of avid technology, inc. Usaf commander reports to the commander, first air force, who reports to the commander, air combat command. Other dos operating systems are not part of the scope of this list in dos, many standard system commands were provided for common tasks such as listing files on a disk or moving files.
Some even serve as a pdf printer, allowing you to virtually print pretty much any file to a. A switch modifies the way msdos carries out a command. Create pdf documents from any program, and much more programs. For example, in a microsoft batch file, % 1 can be used to print what is entered after the batch file name. Ms dos internal external commands pdf the following is a list of msdos version 5. Press and hold down shift and double click the acrobat icon and then open a pdf file. Design implementation training communications integration specializing in integrating new technologies to solve todays complex public safety information and communication issues. The dir command is used to display a list of files and folders contained inside the folder that you are currently working in.
Accelio present applied technology created and tested using. When an object has focus, any diskpart commands that you type will act on that object. If it opens without crashing after about 15 seconds, then you have a faulty plug in, locate and remove it from your plugins folder. Drdos reports whatever value the environment variable osver reports. We will open elevated with administrative privileges cmd. This document contains proprietary technical information which is the property of quectel limited. How to open command prompt in windows 8 as administrator. Japanese grammar guide tae kims guide to learning japanese. Ms dos internal external commands pdf ms dos internal external commands pdf ms dos internal external commands pdf download. This dod interest web site and related equipment are intended for the communication, transmission, processing, and storage of official u. Common dos commands changing the default drive to change the default drive, simply type the letter of your choice. Based on these facts, one might suspect that around 1990 in japan the concept of modality.
532 976 288 134 1440 137 926 459 433 1002 1049 779 746 67 753 980 180 229 767 380 1142 1408 578 169 537 960 678 1367 114 1335 1045 1243 644 617 214 544 159 1521 1261 906 828 1098 1136 285 590 1227 294 1017 191 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '231', 'language_id_whole_page_fasttext': "{'en': 0.8815252780914307}", 'metadata': "{'Content-Length': '18983', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3LDLH3TF23X2HGZ2WM43EDK7IX6ALPKB', 'WARC-Concurrent-To': '<urn:uuid:7c69c67c-af71-49d2-b9d1-4ae60d1b9aa0>', 'WARC-Date': datetime.datetime(2022, 11, 28, 20, 47, 48), 'WARC-IP-Address': '199.36.158.100', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JBI2OUSKXHH5OJNF6SLEKFPVBNVZSHTL', 'WARC-Record-ID': '<urn:uuid:7fe0d64b-b633-4ba4-b1df-758f31b81d55>', 'WARC-Target-URI': 'https://thesgeniti.firebaseapp.com/249.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e8b30b0d-b8ed-40ac-88c8-76333844c22b>', 'WARC-Truncated': None}", 'previous_word_count': '2212', 'url': 'https://thesgeniti.firebaseapp.com/249.html', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019460737705230713', 'original_id': '1ec5f664db14d8702563be0cd8bf9dce02d652472a4f64e4e47f454247920832'} |
During the Second World War, the British government built several Fortress islands in the North Sea to defend its coasts from German invaders. Some of these forts were built illegally in international waters.
One of these illegal Fortresses, consisting of concrete and steel construction, was the famous Fort Roughs Tower, situated slightly north of the estuary region of the River Thames, on the east coast of the United Kingdom. In contrast to the original plan to locate the tower within the sovereign territory of the UK, this fortress was situated at a distance of approximately 7 nautical miles from the coast. This is more than double the then applicable 3 mile range of territorial waters. To put it briefly, this island was situated in the international waters of the North Sea.
The forts were abandoned in the early 1950’s and, due to their illegal construction in international waters in a time of world crisis, they should have been destroyed, to comply with international law. Except for the aforementioned fortress, similarly located fortresses were subsequently pulled down. The result of this was the portentous uniqueness of the fortress. Fort Roughs Tower, situated on the high seas, had been deserted and abandoned, res derelicta and terra nullius. From a legal point of view, it therefore constituted extra-national territory. | mini_pile | {'original_id': 'e9628a6c31f9154d9e7eed5c7b8fe9a110318f22cb3653515fb70196be600217'} |
Skip to content
Includes Expert Content
Edema in feet and ankles
becker1014 posted:
I am a 26 yr old male in FL. I am experiencing swelling in my feet and ankles. I have lost 29lbs in 2 months and noticed an extreme change in the amount of swelling but the swelling persists mostly in my ankles. My primary job does require me to be on my feet all day long but this seemed to have happened after gaining a lot of weight very quickly. I have been to my doctor and he has done blood tests and found nothing wrong with my liver or kidneys and my blood pressure is high enough to be pre-hypertension but not high enough that he was alarmed. Its seems as if the problem may be circulatory in nature because on the nights that I have the time to do my cardio routine I notice the swelling almost dissappears completely and by morning there is virtually no swelling at all. I have tried a daily regimen of butcher's broom and fenugreek and they do help slightly. There is no chronic pain accompanying the swelling but there is a pressure in my ankles when they are at their worst, and sometimes a slight burning sensation in my lower legs down to my feet. Any suggestions or advice would be greatly appreciated
oh and I have cut out all fast food, soda and most sodium.
James Beckerman, MD, FACC responded:
From your description, the swelling doesn't sound serious from a medical standpoint - the tests your doctor has done seem encouraging. In addition to liver and kidney testing, we also sometimes recommend a cardiac evaluation, which can include an ultrasound of the heart - an echocardiogram - to rule out any abnormalities that could predispose you to swelling. That could be something to discuss with your doctor.
becker1014 replied to James Beckerman, MD, FACC's response:
Thank you for your advice. Have you ever heard of edema being cured through weight loss or someone who had the signs of edema but then it vanished from better diet and physical activity? I can't seem to find anyone who has cured edema from just losing weight and being active, it seems as though once edema occurs it is then a lifelong battle to subside its effects instead of actually curing/getting rid of it.
Featuring Experts
Helpful Tips
Was this Helpful?
3 of 3 found this helpful
Expert Blog
The Heart Beat - James Beckerman, MD, FACC
Related News
There was an error with this newsfeed
Related Drug Reviews
• Drug Name User Reviews
Report Problems With Your Medications to the FDA
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '86', 'language_id_whole_page_fasttext': "{'en': 0.947310984134674}", 'metadata': "{'Content-Length': '189216', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7R34QF2QSK4M3ICPHT27E7CLEXDPEHCM', 'WARC-Concurrent-To': '<urn:uuid:81839286-f287-4e3a-a93c-02e180e1abed>', 'WARC-Date': datetime.datetime(2014, 12, 22, 22, 19, 1), 'WARC-IP-Address': '23.0.160.42', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:C3NJCZEPAUQMGHTH3BIM4CDISKQQQSEG', 'WARC-Record-ID': '<urn:uuid:a1d911e0-9b31-4190-979d-652a76294e16>', 'WARC-Target-URI': 'http://forums.webmd.com/3/heart-disease-exchange/forum/4463/0', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5bc46423-bee4-4bb2-a944-9c6ee84f6b14>', 'WARC-Truncated': None}", 'previous_word_count': '560', 'url': 'http://forums.webmd.com/3/heart-disease-exchange/forum/4463/0', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01848280429840088', 'original_id': '46320bab063624df4c37d090b24930579d8cdbdb4b2a1cab8ba749e766f88029'} |
A file picture taken in Beijing in 1998 of 11 criminals paraded in handcuffs by police at a public sentencing rally outside a hotel. The convicted were caught while selling pornographic videos, robbing and stealing. The rally was part of China's ‘Strike Hard’ anti-crime campaign that began two years earlier. Photo: Associated Press | mini_pile | {'original_id': 'be28d1fbbbcf0ef699f97ca9ea4fc28094bc4e3c51184d63fb4b6c1da4f1d3f9'} |
Print PDF
Is the Name of the Game Still the Claim? The Post-Phillips Revolution in Patent Law
Intellectual Property Today
June 2007
Panitch, Gerson S.
Authored by Gerson S. Panitch
In 1990, Giles Rich, then Chief Judge of the Federal Circuit, proclaimed, "The name of the game is the claim."1 Indeed, more than a decade of precedent both before and after made clear that the scope of a patent rested primarily in the words of its numbered patent claims. Patent claims written narrowly were typically afforded limited protection. Broadly crafted claims regularly resulted in expansive patent protection.
Thus over the last three decades, experienced patent drafters honed the skill of crafting broadly worded claims to cover more than what a patent expressly describes. For example, if a technical description in a patent disclosed only "a serial bus," it would not have been unusual to claim that structure as "an interface." In this way, the patent drafter hoped to cover not only all forms of serial busses, but also parallel busses and all other types of interfaces a competitor might employ.
Companies invested their patenting dollars in elaborate claiming strategies, placing less emphasis on the technical description and background parts of their patent applications. There seemed little need to do otherwise. For the name of the game was truly the claim.
Then, two years ago, the winds abruptly began to shift with the Federal Circuit's decision in Phillips v. AWH.2 In the wake of that en banc decision, dozens of later decisions confirmed a revolution underway in patent law. No longer would the judiciary afford deference to broad claim language. For the Federal Circuit began developing a new body of case law curtailing patent rights where language in a patent suggested that an invention was narrower than the actual words in the claims. Applying this new rationale, the Federal Circuit interpreted a claimed "board" as requiring a board cut from a log and not boards made of synthetic materials.3 It interpreted the word "fiberfill" as requiring only synthetic and not natural material.4 And it interpreted a claimed "host interface" as referring only to a "parallel bus interface," and not a serial-bus interface.5 These limiting interpretations each resulted from statements made by the inventors in their patent specifications. And in each of these examples—as in many recent others—the Federal Circuit's interpretation led to findings of no infringement in cases where the words of the claims alone counseled the opposite conclusion.
The upshot of this new trend is twofold: Patent drafters must invest more effort in crafting patent specifications so as not to infect their applications with inherent narrowness. And litigators must realize that patent claims might no longer mean what they say. The name of the game is now the entire patent.
It Started with Phillips
The Federal Circuit's July 2005 decision in Phillips v. AWH was unremarkable in its outcome. It reversed a district court's interpretation of claimed "baffles" as requiring a particular angular orientation. This outcome made perfect sense, since the claims themselves did not recite any particular angular orientation. Yet more significant than the outcome was a shift in rationale. For the first time, an en banc panel of the Federal Circuit signaled that the words of patent claims could not be interpreted in a manner divorced from the context of the entire patent. In doing so, the Federal Circuit elevated the patent specification as the primary guide for interpreting patent claims. And since the issue of patent claim interpretation is a question of law, the Phillips decision began a new era where courts could now go so far as to dispose of patent cases without a jury, if in a court's view the patent specification supported a narrow claim interpretation under which no reasonable jury could find infringement.
Consistent with the Phillips rationale, the Federal Circuit began scrutinizing patent claims like never before. But this time, unlike the unremarkable outcome in Phillips, decision after decision appeared to insert into the claims limitations nowhere found within the words of the claims themselves. These cases fall into six categories.
1. Vague Claim Terms Pose a Risk of Narrow Interpretation
When a claim term is vague or subject to multiple interpretations, the first place courts will now look for understanding is the patent specification. And if the patent specification includes a particularly narrow disclosure, that narrowness may infect the claim. For example, when Network Commerce sued CRS and Microsoft, claiming infringement of a patented system for purchasing software or audio files over the Internet, the vague term "download component," proved to be the patent owner's downfall.6 Unable to understand the meaning of that term without resort to the specification, the Federal Circuit concluded that since the only corresponding disclosure in the patent was a download file with three specific boot functions, the claims required those functions. And since CRS and Microsoft's product did not exhibit those three functions, there could be no infringement as a matter of law.
Honeywell International faced a similar fate.7 It invented the use of metal fibers in nonmetallic automotive fuel-system components in order to dissipate dangerous electric charges. It broadly claimed the invention in connection with a "fuel system component," and when ITT Industries incorporated the inventive concept into a fuel-line connector, Honeywell sued for patent infringement. But much to Honeywell's dismay, the Federal Circuit concluded that the term "fuel system component" could be interpreted to cover only fuel filters, and not ITT's fuel-line connectors. Despite Honeywell's written statements during the patenting process supporting a broader interpretation, the Federal Circuit noted at least four occasions where Honeywell's patent used the phrases "this invention" or "the present invention" in connection with fuel filters. Thus, in the Federal Circuit's view, "[w]here, as here, the [inventor's] written description clearly identifies what his invention is, an expression during prosecution that he intends his claims to cover more than what his specification discloses is entitled to little weight."8
The lesson from these exemplary cases becomes clear: When patent claims contain terms that are either generic or subject to multiple meanings, applicants must carefully craft the patent specification in a way that defines those terms broadly. Otherwise, the limited examples of the specification may govern claim interpretation.
2. Disparaging or Distinguishing Comments Might Limit the Claims
When it sued T-Mobile, Inpro II Licensing probably thought it had a clear case of literal infringement.9 Yet the Federal Circuit dashed those hopes because, within the context of the patent specification, a "host interface" could refer only to a parallel-bus interface, and not the serial connection T-Mobile used. In reaching this conclusion, the Federal Circuit noted that the patent referred to prior-art serial connections as "a big drawback," and "very troublesome," and referred to a parallel-bus interface as "a very important feature of the present invention."10 In addition, the Federal Circuit noted that the only embodiment described in the patent used a parallel bus. "Although claims need not be limited to the preferred embodiment," the Federal Circuit explained, "when the invention is more broadly described, neither do the claims enlarge what is patented beyond what the inventor described as the invention."11
In the absence of disparaging statements, a patent's reference to a differing characteristic of the prior art can lead to a narrow claim interpretation. For example, Terlep sued Brinkmann on a patent for solar-powered pathway lighting, with "clear" lenses.12 Since Brinkmann's lens diffused light, the Federal Circuit found no infringement because the summary of the invention distinguished the invention over diffusing lenses.
These examples teach that in a post-Phillips world, the patent itself is probably not the best forum to distinguish the prior art from the invention. And certainly, in a post-Phillips world, one should not negatively characterize the prior art. For such distinctions and disparaging remarks may infect the scope of the claims.
3. Highlighting the Import of a Nonclaimed Feature Might Result in Claim Narrowing
When Atofina sued Great Lakes Chemical on a patent claim reciting a "chromium catalyst," the Federal Circuit interpreted that term as excluding metal oxides or noninert additives.13 In doing so, the Court cited the inventor's use of the word "necessary" when describing that the catalyst should contain solely chromium. In the prosecution history, in response to a rejection by the examiner, Atofina had also highlighted that the claim transition employed the phrase, "consisting essentially of," and that "the present invention makes it possible to employ a catalyst based solely on chromium to carry out a fluorination reaction."14 By referring to a "solely" chromium catalyst as "necessary," Atofina ended up with a claim interpreted more narrowly than it was written.
Curtiss-Wright Flow Control's lot was similar in its suit against Velan over a machine for deheading coke drums.15 Curtiss-Wright claimed an adjustable machine, and Velan's accused infringing machine was adjustable during down time between periods of operation. Yet the Federal Circuit interpreted the word "adjustable" as requiring adjustability "while the machine is in use or operation," and therefore found no infringement. In reaching that conclusion, the court cited, among other things, the fact that the background of the patent discussed hazards occurring during use in the absence of on-the-fly adjustability; and the specification's use of the phrase "critical aspect" to describe the ability to dehead coke drums without having to perform manual operations.16
While in the past, patent practitioners might have routinely emphasized features of an invention with words such as "critical," "necessary," and "important," today they should avoid that language. Otherwise, they run the risk that features so identified might find their way into a court's narrowing claim interpretation.
4. Narrow Examples Without a More General Description Can Reduce Claim Scope
Though the Federal Circuit has repeatedly cautioned against reading features of preferred embodiments into the claims, that rule seems to have a number of significant caveats. For example, if the preferred embodiments contain the broadest description of the invention and the patent lacks more general language, Federal Circuit precedent is prone to imposing unclaimed features of preferred embodiments on the claims. This is what happened to Tapp Pharmaceutical in its suit against Owl Pharmaceutical.17 In an invention for a microparticle injection, the parties disputed the meaning of the word "particle." The Federal Circuit narrowly interpreted a "particle" as requiring both a "drug" and a "drug retaining substance." The court justified its interpretation because in all 31 examples in the patent specification, a particle was described as having both components.18 There was no broader description in the patent aside from those preferred embodiments. As a result, the patent owner was stuck with claims narrowed to the scope of the preferred embodiments.
Aquatex Industries shared a similar experience in its suit against Techniche Solutions over fiberfill batting materials.19 Aquatex included verbiage in its patent mentioning that "the particular fiberfill is not known to be critical. That is, any commercial fiberfill may be used as long as it does not adversely affect the performance of the end composite." But since all the commercial examples in the specification used purely synthetic fiberfill, the Federal Circuit interpreted "fiberfill" in the claims as requiring only synthetic fiberfill and thus remanded the case on the issue of equivalents.20
This new precedent is a splash of cold water to practitioners who craft applications around one or two preferred embodiments without broader characterizations of the invention. Particularly when patent applications identify one or more commercial examples more narrowly than what the inventors consider their invention, this new Federal Circuit precedent suggests that applicants should characterize the invention in broader terms or risk court-imposed claim restrictions.
5. Describing Benefits of the Invention Can Result in Narrowed Protection
In the past, many patent practitioners included a description of unclaimed advantages of the invention in their applications. Under post-Phillips precedent, however, that practice may haunt patent owners as it did Nystrom in his suit against Trex.21 In that case, the invention involved decking boards with rounded-top side edges that aided in water runoff. The broadest claims recited a board, without specifying the material from which the board was made. Nevertheless, the Federal Circuit interpreted the word "board" as requiring a board cut from a log and excluding coverage of Trex's synthetic product. In narrowly interpreting the claims, the Federal Circuit pointed to a statement in the specification explaining that the invention yields a superior product and reduces the amount of scrap in the outermost boards cut from a log. Since this stated advantage of the invention was unachievable unless the board was cut from a log, the Federal Circuit concluded that the claimed "board" was properly limited only to those boards cut from a log.22
The rationale in Nystrom v. Trex provides defense counsel with a new tool to avoid infringement: Scour the patent for stated advantages unachievable by the accused product and advance the source of those advantages as an implied claim requirement.
6. References to Unclaimed Features of "the Invention" May Lead to Narrowing
Even if a patent does not highlight an unclaimed feature as being particularly important or beneficial, the mere association of an unclaimed feature with "the invention" might lead the Federal Circuit to treat the feature as an inherent part of the claims. Cook Biotech learned this lesson the hard way in its suit against Acell.23 That case involved a tissue-grafting method with three independent patent claims. The first two recited urinary bladder tissue delaminated from a muscle layer. The third recited the bladder tissue but did not expressly require any delamination. The Summary of the Invention section of the patent explained that delamination was "typical," suggesting that it was not always needed. Thus, the district court found that Acell's method, which did not delaminate, infringed that third independent claim. But the Federal Circuit reversed, interpreting even the claim that did not recite delaminating as inherently requiring it. In doing so, the Federal Circuit focused on one particular statement in the patent specification, which stated that the urinary bladder tissue "for use in accordance with the present invention is delaminated" from the muscle layers. (Emphasis added.) The Federal Circuit viewed this passage as a "special definition," and as a result concluded as a matter of law that there could be no infringement either literally or under the doctrine of equivalents.24
The lesson of Cook Biotech is harsh. Despite what claims say, if the specification definitively refers to "the invention" as having an additional feature, that feature might be inherently imported into the claims. Perhaps the result would have differed had Cook's patent mentioned that with the invention the bladder tissue "may be" delaminated, as opposed definitively stating that with the invention it "is" delaminated.
Global Trends in Post-Phillip Cases
On a case-by-case basis, some post-Phillips claim-construction decisions may appear inconsistent with each other. But underlying trends are clearly emerging. The Federal Circuit is repeatedly emphasizing that "a word describing patented technology takes its definition from the context in which it was used by the inventor" and that a patent owner is not entitled to a claim construction "divorced from the context of the written description."25
Whether courts will read limitations from the specification into the claims is a function of whether statements in the specification appear to refer to the invention as a whole or whether they refer only to a particular embodiment. "Statements in the specification that describe the invention as a whole rather than statements that describe only a preferred embodiment are more likely to support a limiting definition of a claim term."26
These post-Phillips trends clearly favor accused infringers. Defense attorneys who carefully parse the words of patent specifications for subtleties of language may reap great rewards for their clients accused of infringement. And the Markman proceeding, where courts interpret the claims as a matter of law, now rises to an even higher level of import.
There is something in the post-Phillips case law for everyone. For every Federal Circuit decision reading limitations into claims, there is another where the Federal Circuit refused to do so. Therefore, to advocate effectively during a Markman proceeding, counsel for both parties must be well versed in the subtleties of the Federal Circuit's post-Phillips claim-construction decisions.
And in a post-Phillips world, companies need to consider investing more patent dollars in carefully crafted specifications that contain appropriately broad characterizations of the invention and that are wordsmithed to avoid the risk of infecting the patent claims with inherent narrowness.
Patent drafters should reconsider outdated practices of distinguishing the invention from the prior art in the patent specification, because during litigation, those distinctions, particularly if they are unclaimed, may find their way into narrowing claim interpretations. Similarly, patent drafters should steer clear of characterizing features of the invention as "important." Otherwise, the features so identified may end up being read into claims that do not expressly recite the same features. Finally, and perhaps most difficult, patent drafters need to adopt new writing techniques that avoid definitively associating any particular characteristic with "the invention," unless the characteristic is absolutely necessary. Otherwise, some day down the road, the patent may end up being interpreted in a narrow manner never intended.
The name of the game is no longer just the claim. It's the whole patent.
1 Giles S. Rich, The Extent of the Protection and Interpretation of Claims-American Perspectives, 21 Int'l Rev. Indus. Prop. & Copyright L., 497, 499 (1990) ("To coin a phrase, the name of the game is the claim.").
3 Nystrom v. TREX Co., 424 F.3d 1136, 1143-45 (Fed. Cir. 2005).
4 Aquatex Indus., Inc. v. Techniche Solutions, 419 F.3d 1374, 1382 (Fed. Cir. 2007).
5 Inpro II Licensing, S.A.R.L. v. T-Mobile USA, Inc., 450 F.3d 1350, 1354-55 (Fed. Cir. 2006).
6 Network Commerce, Inc. v. Microsoft Corp., 422 F.3d 1353 (Fed. Cir. 2005).
7 Honeywell Int'l,, Inc. v. ITT Indus., Inc., 452 F.3d 1312 (Fed. Cir. 2006).
8 Id. at 1319.
9 Inpro II, 450 F.3d at 1350.
10 Id. at 1354.
11 Id. at 1355.
12 Terlep v. Brinkmann Corp., 418 F.3d 1379 (Fed. Cir. 2005).
13 Atofina v. Great Lakes Chem. Corp., 441 F.3d 991, 996-97 (Fed.Cir. 2006).
14 Id. at 997.
15 Curtiss-Wright Flow Control Corp. v. Velan, Inc., 438 F.3d 1374 (Fed. Cir. 2006).
16 Id. at 1379-80.
17 Tap Pharm. Prods., Inc. v. Owl Pharm., L.L.C., 419 F.3d 1346 (Fed. Cir. 2005).
18 Id. at 1353-54.
19 Aquatex, 419 F.3d at 1374..
20 Id. at 1382-83.
21 Nystrom, 424 F.3d at 1136.
22 Id. at 1143-45.
23 Cook Biotech Inc. v. Acell, Inc., 460 F.3d 1365 (Fed. Cir. 2006).
24 Id. at 1374-75.
25 Tap, 419 F.3d at 1354; Nystrom, 424 F.3d 1144-45.
26 Varco, L.P., v. Pason Sys. USA Corp., 436 F.3d 1368 (Fed. Cir. 2006) (quoting C.R. Bard, Inc. v. U.S. Surgical Corp., 388 F.3d 858, 864 (Fed. cir. 2004)).
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '68', 'language_id_whole_page_fasttext': "{'en': 0.9304218888282776}", 'metadata': "{'Content-Length': '116693', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UEVENRIVTECADG7SIW4LKV7VF4PCKDPK', 'WARC-Concurrent-To': '<urn:uuid:f8de507c-7b99-43fe-8993-bb4cce1746f3>', 'WARC-Date': datetime.datetime(2014, 12, 22, 3, 23, 18), 'WARC-IP-Address': '23.101.122.1', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:NV3RK3HDIPK7RJTVOFYYCCGQ3K26CNRC', 'WARC-Record-ID': '<urn:uuid:2ae6bb27-4201-4af5-a878-4dcba8da8588>', 'WARC-Target-URI': 'http://www.finnegan.com/resources/articles/articlesdetail.aspx?news=16abb42a-180b-49b0-af3c-896d420ab1fc', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f1113ca9-62b6-4f1f-8192-34d43d85a743>', 'WARC-Truncated': None}", 'previous_word_count': '3093', 'url': 'http://www.finnegan.com/resources/articles/articlesdetail.aspx?news=16abb42a-180b-49b0-af3c-896d420ab1fc', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024516820907592773', 'original_id': '4ee7e5f69039934e4033ecc081d8656fec217a9e35971849c5e6fdb131edf090'} |
Exploring the Great Pyramid’s Underground Water Tunnels
Hidden Sarcophagus under Pyramids
Giza Water Tunnels
Temple Kukulcan Pyramid
Bosnian Pyramid Tunnels
Global Pyramid Conference
Subscribe free to the Trinfinity & Beyond Blog.
Sacred Mushroom Rites & the Hidden Meaning of the Egyptian Ankh
The Egyptian ankh has always been seen as a power symbol for life, but evidence suggests a deeper, more hidden meaning that has escaped most of the scholars of today. Perhaps because it opens a Pandora’s box most would rather leave closed—knowledge of the Amanita muscaria mushroom.
It all began when a dear friend of mine, living in Italy and now in her 80’s, told me about a man named Andrija Puharich who she had known and loved for many years. He had connections to everyone in the psychic field and had shared quite a few secrets with her. But that’s another story.
Intrigued, I read one of Puharich’s books: The Sacred Mushroom: Key to the Door of Eternity. It confirmed my belief that there was more to the ankh story than most of us have been taught.
During the years 1953 – 1955, Puharich was a medical officer and Captain in the U.S. Army. He was stationed at the Army Medical Center in Edgewood, Maryland, after being recruited by the Chief Officer of the Army’s Psychological Warfare Division. His assignment was to study devices which would increase extrasensory perception.
On December 9, 1954 a former research colleague and friend, a woman named Alice Bouverie, called Puharich to tell him about a subject he might be interested in studying. She related that while at a dinner party a young Dutch sculptor, named Harry Stone, had spontaneously gone into a seizure after she had shown him an authentic piece of Egyptian jewelry that had come from the British Museum. It was a gold pendant, belonging to Queen Tiy (Akhenaten’s mother).
After a few minutes, Stone fell into a deep trance state and began talking about his upbringing in Egypt during the Middle Kingdom’s 14th Dynasty, during the time of Ra Ho Tep. He then asked for writing paper and pen, and proceeded to speak and draw in an ancient Egyptian hieroglyphic script.
Alice kept the writings and produced them for a skeptical Puharich, who soon learned that the hieroglyphic script was written in a rarely seen ancient Egyptian form, which very few knew how to decipher. Consequently, he had difficulty finding anyone proficient enough in the linguistic field to even attempt to translate what Harry had drawn. When he did locate a scholar, the translated information was even more intriguing.
Harry’s hieroglyphs referenced a mushroom practice used in the most sacred ceremonies to the Egyptian gods. A plant that the ancients cultivated in what is now known as Syria. It was used to stimulate communication with the gods, the greater cosmos, and served as an aide in the elevation of human consciousness.
The ancients depicted this “unknown plant” in pairs of two, shaped as parasols or umbrella figures. This unnamed plant was referred to in the Pyramid Texts of ancient Egypt as a golden plant with magic properties. (There is no word for “mushroom” in Egyptian hieroglyphics.)
Over a three-year period, Puharich was able to study the Dutch sculptor during such altered states. Harry would often talk about the medicinal qualities of plants while in trance. What was surprising was that Harry had never been to Egypt or studied its history, let alone learned to write and understand ancient hieroglyphics. This ability was only exhibited during a trance-like state.
Harry described one plant in question as “a mushroom with a golden or a red color”. He drew it with white spots. He then related how this particular “sacred mushroom” would “induce a fission of body and mind so that the mind can operate (or travel) independently of the body.”
Puharich discovered that only one mushroom fit Harry’s description—the fly agaric or Amanita muscaria, a plant often used in fairy tales and legends. It only comes in two colors: red and a golden-yellow, has white spots and a “handkerchief” around the stem like in Harry’s drawings.
This mushroom contains muscarine, a deadly toxin that can quickly kill. Despite its non-edible status, the ancient Egyptians discovered a more profound use for this plant as an aid to higher consciousness.
While in trance, Harry talked about how the ancients had found several ways to diffuse the deadly toxin so that one could benefit from its hallucinogenic properties and still live to tell the story of what lay “beyond the veil.”
One such technique was feeding it to snails, who consequently died, but somehow neutralized the toxin in the death process, while the hallucinogenic properties remained in the urchin. This then made it possible for humans to eat the snails and experience transcendence without the deadly consequences. How they came to discover this unique process, we will never know. A much simpler way to safely ingest it was to peel the skin off the cap, then soak the mushroom in vinegar or brine.
Mushroom Offerings
This plant was specifically used for inducing a trance in order to attain consciousness expansion and mystical knowledge. It was, in essence, an ascension plant.
The ancients would rub it on an individual’s tongue as well as the top of the skull (the crown or soft spot area known in the Indian religion as the “Aperture of Brahma” or the “Opening of Creation”).
Harry also described a purification by water ritual which preceded the ‘”opening of the mouth” ceremony.
In almost every temple throughout Egypt we see gods offering an ankh to the mouth of the king or pharaoh. Scholars have always translated the symbol of the ankh to mean “eternal life” or “the key to life.” Many will admit that little is known about the ankh symbol, or its true origins, even though many religions which came afterward, would adopt this symbol into their own version of the Christian and Coptic crosses.
Drawing from Harry’s information, Puharich discovered that the ankh was the true symbolic representation of the sacred mushroom. Oftentimes, the ancient Egyptians displayed hidden knowledge in plain sight that only the privileged few could interpret.
In the oldest Egyptian writings, known as the Pyramid Texts, it references an unknown red/golden plant used in sacred rites. In the Egyptian Book of the Dead they are called it “the food of the gods,” or “celestial food” and “the flesh of the gods.”
Puharich observed that the Amanita muscaria, with its handkerchief skirting around its stem, actually resembled an ankh during its growth process. Could the walls of temples throughout the centuries actually be displaying depictions that foretold of reaching enlightenment through the aid of a natural, plant-based, hallucinogen?
We know that the ancient Egyptian’s also used the psychoactive properties of the Blue Lotus flower for deep dreaming quests, which I wrote about in a prior blog: Secrets of the Ancient Egyptian Blue Lotus. However, sacred mushrooms were in an entirely different category.
The psychoactive effects of Amanita muscaria are not only the deadly toxins of muscarine, but atropine (belladonna) and bufotenin (a secretion also found in the sweat glands of African toads), similar to adrenaline. This presents a unique combo of drugs that produces a highly hallucinatory effect. Harry talked about it being used to also look into the future.
It is no coincidence that the ankh is described as a vessel out of which the gods dispense, or pour, life. Or, as Puharich, termed it: The Key to the Door of Eternity. When Harry was asked about how the mushroom was used, he said, “by opening the door for the soul, by stepping in, and leaving.”
In a hidden away chamber, near the outskirts of Luxor’s Karnak temple, there is a chapel displaying seven doors, within doors, and seven ankh keys. Above the ankh keys is an immense tree of life engraved on the limestone wall. This particular chapel was a ceremonial post where sacred mushroom ceremonies were conducted by the priests after first undergoing a water purification ceremony. This particular purification ceremony can also be seen symbolically on temple walls, where the gods cleanse the king with the water of life (ankhs) in preparation for his ascension voyage.
Crowns signify much more than rulership in ancient Egypt. The crown of Upper Egypt is usually displayed as a white cone or mushroom shape. When the red crown of Lower Egypt is added and worn, it symbolizes the King’s dominion over both Upper and Lower Egypt (according to modern-day Egyptologists). However, Harry’s trance writings referenced an “N ANKH” describing a “red crown” signifying knowledge.
This suggested to Puharich that when both crowns were worn together, it meant the King had merged the upper and lower realms of human consciousness and attained ascension into the higher realms. He had been initiated and “enlightened.”
The sacred mushroom rites were the path to this attainment of “knowledge”. (It is interesting to note that when one becomes a Cardinal in the Catholic Church, they are then permitted to wear the robes of higher knowledge: short red-caped tops, white stem-like skirting, and white head caps. Coincidence?)
On my most recent return to Egypt, where I lead small groups of fellow mystery seekers each year, I started collecting an album of pictures from temple walls of an upside down mushroom sporting a plant stem. This offering is usually given to either the King or to one of the gods. Most people think the object is some sort of cup or drink, but it clearly has a stem and is always displayed the same in every temple scene of its kind. There are so many of these same scenes that one eventually realizes that the ancient Egyptians were clearly into mushroom knowledge as a pathway to the gods and the afterlife.
Mushroom ceremonies have been in existence throughout the centuries, in ancient cultures from Mexico to Siberia. This knowledge is usually kept in the hands of the high priests and the shamans. But If you pay closer attention, you start seeing the Amanita muscaria symbology in somewhat unexpected places.
My home is decorated with both Egyptian and Balinese artifacts. After becoming interested in sacred mushroom rites, I happened to closely examine an old temple rubbing I had from Thailand. Imagine my surprise to find mushroom symbolism in the artwork which I hadn’t recognized before. The rubbing contained a deity scene with three dark “umbrellas”, all shaped like Amanita muscaria, complete with white spots. The three “umbrellas” are placed in front of trees of life–the plant of immortality (see b&w photo).
I wondered at the meaning of the name “Amanita”. It makes one think of the Egyptian God, Amun Ra–the King of Gods. “Aman” is a Muslim name meaning, “lovable protection without fear”. When I looked up the Aman derivative in other languages, it translated as “mouth” or “water”.
After all my trips to Egypt, I now see symbols and hieroglyphics with a more discerning eye. So many of the temple pillars are even shaped like giant mushrooms.
Many of the ancient Egyptians clearly found greater meaning in life through examining not only death and the afterlife, but the vast unexplored dimensional realms where human consciousness can attain higher wisdom and knowledge. In that respect, man has not changed much over the millennium. We are compelled to seek out answers to the mysterious, the unexplained, the truth that lies beyond. I, for one, can’t imagine a life that doesn’t seek this greater understanding of all things.
Mushroom Statutes in Peru
Mushroom Statues in Serbia
A cool short time-lapse video of the growing process of the Amanita muscaria
Copyright 2018 – Reprint by Permission Only
Subscribe free to the Trinfinity & Beyond Blog.
Time Travel Stargate Found in Egypt
The Seti 1 Temple in Abydos, Egypt has always been cloaked in mystery. It has been rumored to have an Ancient Stargate, an opening to the next world. To add to the mystery, the temple contains strange carvings on several walls which Egyptologists have been at a loss to explain. Such carvings have not been seen in other temples.
New evidence now suggests that information on the Abydos Stargate may have been hidden in plain sight for centuries, waiting to be deciphered. But before I get into the specifics, a little history is in order.
The Temple at Abydos is the oldest necropolis in this ancient land and was believed to be the very heart center of Egypt. The temple we see today was built by Seti 1 over an older more sacred temple, which may contain even deeper secrets. It is well-known that the Egyptian Pharaohs would arrange for a “symbolic” burial tomb to be built in their honor at Abydos, even if their “physical” tomb was erected elsewhere. The Ancients believed Abydos Temple was the closest entry point to the next world and the much desired afterlife. One has to wonder why?
Abydos Temple was home to the Order of Melchizedek, the Brotherhood of the Law of One, known throughout millennium as the cosmic priests to the priests. The origin of this priesthood is said to go back further than Atlantean times, and quite possibly to the very beginnings of man on earth.
The Melchizedek priests were known as true visionaries, dedicated to the service of others. Their mission was to save man from his illusions, to free souls from earthly enslavement. The Melchizedeks were the founders of the Ancient Mystery Schools of Egypt. They were known to possess the knowledge of the cosmos and the keys to mankind’s ascension. They were also the gatekeepers to the Stargate at Abydos Temple.
Years ago I learned from a secret space program insider that Abydos contained a natural Stargate which allowed a covert military experiment to actually send an ET home. How? They forced the Stargate to open using advanced technology.
It sounded pretty far out, but I recall the insider saying the Stargate opening was along one of the Northern walls of the temple. Since Seti 1 built this temple on top of a much older sacred temple, I’ve been at a loss as to whether the wall in question was an inner or outer wall, above ground or below ground. This recently changed when I happened to mention the insider’s story to an Egyptologist friend of mine while revisiting the temple.
His face lit up with excitement as I related the details the military insider shared regarding seeing a series of “four field posts” positioned around “gates” as well as some sort of “projection device,” a “barrel” and a set of “containment rings”. Using a directed electromagnetic energy force, they were able to open and access this natural Stargate and effect time and space distortion.
My friend immediately took me over to an inside wall near the outside of the temple and pointed to an unusual carving that took up most of the wall. I was stunned. I had never really “seen” this carving from past temple visits. I’m sure thousands had walked by it, just like me, without understanding what they were actually seeing. It’s as if it was veiled in some cloaking field that transmitted to passing observers, “move along, nothing to see here.”
Abydos Temple – Sokar Sled to the Underworld
The entire wall carving shows a Pharaoh dragging a sled-like vehicle with wings (not an afterlife boat which is a common symbol seen in many temples). Oddly enough, this sled reminds one of the time travel vehicle used in the H.G. Wells movie, The Time Machine.
The Abydos vehicle contains four gated posts and a barrel-like device with rings displaying two heads of the falcon deity Sokar, the God of the Underworld.
Set Animal
On the wing is a strange creature with unusual ears. Oftentimes you see this animal-like head on the handles of “Was” Scepters, representing the symbol for ultimate power. Some have likened the head of this creature to the “Set Animal“—a being used to control the chaotic forces of nature.
To the left of the Pharaoh is the deity Thoth, depicted with the head of an ibis. Thoth is the God of Wisdom, Knowledge and Magic. In this wall carving, he appears to be instructing the Pharaoh.
The powers of Thoth were known to be so great, that the Egyptians had tales of a “Book of Thoth”, which would allow a person who read the sacred book to become the most powerful magician in the world. It was said to contain “the secrets of the gods themselves” and “all that is hidden in the stars”.
Thoth was thought to be the Master Scribe to the gods. It is believed that he wrote down the story of man’s reality then placed it into the grids of the earth for us to experience and learn through the alchemy of time and consciousness. A ruler is often seen in his hand, as he was the one responsible for making “calculations concerning the Heavens, the Stars and the Earth.”
Ascension Gate symbol
My Egyptian friend immediately sent a picture of the wall carving to a forum group of over 2000 Egyptologists asking if anyone knew what the wall scene meant. Only one response came back: “Gate to the second world”. On each side of the wall carving are Egyptian symbols for “Ascension Gate”.
There is a noticeable deep chunk taken out of the wall, which would have provided the identity of an unknown figure. The missing chunk looks like it may have been intentionally removed at some time.
In a prior blog I’d written, The Reincarnation of Om Sety and the Secrets at Abydos, an English woman named Dorothy Eady, who would become the infamous caretaker of Abydos Temple in the late 20th Century, recalled how she had once fallen into a dimensional hole inside the temple, giving her a time travel glimpse into the past. Many report that during her years of dedicated service at the temple, she was often seen pressing her hands along the walls looking for some hidden doorway that might take her back to that place in time. Perhaps this is Om Sety’s Stargate wall. How often it may spontaneously open is unknown.
The Abydos Stargate is said to be a natural time travel bridge. In 1935, Albert Einstein and physicist Nathan Rosen used the theory of general relativity to elaborate on the idea, proposing the existence of “bridges” through space-time. These bridges connect two different points in space-time, theoretically creating a shortcut that could reduce travel time and distance. The shortcuts came to be called “Einstein-Rosen bridges”, or wormholes.
While the wall carving at Abydos may indeed mark a natural Stargate, it appears the military found a way to open such portals on-demand. Once opened, they utilized a strange black box-like device to access information from the portal pertaining to past and future events.
This technology has been loosely referred to as the “Looking Glass” device, “Yellow Book” or “Orion’s Cube” It is said to be alien technology retrieved from a spaceship, believed to be from the Orion Constellation, which crashed in the U.S. prior to the famous Roswell, New Mexico crash in 1947.
This “Looking Glass” device was given to U.S. President Eisenhower, then widely passed around to several governments to view into their most probable future and plan accordingly. The insider reported they were able to see, in holographic display, information concerning future presidents (i.e. Bush, Clinton, Obama) as well as the events surrounding the World Trade Center attack on September 11th, 2001. (It is important to note that what they saw were the most probable futures based on the strength of pulsed energy emanating from the images. Interesting enough, years ago, upon questioning another person who had access to this device, I was told that they never saw Hillary Clinton as a future president.)
The military carefully studied past events that became true and which ones did not come true based on the energy signature of the holographic image displayed. They learned that not every event is written in stone—the future can be altered. They tried to find a way to accurately read the future events that were more likely to occur. Eventually, the U.S. Government was able to reverse engineer this device in the 60’s and 70’s under a secret CIA program known as “Project Looking Glass”.
The Abydos Stargate was supposedly only used to pass information from the future and/or other dimensions back to this time. Which leads one to ask an important question. Have those in power been manipulating future timelines to effect more desirable/profitable outcomes? If so, governments have been playing some dangerous games within time and space.
Scientists report that wormholes can spontaneously collapse. Any person using the portal when this happens can forever be caught in a state of space-time limbo. If there were early experiments, which I have told there were, how many test subjects did not return?
As of this writing, no one seems to know what became of the Looking Glass technology. If they do, they’re not saying. The device was said to be turned off years ago out of fear for the impact it could have on Earth’s future timeline. The technology showed them that it would be ON when Earth experienced some future catastrophic world event.
The insider somehow knew the device would be accidentally re-activated in the year 2016/2017. How, where and under what circumstances, he would not say. I don’t think he knew. My intuitive guess as to its current whereabouts would be that it’s either being hidden away in the Vatican or is buried beneath the ice cap of the Wllkes Land Crater in East Antarctica—which might explain why many government and church leaders have suddenly taken so many unexpected trips to this frozen land in the last two years. No one wants to talk about what’s going on in Antarctica. Ii’s completely cloaked in a heavy veil of secrecy.
Futuristic vehicles seen at ceiling
Centuries ago, the Melchizedek priests may have stumbled onto such a Looking Glass device, or been given one by the “Gods” or “Star Beings” as they called them. It’s no coincidence that the three Pyramids at Giza are also aligned to the Orion’s Belt Constellation.
Such an advanced technology would have allowed them to see over the curvature of time and space to view such future events. Perhaps this is why there are also carvings in the temple depicting futuristic technology, such as spacecraft, a submarine, and a helicopter—all hidden on a high beam near the ceiling where it would generally go unnoticed.
Any carvings closer to the temple ceilings were known to be of a more esoteric, next world orientation. On close inspection, these carvings do not display any evidence that they have been altered or carved over as other wall scenes displayed lower down. Oddly, the spaceship carving also appears to display field post symbols.
Since there is no way to prove any of this information is true, out of curiosity I asked several highly advanced intuitives to give me their initial impressions of the Abydos wall carvings without any prior information on its possible meaning. I received the following impressions: “beyond the veil sled,” “stairway to heaven” “as above, so below,” “sliding down the rabbit hole,” and “Oh, wow! Whatever it is it gives me shivers all over.” The mystery continues.
See also by Kathy J. Forti:
Discovering Extraterrestrial Evidence in Egypt
The Mystery Schools of the Order of Melchizedek
Copyright 2018 – Reprint by Permission Only
Subscribe free to the Trinfinity & Beyond Blog.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2394', 'language_id_whole_page_fasttext': "{'en': 0.9657949209213256}", 'metadata': "{'Content-Length': '226735', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NJDB76OEIP5UER4ORISHFUNO2KI25TU4', 'WARC-Concurrent-To': '<urn:uuid:8012b9ae-bcb0-48ae-b478-cde1e3909d4d>', 'WARC-Date': datetime.datetime(2020, 7, 16, 13, 34, 52), 'WARC-IP-Address': '162.144.54.237', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TYVJNWDGI6OMBXH6JCY3AJMFDC66HRHT', 'WARC-Record-ID': '<urn:uuid:580f1bf5-9798-4d7d-8342-d046f28712d9>', 'WARC-Target-URI': 'https://trinfinity8.com/2018/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:73d17ae8-a891-4caa-89ee-cb28ca8dc57a>', 'WARC-Truncated': None}", 'previous_word_count': '6352', 'url': 'https://trinfinity8.com/2018/', 'warcinfo': 'isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-95.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03977721929550171', 'original_id': '12a2cd2e0b1e2e79bcf72e0a8f895386b6b5ae7ab3c2f1c05915b9a363ca7562'} |
Consider REITs for Income and Diversification
Real estate investment trusts (REITs) can offer a consistent income stream and help provide portfolio diversification. Considering these potential benefits, it may not be surprising that an estimated 80 million Americans own REITs in their retirement accounts and other investment funds.1 Of course, like all investments, REITs also have risks and downsides.
Pooled Property Investments
Under the federal tax code, a qualified REIT must pay at least 90% of its taxable income each year in the form of shareholder distributions. Unlike many companies, REITs generally do not retain earnings, so they may provide higher distribution percentages than some other investments. At the end of Q1 2019, equity REITs paid an average distribution of 3.72%, almost double the 2.00% average dividend paid by stocks in the S&P 500 index.2
Income vs. Volatility
Equity REITs are effective income-generating assets, but share prices can be sensitive to interest rates, partly because companies often depend on debt to acquire rent-producing properties, and interest rates can affect real estate values. Also, as rates rise, REIT distributions may appear less appealing to investors relative to the stability of bond yields.
For buy-and-hold investors, the income from REIT distributions may be more important than short-term share-price volatility. Moreover, REIT share prices do not always follow the stock or bond markets, making them a helpful diversification tool (see chart). In fact, while REITs are traded on the stock market, they are in some respects a unique asset class with characteristics of both stocks and bonds. So holding REITs not only may diversify your stock holdings but might also broaden your approach to asset allocation. Diversification and asset allocation are methods used to help manage investment risk; they do not guarantee a profit or protect against investment loss.
Real Estate Risks
The return and principal value of all investments, including REIT shares, fluctuate with changes in market conditions. Shares, when sold, may be worth more or less than their original cost. Supply and demand for ETF shares may cause them to trade at a premium or a discount relative to the value of the underlying shares. REIT distributions often reflect a return of capital or other non-income sources, and such distributions are not guaranteed. Investments seeking to achieve higher returns also involve a higher degree of risk.
Check the background of this financial professional on FINRA's BrokerCheck
Check the background of this financial professional on FINRA's BrokerCheck | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '362', 'language_id_whole_page_fasttext': "{'en': 0.933729887008667}", 'metadata': "{'Content-Length': '39087', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Y4757F5EAMFVCPTQZDCN6JUFHFZUKKOA', 'WARC-Concurrent-To': '<urn:uuid:5a00e1de-f866-419f-b2bb-ccd34f1a4c54>', 'WARC-Date': datetime.datetime(2019, 11, 14, 13, 5, 43), 'WARC-IP-Address': '199.59.138.230', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:PT5G7PVQ7QJUJ5FB6PE6GBGQLJOQLK2T', 'WARC-Record-ID': '<urn:uuid:b58baa40-ee7d-4767-af08-4b66232c7213>', 'WARC-Target-URI': 'http://www.kaneinvestment.com/Consider-REITs-for-Income-and-Diversification.c9408.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:476b0017-bfd7-4544-83d3-974d856ce2c4>', 'WARC-Truncated': None}", 'previous_word_count': '645', 'url': 'http://www.kaneinvestment.com/Consider-REITs-for-Income-and-Diversification.c9408.htm', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-24.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14457958936691284', 'original_id': '4774cf7874b12b91404b625cc6c64034634db3a7efc53360a4bcd98cf9f16f00'} |
---
title: Break.Range Property (Word)
keywords: vbawd10.chm200343554
f1_keywords:
- vbawd10.chm200343554
ms.prod: word
api_name:
- Word.Break.Range
ms.assetid: a78720bd-334b-9f97-bc5d-81da30c0986b
ms.date: 06/08/2017
---
# Break.Range Property (Word)
Returns a **[Range](range-object-word.md)** object that represents the portion of a document that's contained in the specified object.
## Syntax
_expression_ . **Range**
_expression_ Required. A variable that represents a **[Break](break-object-word.md)** object.
## See also
#### Concepts
[Break Object](break-object-word.md)
| mini_pile | {'original_id': '0d8e2efa3f0a21580bccab57aec030bb16a730cc038887e12841ded1299e1483'} |
<!DOCTYPE html>
<html>
<head>
<link href="./css/bootstrap.css" type="text/css" rel="stylesheet">
<link href="./css/styles.css" type="text/css" rel="stylesheet">
<script src="./js/jquery-3.4.1.js"></script>
<script src="./js/jquery-3.4.1.js"></script>
</head>
<body>
<h1>Fortune Quiz</h1>
<p>Wanna know your fortune? Look no further! Here is a quiz that'll let you know everything you need to know about
how fortunate you are! Just answer the questions below and we'll let you know!
</p>
<form id="fortune-survey">
<div class="form-group">
<p>Which of these have you seen in the past week? Select all that apply:</p>
<input type="checkbox" name="lucky-sign" type="rainbow">Rainbow<br>
<input type="checkbox" name="unlucky-sign" type="death">Somebody die<br>
<input type="checkbox" name="lucky-sign" type="clover">A four leaf clover<br>
<input type="checkbox" name="unlucky-sign" type="popup">A popup window containing a cursed image and unknown text<br>
<input type="checkbox" name="lucky-sign" type="ladybug">A ladybug<br>
<input type="checkbox" name="lucky-sign" type="shooting-star">Shooting star<br>
<input type="checkbox" name="unlucky-sign" type="emoji-movie">The Emoji Movie on Netflix or something<br>
<input type="checkbox" name="lucky-sign" type="meme">A super dank meme<br>
<input type="checkbox" name="unlucky-sign" type="coronavirus">Bad coronavirus news<br>
</div>
<div class="form-group">
<p>What do you see in these tea leaves?</p>
<input type="checkbox" name="lucky" type="just-leaves">They're just tea leaves(I'm a rationalist)<br>
<input type="checkbox" name="unlucky" type="lobster">A lobster<br>
<input type="checkbox" name="lucky" type="statham">A sillouette of Jason Statham<br>
<input type="checkbox" name="lucky" type="void">The Void<br>
<input type="checkbox" name="unlucky" type="painting">Why it's none other than "The Hands Resist Him" by artist Bill Stoneham, completed in 1972.<br>
<input type="checkbox" name="lucky" type="botswana">It's a map of Botswana<br>
</div>
<div class="form-group">
<p>Pick your favorite colors:</p>
<input type="checkbox" name="lucky-color" type="blue">Blue<br>
<input type="checkbox" name="unlucky-color" type="yellow">Yellow<br>
<input type="checkbox" name="lucky-color" type="purple">Purple<br>
<input type="checkbox" name="unlucky-color" type="green">Green<br>
<input type="checkbox" name="lucky-color" type="black">Black<br>
<input type="checkbox" name="unlucky-color" type="orange">Orange<br>
<input type="checkbox" name="lucky-color" type="red">Red<br>
<input type="checkbox" name="unlucky-color" type="grey">Grey<br>
<input type="checkbox" name="lucky-color" type="brown">Brown<br>
</div>
<label for="favorite-number">What is your favorite number?</label>
<input type="number" id="favorite-number" required>
<br>
<button type="submit">Find your fortune!</button>
</form>
</body>
</html> | the_stack | {'hexsha': '03afa52930b7bc4b37f0da21eed645344e3a4b90', 'size': '3193', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'index.html', 'max_stars_repo_name': 'jhvozdovich/fortune-teller-quiz', 'max_stars_repo_head_hexsha': 'a2e1ae621ec02b811d0be500a3b960b09b428744', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'index.html', 'max_issues_repo_name': 'jhvozdovich/fortune-teller-quiz', 'max_issues_repo_head_hexsha': 'a2e1ae621ec02b811d0be500a3b960b09b428744', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'index.html', 'max_forks_repo_name': 'jhvozdovich/fortune-teller-quiz', 'max_forks_repo_head_hexsha': 'a2e1ae621ec02b811d0be500a3b960b09b428744', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '54.1186440678', 'max_line_length': '157', 'alphanum_fraction': '0.6470404009', 'original_id': 'dbe686ec48f28a21a02bdd1215178332de5df6e55a6a319d74fa0e258581dd09'} |
Closing a Credit Card Without Hurting Your Credit Score
Thinking of closing your credit card? Before you do, you need to know if it's a good decision and how to do it properly. I'll show you how here.
Thinking about closing that credit card?
If you’re struggling to pay off credit card debt closing a card is tempting. It’s one less way to rack up debt.
But you might not want to close it quite yet.
Closing credit cards does reduce your credit score. Doing this at the wrong time could cost you thousands of extra dollars in the future.
Let’s go through when to cancel and when NOT to cancel.
cancel credit card
When Not to Cancel a Credit Card
The main downside from canceling a credit card is the hit that you credit score will take.
How does closing a credit card affect your credit score?
Your credit score is comprised of several different factors including payment history, total debt, credit utilization, and type of credit (revolving and/or installment). Your credit score weighs all of these factors to determine how much of a risk you are to lenders.
The main impact on your credit score when closing a card is through your credit utilization. When you close a card, your total available credit goes down, and your credit utilization across all credit lines goes up.
Lenders prefer lower credit utilization scores. This makes sense. If you’re maxing out your credit, there’s extra risk in giving you another loan on top of that. Whereas if someone uses 10-20% of their total credit, they have plenty of breathing room to begin with and they’d have a higher score.
For an example, let’s assume the following:
Credit Card 1: $1,000 balance, $2500 line of credit
Credit Card 2: $1,000 balance, $2000 line of credit
Credit Card 3: $500 balance, $2500 line of credit
Using the above numbers, this individual has a total of $7,000 in available credit (the total of all credit lines). But, they have a total of $2,500 in credit card debt. This means that they’re using about 28% of their available credit.
If the individual pays off and closes credit card number three, they would have less debt, but their credit utilization score would also change. They would now have $2,000 in debt and $4,500 as their credit line. Once they close credit card number three, their credit utilization jumps to 56%.
Even though this person was being responsible and paying off debt, their credit utilization goes up and their credit score gets dinged.
In the long-run, the impact on your score is minor. As long as you get your credit utilization back to 20% within a few months of closing your card, I wouldn’t worry about this too much. Paying your credit cards on time, maintaining a great credit history, and having multiple types of credit for a long period all matter a lot more.
But there is one type of situation where you want to wait before cancelling a credit card: buying a home, car, or taking out a major loan.
Whenever you make a major purchase that requires a loan, the lender will check your credit. The higher your credit score, the better the interest rate and the less you’ll pay over time.
Better interest rates will save you tens, possibly hundreds, of thousands of dollars over your lifetime. When the lender checks your score, you want the absolute highest credit rating. Every point in your credit score matters.
Don’t ever close any credit cards before requesting a major loan. You want as much credit as possible to keep your credit utilization low.
When It Makes Sense to Cancel a Credit Card
Closing a credit card will affect your credit score. And while a lower credit score can make it more difficult to qualify for loans, it may be the right decision.
Here are a few reasons I’d close a credit card:
Consolidating accounts: When I was in college, I needed any credit card that would approve me. I didn’t have much credit and options were limits. Over time, I got better accounts and my financial system got more complicated. This happens to all of us. Add in company cards, a spouse, children, and things start to get out of hand. If you have an old credit card that you haven’t used for years and really want to simplify things, you can close it. Keep in mind that closing an old card can impact the age of your credit. It’s a trade-off between credit score optimization and overall simplification. I’d rather have the simplicity myself, I cancelled my oldest cards that I no longer use.
Running from a big bank: This is the other one time I cancelled one of my credit cards. I had a Wells Fargo card and bank account. 3 months after depositing a check, they decided the check wasn’t any good, withdrew all my funds, and hit me with a ton of fees. My Dad wrote that check and had the funds, it was good. And no one at Wells Fargo could ever tell me why the check was reversed so long after being deposited. I was furious. I cancelled all my accounts with them, left, and never looked back.
Debt management plan: If you’ve signed up for a debt management plan or filed for bankruptcy, you may be required to close your credit account. Your credit card company could also choose to close the account themselves.
The annual fee is too high: If your credit card has very high fees, you may want to cancel the card before you have to pay the annual fee again. Some travel credit cards like Chase Sapphire Rewards and Citi Prestige Card have fees as high as $450 per year. While these cards certainly have perks, the high annual fee can be a bit tough for some customers. If your financial situation changes and the annual fee isn’t sustainable, close the card. Most banks have versions of these cards that have fewer perks at a lower annual fee, you might be able to downgrade instead of cancelling outright.
If you can’t stop spending: Once you’ve gotten into the habit of making purchases on your credit card beyond your means, it’s a cycle that’s difficult to stop. If it works for you, cancel your credit cards. Maximizing your credit score isn’t nearly as important as getting ahead of your credit card on time and paying your cards off in full every month.
You don’t need to your credit score for a while: If you won’t need to rely on your score for anything (new loans, refinancing a mortgage, buying insurance etc.) and you want to get rid of a card, you can likely close your credit card account safely. Even if your score does drop, continuing to make on-time payments and lowering your other debt can help raise your score again.
Here’s How to close a credit card (the right way)
If you’re set on closing your credit card account, make sure you reduce the impact on your credit score by taking the proper steps.
Step 1: Redeem any rewards or points
Make sure you redeem any cash rewards or point rewards before closing your credit card account. You will most likely lose any reward you don’t use once you close the account. Check your account about a month before you plan to close your credit card account and make sure you don’t miss out on any perks you may have forgotten about. Some rewards cards allow you to transfer points to airlines or hotels. That’s an easy way to get your rewards out without having to spend them all before closing the card.
Step 2: Pay off all credit card debt
You could do a balance transfer on any debt that’s still on the card. But to be honest, you really should pay off the card in full before closing it. Either way, make sure the card doesn’t have a balance and then stop using it for any ongoing purchases. You don’t want to have a few charges still processing when you go to close the card.
Step 3: Cancel your card
Make a phone call the credit card company to close your account. You’ll want to make sure your account really is at zero (fees and interest sometimes show up late) before you close your account. When you call the customer service rep may try to talk you into staying with the company. Occasionally they may offer special perks or reduced interest rates to keep your business. If you really want to cancel your card, be polite, but firm.
Step 4: Wait a month and check
Wait a month for everything to process. Then you’ll want to check two things.
First, check your credit report and make sure the accounts are listed as “closed by customer.” Credit reports are usually accurate but mistakes do happen that can impact you for years. Make sure nothing was reporting incorrectly when closing your account.
Second, log into your bank and make sure the credit card still has a zero balance. Weird fees can pop up as the account is closing which will then recrue interest and more fees if they go ignored. It’s really easy to miss these. I got dinged with a last-minute fee when closing my Wells Fargo card years ago. Feel free to call the bank and try to fight it, just don’t ignore it.
Is Closing a Credit Card Worth It?
Keeping your credit card open, even if you don’t use it, is a smart way to maintain a healthy credit score. Additionally, having access to those additional funds in the event of an emergency could be helpful.
While closing your credit card will likely affect your credit score, you can still do it safely.
If you’re trying to completely optimize your credit score, you’ll want to keep your cards open. If you want simplicity or have another reason to close the account, go for it. Just don’t close any accounts within a few months before applying for a loan.
Do you know your earning potential?
Start The Quiz | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '182', 'language_id_whole_page_fasttext': "{'en': 0.9589887261390686}", 'metadata': "{'Content-Length': '336903', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KKTTNJQPL27XA3WPTMDAUE2BYQYYK7T7', 'WARC-Concurrent-To': '<urn:uuid:9bdd7edc-6e18-4b2d-89b1-bb2534ae8f37>', 'WARC-Date': datetime.datetime(2020, 7, 15, 18, 27, 25), 'WARC-IP-Address': '130.211.159.49', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CVNNNNDZH7RAIHJ4LRCCX2PIBKSTFEJR', 'WARC-Record-ID': '<urn:uuid:e655bc63-80cd-4ac0-b917-0c60baca7834>', 'WARC-Target-URI': 'https://www.iwillteachyoutoberich.com/blog/closing-a-credit-card/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3fefd75c-00df-4b2a-a425-d5eecdb6f57b>', 'WARC-Truncated': None}", 'previous_word_count': '1847', 'url': 'https://www.iwillteachyoutoberich.com/blog/closing-a-credit-card/', 'warcinfo': 'isPartOf: CC-MAIN-2020-29\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-55.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09926891326904297', 'original_id': 'efc2016f71769ae70611c9fce492a4b2ebb3afc8c8f0ee3839345de653c60ab1'} |
TechCruch50 Drinking Game - spectre
http://www.techcrunch.com/2009/09/14/wittc50-the-techcrunch-50-day-two-drinking-game/
======
jrockway
Making fun of people is so fun! Look at all those losers out there presenting
their ideas to the world! Staying home and getting wasted is so much more
valuable, especially if you have a blog!
| mini_pile | {'original_id': '752c08039c8ba8f28914e3c3e0848c39d17652d9b401f84f902ce6463798145f'} |
No one makes a big deal about it, but roughly a third of the filmmakers with work screening at the ongoing Tribeca Film Festival are women. The festival, which continues through May 1 at various venues in TriBeCa, Chelsea and the East Village, serves as a platform for feature debuts by several young women directors. They include efforts as glossy as "Lotus Eaters," a glimpse at the jaded London high life, made on a Canon 5D by Irish director Alexandra McGuinness, and as emotionally textured as "Maria, My Love," a redemptive drama from Jasmine McGlade Chazelle (producer of "Guy and Madeline on a Park Bench").
Malin Bjørhovde, Helene Bergsholm and Beate Støfring in Jannicke Systad Jacobsen's 'Turn Me On, Goddammit,' from Norway. Marianne Bakke
One of the boldest is the Norwegian coming-of-age comedy "Turn Me On, Goddammit," which chronicles the running combat between its teenage heroine, Alma (Helene Bergsholm), and her sex drive. "Even in Norway, it's not something that's talked about much," said the film's director, Jannicke Systad Jacobse, who is coming off a series of successful documentaries. "In the media, they always make fun of the young men's sexuality. But they never talk about the women really having any."
Ms. Jacobse adapted her screenplay from part of a best-selling book by Norwegian author Olaug Nilssen, setting her version of the story in a seaside village in the remote southwest, and deliberately casting first-time actors who all spoke with the same regional dialect. As Alma drifts between her purple imagination and frisky behavior that freaks out her friends, the film's carnal (if mostly verbal) candor is shaped by a gentle yet matter-of-fact tone.
"Sort of sweet but also a bit out there," said Ms. Jacobse, whose film premieres Saturday. "You could understand it but you could also be repulsed by it. It was important to me not to trivialize it. But also a teen is full of hormones so there are funny things that are going to happen either way."
Ms. Jacobse is part of a Norwegian film industry that is slowly growing on the international radar, and is also represented at Tribeca by the fantasy comedy "Trollhunter"). Between the film's defiant title and its disarming performances, it's a good bet for export.
The director shares some thematic turf, and a border, with Sweden's Lisa Aschan, who brings her debut narrative feature, "She Monkeys," to Tribeca. The film explores the charged, push-pull relationship between two girls, 15-year-old Emma (Mathilda Paradeiser) and the slightly older Cassandra (Linda Molin), who meet as members of an equestrian acrobatic team. The intense performances and raw intimacy of the scenes push into dangerous psychological territory. "The theme is how sex is power and how power is sex," Ms. Aschan said. "Everything is true and nothing is a coincidence."
Ms. Aschan proves a masterful orchestrator of the unspoken, the intolerable pause, and the laser-beam gaze. "I would rather raise more questions than give answers," she said.
The Iranian-American screenwriter-turned-director Massy Tadjedin likewise insists on not forcing conclusions on her audience. Taking on the theme of fidelity in the romantic drama "Last Night," Ms. Tadjedin tracks the course of a marital hiccup, as a successful Manhattan couple deals with temptation, each engaging in a close encounter that could destroy their relationship.
"I wanted it to feel a little bit like a thriller," said Ms. Tadjedin, whose high-profile cast includes Keira Knightley, Eva Mendes and Sam Worthington (notably not appearing in 3D). "But I didn't want to conclude anything. It's not a moralizing film in any way. It's an honest portrayal of how this might happen."
The director, who got her start through George Clooney and Steven Soderbergh's production company Section 8, had to keep her ambitions tightly focused, despite the big names. "I knew this would be one that had a shot," she said. "It's a contained film. It happens in 36 hours. And I'm not blowing up a lot of stuff, which is good on your first film." | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9752620458602904}", 'metadata': "{'Content-Length': '93955', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XP3RESR65X3JBNMV6TRQXFKRZVULUI6W', 'WARC-Concurrent-To': '<urn:uuid:8ab862e6-777d-4b83-a03f-33d94474621a>', 'WARC-Date': datetime.datetime(2013, 12, 9, 5, 2, 32), 'WARC-IP-Address': '205.203.140.1', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:XSSPBOTLIQHEK5EJE6UATPKVBQA465NV', 'WARC-Record-ID': '<urn:uuid:8ed32318-85f2-4550-a471-3c35dca6bf70>', 'WARC-Target-URI': 'http://online.wsj.com/news/articles/SB10001424052748703521304576279250410662360', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:59715d06-12ab-4b93-a6f2-966790591a9a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '638', 'url': 'http://online.wsj.com/news/articles/SB10001424052748703521304576279250410662360', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07026427984237671', 'original_id': '2a1994b82eaa029355e664bb895b056267b03def718f685626e6998b9fef542a'} |
Difference Between Constitution and Bylaws
Constitution vs Bylaws
Constitution and Bylaws are two terms or words that are often confused as words that denote the same meaning. Strictly speaking, they are two different words with different meanings. The word ‘constitution’ refers to a kind of document that is created on behalf of a group of people or an organization, which establishes factors such as qualification, eligibility of membership, duties, do’s and don’ts of the members and the like. In short, it can be said a constitution defines the rules and regulations to be followed by the members of an organization.
On the other hand ‘bylaws’ refer to the rules and regulations to be followed on a daily basis. It is important to know that bylaws govern the day to day functions of institutions. This is the main difference between the two words, namely, constitution and bylaws.
While the word ‘constitution’ can be applied to a large community or groups of people, the word ‘bylaws’ can be applied to a smaller community or groups of people. This is another important difference between the two terms.
While the word ‘constitution’ is largely applied to countries and states, the word ‘bylaws’ is applied in the case of offices, committees, departments, and the like. It is important to know that the word ‘constitution’ is used in the sense of ‘political science’. In other words, politics forms the basis of constitution at the national level.
On the other hand, politics or political science has no or minimum role to play in defining the bylaws of an office, or a membership association. Bylaws are formed on the basis of an understanding between the members of a department, or the employer and the employees of an office. On the other hand, people of a country should abide by the rules framed in the constitution. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.952998697757721}", 'metadata': "{'Content-Length': '62130', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:M5QMYEWYE442UYRZ2L3YEQOLLUG5JS7W', 'WARC-Concurrent-To': '<urn:uuid:85f5d015-3d45-4914-811a-dc664e261726>', 'WARC-Date': datetime.datetime(2014, 10, 31, 5, 31, 33), 'WARC-IP-Address': '67.228.117.108', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:RKUYYTTRJ2JI3JDNVN7XVTEPYMSNICYS', 'WARC-Record-ID': '<urn:uuid:3f087d0f-6e7b-49ec-9864-4f6e6e127df8>', 'WARC-Target-URI': 'http://www.differencebetween.com/difference-between-constitution-and-vs-bylaws/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4373f547-d5f3-4b43-9f04-585d6c845f43>', 'WARC-Truncated': 'length'}", 'previous_word_count': '299', 'url': 'http://www.differencebetween.com/difference-between-constitution-and-vs-bylaws/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-16-133-185.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-42\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for October 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.038178861141204834', 'original_id': 'b708a1a9a01721d3fb23c9ed0c148a08192fba11cdacc6ca4c54d8d30572fe76'} |
Do Not Talk to Me About Sandra Bland, the Confederate Flag, or the Consistent Assassination of Blacks in America
Photo Credit:
Every single time, that a new episode of the Black American Struggle comes about, without fail, it seems like people come out of the woodwork with their 2 cents. Listen, I think cases like Sandra Bland should be talked about as well as cases like hers. But, do not ever come to me shouting your outrage about what’s going on if the following apply to you:
(warning: this may hurt your feelings but I need to be clear because I can’t even)
1. You are not adding to our black community
One day, I was talking to my dad about what was going on and he said something that really changed the way I viewed myself and others in the black community and their contributions. He said “By raising your child to be an active member in society, you are adding a wealth to the black community”. If you are a parent and you are not actively raising your child to be educated, motivated, and a functioning member of our society instead of a damn nuisance sucking up my damn tax dollars in prison because they are acting off of the skill sets you have provided them with, then do not talk to me about Sandra Bland, Trayvon, Eric, or anyone else for that matter. You aren’t doing your damn part so keep your outrage to yourself.
2. You didn’t think twice about the Confederate Flag prior to 2015
If you don’t know the origin of the Confederate Flag (it’s basic damn history ya’ll), what it stands for, and you haven’t had an open conversation or a single thought about it before this year, then get away from me. Don’t go posting picture’s of your neighbors Confederate Flag that has been swinging it’s racists ass in the wind for 10 years now. You are a fraud.
3. You just want to use a bunch of black power jargon
I can not stand when I am trying to talk to have a constructive conversation with substance about what is going on in our community and the only contribution the other person has is “My Black brothers and sisters need to stick together to create a change” or some bullshit like that. Uh duh! Obviously!
4. You are a white parent making zero effort with your kids
Listen clearly, racism and racial insensitivity is a learned behavior. If you aren’t teaching your kids about other cultures and have no plans to have honest conversations about this country’s checkered history, then leave me alone! Let’s talk about yogurt or planting tomatoes but do not come to me with your limp sympathy about what is happening.
5. You are color blind
For some reason, people think that saying that they are color blind or that everyone is the same in their eyes is a positive thing. I don’t have such a luxury of being color blind. I am reminded of my color every single damn day. My character has been shitted on before I even walk into a room. So take your ass to an eye doctor and get that color blind issue fixed because if the only way that you can ease your discomfort of differences is to pretend that they don’t exist, then you are the problem.
2 thoughts on “Do Not Talk to Me About Sandra Bland, the Confederate Flag, or the Consistent Assassination of Blacks in America
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '22', 'language_id_whole_page_fasttext': "{'en': 0.9332925081253052}", 'metadata': "{'Content-Length': '85834', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RM744ZMF7HONPGUFGP6PWIVHPB6Y2DPZ', 'WARC-Concurrent-To': '<urn:uuid:c3014334-d14e-48b3-b0fd-07444fc6ec4e>', 'WARC-Date': datetime.datetime(2019, 2, 16, 16, 19, 37), 'WARC-IP-Address': '192.0.78.24', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6NTAG23BTVAWI6D2MV5TRVY64HOLFECA', 'WARC-Record-ID': '<urn:uuid:ad5ae527-b6c6-4b1a-aa9c-ddc2ebc742bc>', 'WARC-Target-URI': 'https://youngfabulousandnatural.com/2015/07/27/do-not-talk-to-me-about-sandra-bland-the-confederate-flag-or-the-consistent-assassination-of-blacks-in-america/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:108c3ab7-9147-4fa0-b345-0007a25fea66>', 'WARC-Truncated': None}", 'previous_word_count': '672', 'url': 'https://youngfabulousandnatural.com/2015/07/27/do-not-talk-to-me-about-sandra-bland-the-confederate-flag-or-the-consistent-assassination-of-blacks-in-america/', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-166-118-163.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.21346008777618408', 'original_id': '770246d69153fab68ded54b4de786a789e1c53bbc774d00a28067e8eb0fb7269'} |
Q:
Upload ThumbNail
Estou com um campo para upload em um formulário HTML, gostaria de saber se é possível colocar uma thumb pré-definida, com uploads de imagens sei que da para fazer uma thumb exibindo a imagem que está sendo colocada, mas por exemplo, caso seja upado um arquivo PDF da para colocar um ícone do PDF, de forma que sempre que um arquivo no formato PDF for selecionado apareça um mesmo ícone e o nome do arquivo embaixo?
A:
Sim é possivel, basta verificares a extenção do ficheiro, existe até uma propriedade type para isso. Por exemplo:
const icons = {
'application/msword': 'http://icons.iconarchive.com/icons/blackvariant/button-ui-ms-office-2016/128/Word-2-icon.png',
'application/pdf': 'http://icons.iconarchive.com/icons/alecive/flatwoken/128/Apps-Pdf-icon.png',
'image/png': 'http://icons.iconarchive.com/icons/hopstarter/soft-scraps/128/Image-PNG-icon.png'
}
const input = document.querySelector('input');
const image = document.querySelector('img');
input.addEventListener('change', function() {
const tipo = this.files[0].type;
image.src = icons[tipo];
});
<input type="file" />
<img src="" style="display: block;"/>
| mini_pile | {'original_id': 'a40fa04175ac869aae57422c5aef211fee6c485ac1402d5e75983fe931fa83d6'} |
When spouses are political foes
2012-11-04 20:10:19
Guess which is to the left and which to the right?
"We always felt it was important to discuss current events and the politics of the day, things happening in the community and at large. Being able to speak openly and honestly about politics is a learned skill," says Nancy, who is a substitute teacher in the Los Alamitos school system. Dan is an independent insurance agent.
Thorny political and social issues sometimes come up at the "Yard Wine" gatherings the Roddys instituted years ago, where neighbors get together on porches and in front yards informally over a glass of wine and some munchies.
Nancy says it's important for those whose politics differ to be able to at least listen to each other.
"We live in a society where you can get your news from a paper or a news station that slants to your point of view. I don't think that's a good thing. We should be hearing from both sides."
And her husband sees no social gathering as off-limits.
"We were at a party one night when somebody yelled (jokingly) 'All the Democrats, get the hell out,'" she says, laughing. "It was Dan who brought up politics."
The Mulvihills, both 67, had to learn to laugh about their political differences.
Early in their seven-year marriage, the couple saw what could happen if they let polarizing politics get between them.
Heated arguments. Hurt feelings. Cold shoulders.
Their conclusion: not worth it.
One or the other might get in a zinger here or a pointed comment there, but they try to remain civil under rules of engagement that Helane ticks off as they sit closer to each other on their couch than those signs in their yard.
Do not get emotional. Stick to the facts. Respect each other's opinion – no eye rolling, gesturing or razzing.
"Helane," says Bob, a lawyer who likes to back his arguments with evidence, "is more emotional."
That makes Helane straighten her back. "Now, wait a second. I'm not more emotional. I'm more vital."
The funny thing is, the Mulvihills met through a personal ad Helane placed 12 years ago in the Register. It remains a mystery to her why Bob, a dedicated Los Angeles Times reader, was perusing a paper whose editorial pages he finds disagreeable. Fate? Along with seeking someone healthy and financially independent, Helane also specified she wanted someone who still had his hair and was a Republican.
Bob, who says he was more of an independent back then, outshone the dozen or so gentlemen who replied. She says she did have to think long and hard about marrying a Democrat after he proposed. But Bob was, and remains, "a decent, kind, honest man," Helane says, "so I was OK. I said I think I can deal with this."
She does more than deal with it.
Helane beat Bob to the punch with her Romney-Ryan lawn sign. When Bob came home and saw it, he immediately tried to locate a counterpart. A visit to Democratic Party headquarters in Santa Ana left him empty-handed. They were all out and said it might take a month to get more.
Not long after, while driving through Laguna Beach, Helane spotted a Democratic office and pointed it out to Bob. He got his Obama-Biden sign right then, thanks to Helane.
Bob beams at her. "Isn't that something?"
Says Helane: "I wanted to be fair."
Through their website O-MAMA.com, friends Michelle Tingler and Debbie Devine encourage moms to be the "voice of reason" when discussing issues of importance.
Michelle is a Democrat, Debbie is a Republican; both live in Orange County. Here are some of their tips to keep conversations friendly and informative:
•Keep an open mind and an open ear. You might not always agree about the topic, but you might learn something that helps inform your own opinion.
Start in the middle. If you come from different ends of the political spectrum, don't start the conversation there. Instead of discussing things from the right and left, try talking about them in terms of right and wrong and lessons you would share with your children.
•Point well taken. When talking politics with people you love, focus less on "winning" and more on explaining your points of view.
•Agree to disagree. When someone starts to get a little riled up, take the high ground and stop the discussion. Simply pour a glass of wine, agree to disagree and make a toast to democracy.
© Copyright 2010 Freedom Communications. All Rights Reserved.
Privacy Policy | User Agreement | Site Map | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '214', 'language_id_whole_page_fasttext': "{'en': 0.972340166568756}", 'metadata': "{'Content-Length': '9892', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SXLLWJESFGQAQWCDDRFHZ4DONL7T7LGB', 'WARC-Concurrent-To': '<urn:uuid:459141d6-ff0c-4139-b765-2cf3b1b32cb9>', 'WARC-Date': datetime.datetime(2014, 3, 11, 20, 6, 55), 'WARC-IP-Address': '141.242.248.222', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ZVF5RYLO6WSMO7UJ5WRKQEXNC54ESJOU', 'WARC-Record-ID': '<urn:uuid:b879e66e-f293-4f12-821c-93f4fa642813>', 'WARC-Target-URI': 'http://www.ocregister.com/common/printer/view.php?db=ocregister&id=376717', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c134438d-e55f-42ed-b587-58a7668d95ac>', 'WARC-Truncated': None}", 'previous_word_count': '1073', 'url': 'http://www.ocregister.com/common/printer/view.php?db=ocregister&id=376717', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.022610783576965332', 'original_id': '3ad59ac3b7e331efb331aee43da2f9e50edb7e902d682cc8aeab25135168d85d'} |
Punjabi Translation Services in Mumbai, India | Shakti Enterprise { "@context": "https://schema.org", "@type": "Organization", "url": "http://www.shaktienterprise.com/", "logo": "http://www.shaktienterprise.com/images/logo.jpg" }
Punjabi Translation Services You Can Trust
Home » Languages » Indian Languages » Punjabi Translation
With Punjabi diaspora spread all across the world and 100 million native Punjabi speakers in the Indian subcontinent, there is a heavy need for Punjabi translation services for different areas. Shakti Enterprise fulfills this requirement through its qualified and native translators. We hold experience in translating documents from assorted fields including finance, marketing, web development, medical, etc.
A Brief Introduction To Punjabi Language
Often spelled and pronounced as Panjabi, the Punjabi language is one of the Indo-Aryan languages. It is a local language for the people of Pakistan and India residing in the historical Punjab province. It has origins from the Sauraseni, Prakrit, Malwai, and other dialects used during the medieval period in India. Today, the Punjabi language has more than 100 million native speakers who use it in their everyday life. Overall, it is the 10th largest language spoken language across the world.
Some Key Facts About Punjabi Language
✔Widely spoken in India
It is among the twenty-two official languages of India and primary official language in the Indian state of Punjab. Other Indian states like Himachal Pradesh, Delhi and Haryana consider it as their secondary official language. Besides, it is the official language of the largest province of Pakistan, Punjab.
✔Globally popular
The language has more than 63 million speakers alone in Pakistan, making it the third most popular language in South Asia. It is considered a minority language with Punjabi diaspora in countries like United States, Australia, Canada, and the United Kingdom. In fact, it is the second most popular language in the UK.
✔It’s different
It’s distinct from other Indo-European languages because of being a tonal language. Only Lahnda and Western Pahari languages have similar features.
✔Varied styles
The scripture may vary as per the religion of speakers. Though, the most commonly used across India and Pakistan is Gurumukhi, which appears to be similar to the Urdu script. In the Indian states of Himachal Pradesh and Haryana, people use Devanagari script for writing Punjabi.
Punjabi Translation Services For Industries
Our qualified and experienced multilingual team can provide precise translations for various domains. We can perform Punjabi translation for numerous fields like medical, agriculture, legal, technical, financial, educational, etc. Other fields where we can provide our translation services include IT, pharmaceutical, manufacturing, literature, telecom, telecommunications, tourism, travel, and many more.
Language Pairs
Some of the language pairs, we offer for the Punjabi translation services are as follows:
✔Punjabi to English translations A team of bilingual proficient in Punjabi, as well as in English, offers you precise translations from Punjabi to English.
✔English to Punjabi translations
✔A team of native speakers assists you with the translations of English to Punjabi.
Why Hire Our Translation Services?
Here is why our Punjabi translation services should be your foremost choice
✔Our team consists of only native or multi-lingual translators
✔We offer domain related translations.
✔With us, you get competitive prices without any compromise on quality.
✔We perform all the requisite editing and proofreading work to ensure superior quality translations
✔Quick turnaround
✔We use CAT tool SDL to save your time and money.
Extensive Utilization Of Our Translation Services
Our Punjabi translation services serve different purposes
✔Transcription and Translation of videos
✔Subtitling movies or short films
✔Translation of the notary and other vital documents
✔Assist with the Punjabi immigration translations
What Differentiates Us From Others?
We own a broad team of Punjabi translators, which helps us to assign your project only to expert translators who possess in-depth knowledge about your content. We utilize our unique system to appoint the right people for your job. It is essential if you want your content to reach the target audience effectively. Moreover, we also have working experience with some of the big brands like TATA, Robert Bosch India, Pfizer, Accenture, etc.
Shakti Enterprise offers quality Punjabi translation services through a team of highly experienced and expert translators. It is for various languages like Punjabi to English or other European languages. We also offer unmatched prices for high-quality translations. Feel free to approach us for instant quotes or any query associated with this service.
Our Clients | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '29', 'language_id_whole_page_fasttext': "{'en': 0.8914173245429993}", 'metadata': "{'Content-Length': '43883', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6CEHJRVTJ6KEEJ6NQSLLVBNDQULG4CT3', 'WARC-Concurrent-To': '<urn:uuid:0b629933-f9e8-4b10-b056-f984e0930eab>', 'WARC-Date': datetime.datetime(2022, 12, 8, 9, 21, 3), 'WARC-IP-Address': '103.83.192.6', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RHQ5HJHLMFHF2HHJHCLRPK2GS5D2D7F7', 'WARC-Record-ID': '<urn:uuid:9cdc51d1-e341-40d2-ad90-7aaee62eefa8>', 'WARC-Target-URI': 'https://www.shaktienterprise.com/punjabi-translation-services.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:280a1aad-fd13-4a28-9d18-09e7a8c5821e>', 'WARC-Truncated': None}", 'previous_word_count': '700', 'url': 'https://www.shaktienterprise.com/punjabi-translation-services.html', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-71\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024927914142608643', 'original_id': '52267bc2d96925ee8b5c2ed72aeaa35a35e338c62f6ee721fa589645ef318154'} |
JavaScript Refresh Page
In JavaScript, you refresh the page using document.location.reload(). You can add the true keyword to force the reloaded page to come from the server (instead of cache). Alternatively, you can use the false keyword to reload the page from the cache.
This code can be called automatically upon an event or simply when the user clicks on a link.
Example JavaScript Refresh Code
You can also use JavaScript to refresh the page automatically after a given time period. Here, we are refreshing the page 5 seconds after the page loads. This results in the page continuously refreshing every 5 seconds.
You can achieve the same effect using the HTML meta tag.
Other Refresh Tricks
By including your refresh code in a function, you can have complete control over when the page is refreshed.
Example 1
Instead of having the "page refresh" function called automatically when the page loads, you can call it only when the user performs some action - such as clicking on a link.
Example 2
You can use conditional statements to determine whether or not to refresh the page. Here's a basic example of using a "confirm" box to ask the user if it's OK to refresh the page.
By incorporating refresh code with a JavaScript function, you can trigger a refresh at any time that makes sense to your web application.
HTML Refresh
The above examples will only work as long as the user has JavaScript enabled on their browser. You can also use HTML to refresh a page automatically once the page has loaded. This is achieved by using the HTML meta tag. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.838692843914032}", 'metadata': "{'Content-Length': '34213', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CM4FLK2EL54ESMT36TYX7APXIHCXZYHQ', 'WARC-Concurrent-To': '<urn:uuid:46981400-2683-44d2-ac3d-e0d012ea8daf>', 'WARC-Date': datetime.datetime(2017, 9, 23, 0, 25, 44), 'WARC-IP-Address': '162.253.124.228', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:42O7WKH65APIXJLJVIVODGQVCX43JINO', 'WARC-Record-ID': '<urn:uuid:6bddf287-1057-417d-a168-c77ad1b37a4c>', 'WARC-Target-URI': 'https://www.quackit.com/javascript/javascript_refresh_page.cfm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5aa2dc23-fe0f-4820-a79d-fa09ec9fabe2>', 'WARC-Truncated': None}", 'previous_word_count': '268', 'url': 'https://www.quackit.com/javascript/javascript_refresh_page.cfm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-157-139-144.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3908417820930481', 'original_id': '77dfb28dcb504730d366959e7a0750c94b4f841918e044ca76e110e4a19198c2'} |
Q:
Testing faulty disk
I have a degraded RAID-1 setup and I'm trying to troubleshoot the problem whether it's completely dead (and need to send the drive back to the vendor) or it can be brought back.
So I ran smartctl:
root@linux:~# smartctl -l selftest /dev/sda
smartctl 6.5 2016-01-24 r4214 [x86_64-linux-4.4.0-176-generic] (local build)
Copyright (C) 2002-16, Bruce Allen, Christian Franke, www.smartmontools.org
=== START OF READ SMART DATA SECTION ===
SMART Self-test log structure revision number 1
Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error
# 1 Extended offline Completed without error 00% 1930 -
# 2 Short offline Completed without error 00% 1930 -
# 3 Extended offline Completed without error 00% 1930 -
Looks good. Let's take a look at the other stuff:
root@linux:~# smartctl --all /dev/sda
smartctl 6.5 2016-01-24 r4214 [x86_64-linux-4.4.0-176-generic] (local build)
Copyright (C) 2002-16, Bruce Allen, Christian Franke, www.smartmontools.org
=== START OF INFORMATION SECTION ===
Model Family: Western Digital Red
Device Model: WDC WD40EFRX-68N32N0
Serial Number: WD-WCC7K3NU4V6D
LU WWN Device Id: 5 0014ee 211e15108
Firmware Version: 82.00A82
User Capacity: 4,000,787,030,016 bytes [4.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Rotation Rate: 5400 rpm
Form Factor: 3.5 inches
Device is: In smartctl database [for details use: -P show]
ATA Version is: ACS-3 T13/2161-D revision 5
SATA Version is: SATA 3.1, 6.0 Gb/s (current: 6.0 Gb/s)
Local Time is: Sun Mar 29 23:04:32 2020 CEST
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
General SMART Values:
Offline data collection status: (0x00) Offline data collection activity
was never started.
Auto Offline Data Collection: Disabled.
Self-test execution status: ( 0) The previous self-test routine completed
without error or no self-test has ever
been run.
Total time to complete Offline
data collection: (44340) seconds.
Offline data collection
capabilities: (0x7b) SMART execute Offline immediate.
Auto Offline data collection on/off support.
Suspend Offline collection upon new
command.
Offline surface scan supported.
Self-test supported.
Conveyance Self-test supported.
Selective Self-test supported.
SMART capabilities: (0x0003) Saves SMART data before entering
power-saving mode.
Supports SMART auto save timer.
Error logging capability: (0x01) Error logging supported.
General Purpose Logging supported.
Short self-test routine
recommended polling time: ( 2) minutes.
Extended self-test routine
recommended polling time: ( 470) minutes.
Conveyance self-test routine
recommended polling time: ( 5) minutes.
SCT capabilities: (0x303d) SCT Status supported.
SCT Error Recovery Control supported.
SCT Feature Control supported.
SCT Data Table supported.
SMART Attributes Data Structure revision number: 16
Vendor Specific SMART Attributes with Thresholds:
ID# ATTRIBUTE_NAME FLAG VALUE WORST THRESH TYPE UPDATED WHEN_FAILED RAW_VALUE
1 Raw_Read_Error_Rate 0x002f 200 200 051 Pre-fail Always - 0
3 Spin_Up_Time 0x0027 100 253 021 Pre-fail Always - 0
4 Start_Stop_Count 0x0032 100 100 000 Old_age Always - 3
5 Reallocated_Sector_Ct 0x0033 200 200 140 Pre-fail Always - 0
7 Seek_Error_Rate 0x002e 200 200 000 Old_age Always - 0
9 Power_On_Hours 0x0032 098 098 000 Old_age Always - 1930
10 Spin_Retry_Count 0x0032 100 253 000 Old_age Always - 0
11 Calibration_Retry_Count 0x0032 100 253 000 Old_age Always - 0
12 Power_Cycle_Count 0x0032 100 100 000 Old_age Always - 3
192 Power-Off_Retract_Count 0x0032 200 200 000 Old_age Always - 0
193 Load_Cycle_Count 0x0032 200 200 000 Old_age Always - 1286
194 Temperature_Celsius 0x0022 117 114 000 Old_age Always - 33
196 Reallocated_Event_Count 0x0032 200 200 000 Old_age Always - 0
197 Current_Pending_Sector 0x0032 200 200 000 Old_age Always - 0
198 Offline_Uncorrectable 0x0030 100 253 000 Old_age Offline - 0
199 UDMA_CRC_Error_Count 0x0032 200 200 000 Old_age Always - 0
200 Multi_Zone_Error_Rate 0x0008 100 253 000 Old_age Offline - 0
SMART Error Log Version: 1
ATA Error Count: 1757 (device log contains only the most recent five errors)
CR = Command Register [HEX]
FR = Features Register [HEX]
SC = Sector Count Register [HEX]
SN = Sector Number Register [HEX]
CL = Cylinder Low Register [HEX]
CH = Cylinder High Register [HEX]
DH = Device/Head Register [HEX]
DC = Device Command Register [HEX]
ER = Error register [HEX]
ST = Status register [HEX]
Powered_Up_Time is measured from power on, and printed as
DDd+hh:mm:SS.sss where DD=days, hh=hours, mm=minutes,
SS=sec, and sss=millisec. It "wraps" after 49.710 days.
Error 1757 occurred at disk power-on lifetime: 1930 hours (80 days + 10 hours)
When the command that caused the error occurred, the device was active or idle.
After command completion occurred, registers were:
ER ST SC SN CL CH DH
-- -- -- -- -- -- --
04 61 02 00 00 00 a0 Device Fault; Error: ABRT
Commands leading to the command that caused the error were:
CR FR SC SN CL CH DH DC Powered_Up_Time Command/Feature_Name
-- -- -- -- -- -- -- -- ---------------- --------------------
ef 10 02 00 00 00 a0 08 11d+12:18:30.077 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.077 IDENTIFY DEVICE
ef 03 46 00 00 00 a0 08 11d+12:18:30.077 SET FEATURES [Set transfer mode]
ef 10 02 00 00 00 a0 08 11d+12:18:30.073 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.073 IDENTIFY DEVICE
Error 1756 occurred at disk power-on lifetime: 1930 hours (80 days + 10 hours)
When the command that caused the error occurred, the device was active or idle.
After command completion occurred, registers were:
ER ST SC SN CL CH DH
-- -- -- -- -- -- --
04 61 46 00 00 00 a0 Device Fault; Error: ABRT
Commands leading to the command that caused the error were:
CR FR SC SN CL CH DH DC Powered_Up_Time Command/Feature_Name
-- -- -- -- -- -- -- -- ---------------- --------------------
ef 03 46 00 00 00 a0 08 11d+12:18:30.077 SET FEATURES [Set transfer mode]
ef 10 02 00 00 00 a0 08 11d+12:18:30.073 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.073 IDENTIFY DEVICE
c8 00 08 08 00 00 e0 08 11d+12:18:30.051 READ DMA
ef 10 02 00 00 00 a0 08 11d+12:18:30.041 SET FEATURES [Enable SATA feature]
Error 1755 occurred at disk power-on lifetime: 1930 hours (80 days + 10 hours)
When the command that caused the error occurred, the device was active or idle.
After command completion occurred, registers were:
ER ST SC SN CL CH DH
-- -- -- -- -- -- --
04 61 02 00 00 00 a0 Device Fault; Error: ABRT
Commands leading to the command that caused the error were:
CR FR SC SN CL CH DH DC Powered_Up_Time Command/Feature_Name
-- -- -- -- -- -- -- -- ---------------- --------------------
ef 10 02 00 00 00 a0 08 11d+12:18:30.073 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.073 IDENTIFY DEVICE
c8 00 08 08 00 00 e0 08 11d+12:18:30.051 READ DMA
ef 10 02 00 00 00 a0 08 11d+12:18:30.041 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.040 IDENTIFY DEVICE
Error 1754 occurred at disk power-on lifetime: 1930 hours (80 days + 10 hours)
When the command that caused the error occurred, the device was active or idle.
After command completion occurred, registers were:
ER ST SC SN CL CH DH
-- -- -- -- -- -- --
04 61 08 08 00 00 e0 Device Fault; Error: ABRT 8 sectors at LBA = 0x00000008 = 8
Commands leading to the command that caused the error were:
CR FR SC SN CL CH DH DC Powered_Up_Time Command/Feature_Name
-- -- -- -- -- -- -- -- ---------------- --------------------
c8 00 08 08 00 00 e0 08 11d+12:18:30.051 READ DMA
ef 10 02 00 00 00 a0 08 11d+12:18:30.041 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.040 IDENTIFY DEVICE
ef 03 46 00 00 00 a0 08 11d+12:18:30.040 SET FEATURES [Set transfer mode]
ef 10 02 00 00 00 a0 08 11d+12:18:30.037 SET FEATURES [Enable SATA feature]
Error 1753 occurred at disk power-on lifetime: 1930 hours (80 days + 10 hours)
When the command that caused the error occurred, the device was active or idle.
After command completion occurred, registers were:
ER ST SC SN CL CH DH
-- -- -- -- -- -- --
04 61 02 00 00 00 a0 Device Fault; Error: ABRT
Commands leading to the command that caused the error were:
CR FR SC SN CL CH DH DC Powered_Up_Time Command/Feature_Name
-- -- -- -- -- -- -- -- ---------------- --------------------
ef 10 02 00 00 00 a0 08 11d+12:18:30.041 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.040 IDENTIFY DEVICE
ef 03 46 00 00 00 a0 08 11d+12:18:30.040 SET FEATURES [Set transfer mode]
ef 10 02 00 00 00 a0 08 11d+12:18:30.037 SET FEATURES [Enable SATA feature]
ec 00 00 00 00 00 a0 08 11d+12:18:30.037 IDENTIFY DEVICE
SMART Self-test log structure revision number 1
Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error
# 1 Extended offline Completed without error 00% 1930 -
# 2 Short offline Completed without error 00% 1930 -
# 3 Extended offline Completed without error 00% 1930 -
SMART Selective self-test log data structure revision number 1
SPAN MIN_LBA MAX_LBA CURRENT_TEST_STATUS
1 0 0 Not_testing
2 0 0 Not_testing
3 0 0 Not_testing
4 0 0 Not_testing
5 0 0 Not_testing
Selective self-test flags (0x0):
After scanning selected spans, do NOT read-scan remainder of disk.
If Selective self-test is pending on power-up, resume after 0 minute delay.
I tried to look through the output but unfortunately I'm not an expert in analyzing smartctl output. It said the drive passed the tests:
SMART overall-health self-assessment test result: PASSED
In the tresholds section everything looks okay (this is a rather new WD Red HDD, a few months old).
At the end of the output there are tons of errors though. I tried to look them up with no luck.
On the other hand, I cannot use the disk at all:
root@idealib:~# fdisk /dev/sda
Welcome to fdisk (util-linux 2.27.1).
Changes will remain in memory only, until you decide to write them.
Be careful before using the write command.
fdisk: cannot open /dev/sda: Input/output error
dmesg looks bad as well:
[ 1708.769491] ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x0
[ 1708.771763] ata1.00: irq_stat 0x40000001
[ 1708.773710] ata1.00: failed command: READ DMA
[ 1708.775667] ata1.00: cmd c8/00:08:08:00:00/00:00:00:00:00/e0 tag 15 dma 4096 in
res 61/04:08:08:00:00/00:00:00:00:00/e0 Emask 0x1 (device error)
[ 1708.779619] ata1.00: status: { DRDY DF ERR }
[ 1708.781613] ata1.00: error: { ABRT }
[ 1708.784344] ata1.00: failed to enable AA (error_mask=0x1)
[ 1708.787355] ata1.00: failed to enable AA (error_mask=0x1)
[ 1708.789183] ata1.00: configured for UDMA/133 (device error ignored)
[ 1708.796930] ata1: EH complete
What other test should I run before I can be 100% sure that the disk is faulty and I need replace it? Or it's dead and I should just accept it? :)
A:
I can't help with the SMART data (I'm not that smart!) but my default tool to poke at the drive is badblocks.
Is a tool for finding bad blocks on a hard drive. If you're okay deleting data, it's worth running it in destructive mode - note this will take some time to run!:
badblocks -wsv /dev/sda
There's actually pretty good information on the Arch wiki (https://wiki.archlinux.org/index.php/badblocks) about the tool and how to use it.
Another tool you could try is Spinrite, which operates from a freedos environment at boot. It's a little old, but does go quite low-level on the disk. I'd suggest a level 4 scan if you use it. https://www.grc.com/sr/spinrite.htm
I'm sure you've already done so, but I always suggest checking/changing the SATA cable, port on the motherboard, etc. I've been caught out by this kind of problem more times than I care to admit.
| mini_pile | {'original_id': 'dfefc6baf695b7fa462e448b4ef472ae58aa1cbec68daa2fee06b16786cafb60'} |
Dexter Wiki
Episode 512: The Big One
1,068pages on
this wiki
The Big One
225px-Dexter the big one
Director(s): Steve Shill
Writer(s): Chip Johannessen
Manny Coto
Premiere: December 12, 2010
Season Five
1 2 3 4 5 6 7 8 9 10 11 12
The Big One is the twelfth and final episode of Season Five, as well as the sixtieth of the series. Time is running out and fast, and Jordan Chase has figured out who Dexter Morgan and Lumen Pierce are...and he's kidnapped Lumen in order to trap Dexter himself. With the death of Stan Liddy, an investigation marks Detective Joey Quinn as the prime suspect, while Debra Morgan uses her intuitive abilities to deduce Jordan Chase's real identity and where to find him.
Dexter's situation grows desperate when he discovers that Lumen has been set up and captured by Jordan Chase. Despite knowing that he's being baited into a trap, Dexter risks his life to save Lumen. In the Barrel Girls case, Debra comes to the conclusion that the disappearance of the rapists is due to a pair of vigilantes. Stan Liddy's body, having been stabbed by Dexter, is found and the team is called to the scene. At Liddy's crime scene, LaGuerta informs Quinn that the last five calls found on Liddy's phone were to him. LaGuerta then notices blood on Quinn's boots (belonging to Liddy), and has him taken in for questioning.
Dexter tracks down the address of one of Chase's camps where Lumen was first assaulted. Dexter speeds to the scene (in a car stolen from the area surrounding Liddy's crime scene) but in his haste, his car flips over a backhoe on the road. Following his crash, Jordan locates Dexter and ties him up alongside Lumen. As Jordan opens Dexter's knife kit, he notices one knife is missing, which Dexter uses to break free and stab Jordan in the foot. Dexter incapacitates Jordan and frees Lumen, before they then strap Jordan to a table. Jordan taunts Lumen about the rape, and she kills him by stabbing him in the chest.
Meanwhile, Debra has tracked down the street vendor, who reported seeing Jordan heading in the direction of a camp. She walks in just as Dexter and Lumen are cleaning the crime scene behind plastic wrapping, which conceals their identities. She tells the two that she knows who they are and advises them to be gone within an hour to avoid the police, and she leaves without seeing them.
The morning after disposing of Jordan's body, Dexter proceeds to the lab to perform the blood-work on Quinn's boot. When he returns, Lumen informs Dexter that she wants to leave, stating that her need to kill has now gone. Dexter laments her leaving and throws a pair of plates at the wall in anger, realizing he may be forever broken. Though distressed Dexter begins to understand, and assures her that she should not be sorry that her darkness has left her. He then promises that he will carry her darkness for her, along with his own. After saying goodbye to Lumen, Dexter attends Harrison's first birthday party with his family and co-workers, visibly distraught by Lumen's departure. Quinn attends with Debra and thanks Dexter for the blood-work which had exonerated him from the Liddy murder case. Dexter tells Debra that he still dislikes Quinn but accepts that he makes Debra happy. As the episode concludes, Dexter questions how those around him can make relationships seem so easy. He removes his wedding ring for the first time and reflects on what Lumen brought into his life, that someone could see him for who he is and not see a monster, and that nothing, not even darkness, is set in stone. He then blows out Harrison's candle on his birthday cake, stating that "wishes, of course, are for children".
• Near the middle of the episode, when Jordan is taking Lumen to the old campground, it shows a sign, which reads "River Jordan Camp", showing where Jordan Chase got his alias.
• This episode marked the last in a string of regular guest appearances by Julia Stiles and Jonny Lee Miller, who played Lumen and Jordan, respectively.
The Episodes of Dexter
Around Wikia's network
Random Wiki | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9704902172088624}", 'metadata': "{'Content-Length': '125314', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IL2YJFC4TPYIQT2OC7KTGFR64WTXO3C4', 'WARC-Concurrent-To': '<urn:uuid:d0d58ca8-a442-4c2e-b4ba-6570d80bc91b>', 'WARC-Date': datetime.datetime(2016, 7, 29, 15, 51, 30), 'WARC-IP-Address': '104.156.85.194', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:RSRISCJHTAA55CXHCLHT7HBPGD2EOFIQ', 'WARC-Record-ID': '<urn:uuid:de102d40-43f6-48b2-b6cc-dbb4ff6cc4e0>', 'WARC-Target-URI': 'http://dexter.wikia.com/wiki/Episode_512:_The_Big_One', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c84de360-d393-48be-aa4f-5d303dd37b72>', 'WARC-Truncated': None}", 'previous_word_count': '706', 'url': 'http://dexter.wikia.com/wiki/Episode_512:_The_Big_One', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03599458932876587', 'original_id': '4d22523fa06bdab40336b16f5d1afe825656a9357f91c161721d0c64eb4173bc'} |
Find accommodation
Enter your UK destination:
Enter arrival date to check pricing & availability
Accommodation Directory
Ilfracombe Tourist Information
Ilfracombe really is the hub of North Devon's dramatic coastline. It's Victorian roots shine through, notable particularly in the character old hotels and Ilfracombe's layout, with it's many green spaces and park areas up on the hills. Much of it's character comes from the fact that it is built on steep sided hills which dip and rise to the seashore. Ilfracombe's tunnel beaches have given pleasure to many North Devon holidaymakers through the years!
» Find Accommodation in Ilfracombe
Ilfracombe's Victorian heritage is celebrated annually every July in Victorian Week when Ilfracombe residents dress up in Victorian garb and there are Punch and Judy shows and a costume gala ball, as well as a massive fireworks display. As a North Devon family resort, Ilfracombe fits the bill with lots of outdoor activities including a selection of golf courses, an aquarium, Ilfracombe Museum, it's spectacular Tunnel Beaches, a castle and family theme park nearby, various promenade amusement arcades and beach activities such as toy train rides and it's got a delightful town centre with lots of quirky specialist shops, particularly health food shops!
Ilfracombe Seaside History
It was the arrival of the railways during the Victorian era that really saw the start of Ilfracombe's holiday seaside boom. However, way before this period Ilfracombe was a fortified Celtic settlement.
Ilfracombe Tourist Information Centre, The Landmark, Sea Front, Ilfracombe EX34 9BX. Tel: 01271 863001.
Ilfracombe Museum
Fancy a bit of a laugh, and some serious maritime social history as well! Check out Ilfracombe's quirky local museum then, adjacent to the Landmark Theatre on the seafront. There's an assortment of the weird and wonderful here, must be a legacy of that Victorian eccentricity which seems to pervade Ilfracombe and give it the character it has. There's a two headed kitten in this museum, plus pickled bats, and birds, butterflies and Buddhas! The kids can get down to a bit of brass rubbing or one of the many quizzes.
There's lots of information on the maritime history of Ilfracombe, which still has an active harbour for fishing. Other exhibitions include information on wartime Ilfracombe, Lundy Island and childhood memories. There's a little gift shop on-site too, and pre-booked school groups can access the museum free!
Ilfracombe Museum, Wilder Road, Ilfracombe, North Devon. EX34 8AF. Tel: 01271 863541
Ilfracombe Tunnel Beaches
Ilfracombe's fascinating tunnel beaches were established as far back as 1823, and are an integral part of seaside history and development on the North Devon Coast. Ilfracombe was the first North Devon coastal local to develop as a seaside resort, and the hand carved tunnels, hand carved by skilled Welsh miners in the 1820s, enabled segregated access to the beaches and tidal pools were created. Before the tunnel beaches were carved the ladies would frequent Wildersmouth Beach and the 'gentlemen' and their nude bathing via a boat trip went to Crewkhorne Beach.
There's a small fee to enter the tunnel beach complex at Ilfracombe, but it's well worth it for what there is to see and do. The old Greek inspired Bath House, built in 1836, still remains intact in all it's splendid glory, as does the original wood fuelled pump house which served to feed sea water to the Bath House for cold and hot sea water baths. Perfect, in the days when bathing was still viewed as something you do for health only, rather than pure leisure pleasure.
The story of the Ilfracombe Tunnel Beaches is the story of Ilfracombe's growth from a small fishing village, to a popular Victorian seaside resort. Local entrepreneurs developed both the tunnels and pools, and development and modernisation has continued up to the present. What you've got on the contemporary Ilfracombe tunnel beaches complex is a variety of facilities including historical information boards everywhere, with photographs of North Devon holidaymakers of old, a superb tidal sea water swimming pool popular with the kids, and access to various beaches which are more like coves (for the endless golden sands you need to head off to Woolacombe and Croyde!). Also on the complex is a Flip Flop Shop, the Cafe Blue bar, a Picnic area, sun beds and deck chairs for hire, numerous rock pools perfect for snorkelling, table tennis and a kids play area. Ilfracombe Tunnel Beaches is also totally accessible to wheelchairs. Superb North Devon coast family holiday fun all round!
Ilfracombe Tunnel Beaches, Bath Place, Ilfracombe, North Devon. Tel: 01271 879882. Please note, not dogs are allowed on the beaches from 1st May-31st October. Check the Ilfracombe Tunnel Beaches weblink for more details.
Ilfracombe Victorian Week
Usually held in mid June annually, Ilfracombe's Victorian week is a really good time to visit this historic North Devon Victorian seaside resort. A host of entertainment treats take placed during this week, including fireworks, local costume celebrations with local residents and visitors getting on their Victorian garb and wandering down the promenade. There are usually Victorian style fairground rides along the promenade as well.
Other Victorian styled events run throughout Ilfracombe during Victorian week, tapping into music hall and so forth. Fabulous fireworks, numerous processions, a host of garden parties, steam engines, a carousel and town criers are what the visitor can expect during Ilfracombe's delightfully kitsch Victorian week every year - don't miss it!
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.945424497127533}", 'metadata': "{'Content-Length': '60450', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UOHH2IGKNMGLQXHFKLDDASTUVNNSB4OQ', 'WARC-Concurrent-To': '<urn:uuid:51e991e2-a14a-42de-9840-d63e02941dba>', 'WARC-Date': datetime.datetime(2013, 12, 13, 13, 44, 24), 'WARC-IP-Address': '80.193.131.253', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:JAPQOIXBMA42ZG2ZUOGHNSA4HM6II3PZ', 'WARC-Record-ID': '<urn:uuid:694b7ef0-cd76-461e-9abf-ae5b883c901f>', 'WARC-Target-URI': 'http://www.iknow-devon.co.uk/tourist_information/north-devon/ilfracombe/ilfracombe_devon_holidays.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:17c01906-1528-4c15-aee7-c7cc80799de7>', 'WARC-Truncated': None}", 'previous_word_count': '903', 'url': 'http://www.iknow-devon.co.uk/tourist_information/north-devon/ilfracombe/ilfracombe_devon_holidays.htm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021796822547912598', 'original_id': 'dfea181c618a0d584ed67903263bc7fb24068c23edf2c37e9c0a6720f6ba8f46'} |
Conventionally, there has been known an apparatus which changes an attitude of a component having a rectangular parallelepiped shape.
For example, as shown in FIG. 19 which is an explanatory view, in changing an attitude of a chip component P having a rectangular parallelepiped shape into a vertical position from a horizontal position, the chip component P in the horizontal position is sucked into and held by a cavity 104 which is formed by cutting along an outer periphery of a rotor 101, and the rotor 101 is rotated relative to a base 103. A guide surface 111 is formed on the base 103, a radially outer side of the chip component P is lifted by the guide surface 111 along with the rotation of the rotor 101 thus bringing the chip component P into the vertical position.
In addition, as shown in FIG. 20 which is an explanatory view, in changing the attitude of the chip component P into the horizontal position from the vertical position, the chip component P in the vertical position is sucked into and held by the cavity 104 formed by cutting along the outer periphery of the rotor 101, and a biasing member 120 is disposed above the rotor 101. Along with the rotation of the rotor 101, a contact surface 121 of the biasing member 120 is brought into contact with an upper portion of the chip component P so that the upper portion of the chip component P is biased by the contact surface 121 whereby the chip component P is brought into the horizontal position (see JP-A-2000-72230, for example). | mini_pile | {'original_id': 'bdb6957b612475c513b8f670f61cd952660e71c763a5ee27acd52c756b686034'} |
If you love me like you tell me Please be careful with my heart You can take it just don't break it Or my world will fall apart You are my first romance And I'm willing to take a chance That till lilfe is through I'll still be loving you ...
SHARE THIS PAGE View Viral Dashboard ›
marieceller doesn’t have any activity yet. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.881902277469635}", 'metadata': "{'Content-Length': '192647', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GNYHKXC6PJCBKYDU7623WXNAUAPTBVYM', 'WARC-Concurrent-To': '<urn:uuid:ae18b2bb-cf26-4cef-9be2-7a939d445c05>', 'WARC-Date': datetime.datetime(2013, 12, 20, 10, 3, 7), 'WARC-IP-Address': '23.64.100.25', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:Y3GKOTXTHC7ZRJHDAPYNK4HJ3TU25GX4', 'WARC-Record-ID': '<urn:uuid:c682425e-eda8-4187-94d7-7f38f7f6b4ba>', 'WARC-Target-URI': 'http://www.buzzfeed.com/marieceller', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:53ed1857-e323-4667-82be-4d32c09437d1>', 'WARC-Truncated': 'length'}", 'previous_word_count': '63', 'url': 'http://www.buzzfeed.com/marieceller', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.295320987701416', 'original_id': '078372d560ad5aba26a3df36df88054cab1fe52f1152e6e97131623a1d37aa26'} |
next up previous
Next: Introduction
A Note on Native Level 1 BLAS in Java[*]
Aart J.C. Bik and Dennis B. Gannon
Lindley Hall 215, Computer Science Department, Indiana University
Bloomington, Indiana 47405-4101, USA
In this research note, we explore the potential of extending the Java Application Programming Interface with some mathematical primitives to improve the performance of certain operations in Java programs while maintaining portability. In particular, we show that providing straightforward native implementations of primitives from Level 1 BLAS can already improve the performance substantially. On multi-processors, combining this native Level 1 BLAS with the multi-threading mechanism of Java may even provide a simple and portable way to obtain a Java program that runs faster than compiled serial C code. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8100686073303223}", 'metadata': "{'Content-Length': '3898', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MZWWITAT32BK7SHZQHCWRZ73YXY4KOJ6', 'WARC-Concurrent-To': '<urn:uuid:be827381-2249-4945-8707-7a6f4c2a5e7c>', 'WARC-Date': datetime.datetime(2014, 4, 19, 9, 48, 50), 'WARC-IP-Address': '129.79.247.149', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LFYTLKJ3DZM5VNPA5H2SVUOOXEC6N3HA', 'WARC-Record-ID': '<urn:uuid:42dbab72-5393-418f-baf1-9446a0027191>', 'WARC-Target-URI': 'http://www.extreme.indiana.edu/hpjava/papers/native/native.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:bea6524f-6f12-44d3-b955-a271a8b63c78>', 'WARC-Truncated': None}", 'previous_word_count': '119', 'url': 'http://www.extreme.indiana.edu/hpjava/papers/native/native.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-4-33.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-15\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for April 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05813318490982056', 'original_id': 'ef967b672191c8acf68e569e872ec9ba2388f8c3d4a57753733bcff21c05cc89'} |
<#import "../../freemarker/main-template.ftl" as u>
<@u.page>
<div class="page-header top5">
<div class="row text-center">
<div class="header-group">
<h1>@Delegate</h1>
<h3>Don't lose your composition.</h3>
</div>
</div>
<div class="row">
<p>
@Delegate was introduced as feature in lombok v0.10. It was moved to the experimental package in
lombok v1.14; the old version from the main lombok package is now deprecated.
</p>
</div>
<div class="row">
<h3>Experimental</h3>
<p>
Experimental because:
<ul>
<li>Not used that much</li>
<li>Difficult to support for edge cases, such as recursive delegation.</li>
<li>API is rather unfriendly; it would be a lot nicer if you can simply implement some methods and let
<code>@Delegate</code> generate delegates for whatever you didn't manually implement, but due to
issues with generics erasure this also can't be made to work without caveats.
</ul>
Current status: <em>negative</em> - Currently we feel this feature will not move out of experimental status
anytime soon, and support for this feature may be dropped if future versions of javac or ecj make it
difficult to continue to maintain the feature.
</div>
<div class="row">
<h3>Overview</h3>
<p>
Any field or no-argument method can be annotated with <code>@Delegate</code> to let lombok generate
delegate methods that forward the call to this field (or the result of invoking this method).
</p>
<p>
Lombok delegates all <code>public</code> methods of the field's type (or method's return type), as well
as those of its supertypes except for all
methods declared in <code>java.lang.Object</code>.
</p>
<p>
You can pass any number of classes into the <code>@Delegate</code> annotation's <code>types</code>
parameter.
If you do that, then lombok will delegate all <code>public</code> methods in those types (and their
supertypes, except <code>java.lang.Object</code>) instead of looking at the field/method's type.
</p>
<p>
All public non-<code>Object</code> methods that are part of the calculated type(s) are copied, whether
or not you also wrote implementations for those methods. That would thus result in duplicate method
errors. You can avoid these
by using the <code>@Delegate(excludes=SomeType.class)</code> parameter to exclude all public methods in
the excluded type(s), and their supertypes.
</p>
<p>
To have very precise control over what is delegated and what isn't, write private inner interfaces with
method signatures, then specify these
private inner interfaces as types in <code>@Delegate(types=PrivateInnerInterfaceWithIncludesList.class,
excludes=SameForExcludes.class)</code>.
</p>
</div>
<@u.comparison />
<div class="row">
<h3>Supported configuration keys:</h3>
<dl>
<dt><code>lombok.delegate.flagUsage</code> = [<code>warning</code> | <code>error</code>] (default: not
set)
</dt>
<dd>Lombok will flag any usage of <code>@Delegate</code> as a warning or error if configured.</dd>
</dl>
</div>
<div class="overview">
<h3>Small print</h3>
<div class="smallprint">
<p>
When passing classes to the annotation's <code>types</code> or <code>excludes</code> parameter, you
cannot include generics.
This is a limitation of java. Use private inner interfaces or classes that extend the intended type
including the
generics parameter to work around this problem.
</p>
<p>
When passing classes to the annotation, these classes do not need to be supertypes of the field. See
the example.
</p>
<p>
<code>@Delegate</code> cannot be used on static fields or methods.
</p>
<p>
<code>@Delegate</code> cannot be used when the calculated type(s) to delegate / exclude themselves
contain <code>@Delegate</code> annotations; in other words, <code>@Delegate</code> will error if you
attempt to use it recursively.
</div>
</div>
</div>
</@u.page>
| common_corpus | {'identifier': 'https://github.com/lehvolk/lombok/blob/master/website/features/details/delegate.ftl', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT, LicenseRef-scancode-unknown-license-reference', 'date': '2015.0', 'title': 'lombok', 'creator': 'lehvolk', 'language': 'Fluent', 'language_type': 'Code', 'word_count': '503', 'token_count': '1212', '__index_level_0__': '25189', 'original_id': '2a345dcca1cb1a87afa316bb9428458e35377ffc9ba18250984d7ffae50a57c5'} |
Wednesday, February 16, 2011
pontypool (2008)
As we are led uneasily into the story of a town disolving into chaos, we see a poster for Honey a lost cat, tacked to a tree.
Monday, February 14, 2011
pool of london (1951)
Night watchman at a bank in the city offers the office cat a saucer of milk before being coshed. The cat then looks on pitifully meowing, its obvious that theres no milk in the offing now, as the burgler makes sure the watchman isn't getting up. A lot of use the cat turned out to be!
The useless security cat turns up again later, meowing, (I see a pattern developing here), as the stretcher bearers run into the bank to carry out the dead watchman. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9635112285614014}", 'metadata': "{'Content-Length': '98197', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CD7KUGM3T7J3EH6LH4DS2SD73ME2EDPR', 'WARC-Concurrent-To': '<urn:uuid:a31883a3-35db-4835-a8f0-467acc16b195>', 'WARC-Date': datetime.datetime(2017, 10, 23, 7, 43, 52), 'WARC-IP-Address': '172.217.7.193', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WZZTFQUGKHOVFNVRITDT3PFKR3B26NHM', 'WARC-Record-ID': '<urn:uuid:77b42a34-b832-4f1f-ba86-6f6088a7437a>', 'WARC-Target-URI': 'http://catsinfilms.blogspot.com/2011_02_13_archive.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5bc2b4ce-8869-427d-8e9b-7dc49d6b73cb>', 'WARC-Truncated': None}", 'previous_word_count': '125', 'url': 'http://catsinfilms.blogspot.com/2011_02_13_archive.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-225-75-130.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04274475574493408', 'original_id': '11feea84ffeff83921e444cfdea5146bf7bb478c5fb6b85392d9ebbce8c3ef1f'} |
Fiesta Fun Invitations 8ct
Price: $3.99
It's time for a fiesta! Invite friends with Fiesta Fun Invitations, featuring a colorful "FIESTA" headline and lots of Mexican flavor. The back of these postcard-style invitations has space for your party details and RSVP information.
Fiesta Fun Invitations include:
• 8 envelopes | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '7', 'language_id_whole_page_fasttext': "{'en': 0.6842221021652222}", 'metadata': "{'Content-Length': '159631', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4LAD67ZMPZLZKGMG6WUSHL5HS75HEBAZ', 'WARC-Concurrent-To': '<urn:uuid:50fc03a1-1dee-4917-bff4-a7325ce585ce>', 'WARC-Date': datetime.datetime(2016, 7, 29, 16, 2, 58), 'WARC-IP-Address': '93.184.216.132', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:CQLNBQ7WL6MVYIZGAVMNSFLHY4MLURUB', 'WARC-Record-ID': '<urn:uuid:d0e7ee57-ba78-4044-afba-05a6cb61472a>', 'WARC-Target-URI': 'http://www.partycity.com/product/fiesta+fun+invitations+8ct.do?sortby=ourPicks&pp=60&size=all&navSet=176292', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2e25a59d-f10f-4658-b9f1-5087e2c46a9c>', 'WARC-Truncated': 'length'}", 'previous_word_count': '65', 'url': 'http://www.partycity.com/product/fiesta+fun+invitations+8ct.do?sortby=ourPicks&pp=60&size=all&navSet=176292', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11815387010574341', 'original_id': '25dc1e2c432af3ffff8923a8991416c0601a8e4b3f32f41e57a0b9d89d32a827'} |
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -triple x86_64-unknown-unknown -verify %s
struct S0 {
int x;
static const int test0 = __builtin_omp_required_simd_align(x); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an expression, only type is allowed}}
static const int test1 = __builtin_omp_required_simd_align(decltype(S0::x));
auto test2() -> char(&)[__builtin_omp_required_simd_align(decltype(x))];
};
struct S1; // expected-note 6 {{forward declaration}}
extern S1 s1;
const int test3 = __builtin_omp_required_simd_align(decltype(s1)); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an incomplete type 'decltype(s1)' (aka 'S1')}}
struct S2 {
S2();
S1 &s;
int x;
int test4 = __builtin_omp_required_simd_align(decltype(x)); // ok
int test5 = __builtin_omp_required_simd_align(decltype(s)); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an incomplete type 'S1'}}
};
const int test6 = __builtin_omp_required_simd_align(decltype(S2::x));
const int test7 = __builtin_omp_required_simd_align(decltype(S2::s)); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an incomplete type 'S1'}}
// Arguably, these should fail like the S1 cases do: the alignment of
// 's2.x' should depend on the alignment of both x-within-S2 and
// s2-within-S3 and thus require 'S3' to be complete. If we start
// doing the appropriate recursive walk to do that, we should make
// sure that these cases don't explode.
struct S3 {
S2 s2;
static const int test8 = __builtin_omp_required_simd_align(decltype(s2.x));
static const int test9 = __builtin_omp_required_simd_align(decltype(s2.s)); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an incomplete type 'S1'}}
auto test10() -> char(&)[__builtin_omp_required_simd_align(decltype(s2.x))];
static const int test11 = __builtin_omp_required_simd_align(decltype(S3::s2.x));
static const int test12 = __builtin_omp_required_simd_align(decltype(S3::s2.s)); // expected-error {{invalid application of '__builtin_omp_required_simd_align' to an incomplete type 'S1'}}
auto test13() -> char(&)[__builtin_omp_required_simd_align(decltype(s2.x))];
};
// Same reasoning as S3.
struct S4 {
union {
int x;
};
static const int test0 = __builtin_omp_required_simd_align(decltype(x));
static const int test1 = __builtin_omp_required_simd_align(decltype(S0::x));
auto test2() -> char(&)[__builtin_omp_required_simd_align(decltype(x))];
};
// Regression test for asking for the alignment of a field within an invalid
// record.
struct S5 {
S1 s; // expected-error {{incomplete type}}
int x;
};
const int test8 = __builtin_omp_required_simd_align(decltype(S5::x));
long long int test14[2];
static_assert(__builtin_omp_required_simd_align(decltype(test14)) == 16, "foo");
static_assert(__builtin_omp_required_simd_align(int[2]) == __builtin_omp_required_simd_align(int), ""); // ok
namespace __builtin_omp_required_simd_align_array_expr {
alignas(32) extern int n[2];
static_assert(__builtin_omp_required_simd_align(decltype(n)) == 16, "");
template<int> struct S {
static int a[];
};
template<int N> int S<N>::a[N];
static_assert(__builtin_omp_required_simd_align(decltype(S<1>::a)) == __builtin_omp_required_simd_align(int), "");
static_assert(__builtin_omp_required_simd_align(decltype(S<1128>::a)) == __builtin_omp_required_simd_align(int), "");
}
template <typename T> void n(T) {
alignas(T) int T1;
char k[__builtin_omp_required_simd_align(decltype(T1))];
static_assert(sizeof(k) == __builtin_omp_required_simd_align(long long), "");
}
template void n(long long);
| mini_pile | {'original_id': 'c48573c6a3e2b7fd33301d41ff69e91ecf2e545a770f3edec371dd08cce7e339'} |
Sunday, June 12, 2011
Rock Solid Recrap: Splitting headache
Yeah, splitting that four game series with the Dodgers was not what I had in mind, especially after the Rockies came out and played so well in the first two. Very, very frustrating results these past two days. A blown opportunity to not only gain on or stand their ground with the front-runners, but more importantly to me, create some space from a Dodgers team that I think has a good run in them during the second half of the season.
Dodgers 10, Rockies 8 (boxscore)
Ubaldo Jimenez: Listen, allowing three home runs is never a good thing for a pitcher. That much is pretty clear and obvious, but it's beyond the numbers to me. Where I'm more concerned is Ubaldo's confidence/mindset. Once something has gone wrong for him this season, like Ty Wigginton's error, he loses it. Fast. And he rarely gets it all back together.
That kinda tells me everything we've seen with him this season has been more mental than physical. I can't prove that. I'm not a licensed doctor or psychiatrist, but that's my diagnosis from afar. And I don't know how you can fix that if it really is the root of the problem. You can work on his mechanics. You can review scouting reports over and over. But how do you teach a pitcher to get over mental hurdles?
Bullpen: Well, we saw the entire lineup struggle together for a month, so it's only appropriate the entire bullpen struggles at the same time. Hopefully they get it straightened out a lot quicker than the offense did. And I don't mean to lump Rex Brothers in there because he's been excellent, but even he had a rough go of it today.
Ty Wigginton: I've seen enough of the limited range and routine grounders clanking off his glove. This team desperately needs to tighten up the defense. If that means bringing back Ian Stewart sooner than later, I'm all for it. Giving opponents extra outs and opportunities has to be addressed and eliminated. It's wearing on everybody.
Jonathan Herrera: The bloom is off the rose with Johnny, which is unfortunate, but not totally unexpected for a major leaguer who survives on guts, intelligence and ability to execute. I'm not saying he needs to go, because I don't think that's the case. But given how well Chris Nelson has played, and given the need for dynamic offensive performers, I'm not sure he's going to fit in if he's not excelling at the things he does best while in a bench role.
This could be a big week for him to get it turned around. And this is coming from Herrera's biggest supporter since he was called up last June.
Offense: All of the Rockies runs scored on homers. Seth Smith had a three-run shot in the 1st, which hopefully served as a reminder to Jim Tracy that he needs to play EVERY DAY. Carlos Gonzalez and Troy Tulowitzki each had two-run homers in the 7th, and then Todd Helton hit a solo shot in the 9th. 8 runs. That should have been enough, but once again, it wasn't.
Overall: Any confidence in the Rockies I had built up over their three-game winning streak is wiped away. Today was a big, big, big game in my mind, especially with Ubaldo out there, and they fell short. Yeah, it's promising the offense has turned it around, but we're learning again that the problems for this team run much deeper than one thing. On any given day, they can do a number of different things poorly that puts them in a position to lose.
Until all of those are cleaned up, the ups will always be followed with disappointing downs.
Lineup Card: 6-12-11 Rockies vs Dodgers
A little slow on the trigger today. Hey, it's Sunday: We're allowed to sleep in and eat a late brunchfest every now and then!
Yesterday's recrap: Can't win if you can't pitch or catch
Colorado Rockies (31-33)
1. CF Carlos Gonzalez
2. 2B Jonathan Herrera
3. 1B Todd Helton
4. SS Troy Tulowitzki
5. RF Seth Smith
6. 3B Ty Wigginton
7. LF Charlie Blackmon
8. C Jose Morales
9. P Ubaldo Jimenez
So yes, Jose Morales has become Ubaldo's personal catcher of late, which shows how predictable Jim Tracy can be. I don't have a problem with that if everyone is comfortable with the arrangement, but Morales kinda has to be better than he has been lately for it to work.
Los Angeles Dodgers (30-36)
1. SS Jamey Carroll
2. 2B Aaron Miles
3. RF Andre Ethier
4. CF Matt Kemp
5. 1B James Loney
6. 3B Juan Uribe
7. C Rod Barajas
8. LF Trent Oeltjen
9. P Rubby De La Rosa
A day off for Tony Gwynn Jr! Yes!
Rock Solid Recrap: Can't win if you can't pitch or catch
Had a nice dinner with my dad for his birthday last night. Then I get home and my internet signal was a little choppy, so while I was able to catch most of the major moments in the game, I wasn't watching as intently as usual. Feel free to correct me on any thoughts that seem off.
But I don't think anyone can argue with this point: If you allow Jamey Carroll and Aaron Miles to go a combined 8-for-9 with 4 RBI, you most definitely deserve to lose.
Dodgers 11, Rockies 7 (boxscore)
Jason Hammel: Had a very average outing going for his 5+ innings before exiting with the sore lower back. Makes you wonder if his back was bothering from the get-go. Whatever the case, the injury doesn't sound like a huge problem right now, so we'll cross our fingers and hope for better next time around.
Bullpen: I think we should just demote all of them. What about you? It's just not tolerable for some of these guys to have a rough outing, much less two bad outings in a row like Matt Reynolds. Demote some of them. Release a couple more. Let's start fresh tomorrow with an all new seven.
If you haven't caught on to the sarcasm, this blog isn't for you. The bullpen had a rough night. It happens. Matt Reynolds, Clayton Mortensen, Matt Lindstrom, and even matt Belisle the night before, these guys have all done wonderfully for the Rockies. To get as worked up as some fans I saw on Twitter (when it was actually working) doesn't make sense.
No, Matt Reynolds doesn't need a minor league stint. No, Matt Lindstrom isn't garbage. Calm it down, folks. There's 98 games to go. Those guys are all going to be quietly great a lot more times than they'll be loudly awful over that timeframe.
Defense: Where do I even start?
First of all, as I mentioned in the Lineup Card, poor Jason Hammel was once again stuck with pretty much the worst feasible defensive alignment Jim Tracy could come up with.
Jason Giambi showed once again he is not a good defender or even an average defender. Any other opinion of the matter will not be acknowledged. Plain and simple.
Eric Young in the outfield needs to never happen again until he spends a whole year in the minors learning it. Sheesh his routes are terrible. And PLEASE don't think I'm taking this out on the player. He's just doing what he's told, and what he's being told is really stupid. Of course it's also the only thing keeping him the big leagues at this point, so it's a really, really tough spot for Young. It's a no-win situation for everybody, which should ultimately lead to him being traded if 2B never opens up.
And yet somehow Young looked a lot better than Matt Kemp did in the outfield. What the heck is his deal?
Oh, and yes, the Jonathan Herrera botch in the 9th inning was quite embarrassing for him and actually pretty costly for the team. Generally he's one of the smarter guys on the team, so his not knowing where to go with the ball in that spot shocked the hell out of me.
I didn't even specifically mention Troy Tulowitzki or Ty Wigginton, the two men who were actually charged with their two errors. That kinda shows how terrible this was overall.
Offense: It's back on track right now. Carlos Gonzalez, Jason Giambi, Troy Tulowitzki, Ty Wigginton and Charlie Blackmon all had multi-hit games. The seven runs they were able to produce should have been enough to extend the winning streak to four, but it wasn't.
Seth Smith: Jim Tracy already thinks Charlie Blackmon is a lot better than you! And apparently he thinks Eric Young is too. I don't necessarily disagree on the former, but come on Tracy, Smith needs to just play every single day.
Ryan Spilborghs: Can't even buy a start against a left-hander these days. That really has to suck.
Sunday afternoon: This is a big one for the Rockies and Ubaldo Jimenez. Despite the loss here, the team is taking more steps forward the backward this week. It would be huge to seal up this series victory over a division rival, as well as keeping Ubaldo's momentum going. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '34', 'language_id_whole_page_fasttext': "{'en': 0.9771244525909424}", 'metadata': "{'Content-Length': '375374', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2CZXCYCH2SEKDA5LJZDZB6JEGV2ALQG4', 'WARC-Concurrent-To': '<urn:uuid:14060ddd-0b90-49de-9d5c-6e72938ae99c>', 'WARC-Date': datetime.datetime(2015, 5, 6, 18, 32, 41), 'WARC-IP-Address': '74.125.228.203', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:VUMXRHRI336RLVSCM2NHBWASR7VGOOE3', 'WARC-Record-ID': '<urn:uuid:3fc04d6a-7847-458c-8023-b486bec9e20e>', 'WARC-Target-URI': 'http://www.heavenandhelton.blogspot.com/2011_06_12_archive.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c3fb4dcc-a3dd-412f-8690-0cee0bbf0aa9>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1578', 'url': 'http://www.heavenandhelton.blogspot.com/2011_06_12_archive.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-235-10-82.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05051541328430176', 'original_id': '92d370970abf342c5697c9607000c602a8ecc1366fe8acf1f072771c9b824628'} |
Improved cardiovascular health and decreased likelihood of liver cancer, Parkinson’s disease and Type II diabetes are all potential benefits of regular coffee consumption, according to the Mayo Clinic. But a new Yale study may have recognized another health benefit: skin cancer protection.
The study, which examined almost half a million people over the course of a decade, found that participants who drank four or more cups of coffee every day were significantly less likely to develop invasive melanoma, a particularly dangerous type of cancer that kills 9,500 Americans every year. Subjects who drank more than four cups a day were 20 percent less likely to develop malignant melanoma than those who drank less than one cup per day.
“A few other observational studies have reported a similar inverse association between coffee drinking and melanoma, but overall previous results have been inconsistent,” said Erikka Loftfield GRD ’15, the study’s author and a doctoral student at the Yale School of Public Health. “We had good statistical power and were not surprised to find that higher coffee drinking was associated with lower risk of melanoma.”
Melanoma differs from other skin cancers in that it forms in pigmentation cells called melanocytes, responsible for producing the molecules that color skin. The melanin-producing cell often mutates into a cancerous cell due to excessive sunlight and ultraviolet light damage, although several genetic causes have been recognized in past studies.
Red-haired, pale-skinned people with frequent exposure to the sun are most likely to develop melanoma because they have less pigment to block DNA-damaging ultraviolet light, said Harriet Kluger, clinical research program leader of the Melanoma Program at Yale.
“One hypothesis would be that there is something in the coffee that protects the cells from developing the mutations that enable them to invade,” she said. “That would be the hypothesis that one could generate from the study.”
The study did not establish any possible causes for the relationship between coffee and melanoma, but it did find that the effect was present only with malignant melanoma and not melanoma in situ, a less harmful type of the cancer. This ineffectiveness, the study noted, would suggest that coffee consumption prevents this cancer from invading deeper into the skin and becoming more harmful — not from forming in the first place.
Kluger said that for an in situ cell to turn into a malignant cell, there must be additional mutations, and coffee may help prevent those mutations.
Both Kluger and Loftfield warned that coffee should not replace sound health practices, including sunscreen use and limited exposure to ultraviolet light, particularly through tanning booths.
“The most important thing that individuals can do to reduce their risk of melanoma is to reduce sun and UV radiation exposure,” Loftfield said. “While our results, and some from other recent studies, may be encouraging to coffee drinkers, they do not indicate that individuals should alter their coffee intake.”
More research is needed to determine whether this 20 percent reduction in malignant melanoma incidence is due to coffee consumption, but past studies seem to be pointing in that direction. For instance, several studies recognized that in lab rat testing, multiple acids and compounds present in coffee, such as caffeine and nicotinic acid, led to a decrease in melanoma in the rats.
While this relationship is present in caffeinated coffee, the 20 percent reduction in malignant melanoma incidence was not found in decaffeinated coffee, suggesting either some effect of caffeine on skin melanoma or some related behavioral trend.
The study does not suggest that coffee should replace good sense, but the reduction in melanoma incidence is significant. If supported by further research, it could be one more long-term health benefit of coffee consumption, alongside the significant decrease in mortality already recognized by research from the Mayo Clinic.
According to the National Cancer Institute, melanoma rates have been rising at roughly 1.8 percent per year for the last decade, while deaths due to melanoma have remained relatively constant. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.9610938429832458}", 'metadata': "{'Content-Length': '64675', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5XGHXGNH2VOKXT223YYEOYN5URNASC4O', 'WARC-Concurrent-To': '<urn:uuid:95436435-21b3-40aa-8056-f834a16abdae>', 'WARC-Date': datetime.datetime(2022, 12, 7, 11, 27, 13), 'WARC-IP-Address': '35.185.29.200', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:PWJRZSANM6BK6WZR255R5GBAO4547AME', 'WARC-Record-ID': '<urn:uuid:5e9a2fb5-f745-4a96-b5fe-f5080f9053e7>', 'WARC-Target-URI': 'https://yaledailynews.com/blog/2015/02/10/four-cups-a-day-keeps-the-doctor-away/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6fa7eef8-3a3c-41d1-a4a7-b407b5eb0220>', 'WARC-Truncated': None}", 'previous_word_count': '650', 'url': 'https://yaledailynews.com/blog/2015/02/10/four-cups-a-day-keeps-the-doctor-away/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-16\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.035138726234436035', 'original_id': '8a2d5425edfc6e6b735140f76d1fb16dd9b7e6881977420a044c7d89f76f839a'} |
Muse Meditation Headset – A Neuroscientist’s Review
Always interested in understanding more about brain function and to optimise my meditation practice, my bf got the hint and bought me the Muse headband for my birthday. Although that was a long time ago, I’ve gained a small appreciation for this device over time.
Muse measures your brain waves (not specified which ones) to rate your level of focus during your meditation.
So what exactly is this device? According to their website..
Using finely calibrated sensors – 2 on the forehead, 2 behind the ears plus 3 reference sensors – Muse is a next-generation, state of the art EEG system that uses advanced algorithms to train beginner and intermediate meditators at controlling their focus. It teaches users how to manipulate their brain states and how to change the characteristics of their brains.
That sounds epic to be honest. But how exactly does is it ‘change the characteristics’ of your brain? It works by neurofeedback – an feedback system which measures your brain waves to inform you of your current state of consciousness. Muse’s model of biofeedback revolves around the sweet sound of birds.
Image result for birds meme
After calibrating the device and selecting a nature track to accompany your meditation, 2 auditory inputs over the track will mark your sessions progress. Birds chirping and singing signify that your mind is focused and in peak meditation flow. Increased volume of the nature sounds backing track signal your mind has drifted off course and your quality of focus has increased. Prolonged stretches of focus are awarded with ‘birds’ and when you reign your mind back in from some wandering you gain ‘recovery’ points. It’s very simplistic but it works well.
The good stuff.
1. It definitely works, although latency might be a second or 2 slow. I’ve tested various states of visual meditation and body scanning to see what technique elicits the most birb responses. If I open my eyes during the session the music gets louder and recognises I’ve changed brain state.
2. The feedback design of auditory sound to reinforce your meditation focus is a very good way to train your mind and level up your meditation practice. I really do miss the birds when my mind is restless and wandering, guiltily pledging to get more next time.
3. It’s simple and straight-forward to use with an excellent battery life.
1. Doesn’t tell you what brain waves it is measuring. The graph should plot your brain waves instead of just having the categories of ‘active’, ‘neutral’ and ‘calm’ on the y-axis. It would be great to have a percentage or ratio of which brain waves you were emitting or even the most dominant brain wave of the session.Screenshot_20191124_213453I did receive an email from muse titled ‘A deeper dive, what exactly is muse measuring’. It’s extremely interesting stuff and you can read the full post over here: What exactly Muse is measuring. That’s all well and good that you know what you’re measuring, Muse. However, I would appreciate some transparency on my end as to what waves my brain is emitting. The analytics back-end graphs would be majorly improved in my opinion by the definition of your distinct brain waves.
2. There is no freestyle mode. I thought this device would be able to just record my brain wave data off the cuff for a desired period of time and then I would be able to view my brain activity. This is not the case however as you can only use the provided ‘soundscapes’ on the app of which there are 3 – beach, rainforest and desert. You can also choose to download ‘city park’ or ‘ambient music’. This unfortunately restricts the devices purpose to neurofeedback. I realise now you can remove your earphones and listen to something else but if the signal gets interrupted the app will pause and your session won’t be recorded.
3. Difficult to get a signal sometimes. I don’t know if my head is a weird shape or too small for the band but often the device can’t read a signal from the left hemisphere of my brain. The device has to be quite tight to your head. If you have hair in the way it won’t get a reading either. As I’m sure you can imagine the last thing you want to do when you have finally allotted yourself some time to chill out is to grapple with a headset, adjusting it until your phone can finally pick up a signal. It’s all about exercising that patience I suppose. The first time I tried it on I placed it backwards lol. 20190409_220948
4. Using birds as a feedback signal is great, however if you are having a prolonged period of focused state the bird noises don’t go away, there’s a continuous chirping in the background. If you have a distracted state the volume of the background track increases. Depending on your mood the whole experience can be a bit jarring and I wonder if it’s preventing me entering a deeper state.
Yes I would recommend. Although a bit pricey considering all the limitations, if you buy the headset with the purpose of practicing neurofeedback and learning how to meditate correctly you shouldn’t be disappointed.
The Muse 2 headset has since been released which apparently has some upgrades that overcome some of the issues I’ve mentioned. I have no idea what improvements the hardware has undergone to justify a whole new device. It would be great if I didn’t have to buy a brand new headset and I could just update the muse app to the latest version and the device would sync to the latest version.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.931737184524536}", 'metadata': "{'Content-Length': '94022', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UEEU7BN5TLOFVRS5PWZU3KGHBH2SF4SK', 'WARC-Concurrent-To': '<urn:uuid:8815b7f3-3632-4666-ab1b-2210e62f89c5>', 'WARC-Date': datetime.datetime(2021, 5, 16, 21, 18, 19), 'WARC-IP-Address': '192.0.78.25', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6IZFBC6EIC3O55UIE5KQ6X3GMEO3POFM', 'WARC-Record-ID': '<urn:uuid:9346416c-5981-4fca-9fd9-06d46c85a298>', 'WARC-Target-URI': 'https://eternalmicrobe.com/2019/07/20/muse-meditation-headset-review/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9279877f-ba5d-48fb-8422-9b87a2edbb05>', 'WARC-Truncated': None}", 'previous_word_count': '1010', 'url': 'https://eternalmicrobe.com/2019/07/20/muse-meditation-headset-review/', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-184.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06996911764144897', 'original_id': '96a6e260bbc99ea84fbd9e6d7bea7d82cda197c83f8d1810d778f2731de3f511'} |
Benedict Cumberbatch wants new title for fans
Bang Showbiz
Benedict Cumberbatch wishes his fans had a different name.
The 'Imitation Game' actor has a dedicated following of female supporters who call themselves Cumberbitches and though he is ''flattered'' by their attention, he thinks they ought to choose a less ''rude'' nickname.
He said: ''It's funny and I'm flattered. But on a serious note, come on, give yourself more power as women. Don't just call yourself bitches!
''I know it was a joke, and more of an empowering thing. The majority of [the fans] are smart and savvy and just having fun, but it's getting out there. It sounds a bit [rude].''
And the 38-year-old actor has several suggestions of alternative monikers.
He said: ''Cumbersomes? Cumbercollective? Cumberfans? There's lots of stuff!''
Benedict recently got engaged to theater director Sophie Hunter and is very impressed with how well she copes with his female devotees.
He told People magazine: ''She's just so in command of it.
''It could be a difficult thing, but she's just really cool. It's really impressive.''
The 'Sherlock' star is looking forward to taking a break over the festive season and is planning a ''traditional'' celebration.
He said: ''I like a traditional Christmas, the whole nine yards. It's all about just shutting down and shutting off for a bit. Going off the grid.'' | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9735201597213744}", 'metadata': "{'Content-Length': '120506', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IAKKJFEDKUEEXCZHENEKC5TMNF45FZXF', 'WARC-Concurrent-To': '<urn:uuid:71d3a1ae-bc6f-4870-80a5-5e8963f6993b>', 'WARC-Date': datetime.datetime(2021, 4, 21, 0, 0, 40), 'WARC-IP-Address': '151.101.250.62', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:UNBW6CX5RRQFIIVSJD2LE5VDT3P2PHPZ', 'WARC-Record-ID': '<urn:uuid:4430ab73-3dee-4426-9c42-e0af2e0e7a78>', 'WARC-Target-URI': 'https://www.azcentral.com/story/entertainment/people/2014/11/26/benedict-cumberbatch-wants-new-title-for-fans/19517525/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:fc357eca-6144-4b91-8f8f-a7a0e1e2a35d>', 'WARC-Truncated': None}", 'previous_word_count': '211', 'url': 'https://www.azcentral.com/story/entertainment/people/2014/11/26/benedict-cumberbatch-wants-new-title-for-fans/19517525/', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-55.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.28747326135635376', 'original_id': 'b4df91d346f475a1c3f889f357589f9d129d7ec6165a4b9eb3b6a667ed610d1f'} |
Top 25 Social Media Books from an Academic Perspective: #24 Influence Marketing
Continuing our countdown on the top 25 books that could qualify for classroom reading, number 24 is Influence Marketing by Danny Brown and Sam Fiorella.
Influence Marketing ranks as top social media book
Danny Brown and Sam Fiorella as authors of top social media book
Do a search on influence marketing, and you will likely stumble upon these two pioneers What makes their book especially appealing to academia is its modelling of influence paths that shape our customer’s buying decisions. This fits well with sales funnel concepts discussed in marketing and lead management.
And rather than romancing high Klout scoring individuals that could amplify our messages, the authors help us dissect the situational factors surrounding a customer’s affinity for our brands. This centers the influence exercise more around the customer than the influencer.
The book, in my opinion, qualifies academically as a recommended reading for an MBA level program. Its appeal is limited to influence marketing topics in social media for which it has the following advantages:
1. The author’s provide numerous cases and stories related to the mapping and modelling of influence down to micro-influencers.
2. The modelling takes a bottom-line view of influence that transcends the more popular approaches to merely counting followers and likes or measuring Klout.
3. High academic rigor is applied to understanding the customer’s influence path with their Customer-Centric Influence Marketing and the Customer Life Cycle Continuum.
4. Their 4 M’s of influence marketing offer a structured approach to deploying influence strategies.
1. The topic, itself, covers less than 20% of a typical curriculum that covers content marketing and social media.
2. Following a great MV-1 Canada story of how the influence modelling process works, the rest of the book takes a more technically descriptive approach to sharing insights. This dispels some of the early energy gained from a fascinating example at the onset.
Overall Evaluation of Social Media Book
Category: Recommended reading for MBA-level course in social media marketing.
Social media book evaluation
Evaluation of Influence Marketing as top social media book
Leave a Reply
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '98', 'language_id_whole_page_fasttext': "{'en': 0.8890470862388611}", 'metadata': "{'Content-Length': '28803', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4ADJWNTTQ2ZJD3HR3YYWKJFTQLF4YBOW', 'WARC-Concurrent-To': '<urn:uuid:dcd7f5aa-c9db-4653-b876-77648d1694ab>', 'WARC-Date': datetime.datetime(2021, 4, 12, 20, 0, 8), 'WARC-IP-Address': '45.40.157.1', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WKUCYGYV7435L2XCRQNXMY457ICRERHJ', 'WARC-Record-ID': '<urn:uuid:02d01079-4187-4a1b-83fd-27c32a5f0b2b>', 'WARC-Target-URI': 'http://blog.socialcontentmarketing.com/top-25-social-media-books-from-an-academic-perspective-24-influence-marketing/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cc01c339-0751-40fe-9a11-2096eefd0759>', 'WARC-Truncated': None}", 'previous_word_count': '420', 'url': 'http://blog.socialcontentmarketing.com/top-25-social-media-books-from-an-academic-perspective-24-influence-marketing/', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-35.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021519899368286133', 'original_id': '9181411594981a7e3b5235b62dcf03bda55c538ae75253bd43285f9f6aabbf6c'} |
Real courage when encountering difficulties
When we encounter a setback, embarrassment, or receive contempt or verbal abuse, how should we handle it?
Firstly, we should not let our ordinary mind react for us. Instead, we should calm down, thinking with our heart: “If I were a teacher, or if I was a Bodhisattva, how would I act to deal with it?” By having such second thoughts, we are sure to reduce negative psychological setbacks by half!
Think that even the Buddha did received such insults, even evil and vicious, and that the Buddha heart were able to calm down impatience.
If we allow ourselves to react with an ordinary mind, it may be like volcanic eruptions of retaliation or counterattack to vent an angry heart.
Real courage is the courage to not kill, the courage of shame, the courage of retreat, the courage of forgiveness, and the courage of compassion. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9577257633209229}", 'metadata': "{'Content-Length': '15108', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GV6PEA6ODMBDKGNJ7FEH5XV3P4I7VMIG', 'WARC-Concurrent-To': '<urn:uuid:b6720fe1-4ceb-480e-b501-32b8721e1cbf>', 'WARC-Date': datetime.datetime(2019, 4, 22, 10, 12, 52), 'WARC-IP-Address': '46.30.215.100', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WYAH4BQZVRS7K7WKNWYMFZ7Z4DLY74FO', 'WARC-Record-ID': '<urn:uuid:e9abca57-22b0-4f4b-a548-20091a032eb2>', 'WARC-Target-URI': 'http://blog.sangye.org/2015/09/14/real-courage-when-encountering-difficulties/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4e55c1f0-0044-4b7a-9970-177cfb9e2a5a>', 'WARC-Truncated': None}", 'previous_word_count': '147', 'url': 'http://blog.sangye.org/2015/09/14/real-courage-when-encountering-difficulties/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-136-233-116.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14785140752792358', 'original_id': '24d5dd447c218e72760050a5f1de6287e23665501b05bb28455df6f6c11646ca'} |
<!DOCTYPE html>
<html>
<head>
<title>Hello DuoCode</title>
<link href="console.css" rel="stylesheet" type="text/css">
<!-- assembly references (ordered by dependency) -->
<script type="text/javascript" src="scripts/mscorlib.js"></script>
<script type="text/javascript" src="scripts/HelloDuoCode.js"></script>
</head>
<body onload="HelloDuoCode.Program.Run()">
<p style="text-align: center; font-size: x-large; font-family: 'Gill Sans', 'Gill Sans MT', Calibri, 'Trebuchet MS', sans-serif;">Clicker#</p>
<p style="text-align: center; font-size: medium; font-family: 'Gill Sans', 'Gill Sans MT', Calibri, 'Trebuchet MS', sans-serif;">Symple clicker writen on clear C#.</p>
<p style="text-align: center; font-size: medium; font-family: 'Gill Sans', 'Gill Sans MT', Calibri, 'Trebuchet MS', sans-serif;">Compiled on DuoCode writed by yCatDev(ycat.developer@gmail.com).</p>
</body>
</html>
| the_stack | {'hexsha': 'f121dc1ecb8f83b458acda02ddb937cc3f848c75', 'size': '916', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'docs/index.html', 'max_stars_repo_name': 'yCatDev/duoCode_onlineClicker', 'max_stars_repo_head_hexsha': 'e2044f92b59b49b008c686382e0829ce51e0b461', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'docs/index.html', 'max_issues_repo_name': 'yCatDev/duoCode_onlineClicker', 'max_issues_repo_head_hexsha': 'e2044f92b59b49b008c686382e0829ce51e0b461', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'docs/index.html', 'max_forks_repo_name': 'yCatDev/duoCode_onlineClicker', 'max_forks_repo_head_hexsha': 'e2044f92b59b49b008c686382e0829ce51e0b461', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '53.8823529412', 'max_line_length': '199', 'alphanum_fraction': '0.6855895197', 'original_id': '413e01c45690863b5ab17d37589d7deae96acbfe413988684db241581300d19f'} |
Cart 0
096 Old School Atlas of the United States c.1847
096 Old School Atlas of the United States c.1847
• 3125
Woodbridge Map of the US 1847
This map of the United States was part of an atlas collection known as the Woodbridge Atlas. Produced in 1843, it was considered to be a modern atlas at the time. It's purpose was to portray the attributes of various countries and regions as they relate to political orientation, physical attributes, prevalent religious practices, types of government and certain degrees of civilization. In addition, information regarding climate differences between countries was contained in the atlas as well as the usual information you would expect to find on a map such as comparative sizes of countries, prominent cities, and geographical features such as rivers or mountains.
The atlas had statistical tables contained therein for quick comparison studies, as well as geographical tables for size and length comparisons of various countries' topographical attributes around the world.
The atlas was informative and gave indepth information for what was available at the time. It was considered to be a signature work.
The insets located on the right side of the map feature different environs for locations such as Boston, New York, Philadelphia, and Baltimore. For orientation purposes, the Meridian point lies at Washington D.C. In addition, this map shows a very young United States, with much of the West being unexplored. Furthermore, being geographical in nature, locations are represented on the map according to their physical attributes. Places such as the Mississippi basin, Great American Desert, and others, are prominently featured with lettering that stands out. Topographical features, such as the Appalachian Mountains, are prominent, as well as the Mississippi River system and all of her varying tributaries.
The Great Lakes can also be seen very clearly, as well as another noteworthy lake in the West,
Timpanogos (located and what is now the state of Utah). The border is basic, featuring standard border and neat lines, with a unique cartographic feature being the country of Mexico extending beyond the border, before it makes its upward curve to break back into the map once again.
All sizes are approximate.
We Also Recommend
Sold Out | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9673290252685548}", 'metadata': "{'Content-Length': '67935', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PJDB2TOGGW3BICNPOZT5LLN6GX63L5TP', 'WARC-Concurrent-To': '<urn:uuid:1944fa91-afbf-4a59-b559-67947d6f4b37>', 'WARC-Date': datetime.datetime(2019, 5, 24, 3, 28, 13), 'WARC-IP-Address': '23.227.63.64', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TPJOQ45YLJHPABXSOC2XHDSPH2HHQGQJ', 'WARC-Record-ID': '<urn:uuid:43846829-b659-4054-9d03-36b3d69308f2>', 'WARC-Target-URI': 'https://great-river-arts.myshopify.com/collections/world-maps/products/copy-of-custom-map-of-jackson-wyoming-and-vicinity', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e2a4b0a2-40be-4a76-b401-b28632cdb2f1>', 'WARC-Truncated': None}", 'previous_word_count': '368', 'url': 'https://great-river-arts.myshopify.com/collections/world-maps/products/copy-of-custom-map-of-jackson-wyoming-and-vicinity', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-142-79-158.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0241239070892334', 'original_id': '148d8f35e368f2acd79a3cbadc720fbb51b0043adf0def7ea3ab828341e8b9eb'} |
Troubleshooting
Common questions and answers will be listed here.
I cloned/downloaded Academic but Hugo produces errors when using it with my existing Hugo site
Academic is a website framework rather than just a theme. Therefore, you must follow the full installation guide found on the Demo/Documentation website or in the Github Readme. If you still have problems, first try running Hugo on the Academic Example Site found in the themes/academic/exampleSite folder and then compare the configuration parameters in the Example Site’s config.toml and content files with the files in your existing site.
Hosting your site with Netlify or Cloudflare and experience strange behavior such as filters not working?
Hugo/TOML require that the value for the date field should be in TOML format, as per frontmatter of the content/publication/ files in the example site. If you want to use a partial date, such as year, you should still complete a full date to make a valid TOML date format.
Issue parsing LaTeX in publication abstract
Let’s consider the following LaTeX which fails to parse correctly:
abstract = "${O(d_{\max})}$"
This is a side effect of Academic and Hugo attempting to parse TOML, Markdown and LaTeX content in the abstract. The solution is to:
escape each LaTeX backslash (\) with an extra backslash, yielding \\
escape each LaTeX underscore (_) with two backslashes, yielding \\_.
Hence, editing the above example, we get:
abstract = "${O(d\\_{\\max})}$"
Cannot achieve line break in multiline equation (LaTeX/Mathjax)
\\ usually achieves a line break in a multiline LaTeX/Mathjax equation, but due to Hugo’s Markdown parser it doesn’t. | mini_pile | {'original_id': '3e0056040630cdd1d9d01f53208b51b437d1c5b3665bc1364dc30744fb5d9f82'} |
FontDame GPOS table
EM 1000
script table begin
khmr default 0, 1, 2
script table end
feature table begin
0 abvm 6, 7, 8, 9, 10, 11, 21, 22, 23, 24
1 blwm 25, 26, 27, 28, 29, 30, 33, 34
2 dist 3, 4, 5
feature table end
lookup 0 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17C2 67
x advance uni17C2 67
lookup end
lookup 1 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni179A 74
x advance uni179A 74
lookup end
lookup 2 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x advance uni17B2 10
lookup end
lookup 3 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni17B2
coverage definition end
inputcoverage definition begin
uni17D21799
coverage definition end
coverage 1,2
lookup end
lookup 4 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni17C2
coverage definition end
coverage 1,0
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni17C2
coverage definition end
coverage 1,0
lookup end
lookup 5 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BB
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BB
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B8.r
uni17B9.r
uni17BA.r
uni17CF.r
uni17D0
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
lookaheadcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
uni17CC.r
uni17CF.r
uni17DD.r
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
coverage definition end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17B7.r
uni17B717CD.r
uni17B8.r
uni17B9.r
uni17BA.r
coverage definition end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17D21798
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BC
uni17BD
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17D21798
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BC
uni17BD
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BC
uni17BD
coverage definition end
coverage 1,1
subtable end
backtrackcoverage definition begin
space
coverage definition end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D2179D
uni17D217A0
uni17D217A2
uni17D217AB
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni179A
coverage definition end
lookaheadcoverage definition begin
uni17BC
uni17BD
coverage definition end
coverage 1,1
lookup end
lookup 6 mark to base
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17B7 0 -310,684
mark uni17B7.r 0 -224,684
mark uni17B717CD 0 -310,684
mark uni17B717CD.r 0 -224,684
mark uni17B8 0 -310,684
mark uni17B8.r 0 -224,684
mark uni17B9 0 -310,684
mark uni17B9.r 0 -224,684
mark uni17BA 0 -310,684
mark uni17BA.r 0 -224,684
mark uni17C6 0 -310,694
mark uni17C6.r 0 -310,684
mark uni17C9 0 -310,684
mark uni17C9.r 0 -310,684
mark uni17CA 0 -310,684
mark uni17CA.r 0 -310,684
mark uni17CA.r.c0 0 -250,684
mark uni17CB 0 -297,684
mark uni17CB.r 0 -257,733
mark uni17CC 0 -310,684
mark uni17CC.r 0 -310,684
mark uni17CD 0 -310,684
mark uni17CD.r 0 -310,684
mark uni17CE 0 -310,684
mark uni17CE.r 0 -77,684
mark uni17CF 0 -310,689
mark uni17CF.r 0 -309,689
mark uni17B717CE 0 -310,684
mark uni17BA17CE 0 -310,684
mark uni17BA17CE.r 0 -310,684
mark uni17CA17B7 0 -310,684
mark uni17CA17B8 0 -310,684
mark uni17CA17B8.r 0 -310,684
mark uni17CA17B9 0 -310,684
mark uni17CA17BA 0 -310,684
mark uni17CA17C6 0 -310,684
mark uni17CA17CE 0 -310,684
mark uni17CA17D0 0 -310,684
mark uni17D017CE 0 -310,684
mark uni17C917B8 0 -310,684
mark uni17C917BA 0 -310,684
mark uni17C917CE 0 -310,684
mark uni17D0 0 -310,701
mark uni17D1 0 -297,674
mark uni17D1.r 0 -298,674
mark uni17D3 0 -297,694
mark uni17D3.r 0 -297,694
mark uni17DD 0 -310,684
mark uni17DD.r 0 -320,684
base uni1780 0 354,830
base uni1781 0 354,830
base uni1782 0 354,830
base uni1783 0 668,830
base uni1784 0 341,830
base uni1785 0 355,830
base uni1786 0 350,830
base uni1787 0 364,830
base uni1788 0 939,830
base uni1789 0 633,830
base uni1789.a 0 634,830
base uni178A 0 354,830
base uni178B 0 345,830
base uni178C 0 341,830
base uni178D 0 700,830
base uni178E 0 657,830
base uni178F 0 355,830
base uni1790 0 360,842
base uni1791 0 318,830
base uni1792 0 365,830
base uni1793 0 348,830
base uni1794 0 346,830
base uni1794.a 0 372,830
base uni1794.a2 0 372,830
base uni1795 0 351,830
base uni1796 0 343,830
base uni1797 0 336,830
base uni1798 0 346,830
base uni1799 0 645,830
base uni179A 0 204,830
base uni179B 0 618,830
base uni179C 0 200,842
base uni179D 0 354,830
base uni179E 0 346,830
base uni179F 0 647,830
base uni17A0 0 666,830
base uni17A1 0 651,830
base uni17A2 0 360,830
base uni17A7 0 354,859
base uni17AA 0 325,1102
base uni17AB 0 346,830
base uni17AC 0 346,830
base uni17BF.right1 0 -22,1170
base uni17BF.right2 0 -22,1170
base uni17BF.right3 0 -22,1170
base uni17C0.right1 0 -419,843
base uni17C0.right2 0 -419,843
base uni17C0.right3 0 -419,843
base uni17D21783 0 -15,830
base uni17D21783.low 0 -15,830
base uni17D21788 0 5,830
base uni17D21788.low 0 5,830
base uni17D2178D 0 -1,830
base uni17D2178D.low 0 -1,830
base uni17D21794 0 -43,830
base uni17D21794.low 0 -43,830
base uni17D21799 0 -45,830
base uni17D21799.low 0 -51,830
base uni17D2179E 0 -45,830
base uni17D2179E.low 0 -45,830
base uni17D2179F 0 -35,830
base uni17D2179F.low 0 -35,830
base uni25CC 0 325,844
lookup end
lookup 7 mark to ligature
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17B7 0 -310,684
mark uni17B7.r 0 -224,684
mark uni17B717CD 0 -310,684
mark uni17B717CD.r 0 -224,684
mark uni17B8 0 -310,684
mark uni17B8.r 0 -224,684
mark uni17B9 0 -310,684
mark uni17B9.r 0 -224,684
mark uni17BA 0 -310,684
mark uni17BA.r 0 -224,684
mark uni17C6 0 -310,694
mark uni17C6.r 0 -310,684
mark uni17C9 0 -310,684
mark uni17C9.r 0 -310,684
mark uni17CA 0 -310,684
mark uni17CA.r 0 -310,684
mark uni17CA.r.c0 0 -250,684
mark uni17CB 0 -297,684
mark uni17CB.r 0 -257,733
mark uni17CC 0 -310,684
mark uni17CC.r 0 -310,684
mark uni17CD 0 -310,684
mark uni17CD.r 0 -310,684
mark uni17CE 0 -310,684
mark uni17CE.r 0 -77,684
mark uni17CF 0 -310,689
mark uni17CF.r 0 -309,689
mark uni17B717CE 0 -310,684
mark uni17BA17CE 0 -310,684
mark uni17BA17CE.r 0 -310,684
mark uni17CA17B7 0 -310,684
mark uni17CA17B8 0 -310,684
mark uni17CA17B8.r 0 -310,684
mark uni17CA17B9 0 -310,684
mark uni17CA17BA 0 -310,684
mark uni17CA17C6 0 -310,684
mark uni17CA17CE 0 -310,684
mark uni17CA17D0 0 -310,684
mark uni17D017CE 0 -310,684
mark uni17C917B8 0 -310,684
mark uni17C917BA 0 -310,684
mark uni17C917CE 0 -310,684
mark uni17D0 0 -310,701
mark uni17D1 0 -297,674
mark uni17D1.r 0 -298,674
mark uni17D3 0 -297,694
mark uni17D3.r 0 -297,694
mark uni17DD 0 -310,684
mark uni17DD.r 0 -320,684
ligature uni17A4 1 2 0 360,849
ligature uni17A4 2 2 0 768,830
ligature uni178017B6 1 2 0 354,830
ligature uni178017B6 2 2 0 756,830
ligature uni178017C5 1 2 0 354,830
ligature uni178017C5 2 2 0 354,830
ligature uni178117B6 1 2 0 354,830
ligature uni178117B6 2 2 0 750,830
ligature uni178117C5 1 2 0 354,830
ligature uni178117C5 2 2 0 354,830
ligature uni178217B6 1 2 0 354,830
ligature uni178217B6 2 2 0 756,830
ligature uni178217C5 1 2 0 354,830
ligature uni178217C5 2 2 0 354,830
ligature uni178317B6 1 2 0 668,830
ligature uni178317B6 2 2 0 1044,830
ligature uni178317C5 1 2 0 668,830
ligature uni178317C5 2 2 0 668,830
ligature uni178417B6 1 2 0 341,830
ligature uni178417B6 2 2 0 767,830
ligature uni178417C5 1 2 0 341,830
ligature uni178417C5 2 2 0 341,830
ligature uni178517B6 1 2 0 355,830
ligature uni178517B6 2 2 0 775,830
ligature uni178517C5 1 2 0 355,830
ligature uni178517C5 2 2 0 355,830
ligature uni178617B6 1 2 0 350,830
ligature uni178617B6 2 2 0 775,830
ligature uni178617C5 1 2 0 350,830
ligature uni178617C5 2 2 0 350,830
ligature uni178717B6 1 2 0 364,830
ligature uni178717B6 2 2 0 776,830
ligature uni178717C5 1 2 0 364,830
ligature uni178717C5 2 2 0 364,830
ligature uni178817B6 1 2 0 939,830
ligature uni178817B6 2 2 0 1369,830
ligature uni178817C5 1 2 0 939,830
ligature uni178817C5 2 2 0 939,830
ligature uni178917B6 1 2 0 633,830
ligature uni178917B6 2 2 0 1079,830
ligature uni178917C5 1 2 0 633,830
ligature uni178917C5 2 2 0 633,830
ligature uni178917B6.a 1 2 0 634,830
ligature uni178917B6.a 2 2 0 1079,830
ligature uni178917C5.a 1 2 0 634,830
ligature uni178917C5.a 2 2 0 634,830
ligature uni178A17B6 1 2 0 354,830
ligature uni178A17B6 2 2 0 756,830
ligature uni178A17C5 1 2 0 354,830
ligature uni178A17C5 2 2 0 354,830
ligature uni178B17B6 1 2 0 345,830
ligature uni178B17B6 2 2 0 768,830
ligature uni178B17C5 1 2 0 345,830
ligature uni178B17C5 2 2 0 345,830
ligature uni178C17B6 1 2 0 341,830
ligature uni178C17B6 2 2 0 751,830
ligature uni178C17C5 1 2 0 341,830
ligature uni178C17C5 2 2 0 341,830
ligature uni178D17B6 1 2 0 700,830
ligature uni178D17B6 2 2 0 1064,830
ligature uni178D17C5 1 2 0 700,830
ligature uni178D17C5 2 2 0 700,830
ligature uni178E17B6 1 2 0 657,830
ligature uni178E17B6 2 2 0 1360,830
ligature uni178E17C5 1 2 0 657,830
ligature uni178E17C5 2 2 0 657,830
ligature uni178F17B6 1 2 0 355,830
ligature uni178F17B6 2 2 0 757,830
ligature uni178F17C5 1 2 0 355,830
ligature uni178F17C5 2 2 0 355,830
ligature uni179017B6 1 2 0 360,842
ligature uni179017B6 2 2 0 775,842
ligature uni179017C5 1 2 0 360,842
ligature uni179017C5 2 2 0 360,842
ligature uni179117B6 1 2 0 318,830
ligature uni179117B6 2 2 0 730,830
ligature uni179117C5 1 2 0 318,830
ligature uni179117C5 2 2 0 318,830
ligature uni179217B6 1 2 0 365,830
ligature uni179217B6 2 2 0 775,830
ligature uni179217C5 1 2 0 365,830
ligature uni179217C5 2 2 0 365,830
ligature uni179317B6 1 2 0 348,830
ligature uni179317B6 2 2 0 763,830
ligature uni179317C5 1 2 0 348,830
ligature uni179317C5 2 2 0 348,830
ligature uni179417B6 1 2 0 372,830
ligature uni179417B6 2 2 0 776,830
ligature uni179417B6.high 1 2 0 372,830
ligature uni179417B6.high 2 2 0 776,830
ligature uni179417C5 1 2 0 372,830
ligature uni179417C5 2 2 0 372,830
ligature uni179417C5.high 1 2 0 372,830
ligature uni179417C5.high 2 2 0 372,830
ligature uni179517B6 1 2 0 351,878
ligature uni179517B6 2 2 0 775,878
ligature uni179517C5 1 2 0 351,878
ligature uni179517C5 2 2 0 351,878
ligature uni179617B6 1 2 0 343,830
ligature uni179617B6 2 2 0 751,830
ligature uni179617C5 1 2 0 343,830
ligature uni179617C5 2 2 0 343,830
ligature uni179717B6 1 2 0 336,830
ligature uni179717B6 2 2 0 738,830
ligature uni179717C5 1 2 0 336,830
ligature uni179717C5 2 2 0 336,830
ligature uni179817B6 1 2 0 346,830
ligature uni179817B6 2 2 0 768,830
ligature uni179817C5 1 2 0 346,830
ligature uni179817C5 2 2 0 346,830
ligature uni179917B6 1 2 0 645,830
ligature uni179917B6 2 2 0 1053,830
ligature uni179917C5 1 2 0 645,830
ligature uni179917C5 2 2 0 645,830
ligature uni179A17B6 1 2 0 204,830
ligature uni179A17B6 2 2 0 476,830
ligature uni179A17C5 1 2 0 204,830
ligature uni179A17C5 2 2 0 204,830
ligature uni179B17B6 1 2 0 618,830
ligature uni179B17B6 2 2 0 1041,830
ligature uni179B17C5 1 2 0 618,830
ligature uni179B17C5 2 2 0 618,830
ligature uni179C17B6 1 2 0 203,878
ligature uni179C17B6 2 2 0 476,878
ligature uni179C17C5 1 2 0 203,878
ligature uni179C17C5 2 2 0 203,878
ligature uni179D17B6 1 2 0 354,830
ligature uni179D17B6 2 2 0 756,830
ligature uni179D17C5 1 2 0 354,830
ligature uni179D17C5 2 2 0 354,830
ligature uni179E17B6 1 2 0 346,830
ligature uni179E17B6 2 2 0 768,830
ligature uni179E17C5 1 2 0 346,830
ligature uni179E17C5 2 2 0 346,830
ligature uni179F17B6 1 2 0 647,830
ligature uni179F17B6 2 2 0 1041,830
ligature uni179F17C5 1 2 0 647,830
ligature uni179F17C5 2 2 0 647,830
ligature uni17A017B6 1 2 0 666,830
ligature uni17A017B6 2 2 0 1059,830
ligature uni17A017C5 1 2 0 666,830
ligature uni17A017C5 2 2 0 666,830
ligature uni17A117B6 1 2 0 651,830
ligature uni17A117B6 2 2 0 1014,830
ligature uni17A117C5 1 2 0 651,830
ligature uni17A117C5 2 2 0 651,830
ligature uni17A217B6 1 2 0 360,849
ligature uni17A217B6 2 2 0 768,830
ligature uni17A217C5 1 2 0 360,830
ligature uni17A217C5 2 2 0 360,830
ligature uni17D2178317B6 1 2 0 371,830
ligature uni17D2178317B6 2 2 0 371,830
ligature uni17D2178317B6.low 1 2 0 371,830
ligature uni17D2178317B6.low 2 2 0 371,830
ligature uni17D2178317C5 1 2 0 39,958
ligature uni17D2178317C5 2 2 0 39,958
ligature uni17D2178317C5.low 1 2 0 39,958
ligature uni17D2178317C5.low 2 2 0 39,958
ligature uni17D2178817B6 1 2 0 371,830
ligature uni17D2178817B6 2 2 0 371,830
ligature uni17D2178817B6.low 1 2 0 371,830
ligature uni17D2178817B6.low 2 2 0 371,830
ligature uni17D2178817C5 1 2 0 -1,843
ligature uni17D2178817C5 2 2 0 -1,843
ligature uni17D2178817C5.low 1 2 0 -1,843
ligature uni17D2178817C5.low 2 2 0 -1,843
ligature uni17D2178D17B6 1 2 0 354,830
ligature uni17D2178D17B6 2 2 0 354,830
ligature uni17D2178D17B6.low 1 2 0 354,830
ligature uni17D2178D17B6.low 2 2 0 354,830
ligature uni17D2178D17C5 1 2 0 -1,843
ligature uni17D2178D17C5 2 2 0 -1,843
ligature uni17D2178D17C5.low 1 2 0 -1,843
ligature uni17D2178D17C5.low 2 2 0 -1,843
ligature uni17D2179417B6 1 2 0 343,830
ligature uni17D2179417B6 2 2 0 343,830
ligature uni17D2179417B6.low 1 2 0 343,830
ligature uni17D2179417B6.low 2 2 0 343,830
ligature uni17D2179417C5 1 2 0 -1,843
ligature uni17D2179417C5 2 2 0 -1,843
ligature uni17D2179417C5.low 1 2 0 -1,843
ligature uni17D2179417C5.low 2 2 0 -1,843
ligature uni17D2179917B6 1 2 0 341,830
ligature uni17D2179917B6 2 2 0 341,830
ligature uni17D2179917B6.low 1 2 0 347,830
ligature uni17D2179917B6.low 2 2 0 347,830
ligature uni17D2179917C5 1 2 0 -1,843
ligature uni17D2179917C5 2 2 0 -1,843
ligature uni17D2179917C5.low 1 2 0 -1,843
ligature uni17D2179917C5.low 2 2 0 -1,843
ligature uni17D2179E17B6 1 2 0 343,830
ligature uni17D2179E17B6 2 2 0 341,830
ligature uni17D2179E17B6.low 1 2 0 343,830
ligature uni17D2179E17B6.low 2 2 0 341,830
ligature uni17D2179E17C5 1 2 0 -1,843
ligature uni17D2179E17C5 2 2 0 -1,843
ligature uni17D2179E17C5.low 1 2 0 -1,843
ligature uni17D2179E17C5.low 2 2 0 -1,843
ligature uni17D2179F17B6 1 2 0 341,830
ligature uni17D2179F17B6 2 2 0 346,830
ligature uni17D2179F17B6.low 1 2 0 341,830
ligature uni17D2179F17B6.low 2 2 0 346,830
ligature uni17D2179F17C5 1 2 0 -1,843
ligature uni17D2179F17C5 2 2 0 -1,843
ligature uni17D2179F17C5.low 1 2 0 -1,843
ligature uni17D2179F17C5.low 2 2 0 -1,843
lookup end
lookup 8 mark to mark
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
MarkAttachmentType 1
mark uni17B7 0 -310,684
mark uni17B7.r 0 -224,684
mark uni17B717CD 0 -310,684
mark uni17B717CD.r 0 -224,684
mark uni17B8 0 -310,684
mark uni17B8.r 0 -224,684
mark uni17B9 0 -310,684
mark uni17B9.r 0 -224,684
mark uni17BA 0 -310,684
mark uni17BA.r 0 -224,684
mark uni17C6 0 -310,694
mark uni17C6.r 0 -310,684
mark uni17C9 0 -310,684
mark uni17C9.r 0 -310,684
mark uni17CA 0 -310,684
mark uni17CA.r 0 -310,684
mark uni17CA.r.c0 0 -250,684
mark uni17CB 0 -297,684
mark uni17CB.r 0 -257,733
mark uni17CC 0 -310,684
mark uni17CC.r 0 -310,684
mark uni17CD 0 -310,684
mark uni17CD.r 0 -310,684
mark uni17CE 0 -310,684
mark uni17CE.r 0 -77,684
mark uni17CF 0 -310,689
mark uni17CF.r 0 -309,689
mark uni17B717CE 0 -310,684
mark uni17BA17CE 0 -310,684
mark uni17BA17CE.r 0 -310,684
mark uni17CA17B7 0 -310,684
mark uni17CA17B8 0 -310,684
mark uni17CA17B8.r 0 -310,684
mark uni17CA17B9 0 -310,684
mark uni17CA17BA 0 -310,684
mark uni17CA17C6 0 -310,684
mark uni17CA17CE 0 -310,684
mark uni17CA17D0 0 -310,684
mark uni17D017CE 0 -310,684
mark uni17C917B8 0 -310,684
mark uni17C917BA 0 -310,684
mark uni17C917CE 0 -310,684
mark uni17D0 0 -310,701
mark uni17D1 0 -297,674
mark uni17D1.r 0 -298,674
mark uni17D3 0 -297,694
mark uni17D3.r 0 -297,694
mark uni17DD 0 -310,684
mark uni17DD.r 0 -320,684
base uni17B7 0 -310,947
base uni17B7.r 0 -224,947
base uni17B717CD 0 -310,969
base uni17B717CD.r 0 -224,969
base uni17B8 0 -310,982
base uni17B8.r 0 -224,982
base uni17B9 0 -310,952
base uni17B9.r 0 -224,982
base uni17BA 0 -310,982
base uni17BA.r 0 -224,982
base uni17C9 0 -310,910
base uni17C9.a 0 -297,950
base uni17C9.r 0 -310,950
base uni17CA 0 -310,830
base uni17CA.r 0 -310,830
base uni17CA.r.c0 0 -310,830
base uni17CB 0 -297,889
base uni17CB.r 0 -257,918
base uni17CC 0 -310,994
base uni17CC.r 0 -310,994
base uni17CD 0 -310,936
base uni17CD.r 0 -310,936
base uni17CE 0 -310,963
base uni17CE.r 0 -77,963
base uni17CF 0 -310,970
base uni17CF.r 0 -309,970
base uni17B717CE 0 -310,940
base uni17BA17CE 0 -310,940
base uni17BA17CE.r 0 -310,940
base uni17CA17B7 0 -310,940
base uni17CA17B8 0 -310,940
base uni17CA17B8.r 0 -310,940
base uni17CA17B9 0 -310,950
base uni17CA17BA 0 -310,986
base uni17CA17C6 0 -310,978
base uni17CA17CE 0 -310,919
base uni17CA17D0 0 -310,948
base uni17D017CE 0 -310,934
base uni17C917B8 0 -310,950
base uni17C917BA 0 -310,950
base uni17C917CE 0 -310,940
base uni17D0 0 -310,969
base uni17D1 0 -298,870
base uni17D1.r 0 -299,870
lookup end
lookup 9 mark to base
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17C6 0 -310,694
mark uni17C6.r 0 -310,684
base uni1787 0 364,843
base uni178A 0 354,797
base uni1790 0 360,842
base uni1795 0 351,830
base uni17B6 0 70,830
lookup end
lookup 10 mark to ligature
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17C6 0 -310,694
mark uni17C6.r 0 -310,684
ligature uni17A4 1 2 0 360,849
ligature uni17A4 2 2 0 768,830
ligature uni178017B6 1 2 0 354,830
ligature uni178017B6 2 2 0 756,830
ligature uni178117B6 1 2 0 354,830
ligature uni178117B6 2 2 0 750,830
ligature uni178217B6 1 2 0 354,830
ligature uni178217B6 2 2 0 756,830
ligature uni178317B6 1 2 0 668,830
ligature uni178317B6 2 2 0 1044,830
ligature uni178417B6 1 2 0 341,830
ligature uni178417B6 2 2 0 767,830
ligature uni178517B6 1 2 0 355,830
ligature uni178517B6 2 2 0 775,830
ligature uni178617B6 1 2 0 350,830
ligature uni178617B6 2 2 0 775,830
ligature uni178717B6 1 2 0 364,830
ligature uni178717B6 2 2 0 776,830
ligature uni178717C5 1 2 0 364,830
ligature uni178717C5 2 2 0 351,869
ligature uni178817B6 1 2 0 939,830
ligature uni178817B6 2 2 0 1369,830
ligature uni178917B6 1 2 0 633,830
ligature uni178917B6 2 2 0 1079,830
ligature uni178917B6.a 1 2 0 634,830
ligature uni178917B6.a 2 2 0 1079,830
ligature uni178A17B6 1 2 0 354,830
ligature uni178A17B6 2 2 0 756,830
ligature uni178A17C5 1 2 0 354,830
ligature uni178A17C5 2 2 0 354,797
ligature uni178B17B6 1 2 0 345,830
ligature uni178B17B6 2 2 0 768,830
ligature uni178C17B6 1 2 0 341,830
ligature uni178C17B6 2 2 0 751,830
ligature uni178D17B6 1 2 0 700,830
ligature uni178D17B6 2 2 0 1064,830
ligature uni178E17B6 1 2 0 657,830
ligature uni178E17B6 2 2 0 1360,830
ligature uni178F17B6 1 2 0 355,830
ligature uni178F17B6 2 2 0 757,830
ligature uni179017B6 1 2 0 360,842
ligature uni179017B6 2 2 0 775,842
ligature uni179017C5 1 2 0 360,842
ligature uni179017C5 2 2 0 351,919
ligature uni179117B6 1 2 0 318,830
ligature uni179117B6 2 2 0 730,830
ligature uni179217B6 1 2 0 365,830
ligature uni179217B6 2 2 0 775,830
ligature uni179317B6 1 2 0 348,830
ligature uni179317B6 2 2 0 763,830
ligature uni179417B6 1 2 0 372,830
ligature uni179417B6 2 2 0 776,830
ligature uni179417B6.high 1 2 0 372,830
ligature uni179417B6.high 2 2 0 776,830
ligature uni179517B6 1 2 0 351,878
ligature uni179517B6 2 2 0 775,878
ligature uni179617B6 1 2 0 343,830
ligature uni179617B6 2 2 0 751,830
ligature uni179717B6 1 2 0 336,830
ligature uni179717B6 2 2 0 738,830
ligature uni179817B6 1 2 0 346,830
ligature uni179817B6 2 2 0 768,830
ligature uni179917B6 1 2 0 645,830
ligature uni179917B6 2 2 0 1053,830
ligature uni179A17B6 1 2 0 204,830
ligature uni179A17B6 2 2 0 476,830
ligature uni179B17B6 1 2 0 618,830
ligature uni179B17B6 2 2 0 1041,830
ligature uni179C17B6 1 2 0 203,878
ligature uni179C17B6 2 2 0 476,878
ligature uni179D17B6 1 2 0 354,830
ligature uni179D17B6 2 2 0 756,830
ligature uni179E17B6 1 2 0 346,830
ligature uni179E17B6 2 2 0 768,830
ligature uni179F17B6 1 2 0 647,830
ligature uni179F17B6 2 2 0 1041,830
ligature uni17A017B6 1 2 0 666,830
ligature uni17A017B6 2 2 0 1059,830
ligature uni17A117B6 1 2 0 651,830
ligature uni17A117B6 2 2 0 1014,830
ligature uni17A217B6 1 2 0 360,849
ligature uni17A217B6 2 2 0 768,830
ligature uni17D2178317B6 1 2 0 371,830
ligature uni17D2178317B6 2 2 0 371,830
ligature uni17D2178317B6.low 1 2 0 371,830
ligature uni17D2178317B6.low 2 2 0 371,830
ligature uni17D2178817B6 1 2 0 371,830
ligature uni17D2178817B6 2 2 0 371,830
ligature uni17D2178817B6.low 1 2 0 371,830
ligature uni17D2178817B6.low 2 2 0 371,830
ligature uni17D2178D17B6 1 2 0 354,830
ligature uni17D2178D17B6 2 2 0 354,830
ligature uni17D2178D17B6.low 1 2 0 354,830
ligature uni17D2178D17B6.low 2 2 0 354,830
ligature uni17D2179417B6 1 2 0 343,830
ligature uni17D2179417B6 2 2 0 343,830
ligature uni17D2179417B6.low 1 2 0 343,830
ligature uni17D2179417B6.low 2 2 0 343,830
ligature uni17D2179917B6 1 2 0 341,830
ligature uni17D2179917B6 2 2 0 341,830
ligature uni17D2179917B6.low 1 2 0 347,830
ligature uni17D2179917B6.low 2 2 0 347,830
ligature uni17D2179E17B6 1 2 0 343,830
ligature uni17D2179E17B6 2 2 0 341,830
ligature uni17D2179E17B6.low 1 2 0 343,830
ligature uni17D2179E17B6.low 2 2 0 341,830
ligature uni17D2179F17B6 1 2 0 341,830
ligature uni17D2179F17B6 2 2 0 346,830
ligature uni17D2179F17B6.low 1 2 0 341,830
ligature uni17D2179F17B6.low 2 2 0 346,830
lookup end
lookup 11 mark to ligature
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17C9 0 -310,684
mark uni17C9.r 0 -310,684
ligature uni179A17B6 1 2 0 476,830
ligature uni179A17B6 2 2 0 476,830
ligature uni179C17B6 1 2 0 476,878
ligature uni179C17B6 2 2 0 476,878
lookup end
lookup 12 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 562
lookup end
lookup 13 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 863
lookup end
lookup 14 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 512
lookup end
lookup 15 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 412
lookup end
lookup 16 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 607
lookup end
lookup 17 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17D0 455
lookup end
lookup 18 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
y placement uni17B7 226
y placement uni17B8 226
y placement uni17B9 226
y placement uni17BA 226
y placement uni17CE 226
lookup end
lookup 19 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
y placement uni17BB -244
y placement uni17BC -244
y placement uni17BD -244
lookup end
lookup 20 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17C9.r -20
lookup end
lookup 21 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni1789.a
uni178A
uni178B
uni178C
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179B
uni179D
uni179E
uni179F
uni17A2
uni17A7
uni17AA
uni17AB
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni1789.a
uni178A
uni178B
uni178C
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179B
uni179D
uni179E
uni179F
uni17A2
uni17A7
uni17AA
uni17AB
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni1789.a
uni178A
uni178B
uni178C
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179B
uni179D
uni179E
uni179F
uni17A2
uni17A7
uni17AA
uni17AB
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni1789.a
uni178A
uni178B
uni178C
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179B
uni179D
uni179E
uni179F
uni17A2
uni17A7
uni17AA
uni17AB
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni1789.a
uni178A
uni178B
uni178C
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179B
uni179D
uni179E
uni179F
uni17A2
uni17A7
uni17AA
uni17AB
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,12
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni178E
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni178E
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni178E
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni178E
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni178E
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,13
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni178D
uni17A0
uni17A1
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni178D
uni17A0
uni17A1
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni178D
uni17A0
uni17A1
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni178D
uni17A0
uni17A1
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni178D
uni17A0
uni17A1
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,14
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni179A
uni179C
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,15
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni17AC
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni17AC
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17AC
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni17AC
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni17AC
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,16
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni17A4
uni178017B6
uni178117B6
uni178217B6
uni178317B6
uni178417B6
uni178517B6
uni178617B6
uni178717B6
uni178817B6
uni178917B6
uni178A17B6
uni178B17B6
uni178C17B6
uni178D17B6
uni178E17B6
uni178F17B6
uni179017B6
uni179117B6
uni179217B6
uni179317B6
uni179417B6
uni179417B6.high
uni179517B6
uni179617B6
uni179717B6
uni179817B6
uni179917B6
uni179A17B6
uni179B17B6
uni179C17B6
uni179D17B6
uni179E17B6
uni179F17B6
uni17A017B6
uni17A117B6
uni17A217B6
uni17D2178317B6
uni17D2178317B6.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179F17B6
uni17D2179F17B6.low
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179A
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
subtable end
backtrackcoverage definition begin
uni17BB
coverage definition end
backtrackcoverage definition begin
uni17A4
uni178017B6
uni178117B6
uni178217B6
uni178317B6
uni178417B6
uni178517B6
uni178617B6
uni178717B6
uni178817B6
uni178917B6
uni178A17B6
uni178B17B6
uni178C17B6
uni178D17B6
uni178E17B6
uni178F17B6
uni179017B6
uni179117B6
uni179217B6
uni179317B6
uni179417B6
uni179417B6.high
uni179517B6
uni179617B6
uni179717B6
uni179817B6
uni179917B6
uni179A17B6
uni179B17B6
uni179C17B6
uni179D17B6
uni179E17B6
uni179F17B6
uni17A017B6
uni17A117B6
uni17A217B6
uni17D2178317B6
uni17D2178317B6.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179F17B6
uni17D2179F17B6.low
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
subtable end
backtrackcoverage definition begin
uni17A4
uni178017B6
uni178117B6
uni178217B6
uni178317B6
uni178417B6
uni178517B6
uni178617B6
uni178717B6
uni178817B6
uni178917B6
uni178A17B6
uni178B17B6
uni178C17B6
uni178D17B6
uni178E17B6
uni178F17B6
uni179017B6
uni179117B6
uni179217B6
uni179317B6
uni179417B6
uni179417B6.high
uni179517B6
uni179617B6
uni179717B6
uni179817B6
uni179917B6
uni179A17B6
uni179B17B6
uni179C17B6
uni179D17B6
uni179E17B6
uni179F17B6
uni17A017B6
uni17A117B6
uni17A217B6
uni17D2178317B6
uni17D2178317B6.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179F17B6
uni17D2179F17B6.low
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni17A4
uni178017B6
uni178117B6
uni178217B6
uni178317B6
uni178417B6
uni178517B6
uni178617B6
uni178717B6
uni178817B6
uni178917B6
uni178A17B6
uni178B17B6
uni178C17B6
uni178D17B6
uni178E17B6
uni178F17B6
uni179017B6
uni179117B6
uni179217B6
uni179317B6
uni179417B6
uni179417B6.high
uni179517B6
uni179617B6
uni179717B6
uni179817B6
uni179917B6
uni179A17B6
uni179B17B6
uni179C17B6
uni179D17B6
uni179E17B6
uni179F17B6
uni17A017B6
uni17A117B6
uni17A217B6
uni17D2178317B6
uni17D2178317B6.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179F17B6
uni17D2179F17B6.low
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
subtable end
backtrackcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni17A4
uni178017B6
uni178117B6
uni178217B6
uni178317B6
uni178417B6
uni178517B6
uni178617B6
uni178717B6
uni178817B6
uni178917B6
uni178A17B6
uni178B17B6
uni178C17B6
uni178D17B6
uni178E17B6
uni178F17B6
uni179017B6
uni179117B6
uni179217B6
uni179317B6
uni179417B6
uni179417B6.high
uni179517B6
uni179617B6
uni179717B6
uni179817B6
uni179917B6
uni179A17B6
uni179B17B6
uni179C17B6
uni179D17B6
uni179E17B6
uni179F17B6
uni17A017B6
uni17A117B6
uni17A217B6
uni17D2178317B6
uni17D2178317B6.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179F17B6
uni17D2179F17B6.low
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage 1,17
lookup end
lookup 22 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni17C9
coverage definition end
inputcoverage definition begin
uni17D0
coverage definition end
lookaheadcoverage definition begin
uni17C7
coverage definition end
coverage
subtable end
backtrackcoverage definition begin
uni17C9
coverage definition end
backtrackcoverage definition begin
uni178017B6
uni178017C5
uni178117B6
uni178117C5
uni178217B6
uni178217C5
uni178317B6
uni178317C5
uni178417B6
uni178417C5
uni178517B6
uni178517C5
uni178617B6
uni178617C5
uni178717B6
uni178717C5
uni178817B6
uni178817C5
uni178917B6
uni178917C5
uni178A17B6
uni178A17C5
uni178B17B6
uni178B17C5
uni178C17B6
uni178C17C5
uni178D17B6
uni178D17C5
uni178E17B6
uni178E17C5
uni178F17B6
uni178F17C5
uni179017B6
uni179017C5
uni179117B6
uni179117C5
uni179217B6
uni179217C5
uni179317B6
uni179317C5
uni179417B6
uni179417B6.high
uni179417C5
uni179417C5.high
uni179517B6
uni179517C5
uni179617B6
uni179617C5
uni179717B6
uni179717C5
uni179817B6
uni179817C5
uni179917B6
uni179917C5
uni179A17B6
uni179A17C5
uni179B17B6
uni179B17C5
uni179C17B6
uni179C17C5
uni179D17B6
uni179D17C5
uni179E17B6
uni179E17C5
uni179F17B6
uni179F17C5
uni17A017B6
uni17A017C5
uni17A117B6
uni17A117C5
uni17A217B6
uni17A217C5
uni17D2178317B6
uni17D2178317B6.low
uni17D2178317C5
uni17D2178317C5.low
uni17D2178817B6
uni17D2178817B6.low
uni17D2178817C5
uni17D2178817C5.low
uni17D2178D17B6
uni17D2178D17B6.low
uni17D2178D17C5
uni17D2178D17C5.low
uni17D2179417B6
uni17D2179417B6.low
uni17D2179417C5
uni17D2179417C5.low
uni17D2179917B6
uni17D2179917B6.low
uni17D2179917C5
uni17D2179917C5.low
uni17D2179E17B6
uni17D2179E17B6.low
uni17D2179E17C5
uni17D2179E17C5.low
uni17D2179F17B6
uni17D2179F17B6.low
uni17D2179F17C5
uni17D2179F17C5.low
coverage definition end
inputcoverage definition begin
uni17CE
coverage definition end
coverage 1,18
subtable end
backtrackcoverage definition begin
uni17C5.right
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
inputcoverage definition begin
uni17CE
coverage definition end
coverage 1,18
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni17C9
coverage definition end
inputcoverage definition begin
uni17B7
uni17B8
uni17B9
uni17BA
coverage definition end
coverage 1,18
lookup end
lookup 23 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
inputcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21783
uni17D21783.low
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21788
uni17D21788.low
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178A.r
uni17D2178B
uni17D2178C
uni17D2178D
uni17D2178D.low
uni17D2178E
uni17D2178E.alt
uni17D2178F
uni17D2178F.r
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21794
uni17D21794.low
uni17D21795
uni17D21796
uni17D21797
uni17D21797.r
uni17D21798
uni17D21798.r
uni17D21799
uni17D21799.low
uni17D2179A
uni17D2179A.low
uni17D2179B
uni17D2179C
uni17D2179D
uni17D2179E
uni17D2179E.low
uni17D2179F
uni17D2179F.low
uni17D217A0
uni17D217A1
uni17D217A2
uni17D217A7
uni17D217AB
uni17D217AC
uni17D217AF
coverage definition end
lookaheadcoverage definition begin
uni17B7
uni17B8
uni17B9
uni17BA
uni17D0
coverage definition end
coverage 1,19
lookup end
lookup 24 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni179C17C5
coverage definition end
inputcoverage definition begin
uni17C9.r
coverage definition end
coverage 1,20
lookup end
lookup 25 mark to base
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures yes
IgnoreMarks no
mark uni17BB 0 -310,0
mark uni17BB.b 0 -462,16
mark uni17BC 0 -310,0
mark uni17BC.b 0 -412,16
mark uni17BD 0 -310,0
mark uni17BD.b 0 -400,16
mark uni17D21780 0 -318,16
mark uni17D21781 0 -318,16
mark uni17D21782 0 -317,16
mark uni17D21784 0 -317,16
mark uni17D21785 0 -331,16
mark uni17D21786 0 -350,16
mark uni17D21787 0 -303,16
mark uni17D21789 0 -325,16
mark uni17D2178A 0 -317,16
mark uni17D2178A.r 0 -196,16
mark uni17D2178B 0 -304,16
mark uni17D2178C 0 -318,16
mark uni17D2178E 0 -622,16
mark uni17D2178E.alt 0 -763,16
mark uni17D2178F 0 -318,16
mark uni17D2178F.r 0 -196,16
mark uni17D21790 0 -333,16
mark uni17D21791 0 -325,16
mark uni17D21792 0 -318,16
mark uni17D21793 0 -323,16
mark uni17D21795 0 -318,16
mark uni17D21796 0 -318,16
mark uni17D21797 0 -344,16
mark uni17D21797.r 0 -222,16
mark uni17D21798 0 -310,16
mark uni17D21798.r 0 -178,16
mark uni17D2179B 0 -318,16
mark uni17D2179C 0 -319,16
mark uni17D2179D 0 -318,16
mark uni17D217A0 0 -318,16
mark uni17D217A2 0 -322,16
mark uni17D217A7 0 -318,16
mark uni17D217AB 0 -330,16
mark uni17D217AC 0 -330,16
mark uni17D217AF 0 -285,16
mark uni17D217AB.low 0 -330,16
mark uni17D217AC.low 0 -330,16
mark uni17D217AF.low 0 -285,16
base uni1780 0 354,244
base uni1781 0 354,244
base uni1782 0 354,244
base uni1783 0 666,244
base uni1784 0 363,244
base uni1785 0 367,244
base uni1786 0 361,244
base uni1787 0 374,244
base uni1788 0 981,244
base uni1789 0 522,0
base uni1789.a 0 695,244
base uni178A 0 354,244
base uni178B 0 365,244
base uni178C 0 354,244
base uni178D 0 695,244
base uni178E 0 655,244
base uni178F 0 354,244
base uni1790 0 373,244
base uni1791 0 334,244
base uni1792 0 374,244
base uni1793 0 354,244
base uni1794 0 356,244
base uni1794.a 0 374,204
base uni1794.a2 0 374,204
base uni1795 0 365,244
base uni1796 0 348,244
base uni1797 0 336,244
base uni1798 0 356,244
base uni1799 0 667,244
base uni179A 0 204,244
base uni179B 0 656,244
base uni179C 0 210,244
base uni179D 0 354,244
base uni179E 0 356,244
base uni179F 0 662,244
base uni17A0 0 677,244
base uni17A1 0 627,5
base uni17A2 0 345,244
base uni17A3 0 345,244
base uni17A5 0 358,244
base uni17A7 0 354,214
base uni17AA 0 317,220
base uni17D21783 0 -48,-20
base uni17D21788 0 -39,-18
base uni17D21794 0 -28,5
base uni17D21799 0 -32,0
base uni17D2179E 0 -38,5
base uni17D2179F 0 -32,0
base uni17D217A1 0 -51,-239
base uni25CC 0 325,244
lookup end
lookup 26 mark to ligature
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17BB 0 -310,0
mark uni17BB.b 0 -462,16
mark uni17BC 0 -310,0
mark uni17BC.b 0 -412,16
mark uni17BD 0 -310,0
mark uni17BD.b 0 -400,16
mark uni17D21780 0 -318,16
mark uni17D21781 0 -318,16
mark uni17D21782 0 -317,16
mark uni17D21784 0 -317,16
mark uni17D21785 0 -331,16
mark uni17D21786 0 -350,16
mark uni17D21787 0 -303,16
mark uni17D21789 0 -325,16
mark uni17D2178A 0 -317,16
mark uni17D2178A.r 0 -196,16
mark uni17D2178B 0 -304,16
mark uni17D2178C 0 -318,16
mark uni17D2178E 0 -622,16
mark uni17D2178E.alt 0 -763,16
mark uni17D2178F 0 -318,16
mark uni17D2178F.r 0 -196,16
mark uni17D21790 0 -333,16
mark uni17D21791 0 -325,16
mark uni17D21792 0 -318,16
mark uni17D21793 0 -323,16
mark uni17D21795 0 -318,16
mark uni17D21796 0 -318,16
mark uni17D21797 0 -344,16
mark uni17D21797.r 0 -222,16
mark uni17D21798 0 -310,16
mark uni17D21798.r 0 -178,16
mark uni17D2179B 0 -318,16
mark uni17D2179C 0 -319,16
mark uni17D2179D 0 -318,16
mark uni17D217A0 0 -318,16
mark uni17D217A2 0 -322,16
mark uni17D217A7 0 -318,16
mark uni17D217AB 0 -330,16
mark uni17D217AC 0 -330,16
mark uni17D217AF 0 -285,16
mark uni17D217AB.low 0 -330,16
mark uni17D217AC.low 0 -330,16
mark uni17D217AF.low 0 -285,16
ligature uni17A4 1 2 0 345,244
ligature uni17A4 2 2 0 690,244
ligature uni178017B6 1 2 0 354,244
ligature uni178017B6 2 2 0 678,244
ligature uni178017C5 1 2 0 354,244
ligature uni178017C5 2 2 0 678,244
ligature uni178117B6 1 2 0 354,244
ligature uni178117B6 2 2 0 672,244
ligature uni178117C5 1 2 0 354,244
ligature uni178117C5 2 2 0 672,244
ligature uni178217B6 1 2 0 354,244
ligature uni178217B6 2 2 0 678,244
ligature uni178217C5 1 2 0 354,244
ligature uni178217C5 2 2 0 678,244
ligature uni178317B6 1 2 0 666,244
ligature uni178317B6 2 2 0 966,244
ligature uni178317C5 1 2 0 666,244
ligature uni178317C5 2 2 0 966,244
ligature uni178417B6 1 2 0 363,244
ligature uni178417B6 2 2 0 689,244
ligature uni178417C5 1 2 0 363,244
ligature uni178417C5 2 2 0 689,244
ligature uni178517B6 1 2 0 367,244
ligature uni178517B6 2 2 0 697,244
ligature uni178517C5 1 2 0 367,244
ligature uni178517C5 2 2 0 697,244
ligature uni178617B6 1 2 0 361,244
ligature uni178617B6 2 2 0 697,244
ligature uni178617C5 1 2 0 361,244
ligature uni178617C5 2 2 0 697,244
ligature uni178717B6 1 2 0 374,244
ligature uni178717B6 2 2 0 698,244
ligature uni178717C5 1 2 0 374,244
ligature uni178717C5 2 2 0 698,244
ligature uni178817B6 1 2 0 981,244
ligature uni178817B6 2 2 0 1291,244
ligature uni178817C5 1 2 0 981,244
ligature uni178817C5 2 2 0 1291,244
ligature uni178917B6 1 2 0 522,0
ligature uni178917B6 2 2 0 1001,0
ligature uni178917C5 1 2 0 522,0
ligature uni178917C5 2 2 0 1001,0
ligature uni178917B6.a 1 2 0 695,244
ligature uni178917B6.a 2 2 0 1001,244
ligature uni178917C5.a 1 2 0 695,244
ligature uni178917C5.a 2 2 0 1001,244
ligature uni178A17B6 1 2 0 354,244
ligature uni178A17B6 2 2 0 678,244
ligature uni178A17C5 1 2 0 354,244
ligature uni178A17C5 2 2 0 678,244
ligature uni178B17B6 1 2 0 365,244
ligature uni178B17B6 2 2 0 690,244
ligature uni178B17C5 1 2 0 365,244
ligature uni178B17C5 2 2 0 690,244
ligature uni178C17B6 1 2 0 354,244
ligature uni178C17B6 2 2 0 673,244
ligature uni178C17C5 1 2 0 354,244
ligature uni178C17C5 2 2 0 673,244
ligature uni178D17B6 1 2 0 695,244
ligature uni178D17B6 2 2 0 986,244
ligature uni178D17C5 1 2 0 695,244
ligature uni178D17C5 2 2 0 986,244
ligature uni178E17B6 1 2 0 655,244
ligature uni178E17B6 2 2 0 1282,244
ligature uni178E17C5 1 2 0 655,244
ligature uni178E17C5 2 2 0 1282,244
ligature uni178F17B6 1 2 0 354,244
ligature uni178F17B6 2 2 0 679,244
ligature uni178F17C5 1 2 0 354,244
ligature uni178F17C5 2 2 0 679,244
ligature uni179017B6 1 2 0 373,244
ligature uni179017B6 2 2 0 697,244
ligature uni179017C5 1 2 0 373,244
ligature uni179017C5 2 2 0 697,244
ligature uni179117B6 1 2 0 324,244
ligature uni179117B6 2 2 0 652,244
ligature uni179117C5 1 2 0 324,244
ligature uni179117C5 2 2 0 652,244
ligature uni179217B6 1 2 0 374,244
ligature uni179217B6 2 2 0 697,244
ligature uni179217C5 1 2 0 374,244
ligature uni179217C5 2 2 0 697,244
ligature uni179317B6 1 2 0 354,244
ligature uni179317B6 2 2 0 685,244
ligature uni179317C5 1 2 0 354,244
ligature uni179317C5 2 2 0 685,244
ligature uni179417B6 1 2 0 374,204
ligature uni179417B6 2 2 0 698,204
ligature uni179417B6.high 1 2 0 374,204
ligature uni179417B6.high 2 2 0 698,204
ligature uni179417C5 1 2 0 374,204
ligature uni179417C5 2 2 0 698,204
ligature uni179417C5.high 1 2 0 374,204
ligature uni179417C5.high 2 2 0 698,204
ligature uni179517B6 1 2 0 375,244
ligature uni179517B6 2 2 0 697,244
ligature uni179517C5 1 2 0 375,244
ligature uni179517C5 2 2 0 697,244
ligature uni179617B6 1 2 0 348,244
ligature uni179617B6 2 2 0 673,244
ligature uni179617C5 1 2 0 348,244
ligature uni179617C5 2 2 0 673,244
ligature uni179717B6 1 2 0 336,244
ligature uni179717B6 2 2 0 660,244
ligature uni179717C5 1 2 0 336,244
ligature uni179717C5 2 2 0 660,244
ligature uni179817B6 1 2 0 356,244
ligature uni179817B6 2 2 0 690,244
ligature uni179817C5 1 2 0 356,244
ligature uni179817C5 2 2 0 690,244
ligature uni179917B6 1 2 0 667,244
ligature uni179917B6 2 2 0 975,244
ligature uni179917C5 1 2 0 667,244
ligature uni179917C5 2 2 0 975,244
ligature uni179A17B6 1 2 0 204,244
ligature uni179A17B6 2 2 0 398,244
ligature uni179A17C5 1 2 0 204,244
ligature uni179A17C5 2 2 0 398,244
ligature uni179B17B6 1 2 0 656,244
ligature uni179B17B6 2 2 0 963,244
ligature uni179B17C5 1 2 0 656,244
ligature uni179B17C5 2 2 0 963,244
ligature uni179C17B6 1 2 0 204,244
ligature uni179C17B6 2 2 0 398,244
ligature uni179C17C5 1 2 0 204,244
ligature uni179C17C5 2 2 0 398,244
ligature uni179D17B6 1 2 0 354,244
ligature uni179D17B6 2 2 0 678,244
ligature uni179D17C5 1 2 0 354,244
ligature uni179D17C5 2 2 0 678,244
ligature uni179E17B6 1 2 0 366,244
ligature uni179E17B6 2 2 0 690,244
ligature uni179E17C5 1 2 0 366,244
ligature uni179E17C5 2 2 0 690,244
ligature uni179F17B6 1 2 0 662,244
ligature uni179F17B6 2 2 0 963,244
ligature uni179F17C5 1 2 0 662,244
ligature uni179F17C5 2 2 0 963,244
ligature uni17A017B6 1 2 0 687,244
ligature uni17A017B6 2 2 0 981,244
ligature uni17A017C5 1 2 0 687,244
ligature uni17A017C5 2 2 0 981,244
ligature uni17A117B6 1 2 0 621,5
ligature uni17A117B6 2 2 0 930,5
ligature uni17A117C5 1 2 0 621,5
ligature uni17A117C5 2 2 0 930,2
ligature uni17A217B6 1 2 0 345,244
ligature uni17A217B6 2 2 0 690,244
ligature uni17A217C5 1 2 0 345,244
ligature uni17A217C5 2 2 0 690,244
ligature uni17D2178317B6 1 2 0 -49,-20
ligature uni17D2178317B6 2 2 0 -48,-20
ligature uni17D2178317C5 1 2 0 -48,-20
ligature uni17D2178317C5 2 2 0 -48,-20
ligature uni17D2178817B6 1 2 0 -39,-18
ligature uni17D2178817B6 2 2 0 -39,-18
ligature uni17D2178817C5 1 2 0 -39,-18
ligature uni17D2178817C5 2 2 0 -39,-18
ligature uni17D2178D17B6 1 2 0 -39,-18
ligature uni17D2178D17B6 2 2 0 -39,-18
ligature uni17D2178D17C5 1 2 0 -39,-18
ligature uni17D2178D17C5 2 2 0 -39,-18
ligature uni17D2179417B6 1 2 0 -28,5
ligature uni17D2179417B6 2 2 0 -28,5
ligature uni17D2179417C5 1 2 0 -28,5
ligature uni17D2179417C5 2 2 0 -28,5
ligature uni17D2179917B6 1 2 0 -32,0
ligature uni17D2179917B6 2 2 0 -32,0
ligature uni17D2179917C5 1 2 0 -32,0
ligature uni17D2179917C5 2 2 0 -32,0
ligature uni17D2179E17B6 1 2 0 -28,5
ligature uni17D2179E17B6 2 2 0 -28,5
ligature uni17D2179E17C5 1 2 0 -28,5
ligature uni17D2179E17C5 2 2 0 -28,5
ligature uni17D2179F17B6 1 2 0 -32,0
ligature uni17D2179F17B6 2 2 0 -32,0
ligature uni17D2179F17C5 1 2 0 -32,0
ligature uni17D2179F17C5 2 2 0 -32,0
lookup end
lookup 27 mark to mark
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
MarkAttachmentType 2
mark uni17BB 0 -310,0
mark uni17BB.b 0 -462,16
mark uni17BC 0 -310,0
mark uni17BC.b 0 -412,16
mark uni17BD 0 -310,0
mark uni17BD.b 0 -400,16
mark uni17D21780 0 -318,16
mark uni17D21781 0 -318,16
mark uni17D21782 0 -317,16
mark uni17D21784 0 -317,16
mark uni17D21785 0 -331,16
mark uni17D21786 0 -350,16
mark uni17D21787 0 -303,16
mark uni17D21789 0 -325,16
mark uni17D2178A 0 -317,16
mark uni17D2178A.r 0 -196,16
mark uni17D2178B 0 -304,16
mark uni17D2178C 0 -318,16
mark uni17D2178E 0 -622,16
mark uni17D2178E.alt 0 -763,16
mark uni17D2178F 0 -318,16
mark uni17D2178F.r 0 -196,16
mark uni17D21790 0 -333,16
mark uni17D21791 0 -325,16
mark uni17D21792 0 -318,16
mark uni17D21793 0 -323,16
mark uni17D21795 0 -318,16
mark uni17D21796 0 -318,16
mark uni17D21797 0 -344,16
mark uni17D21797.r 0 -222,16
mark uni17D21798 0 -310,16
mark uni17D21798.r 0 -178,16
mark uni17D2179B 0 -318,16
mark uni17D2179C 0 -319,16
mark uni17D2179D 0 -318,16
mark uni17D217A0 0 -318,16
mark uni17D217A2 0 -322,16
mark uni17D217A7 0 -318,16
mark uni17D217AB 0 -330,16
mark uni17D217AC 0 -330,16
mark uni17D217AF 0 -285,16
mark uni17D217AB.low 0 -330,16
mark uni17D217AC.low 0 -330,16
mark uni17D217AF.low 0 -285,16
base uni17D2 0 -297,-24
base uni17D21780 0 -317,-244
base uni17D21781 0 -320,-244
base uni17D21782 0 -317,-244
base uni17D21784 0 -331,-244
base uni17D21785 0 -331,-244
base uni17D21786 0 -335,-244
base uni17D21787 0 -303,-244
base uni17D21789 0 -304,-244
base uni17D21789.a 0 -522,-251
base uni17D2178A 0 -319,-244
base uni17D2178A.r 0 -196,-244
base uni17D2178B 0 -295,-244
base uni17D2178C 0 -318,-244
base uni17D2178E 0 -620,-244
base uni17D2178E.alt 0 -620,-244
base uni17D2178F 0 -315,-244
base uni17D2178F.r 0 -196,-244
base uni17D21790 0 -328,-244
base uni17D21791 0 -312,-244
base uni17D21792 0 -297,-248
base uni17D21793 0 -297,-261
base uni17D21795 0 -318,-244
base uni17D21796 0 -318,-244
base uni17D21797 0 -344,-244
base uni17D21797.r 0 -222,-244
base uni17D21798 0 -310,-244
base uni17D21798.r 0 -178,-244
base uni17D2179B 0 -314,-234
base uni17D2179C 0 -318,-244
base uni17D2179D 0 -318,-244
base uni17D217A0 0 -317,-244
base uni17D217A2 0 -322,-244
base uni17D217A7 0 -318,-244
lookup end
lookup 28 mark to base
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures yes
IgnoreMarks no
mark uni17D2178E 0 -699,10
base uni179F 0 441,244
lookup end
lookup 29 mark to base
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures yes
IgnoreMarks no
mark uni17D21789.a 0 -522,22
base uni1789.a 0 519,244
lookup end
lookup 30 mark to ligature
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
mark uni17D21789.a 0 -522,22
ligature uni178917B6.a 1 2 0 519,244
ligature uni178917B6.a 2 2 0 519,244
ligature uni178917C5.a 1 2 0 519,244
ligature uni178917C5.a 2 2 0 519,244
lookup end
lookup 31 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
y placement uni17BB -244
y placement uni17BC -244
y placement uni17BD -244
lookup end
lookup 32 single
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
x placement uni17BB 152
x placement uni17BC 102
x placement uni17BC.b 34
x placement uni17BD 90
x placement uni17BD.b 30
lookup end
lookup 33 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni179E
uni179F
uni17A0
uni17A2
uni17D2179E
uni17D2179F
uni200D
coverage definition end
inputcoverage definition begin
uni17BB
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
coverage 1,31
subtable end
inputcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
lookaheadcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21783
uni17D21783.low
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21788
uni17D21788.low
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178A.r
uni17D2178B
uni17D2178C
uni17D2178D
uni17D2178D.low
uni17D2178E
uni17D2178E.alt
uni17D2178F
uni17D2178F.r
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21794
uni17D21794.low
uni17D21795
uni17D21796
uni17D21797
uni17D21797.r
uni17D21798
uni17D21798.r
uni17D21799
uni17D21799.low
uni17D2179A
uni17D2179A.low
uni17D2179B
uni17D2179C
uni17D2179D
uni17D2179E
uni17D2179E.low
uni17D2179F
uni17D2179F.low
uni17D217A0
uni17D217A1
uni17D217A2
uni17D217A7
uni17D217AB
uni17D217AC
uni17D217AF
coverage definition end
lookaheadcoverage definition begin
uni17B7
uni17B8
uni17B9
uni17BA
uni17D0
coverage definition end
coverage 1,31
lookup end
lookup 34 chained
RightToLeft no
IgnoreBaseGlyphs no
IgnoreLigatures no
IgnoreMarks no
backtrackcoverage definition begin
uni1781
uni1791
coverage definition end
inputcoverage definition begin
uni17BC.b
uni17BD.b
coverage definition end
coverage 1,32
subtable end
backtrackcoverage definition begin
uni17D21780
uni17D21781
uni17D21782
uni17D21784
uni17D21785
uni17D21786
uni17D21787
uni17D21789
uni17D21789.a
uni17D2178A
uni17D2178B
uni17D2178C
uni17D2178E
uni17D2178F
uni17D21790
uni17D21791
uni17D21792
uni17D21793
uni17D21795
uni17D21796
uni17D21797
uni17D21798
uni17D2179B
uni17D2179C
uni17D217A0
uni17D217A2
coverage definition end
backtrackcoverage definition begin
uni1780
uni1781
uni1782
uni1783
uni1784
uni1785
uni1786
uni1787
uni1788
uni1789
uni178A
uni178B
uni178C
uni178D
uni178E
uni178F
uni1790
uni1791
uni1792
uni1793
uni1794
uni1795
uni1796
uni1797
uni1798
uni1799
uni179A
uni179B
uni179C
uni179D
uni179E
uni179F
uni17A0
uni17A1
uni17A2
uni17A3
uni17A4
coverage definition end
backtrackcoverage definition begin
uni17D2179A.low
coverage definition end
inputcoverage definition begin
uni17BB
uni17BC
uni17BD
coverage definition end
coverage 1,32
lookup end
| the_stack | {'hexsha': 'cb168975eb5d44845aed9345f7581657d09fcea5', 'size': '76154', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'src/NotoSansKhmerUI/Noto Sans Khmer UI 190-100 GPOS.txt', 'max_stars_repo_name': 'Mystic-Mirage/noto-source', 'max_stars_repo_head_hexsha': '90cd7f7593cab139630209d4d81da17b24637878', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '125', 'max_stars_repo_stars_event_min_datetime': '2019-04-19T06:44:24.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-23T08:21:32.000Z', 'max_issues_repo_path': 'src/NotoSansKhmerUI/Noto Sans Khmer UI 190-100 GPOS.txt', 'max_issues_repo_name': 'Mystic-Mirage/noto-source', 'max_issues_repo_head_hexsha': '90cd7f7593cab139630209d4d81da17b24637878', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '121', 'max_issues_repo_issues_event_min_datetime': '2019-06-29T17:05:17.000Z', 'max_issues_repo_issues_event_max_datetime': '2022-03-26T21:28:10.000Z', 'max_forks_repo_path': 'src/NotoSansKhmerUI/Noto Sans Khmer UI 190-100 GPOS.txt', 'max_forks_repo_name': 'Mystic-Mirage/noto-source', 'max_forks_repo_head_hexsha': '90cd7f7593cab139630209d4d81da17b24637878', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '54', 'max_forks_repo_forks_event_min_datetime': '2019-05-15T15:14:20.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-24T10:53:25.000Z', 'avg_line_length': '18.4481589147', 'max_line_length': '43', 'alphanum_fraction': '0.7936024372', 'original_id': '6cea25c95bf2da40844129b277f54e6db03c5f049048c6bf8e0e874c55c1db58'} |
TweetFollow Us on Twitter
Assembly Tutorial
Volume Number:5
Issue Number:12
Column Tag:Assembly Lab
Assembly Language for the Rest of Us
By Jeffrey B. Kane, MD, Boston, MA
Introduction and Purpose
I’ve always found that it’s the little things in life that hang me up. The grandiose projects somehow seem to fall in place, but when I want to do a simple project, using only obvious facts, I find that those facts must be so obvious, no one has bothered to write them down.
Most people who program do so to create little tools. As an engineer or scientist might we write our code in a high level language like Pascal, C, Fortran, or LISP in order to efficiently read and debug our code (especially with tools from people like Think Technologies and Coral Software). Once the code is up and running, we may notice that one of our procedures, lets say one that crunches a lot of numbers using SANE1, is taking up most of the processing time. By rewriting this one part of the program we can speed things up dramatically, often 10 times or more!
This article is about assembly language. It’s not about writing a lightening fast game or a new version of Excel™, rather it’s about using the minimum amount of programing we can get away with in order to write a short but useful little bit of code. Neither is it about writing a stand alone program in assembly, but instead we will take a program written in Pascal and rewrite just one of it’s procedures in assembly language, so the entire program can run much faster.
What we will do
In this article will recode a small subroutine whose mission in life is to take an array and multiply each of it’s elements by a scalar constant. Although the program is not the most dramatic use of assembly language, and the code we write will not be the most elegant, hopefully it will be clear and easy to understand2. We will be illustrating the steps needed to interface any code with a running Pascal program. I chose to make use of the 68881 floating point processor3 in our program, not to add complexity, but to illustrate how easy it is to use this chip. Motorola has made the 68881 appear simply to be an extension of the 68000 CPU4. To the programmer the combination of a 68000 and a 68881 appear as a souped up 68000, just like the basic version but turbocharged for numeric speed with a few more instructions and registers added to it. If you don’t have this chip the same principles of programing apply. You would simply replace the 68881 instructions with a few more 68000 instructions, but the programing logic would be the same.
MPW Assembler, LSP, and MDS
I will be using LightSpeed Pascal® to develop our main Pascal program. As I explained above the basic program creates an array, then multiplies each number within the array by a constant. LightSpeed is a great product for writing quick and dirty programs, since you can debug and observe your variables as you go. It even has an assembly level debugger built right in, so if you want to peek at the actual memory to see exactly what your instructions are doing, you can. This is a great way to learn the simple and predictable way each line in your program will effect memory.
We will also be using Macsbug™, a source level debugger that should be available either from your local computer dealer5, most user groups, bulletin boards, and/or commercial language products (including LightSpeed). With Macsbug we can look at everything the Mac is doing, while it follows our assembly language instructions as they execute, one line at a time. Tracing our code as it executes will make it clear that each instruction has very predictable and simple results (Remember that if a compressed piece of sand called the 68000 can understand what these instructions mean, so can you!).
Finally we will be using the assembler built into the MPW shell6 (version 2.02). Consulair also makes a stand alone Assembler that was the standard of the industry7.
In this article we will assume8 that you know a what a bit is (0 or 1), that 8 bits are stored in a byte, that 16 bits make up a word, and finally that 32 bits make up a long word9. We also assume that have some idea of what a hexadecimal number is10.
The Pascal Code
First lets take a look at the Pascal Code:
element = PACKED RECORD
empty : integer;
n : extended;
vector = ARRAY[0..19] OF element;
matrix = RECORD
rows : integer;
columns : integer;
vecPtr : ^vector
inVect : vector;
outVect : vector;
i : integer;
inMatrix, outMatrix : matrix;
scalar : extended;
error : integer;
FUNCTION ScaleMult (scalar : extended; VAR inMat, outMat : matrix)
: integer;
scalar := 35;
inMatrix.rows := 0;
inMatrix.columns := 19;
inMatrix.VecPtr := @inVect;
outMatrix.rows := 0;
outMatrix.columns := 19;
outMatrix.VecPtr := @outVect;
writeln(‘scalar = ‘, scalar);
writeln(‘scalar, inMatrix, outMatrix, error, inVect’);
write(longint(@scalar), longint(@inMatrix), longint(@outMatrix),
FOR i := 0 TO 19 DO
inVect[i].empty := 255;
inVect[i].n := i;
error := ScaleMult(scalar, inMatrix, outMatrix);
writeln(‘error = ‘, error);
FOR i := 0 TO 19 DO
writeln(i:5, inVect[i].n:10, outVect[i].n:10);
writeln(‘scalar = ‘, scalar);
writeln(‘The End...’);
In this article, we will rewrite the function ScaleMult in assembly language. From our perspective, all that Pascal does is hand our assembly language program the information in the form we declared in the interface statement. Since we have declared our subroutine as a function, our responsibility will be to return a result to Pascal, also in the form we declared. Pascal does not care how we perform our task, only that we get it done.
The first unusual item that you may notice is our definition of an element. In most programming, numbers with decimal places in them are defined as “real” numbers. An example of a real number would be 3.14159 or “3.14159 E+0”. The last part, “E+0” means that we will multiply our number “3.14159” times ten raised to the the zero power (which is equal to one). We could have simply written the number as 3.14159 and Pascal would have interpreted it the same way. If the number contained “E+1' then we would have multiplied our base number by ten raised to the first power (or 10), or we could have written the equivalent real number as 31.4159. Similarly “E+3” would have meant multiplying by 103 (or 1000) and been equivalent to 3,141.59. SANE uses a more accurate form of the real number, called an extended number. The extended format can hold more decimal places than a real number, and it can also raise a number to a larger power than a real number (a real number can run between ±3.4E+38 and ±1.2E-38, whereas extended numbers can (approximately) extend from ±1.1E+4932 and ±1.7E-4932, with more decimal places stored for each number). All of those extra decimal places translate into more accuracy as we do our calculations.
In our program we have defined an element to be:
empty : integer;
n : extended;
Instead of just holding an extended number, our element has an integer (which is empty) placed in front of it. We have done this to provide for the difference between the way SANE and the 68881 handle extended numbers. Although we will explain the reasoning below (it’s actually not hard to understand), for now simply consider each Element of the array as an extended Format number.
Basic Assembly Language
Now lets take a look at our assembly language function:
MC68881; We will be using
; instructions for
; the 68881 chip
MACHINE MC68020 ; optimize for the
; 68020, if you don’t
; have one remove
; this line
; this lets the rest
; of the world know
; about our function
_Debugger OPWORD $A9FF ; this will pop us
; into Macs bugs so
; we can follow every
; instruction and
; observe the
; registers
; The following are all displacements so we
; can address our data on the stack, relative
; to the address stored in A6
result EQU 20 ; two bytes for our
; integer result
Scalar EQU 16 ; 4 bytes (address of
; the scalar)
inMat EQU 12; 4 bytes (address of
; the input Matrix)
outMat EQU 8
; 4 bytes (address of
; the output Matrix)
ReturnAdd EQU 4 ; 4 bytes
superScalar EQU -12
; 12 bytes (hold a
; place for our 68881
; version of the
; scalar)
oldA2 EQU -14 ; old the old value
; of A2
oldA3 EQU -16 ; old the old value
;of A3
; *** Add the following features (to make
; this a “real” program):
; 1) make sure the number of
;rows and columns in the input ;
Matrix jives with that of the ; the output matrix.
;2) Fix the error message to
;tell the Pascal Program if
;there was a problem, such as
;if: rows X columns vector
; ***** The first “real” line of our program ;
(it’s about time!)
_Debugger; jump into Macsbugs
; so we can follow
; what’s going on
; move all the initial parameters off the
; stack from the calling routine “function
; ScaleMult (scalar:extended;var inMatrix,
; outMatrix:matrix) :error”
link A6,#-12 ; push A6 (the frame
; pointer) onto the
; stack , load SP
; into A6, then
; subtract off 12
; bytes from A7 to
; make room for our
; variables
; after the link instruction
; the stack looks as follows:
; high
;integer (2 bytes)
;------------ <- 20(A6)
scalar (4 bytes)
;------------ <- 16(A6)
;inMatrix (4 bytes)
;------------ <- 12(A6)
;oldMatrix (4 bytes)
;------------ <- 8(A6)
;returnAddress (4 bytes)
;------------ <- 4(A6)
;old A6 (4 bytes)
;------------ <- (A6)
; superscalar (12 bytes)
;------------ <- -12(A6)
; and initial (A7)
; now move the addresses onto the chip so we
; can work with them
MOVE.L A2,-(A7); push A2 onto the
; stack to save it
MOVE.L A3,-(A7); do the same to A3
MOVE.L inMat(A6),A2
; get the pointer to
; the address of
; inMatrix
MOVE.L 4(A2),AØ ; get the address of
; the input matrix
; (4 bytes from the
; start of our matrix
; data structure )
MOVE.L outMat(A6),A2
MOVE.L 4(A2),A1; get the address of
; the output matrix
MOVE.L inMat(A6),A2 ; get the number of
; rows (first byte of
; Matrix record)
MOVE.W 2(A2),D1; then get the number
; of columns (3rd
; byte of matrix
; record
MOVE.L scalar(A6),A2
; we will now move
; the scalar to a
; place with a bit
; more room
LEA superScalar(A6),A3
CLR.W (A3)+
MOVE.L (A2)+,(A3)+ ; move the first 4
; bytes
MOVE.L (A2)+,(A3)+; move the next 4
; bytes
MOVE.W (A2),(A3); move the last byte
LEA superScalar(A6),A2
MOVE.L (A2),D2 ; get the top
; long-word of
; the scalar, shift
; it, then put it
; back
LSL.L #8,D2
LSL.L #8,D2
MOVE.L D2,(A2)
FMOVE.X(A2),FP1; get the modified
; scalar and store it
; on the 68881
Loop MOVE.L(AØ),D2; get the current
; high Long word of
; the element from
; the input matrix
LSL.L #8,D2
LSL.L #8,D2
FMOVE.X(AØ),FP0; get the current
; element
FMUL.X FP1,FP0 ; multiply by the
; scalar
FMOVE.XFP0,(A1) ; put the element
; back in RAM
MOVE.L (A1),D2 ; now shift the high
; Long word back (in
; the output
; matrix,and then put
; it away in RAM
LSR.L #8,D2
LSR.L #8,D2
MOVE.L D2,(A1)
MOVE.L (AØ),D2 ; now shift the high
; Long word back (in
; the input matrix)
; and then put it
; away
LSR.L #8,D2
LSR.L #8,D2
ADD #12,AØ; increment the
; element’s address
; (to get the next
; element)
ADD #12,A1
DBLT D1,Loop ; decrement the
; number of columns
; and test
; if we are here we have gone through one
; column
MOVE.L inMat(A6),A2
MOVE.W 2(A2),D1; restore the number
; of columns
DBLT DØ,Loop ; test if we have
; completed through
; all the rows
; if we are here, we have gone through all
; the rows
; since we have done our work let’s put away
; our toys (clear the stack of all the
; garbage) and go home.
MOVE.L (A7)+,A3 ; pop off the old A3
MOVE.L (A7)+,A2 ; pop off the old A2
MOVE.L (A7)+,A0 ; save the return
; address
ADD.L #12,A7 ; move the stack
; pointer clear all
; the data off the
; stack
CLR.W (A7); replace the return
; value on the stack
; with ours
; ** NOTE: we are pushing a value of zero
; onto the stack, meaning that nothing went
; wrong. This is bogus and in the real
; version we need to fix this!
MOVE.L AØ,-(A7); push the return
; address back onto
; the stack
RTS ; return to reality
; (our calling
; program)
The 68000 Instructions:
First of all the basics. Anything after a semicolon (“ ; ”) is a comment and not a command. Our Assembler will ignore all comments, just as if they had never been typed in. Each line of code has three basic parts11. If you look at the code you can see that it seems to be divided into three columns. The first column begins with the first character of each new line and is called a label. Labels are used so we can refer to that line of code from within our program. Anything in the second column is an instruction for the 68000 (or the 68881). Anything in the third column tells the chip how (and where) to execute that instruction.
A couple of the instructions that appear at the beginning of the program are actually instructions for the Assembler12 and not the chip. The instruction “EQU” as in “ReturnAdd EQU 4” tells the Assembler to substitute the number “4” every time it sees the label “ReturnAdd” in our code. We could have written the number 4 in ourselves, but using the label “ReturnAdd” makes our code a lot more understandable13. FUNC tells the Assembler that this is the name of a function. The word EXPORT tells it to let the rest of the world know that a function exists by the name “ScaleMult” and where that function can be found. MC68881 states that we will be using some of the 68881 instructions (otherwise our Assembler would say we must be making a mistake when we try to use them). MACHINE MC68020 lets the Assembler use instructions that are available only on the 68020 chip on a Mac II. The MPW Assembler will replace some of our instructions with it’s own if it sees a faster way of doing the same thing. This is called optimizing the code. If you are not running with a 68020 delete this line. OPWORD is similar to EQU except that it lets us define a new instruction by its numeric equivalent, whereas EQU lets us define a constant used by the instruction. ENDF and END signal that we are finished writing our function and code, respectively.
The 68000 chip has several registers for holding numbers. These can be thought of as Mail Box slots if you will. A mail box can either hold a parcel (your data) or a slip telling you where your parcel is (an address). Our registers take 32 bit numbers and hold them on the chip. Eight slots (or “registers”) hold simple data. Another eight registers hold 32 bit addresses (see Figure 1). Address are simply numbers that tell the Mac which byte in the memory holds your data. 0 is the first byte in RAM, 1 is the second, etc. Remember that both Data and the Address registers hold simple 32 bit numbers. These registers are referred to as D0, D1, , D7 for the data and A0, A1, , A7 for the Addresses. To manipulate numbers on the computer we simply move a number from RAM, into one of these registers, do what we want to it, then put it back. The fact that the 68000 CPU has so many registers on the chip means that we don’t have to swap back and forth between RAM and the chip nearly as often as you had to on older chips. Our basic command for moving data around is “MOVE” (doesn’t that make sense?).
Figure 1.
To get a number that is stored in the 128th byte of RAM, and move it to register D1 on our chip would simply write “MOVE 128,D1” (see Figure 2). To actually place the number 68 into register D1 we would say “MOVE #68,D1” (see Figure 3). The symbol “ # ” means to take the number and use it literally, versus using the number as the address of our data, as we showed in Figure 2.
Putting the name of a register in parentheses means to use the address stored within that register to find our data. This is shown in Figure 4. The same instruction without the parentheses means to use the contents of the register directly, as shown in Figure 5.
Figure 2. MOVE 128, D1 (get the data from memory location 128)
Figure 3. MOVE #68, D1 (put 68 in register D1)
Figure 4. MOVE (A1), D! (register A1 contains the address of our data)
Figure 5. Move A1, D1 (register A1 contains the data)
Figure 6. How Numbers Are Stored in the 68000 Registers
Basic 68881 Commands
Notice that many of the instructions have suffixes attached to them, such as MOVE.W or MOVE.L (and MOVE.B). These simply tell the 68000 what size number we are moving, “.B” for a Byte (8 bits long), “.W” for a Word (16 bits long and the default if you forget to specify a suffix), or finally “.L” for a Long word (or 32 bits). Some of the Floating Point instructions specify a “.X” which tells the 68881 to move three long words (or the 96 bits it takes to specify an extended number). The “.X” extension is only understood by the 68881, so if you added it to a 68000 instruction, the CPU would not know what you where talking about. When we move different size numbers onto the chip they are always placed so that bit zero is aligned all the way to the right. Thus the three numbers would be stored as in Figure 9.
The instruction FMOVE works the same way as MOVE, but allows you to move numbers to and from the 68881 coprocessor chip. By using the suffix “.X” (as in FMOVE.X) we can tell the coprocessor that you are manipulating a 96 bit extended number, although “.L”, “.W”, “.B” will also work if you are referring to these quantities. The 68881 FPP has 8 registers of it’s own (FP0 to FP7), each with enough room to store an extended number.
Figure 7. How numbers are stored in RAM
Bits and Bytes
I am not going to go over a lengthy explanation of bits, bytes, or how to convert between decimal numbers and hexadecimal numbers (since these are just different ways of writing the same number). There are many good books on these kinds of basics, and they are referred to in the appendix [1-3].
The 68000 stores numbers in memory in the same way that you would read them from a piece of paper. It starts at a low memory address and writes the number, starting with the most significant digit and going to the least significant digit. If another number is to be written, it will repeat the sequence. Thus if I was going to store the number $38240193 at memory location 128, and then store the number $42310000 in the next highest position (which would start at memory location 132) the memory would appear as in Figure 7.
The stack is a key concept to writing assembly language. The best example of a stack are those old plate stackers that we all remember from the school cafeteria. If you imagine that each plate is a number, you simply place the next “plate” on the stack, piling them up as you go. If you need a plate, you simply pop it off the top. The 68000 uses the same concept to store numbers. To define a stack you first pick where in memory you want to start. This starting address is usually placed in register A6 (this is simply a convention and we could just as easily stashed it in A4 or any other register). We then place a number on the stack (we call this pushing the number onto the stack) by simply writing the number into memory, using the memory location pointed to by register A6. The next thing we want to keep track of is the end of our stack. We can do this using another one of our registers, A7. If we just added 2 bytes to the stack by pushing our number , then we need to adjust register A7 to point to the next free byte of memory, or in other words, the end of the stack.
What if we want to take the top number off of the stack? A7 points to the top, so we get our number, move it somewhere else, then change A7 to point to the new top of the stack. Using this system we can push numbers onto the top of the stack, and pop them off at will. This type of memory arrangement is called a Last In/First Out system, since the last number we pushed onto the stack is the First number we have available to pop off again.
Most computer systems use the stack as a method of storing numbers. The only little twist to the way the Macintosh handles a stack is that instead of starting at a low memory address and working higher, the Macintosh starts at a High memory address and works downward, toward lower memory. This twist doesn’t change the way we work with the stack. If we decide that we want to start our stack at memory address 128, we store 128 in register A6 and then set A7 to point to the end of the stack, which in this case is also 128. We now want to add a 4 bytes number onto the stack ,such as $32411000. We simply subtract 4 from the address in A7 (or 128 - 4 = 124), and Move our 4 byte number to RAM, starting at address 124. This is accomplished with the command “MOVE.L #$32411000,-(A7)”. If we look at the RAM, starting at address 124 we will now see the number $32411000.
Take a close look at the instruction we just issued. By appending .L to the MOVE command we have told the assembler that we are moving a long word, which is by definition 4 bytes long (or 32 bits). The #$32411000 portion used tells the 68000 to use the number $32411000 literally. Finally the command “-(A7)” does something special. It tells the 68000 to subtract the length of our longword, 4, from the address stored in A7, and place the resulting address back in A7. It also does this before it executes the MOVE instruction, so our number gets moved to address 124 instead of 128. This leaves 124 in A7 when we are finished so our stack pointer now points to the end of the stack again. We call this kind of addressing “Predecrement Indirect”. Don’t worry about what this mode of addressing is called, just take note of what it does. The fact that the 68000 can do these kinds of instructions in one step makes life very simple for us. The 68000 can also do the converse operation. Lets say we want to remove our number and store it in RAM starting at address 200. We will then issue the command “MOVE.L (A7)+, 200”. Again the suffix “.L” tells us that we are dealing with a 4 byte longword. Note that if we used “.W” instead the 68000 would do the same calculation, but know that we were talking about moving a (2 byte) word instead. Our original command, MOVE.L, will get the 4 byte number, starting at the memory location pointed to by register A7, and move that number to memory address 200. After it is done, it will add 4 to the address stored in register A7 so that A7 now contains 124+4 or 128, which is the top of the stack again. This type of addressing is called Postincrement Indirect. We have just successfully pushed a 4 byte number onto the stack, and then popped it off again, all the time keeping register A7 pointing to the end of the stack.
We can use this algorithm to push many numbers onto the stack, one after another. This is exactly what a Pascal program does when it calls your assembly language subroutine. It pushes all the variables it is going to hand you onto the stack, and then jumps to your routine. Since we know the kinds of numbers that the main program will pass to us, we can pop them off, do our calculation, push our result back onto the stack, then jump back to the main program. We will talk more about actually doing this a little later.
More Instructions
Let’s look at a few more Assembly language instructions. The instruction CLR (which stands for Clear) will put all zeros at an address. Thus “CLW.W 128” will put 2 bytes worth of zeros starting at address 128. CLW.L (A1) will store 4 bytes worth of zeros at the address stored in register A1. CLW.B D1 will fill the 1st byte of register D1 with zeros.
The instruction ADD will do what it’s name would suggest. “ADD.L D1,D2” will add the two long words stored in registers D1 and D2 and store the result in D2. “ADD.W (A1)+,D1” will get a number from memory, stored at the address contained in A1. It will then add that number to the number stored in D1. The final result is stored in D1. The fact that we wrote “(A1)+” means that after it completes all of this addition, it will increase the address stored in A1 by 2 (since we specified .W). This is very useful if we are adding a bunch of numbers to D1 and they are stored in memory one after another starting at the address in A1. After we execute our “ADD (A1)+,D1” command, A1 now automatically points to the next number in memory. This command, when placed in a simple loop, is a powerful way to add many numbers.
Figure 8. The Macintosh Stack
Another use for this type of addressing to move a range of bytes from one part of RAM to another. If we store the beginning address of our data in A1, and the address of the place we want to move it to in A2, by repeatedly calling “MOVE.L (A1)+, (A2)+” we move our data from (A1) to (A2) in RAM, afterwards both the addresses stored in A1 and A2 are automatically incremented by 4, so we are ready to move the next long word. Nifty, isn’t it?
The commands LSR and LSL stand for Logical Shift Right and Logical Shift Left. What they do is move each bit in memory to the right or left a certain number of places. The bits that fall off the end disappear14, and the places that we leave empty are replaced by zeros. An example of a Logical Shift Left is shown in Figure 9. “LSL.L #5,D1” will shift the binary number stored in register D1 to the left 5 places by pushing zeros onto the right. A LSR instruction works in the converse fashion
Figure 9. LSR #5, D1
LSR and LSL will become important later on when we want to quickly manipulate our numbers. The next instruction that we use a bit is LEA which stands for Load Effective Address. An example might be “LEA Scalar(A6),A2”. This instruction calculates the address using the code 16(A6) and stores that address in register A2 (remember that we had defined the label Scalar to be the same as the number 16). Note that it doesn’t go to the address, just calculates what it should be. Unfortunately you probably don’t know what 16(A6) would be, but it is not hard to figure out. We take the address stored in register A6 (lets say it’s our old friend 128 again) and add 16 to it. Take the result (128 + 16 = 144) and put it in A2. We can now use the address in A2 for other instructions. This type of instruction is good if we know we want a number stored 16 bytes away from some base address, and that base address will be given to us later. When we get that base address, we can store it in A6 and use our LEA instruction to find the address of our data. Many times we will know the form a bunch of data, i.e. an integer is stored first, then a real number, then a pointer to an array (i.e. the address of some other data), but we won’t know exactly where this data is going to be in RAM. LEA lets us get the beginning of our data and calculate where everything else should be.
The final instruction that we need to look closely at are the LINK and UNLK instructions (i.e. “LINK A6,#-12” & “UNLK A6”). If you remember when we were talking about stacks, we said we would remember the beginning address of the stack by putting it in register A6. The technique of beginning your stack at A6 is called stack frames. The way it works is as follows: The main Pascal program has it’s own stack. It pushes all of the data it needs to give your subroutine on it’s stack. Finally it pushes a return address onto the stack (so you know which instruction to return to when you’re done executing your code), and then jumps to your assembly code. You dutifully save the return address by popping it off the stack and moving it someplace safe. You then pop all of the data off the stack and are ready to go.
Figure 10. The Stack After LINK
At this point you most likely want to create your own stack, and the best place is right at the end of the main program’s stack. The first thing you do is save the old value of A6 that marks the beginning of Pascal’s programs stack. A great way to store this value is to push it right onto the stack. Take the new value of A7 (the address that we are going to use as the base of our new stack) and store that in A6. We are now ready to go. A6 and A7 both point to the beginning of our stack. We then increment the stack pointer (A7) to make room for any storage space that you might want to use. As we push and pop values to and from our stack we will adjust A7 appropriately with the predecrementing and postincrementing commands that we discussed. These steps are illustrated in Figure 10. All of the steps necessary to create a stack frame are contained in the LINK instruction. The instruction “LINK A6, #-12” will first push A6 onto the stack after decreasing A7 by 4 (since an address is a long word of 4 bytes). The new new value of A7 is copied into A6, since that will be the base of our new stack. Finally the stack pointer A7 is decremented by 12 bytes to make room for new data that we might want to store there. In this case we decremented the stack by 12 since, if you remember, our stack grows downward in memory. Decreasing A7 by 12 leaves room for 12 new bytes of storage space (which would be just enough room for us to stash a 96 bit extended number in the 68881 format!).
The nice thing about having A6 point to the beginning of our stack is that when we are ready to jump back to the main program we can take A6 and copy it into A7. That maneuver has just made our stack pointer point to the bottom of our stack frame. We then pop the old value of A6 off the stack and put it back into register A6, then add 4 to the contents of A7, just like our old friend the “MOVE (A7)+,A6” instruction. We now have returned the stack to it’s state just before we created our stack frame. The 68000 does all of this with another single instruction UNLK. In our case “UNLK A6” will do all of the above steps.
The second nicety of having A6 point to the bottom of our stack frame is that we can easily store our own variables on the stack. Although we do not know in advance where A6 will point, we do know the relative position of our data on the stack. Let’s say one variable will be located 4 bytes before A6, another will be 6 bytes before A6, etc. By using addresses of the form -4(A6) and -6(A6) we can access these variables whenever we need to.
Another advantage of addressing all of our data relative to the stack frame in (A6), is that we don’t necessarily have to waste time moving the variables that we received from our Pascal, off of the stack. Since we know what the stack looks like after we execute our “LINK A6,#-12” instruction (see Figure 10) we know that the pointer to inMat is located 8 bytes prior to (A6), and that outMat will be 12 bytes before (A6). We then use the same form of addressing (e.g. “MOVE.L 12(A6),AØ”) to move outMat to AØ so we can work with it.
In order to quickly manipulate every element in our matrix, we will create a loop that performs our calculation, then repeats itself with the next element in the matrix, until we get to the end. To create a loop and test for a specific condition (so we know when to stop looping) we will use the instruction DBLT (decrement and branch if less than zero). This is one member of a class of instructions written in shorthand as DBcc, where cc is a test. The easiest way to think of this instruction is don’t branch if the condition is true. The instruction works by first testing if the test condition is true, i.e. did we just execute an instruction that resulted in an answer that was less than zero (or in other words a negative number). If the prior instruction created a negative number then don’t branch (which would then leave our loop, just as branching would bring us back to the beginning of our loop), but instead execute the next instruction. Now if the last instruction created a positive number (and thus the test failed) then we decrease the register D1 by one and see if D1 is now less than zero. If it is, then we don’t branch but instead continue on to the next instruction. If neither of these condition are true then round we go again, branching to the beginning of our loop. This instruction has several advantages. First it looks for a specific condition that will end the loop. Failing this, it counts down a register until it is less than zero and then exits the loop.
The last instruction in our program is RTS (Return from Subroutine). This instruction assumes that we have pushed the return address back onto the top of the stack and will jump to that address. If we had stored our return address in AØ we could have accomplished the same feat by using the command “JMP (A0)” (jump to the address stored in register AØ).
SANE vs. the 68881
Although SANE and the 68881 both use the same basic format for an extended number, there is one fundamental difference. In SANE the extended number is 80 bits (10 bytes) long. On the other hand, the 68881 places two bytes of zeros just before the last word in the number (this is illustrated in Figure 11). The 68881 does this because it is more efficient for it to move three long words than to manipulate 2 1/2 long words. We can easily convert back and forth between these formats by grabbing the last word of a SANE extended number and shifting it over 16 spaces to the left (using the LSL instruction). When we want to return the number to SANE we simple shift the top long word of our 68881 extended number back to the right 16 spaces (using LSR)15.
Figure 11. SANE vs. 68881 extended numbers
The interface for a Pascal calling routine
A Pascal program calls a procedure in a very orderly fashion. In our example the procedure that we will write in assembly language is declared to Pascal as:
FUNCTION ScaleMult (scalar : extended;VAR inMat, outMat : matrix) : integer;
Pascal will prepare to call our subroutine by first pushing enough space onto the stack for our result. If our subroutine was declared as a procedure, Pascal would not expect a return value and would skip this step. Following this, Pascal pushes it’s data onto the stack as read from left to right. In our case Pascal would next push a pointer to the variable “scalar”. Pascal pushes a pointer16 to the data if it is declared as a VAR parameter (meaning that the subroutine can change the actual variable), or if the data is larger than four bytes in size17. A pointer to inMat is then pushed onto the stack followed, by a pointer to outMat. Finally the return address is pushed onto the stack and the program then jumps to our subroutine. Pascal cannot do any type checking when it jumps to an assembly language routine. It simply assumes you know what kind of data you are expecting, and that you will place the correct result on the stack (if your routine is a function and not a procedure) when you return to the main program.
Figure 12. The Stack as passed from Pascal
When the Pascal calling routine tries to make space for the return variable (the very first thing we said that Pascal would push onto our stack if it is calling a function) it follows the Pascal rule of pushing the actual variable if it is 4 bytes or less, or, as is the case of our extended variables which is larger than 4 bytes, it pushes a pointer to the variable. We would then use that address to store the result of our functions. When we return to Pascal we would leave the address of our return variable on the stack so the calling Pascal program can remember where to get its result.
In our assembly language program we will remove all the information from the stack, complete our routine, then push an integer (2 bytes) onto the stack as a result. Our final maneuver will be to jump back to the return address that was given to us initially. Figure 12 shows us the stack as it would appear when we initially enter our subroutine.
One point I would like to clarify is this business of Pascal pushing a pointer onto the stack if that variable is more than four bytes long, or if it is declared as a VAR in the interface statement. Figure 13 shows the size of some common variables used in Pascal.
Variable What is passed on the stack
integer 2 bytes
longInt 4 bytes
real 4 bytes
extended 4 byte pointer
to the 10 bytes SANE
extended number
pointer 4 bytes
string 4 bytes pointer0 to your string if it is
over 4 bytes in size) A
string takes up n+1
bytes where n is the
number of characters.
The very first byte tells
you how many
characters are in the
boolean 2 bytes (put your result in the
least significant byte of
the word when you
return to Pascal)
char 2 bytes
anything 4 byte pointer to the variable in RAM
declared as “var”
Figure 13. Size of Pascal Variables Pushed onto the stack
Remember, if we wrote a procedure instead of a function we would leave the stack empty when we returned to the main program. An illuminating example would be if we had declared our function to return an extended number. Since we don’t want to push the entire 10 bytes of data onto the stack we simply store our data at the address supplied by the calling routine. I always considered it courteous of Pascal to take care of the memory for any variables our function needs to return.
In our program, we are returning an integer which is two bytes in size, so we can just push the actual value of the integer onto the stack, and not worry about pointers at all. Remember that Pascal has already made enough room on the stack to hold our integer.
Pascal lets us freely use registers A0, A1, D0, D1, and D2. We can of course use any of the registers on the 68000 chip, just so long as we save the values that are stored there and put them back, before we return to the Pascal environment.
The Code
Now that we understand all the the basic instructions, lets go through our assembly language code. Our program receives three pointers (or addresses) from Pascal. The data is stored at these addresses in SANE extended number format. We take each of these numbers, and shift over the top word so it is in the correct format for the 68881 chip. Next, we move one element of our matrix (from inMat) onto the 68881, along with the scalar, multiply them, then save the result in the output matrix (outMat). We repeat this for all of the numbers in our matrix before returning to the main program. The LINK instruction is used to illustrate how we can make room on the stack for our own variables, easily accessing them relative to the base of the stack. Our funny data structure for an element may make a little more sense now, in light of the above differences between the SANE and 68881 representation of an extended number. Each element of our vector is a record of the form
empty : integer;
n : extended
the empty integer that I have thrown before each SANE extended number takes up one word of space (16 bits). This gives us enough room to change all of our 80 bit SANE extended numbers into the larger 96 bit 68881 format. Because we have this extra room we can store our numbers right back in their array. This may not be important for our simple little program, but if we were doing a lot of math with these numbers, converting back and forth for each mathematical operation would take a lot of time. This way we can convert each element to the 68881 extended format when we start our program and convert them all back to the SANE format when we are finished.
A vector is simply defined as an array of many elements.
vector = ARRAY[0..19] OF element;
matrix = RECORD
rows : integer;
columns : integer;
vecPtr : ^vector
A matrix is a data structure that specifies the number of rows and columns it will contain, followed by a vector that is rows ¥ columns in size. Again, all of this is not strictly needed for our code, but it does illustrate how we can write a general algorithm that would take an matrix of an arbitrary size, do whatever math is needed, and then store the results in a new matrix.
How to Compile and Put the Program Together
I have always hated articles that give you great code18, but then leave you in the lurch as to exactly how they put it all together. I’m going to give instructions for using the MPW compiler, since it already supports the 68881 and 68020 chips.
First of all open the MPW shell and type Command-N to get a fresh document. Type in all of the Assembly code, as it is written (of course you can leave out the comments if you want). Save this document as “ScalarMult.a”. Click on the Worksheet19 and type the Magical incantation “Asm ScalarMult.a” followed by the enter key (or Command- RETURN if you don’t have an enter key on your keyboard). [Please note that the return key and enter key are treated differently in the MPW environment.] If you didn’t make any mistakes then MPW will have just created a file named “ScalarMult.a.o”. If everything worked out alright then quit MPW.
Version 1.11 of LightSpeed Pascal includes a little utility called the “.O converter”; Double click on this icon, then select our assembly code file “ScalarMult.a.o” from the dialog box. After you quit “.O converter”, You will see that we have just created a LightSpeed library file.
Our final chore will be to launch LightSpeed Pascal and open a new project. First get a fresh window up, and type in the Pascal main program. Next go to the “Project” Menu and select “Add Files ”. Add the main program that we just typed in, along with the library file we created from our assembly code. That’s all there is to it!. You can either run the program by typing Command- G (for Go) from within Lightspeed, or elect to build a stand alone program20.
Remember that our procedure will jump into Macsbug as the first instruction, so that we can follow the program. If you don’t have Macsbug in your system folder , remove the instruction “_Debugger” or the computer will bomb with an ID=1 error
In this article, I hope I have introduced enough basic information to let you write an assembly language subroutine. We looked at the basic 68000 instructions, and a few instructions from the 68881 numeric coprocessor ships. As we saw 68881 instructions are easily executed, as if they were part of a souped up 68000 CPU.
We saw how Pascal calls functions and procedures and we created a short assembly language subroutine that could stored it’s own local variables and manipulated them. Finally we looked at how to compile and interface the assembly language using Light Speed Pascal and the MPW assembler. I hope that this introduction lets you see that assembly language is not as intimidating as it looks, and that by selectively rewriting certain Pascal procedures we can realize great increase in the speed of many of our programs, especially those that are calculation intensive.
1. Apples “Standard Apple Numeric Environment” which handles complex math very well, if not a little slowly
2. Note that in many cases we are presenting a simplified picture of what our Assembly language instructions do. If you are an experienced Assembly language programmer, you may note some deviations from fact (i.e. white lies). This is to shield the inexperienced user with unnecessary, complicating details, and will be noted. Come to think of it, if your such a hot shot programmer, why do you need to read this? See any of the books in the reference section for a more complete picture of Assembly Language programing.
3. FPP
4. Central Processing Unit.
5. I know... when you ask the salesman, they’ve never heard of it.
6. Macintosh Programmers Workshop
7. And the only native Mac language system supported by Apple for a long time
8. Yes, I know the “definition” of AssUMe.
9. If you didn’t know it, you do now.
10. A hexadecimal number is a number, similar to our ordinary base 10 counting numbers. Instead of counting from zero to nine (then indicating ten by putting a one in the next significant place, as in 10), in hexadecimal we count from zero to fifteen (representing the numbers ten through fifteen with the symbols A through F). We would then represent the next number, 16, by putting a one in the next significant place as in $10. I will use the “$” sign before any hexadecimal number to you don’t confuse $10 with the decimal number ten. Hexadecimal notation is a convenient way to write numbers when we deal with computers. See any of the books in the reference section for a good review of the subject.
11. Not counting the comments
12. The program that translates our written words into the actual numbers that the 68000 and 68881 understands
13. At least for us humans. The computer prefers numbers and will substitute numbers for all of our words, including the instructions. Oh well to each his own.
14. Not exactly, each bit first goes to a place called a Carry Bit, before it drops off into never never land, but that’s not really important.
15. An even easier way to accomplish the same thing would be to MOVE the last word over, for example using the instruction “MOVE 8(AØ), 1Ø(AØ)”, provided AØ pointed to the beginning of our extended number. You should always follow the above instruction with CLR.W 8(AØ) to ensure that the bit 64 through 80 are zero, just to ensure compatibility with future products.
16. A pointer is simply the address of where our data starts in RAM
17. Note that the pointer given to us actually points to a copy of the variable, known as a “dummy variable”. This will prevent us from accidentally changing the value of the variable in the main program.
18. Don’t worry, I’m not assuming that you have gotten any great code from this article
19. Its the document that doesn’t have a go-away box
20. Of course you could have complied and linked you program totally from within MPW and MPW Pascal, but if you know how to do all of that, you probably didn’t need my help to begin with.
---------- Bibliography ----------
[1] MPW and Assembly Language Programing for the Macintosh, Scott Kronick, Hayden Books, 1987
[2] Programming the Macintosh in Assembly Language, James Coffron, Sybex Inc., 1986
[3] How to Write Macintosh Software, Scott Knaster, Hayden Book Company, 1986
Apple Inc.
Microsoft Corpora
Google Inc.
MacTech Search:
Community Search:
Software Updates via MacUpdate
Apple Configurator 1.5 - Configure and d...
Xcode 5.1 - Integrated development envir...
Geekbench 3.1.5 - Measure processor and...
Apple iOS 7.1 - The latest version of Ap...
DiskCatalogMaker 6.4.9 - Catalog your di...
HoudahSpot 3.8.5 - Advanced front-end fo...
WhiteCap 6.2 - Visual plug-in for iTunes...
calibre 1.27.0 - Complete e-library mana...
Path Finder 6.5.1 - Powerful, award-winn...
iPhoto Library Manager 4.1.5 - Manage mu...
Latest Forum Discussions
See All
Runr Review
Devious Dungeon Review
Smash Hit Review
DiceTris+ Review
Microtrip Review
bookkeep Review
Defenders & Dragons Review
Uncanny Comics Review
Ninja Newton Review
Price Scanner via
New Mac Pro in stock today
Mujjo Introduces Two New Leather Sleeve Case...
Apple refurbished 13-inch MacBook Pros availa...
15-inch Retina MacBook Pros (Apple refurbishe...
Apple Top Smartphone Maker – comScore January...
Unsold Phone 5c Inventories Estimated At Over...
Luck of the iPhone: Stats Reveal iPhone Users...
SecondOpinions Mobile App For iOS and Android...
New Apple Store Display for the iPad mini wit...
Jobs Board
Lead *Apple* Solutions Consultant - Apple (...
Senior Whitebox Quality Assurance Engineer,...
Lead *Apple* Solutions Consultant - Apple (... | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1167', 'language_id_whole_page_fasttext': "{'en': 0.8896868824958801}", 'metadata': "{'Content-Length': '119638', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MPDT47LBIMOWTIN4YINW4RFIP76EK4BK', 'WARC-Concurrent-To': '<urn:uuid:f9cc3cd1-abaa-4d85-9fa2-584b93a4670e>', 'WARC-Date': datetime.datetime(2014, 3, 11, 22, 9, 16), 'WARC-IP-Address': '75.101.132.77', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:KTPK5IZ7QSAZKLYNSJNJDNN4BCXTWE26', 'WARC-Record-ID': '<urn:uuid:40a84771-c318-4bc8-a247-406a0e26967d>', 'WARC-Target-URI': 'http://www.mactech.com/articles/mactech/Vol.05/05.12/AssemblyTutorial/index.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:75205a73-085f-46f1-8469-5fe59ddb2ed2>', 'WARC-Truncated': None}", 'previous_word_count': '9362', 'url': 'http://www.mactech.com/articles/mactech/Vol.05/05.12/AssemblyTutorial/index.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.22596895694732666', 'original_id': 'bfdcb9ba5ac0e9f4435247bab5ddf2c1154499622ea036c86b6f9b84368ab1e2'} |
-6 AN 90° Fitting
In stock
These Aluminum Fittings are specially designed to work with our Braided Stainless Steel Lines. They are compatible with the following fluids:
High-octane gasoline, up to 117 Octane
Regular gasoline
Ethanol (E85 or E100)
Diesel fuel
Nitrous oxide
Engine oil (synthetic or regular)
Transmission fluid
Engine coolant/antifreeze
Brake fluid
Hydraulic clutch fluid
Air Conditioning Refrigerant (R12 or R134A)
Power steering fluid
Air and water, of course
Most of the braided stainless steel lines and fittings that you can buy actually have a rubber (EPDM or NBR) interior. Some competing products advertise a special coating on the inside of the rubber to make them resistant to ethanol and certain other chemicals. We think this is wrong wrong wrong. Why would you use a material that isn’t 100% resistant to the chemicals in your application for absolutely no reason? Our PTFE lines are superior to our competitors rubber lines in every way and they cost less too!
Our lines are made of high-quality PTFE on the inside that gives them high chemical and heat resistance, along with a braided stainless steel outside which gives them high durability, extreme pressure resistance, and a professional and high-tech appearance. Be careful when buying Braided Stainless Steel Hose because they are not all the same! Make sure yours are compatible with the fluid, pressure and temperature in your application.
Braided Stainless Steel PTFE lines like ours are great for replacing many factory rubber hoses such as rubber fuel lines, brake lines, and clutch lines. (Crimp-on fittings recommended for brake lines, nitrous lines, and other applications with over 500 PSI.) PTFE does not deteriorate or bulge with age like rubber does, and has far superior chemical resistance. The stainless steel outside keeps the inner diameter uniform, allowing faster and more efficient fluid transfer (this means a firmer, more responsive pedal feel when replacing brake lines.) The stainless steel outside also keeps the lines looking shiny, new and professional all the time, and prevents damage to the inner hose.
Question: Are your braided stainless steel lines Teflon?
They are chemically identical to Teflon, however we can’t call them Teflon because Teflon is a registered trademark of DuPont.
Question: What can I do with your lines and fittings?
Use them to replace your fuel lines and convert your car to run on Ethanol without worrying about breaking down your inferior factory lines
Deliver the methanol in your custom methanol injection kit
Install an aftermarket oil cooler
Install an aftermarket transmission cooler
Run the water lines for a water to air intercooler
Repair or replace the lines in your hydraulic clutch system
Repair or replace the lines in air conditioning system
Convert all your boost/vacuum hose to stainless steel lines to finally put an end to boost/vacuum leaks
And More!
Pressure Rating: 1500 PSI – note: crimp-on fittings are recommended for applications over 500 PSI.
Temperature Rating: -100F to 500F
All of our bending line termination adaptors (45, 90, 180, etc) come with a swivel on one end so you can turn the outlet without re-installing.
How To Install Fittings
Update! Our fittings have been upgraded with our new Triple Grip design. The brass compression fitting still compresses, grips and seals along the wall of the PTFE tube and also grips the stainless steel braids, however it now also compresses, grips and seals the edge of the PTFE line against the top part of the aluminum fitting. Some other lines you find online only grip in one place!
Our fittings are a three-piece design. Properly installed, the stainless steel braids are gripped by the fitting; do not trim down the stainless steel.
Slide the outside of the fitting over the stainless steel line.
Carefully feather out the stainless steel braiding and insert the PTFE line into the middle part of the fitting. The PTFE line must slide all the way down into the middle part of the fitting. The edge of the PTFE line should protrude approximately 1/8″ from the middle part of the fitting, so that it can be opened up and gripped against the top part of the fitting.
Slide the end of the fitting through the middle part of the fitting, all the way into the PTFE line. You’ll notice the PTFE line being opened up by the top part of the fitting, which helps it seal in the third place when you tighten the fitting.
Be careful not to scratch the finish on the fitting when tightening. They make special wrenches for this, but we prefer an old rag wrapped around the fitting and a regular wrench.
If you open the fitting again after tightening, you will notice that the PTFE line has been compressed between the top and middle part of the fitting.
Please check the following before you start, and check again if you have any problems.
Highly Recommended: Use our AN Fittings Pressure Test Kit to pressure test your built lines before installing. This kit will help you troubleshoot any problems with assembly and prevent a nasty fluid spill.
PTFE and Stainless Steel lines should not be bent in a short radius. If you need a quick bend in your line, install some extra fittings instead of bending the line.
Be careful not to kink the line during installation. The line is firm and hard to kink, but if you do kink it you might ruin it.
Make sure the line is square where it was cut. If the line is cut at a slight angle, it might result in an improper seal, resulting in leakage or failure. We use a cutoff saw that holds the line down to make sure the cut is perfectly square and clean. If you re-cut the line, make sure it’s square.
Make sure you don’t get any of the stainless steel braids caught up in the threads. If you get any steel in the threads, it will prevent proper tightening, resulting in leakage and most likely damage to the threads.
Depending on how you cut the line and how much the PTFE inner moves around in the SS braids (for short lines), you might end up with a situation where the SS needs to be trimmed down slightly. If you have trouble tightening fully, you might try trimming the SS slightly. Note that it should still be long enough to be compressed against the middle part of the fitting.
Related Products
Sold Out
Sold Out
AN Nuts
AN Plugs
AN Tee
From $6.99 | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '50', 'language_id_whole_page_fasttext': "{'en': 0.921087920665741}", 'metadata': "{'Content-Length': '1051166', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GBU3PSEFHTO3BG7IYQ35JXAG3AJPGWXZ', 'WARC-Concurrent-To': '<urn:uuid:6312a323-fe9c-4692-b27f-660346c31f77>', 'WARC-Date': datetime.datetime(2021, 6, 22, 13, 57, 58), 'WARC-IP-Address': '23.227.38.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JQGTZ4SPE2IGQNXZ365SOE5RCHCZPDJT', 'WARC-Record-ID': '<urn:uuid:e2029de9-8101-494e-98c2-7017a0859ac2>', 'WARC-Target-URI': 'https://uppturbo.com/products/6-an-90-fitting-copy', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d753ba5d-776b-489d-b3be-1fe3043de457>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1072', 'url': 'https://uppturbo.com/products/6-an-90-fitting-copy', 'warcinfo': 'isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-171.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03307962417602539', 'original_id': '00ce180fb925ea21d931e39b2477d8bc43090b70674ec1275657b7d1a0523afc'} |
Mitsuhiko Shionoya,
Area Organizer, Professor,
Graduate School of Science,
The University of Tokyo
One of the ultimate goals of chemistry is to control the absolute and relative configurations of all elements and freely design the bonds between the elements. Therefore, controlling the absolute configuration and asymmetry of the metallic center is an important key to open up science for new materials of metallic elements that account for approximately 80% of the periodic table.
The purpose of this study area is the design and synthesis of asymmetric coordination sphere and development of anisotropic assembly method with theory, experiments, and measurements of metal complexes by understanding metallic elements as well as three-dimensional control of the coordination sphere, reaction, and physical properties expression field. Namely, a new scientific principle “Coordination Asymmetry” was created by the development of methodologies to build asymmetry and chirality of structural and electronic states with metal complexes and coordination space obtained from assembled complexes and its nano-micro level assembly based on the molecular level control of the coordination sphere of metal complexes. Specifically, building method for chiral metal complexes including asymmetric induction of prochiral metal complexes, and new techniques for asymmetric structural assembly are established and expanded to new functional molecules and materials having structural, functional, and anisotropy or directivity of physical properties. “Coordination Asymmetry” opens up matchless new academic fields for chiral material chemistry in the field of organic chemistry by coming up with innovations for material creation research based on coordination chemistry.
In this study area, four research items, A01 (molecular asymmetry), A02 (assembly asymmetry), A03 (spatial asymmetry), and A04 (electron system asymmetry) have been set, and research is promoted with a coordinated cooperation system between the theoretical, experimental and measurement groups.
With this area of study, new scientific principles are created for the design methods of asymmetric coordination sphere and multi-scale anisotropic assembly, and the fundamental concepts related to molecular architecture and the hierarchical structure architecture will bring about a paradigm shift by penetrating into not only coordination chemistry but all fields related to material creation. An ingenious new material group will be realized by rationally designing (unit design) the absolute and relative configurations of all the atoms in materials containing metal that form a structural unit, and controlling the relative positions during assembly (assembly design) with precision. We have focused on the core of coordination chemistry called “Coordination asymmetry” while keeping an eye on the basis of such chemistry and are vigorously promoting the challenging fusion research with an overall view of all related fields. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '48', 'language_id_whole_page_fasttext': "{'en': 0.9005351662635803}", 'metadata': "{'Content-Length': '16826', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XUFG4U3HN2HAMVX6YAYLXGRSKPT5WPWZ', 'WARC-Concurrent-To': '<urn:uuid:5de5cf87-17fa-4b35-9c22-6860747223d7>', 'WARC-Date': datetime.datetime(2021, 9, 28, 7, 39, 48), 'WARC-IP-Address': '153.122.114.179', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4H2KTIXYQLWXD65CFZYIQV7MMZP7ZF27', 'WARC-Record-ID': '<urn:uuid:6ce194ad-a984-418e-a559-86cf1166380e>', 'WARC-Target-URI': 'http://www.asymmetallic.jp/greeting_en', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:989c53bf-fd36-4c1d-97ff-0432fb71d274>', 'WARC-Truncated': None}", 'previous_word_count': '413', 'url': 'http://www.asymmetallic.jp/greeting_en', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-93\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05900090932846069', 'original_id': '06b760eb6b15c3fe4ce422101f08c9f48e18cc672b1a1877df1e9c88ba51a82e'} |
package io.crnk.core.exception;
import io.crnk.core.engine.information.resource.ResourceField;
/**
* An exception which is thrown when a relationship repository for a classes is not found in specific package
*/
public class RelationshipRepositoryNotFoundException extends InternalServerErrorException {// NOSONAR ignore deep class hierarchy
private static final String LEGACY_MESSAGE = "Couldn't find a relationship repository for resourceType=%s and field=%s";
private static final String MESSAGE = "Couldn't find a relationship repository for resourceType=%s and field=%s, hasIdField=%s, repositoryBehavior=%s";
public RelationshipRepositoryNotFoundException(ResourceField field) {
super(String.format(MESSAGE, field.getResourceInformation().getResourceType(), field.getUnderlyingName(), field.hasIdField(), field.getRelationshipRepositoryBehavior()));
}
}
| mini_pile | {'original_id': '99a7041a2d7c121444171aaf74023d512f3d388afab21717bc1be5e45396c75d'} |
Eric Merritt
"Erlang and OTP in Action" Co-Author, ErlWare Maintainer
Eric is a veteran entrepreneur, author and public speaker. He is an expert in the architecture, development and deployment of large-scale distributed systems on heterogeneous hardware, and the languages and platforms required to support them. His experience spans from vertical scaled manufacturing and billing systems on IBM Mainframe and midrange hardware for companies like Sysco, Inc, to distributed build systems and massive fleet deployment tools on large fleets of beige boxes for companies like, and high-frequency trading and financial exchange systems on custom hardware for leading private brokerages. Eric is also co-author of the popular book “Erlang and OTP in Action”.
Twitter: @ericbmerrit
Eric Merritt is Giving the Following Talks
Relx, A Dead Simple, Robust Way to build Releases
Building Releases is harder then it needs to be. There is already so much useful metadata in any Erlang release that it should be a simple one line command to create almost any Release. With Relcool it is. Providing both a simple command line and intuitive integration with Rebar, Relx makes the standard Releases simple and hard Releases easy.
Talk objectives: The ultimate goal is to get more people using standard OTP Releases for their systems. By introducing Relx and showing how easy releases actually are we hope to convince more Erlangers to use Releases as part of their everyday work.
Target audience: Erlang Developers.
Tutorial: Erlang in a *Nix World. Learning How to get Erlang/OTP Releases to integrate into a Standard Production Environment
This tutorial will teach the audience how to create releases and integrate those into a unix environment. It sets up the participant up to be able to do reasonable continuous deployment with Erlang.
Participants will learn and practice the following three things:
* Building OTP Releases with Relx
* Integrating Erlang releases into a unix environment
* Packaging up releases with native packages, be they RPMs or Debs. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.8980562090873718}", 'metadata': "{'Content-Length': '17609', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QFKHCROCLMWHKVCAYR5PFY4EQGEHB6YM', 'WARC-Concurrent-To': '<urn:uuid:563b4ecf-6872-4a58-bb2f-aeceda521119>', 'WARC-Date': datetime.datetime(2014, 8, 1, 22, 30, 10), 'WARC-IP-Address': '31.172.186.56', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:QYNWCE5F6K3H5CJR423MQKHZHIN5PLWP', 'WARC-Record-ID': '<urn:uuid:5759d8a6-c7da-48fc-9627-f0247e1b4c9b>', 'WARC-Target-URI': 'http://www.erlang-factory.com/conference/ErlangUserConference2013/speakers/EricMerritt', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9e233cba-ef15-47fb-9b76-54b9764877d4>', 'WARC-Truncated': None}", 'previous_word_count': '327', 'url': 'http://www.erlang-factory.com/conference/ErlangUserConference2013/speakers/EricMerritt', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02768409252166748', 'original_id': '70e9c142071c0b21ceff47182537a0941925594368f7d31598102543a79cac8f'} |
MagnoliaF
8
12
7
8
8
6
15
10
14
17
9
15
14
23
16
31
25
28
25
21
43
19
48
46
42
47
43
41
73
77
85
73
104
89
115
120
131
102
146
136
127
150
150
127
122
125
87
117
100
76
94
69
78
85
51
81
57
51
56
48
77
47
53
45
42
48
52
47
45
43
43
42
31
47
25
27
29
24
25
10
12
19
17
19
19
19
11
16
11
10
8
9
13
22
11
17
14
17
24
14
17
14
22
12
16
7
18
0
11
15
15
20
19
28
29
25
34
30
38
33
72
75
66
58
65
74
100
116
141
140
166
191
221
256
332
| the_stack | {'hexsha': 'b7c0b2b8555fb1d25abb464e543de98201db88cc', 'size': '429', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'name_trends/history_files/Magnolia_F.txt', 'max_stars_repo_name': 'mullinmax/projects', 'max_stars_repo_head_hexsha': 'a777ee3fa6db80fad4827fb515a91c9588137cb0', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '4', 'max_stars_repo_stars_event_min_datetime': '2019-05-20T13:10:56.000Z', 'max_stars_repo_stars_event_max_datetime': '2019-05-23T02:07:21.000Z', 'max_issues_repo_path': 'name_trends/history_files/Magnolia_F.txt', 'max_issues_repo_name': 'mullinmax/projects', 'max_issues_repo_head_hexsha': 'a777ee3fa6db80fad4827fb515a91c9588137cb0', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'name_trends/history_files/Magnolia_F.txt', 'max_forks_repo_name': 'mullinmax/projects', 'max_forks_repo_head_hexsha': 'a777ee3fa6db80fad4827fb515a91c9588137cb0', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '3.1313868613', 'max_line_length': '9', 'alphanum_fraction': '0.682983683', 'original_id': 'f1266a79d1a375b3171dd31142fd92d303823fd13a5b1102d3376b1625f2b054'} |
Sunday, September 9, 2012
How the west was won...
Well... bit of an update to type out here, hopefully that should make up for the few and far between nature of my posts :)
As most of you are aware, last weekend, Team NZ attended the Australasian Team Challenge (or Australasian Team Championship, depending on who you ask on what day of the week).
I had left this fairly low-key building up to the event, as to both avoid building too much hype and thus further exacerbating the weight of expectation, and also a couple of people had been fairly vocal in their dissatisfaction with not being selected. Quite frankly I have 0 energy available for these people, so decided it wasn't worth the effort.
All that is of course moot now, as we have the hot little trophy in our hands!
So, first up, a summary of the event itself. The ATC was spawned in the wake of the ETC, and is very similar in many respects. Teams of 8 players, with a restriction on using each codex no more than once within a team, compete. Individuals are paired up by the captains in what is essentially an 'I go you go' set up, and their results are combined to achieve the total round score out of 160 (20 per player). 0-74 = a loss, 75-85 = a draw, and 86-160 = a win. A win was worth 2 match points, a draw 1, and a loss 0.
The teams were as follows:
Victoria - Captained by Josh Diffey
Queensland - Captained by Stacy Dennis
New South Wales - Captained by Dennis Fung
South Australia - Captained by Alun Gallie (who showed up the first night in an all blacks jersey with a kiwi accent!)
ACT - Captained by Jeff Dunster
Tasmania - Captained by Simon Russell
Western Australia - Captained by Matt Aird
and finally New Zealand - Captained by myself.
More detail on who were in the other teams, and what exactly each list was can be found here:
As for our own team, I shall go into in detail below, but here are the lads!
Those of you with keen eyes will notice the map of Australia on Nikola's medal is suspiciously backwards.
Our results were as follows:
Round 1: Tasmania - win 120-40
Round 2: Victoria - Win 96-64
Round 3: New South Wales - Win 101-59
Round 4: Queensland - Win 96-64
Round 5: South Australia - Win 87-73
Round 6: Western Australia - Loss 65-95
The members of the team were:
The youngest on the team; Daniel Hayden brought with him a wealth of enthusiasm, a bunch of jumper blood angels, some longfang wannabe's and Mephiston to hold their hands. The primary reason for including Dan in the team was to saturate him in experience. Dan has a lot of potential but is still fairly new to the pointy end of tournaments. I felt this was a great opportunity to develop him further and inject more skill into the community.
Dan had a bit of a rough time over the weekend, scoring 4 points against Tasmania's Space Wolves, 0 points to Victoria's Dark Eldar (after losing ~1050 points in a single tank shock from a shock prow raider), a 9 point draw against NSW's IG, a 9 point draw against QLD's Blood Angels, a 15 point win against SA's Blood Angels, and a 9 point draw against WA's Deathwing. Overall I was fairly satisfied with Dans efforts over the weekend, and his win against the SA Blood Angels was absolutely critical in securing the round, given the shocker some of the rest had! Ultimately though, I'll be looking to make sure he capitilises on this experience and improves dramatically over the next tournament year.
The lazy-lover himself, Reverend Doug Sainsbury. Doug played Warhammer-on-Training-Wheels all weekend with a fairly typical Coteaz+psyfleman+purifier+razorback spam list, though it is worth noting I felt he made the strongest list out of that codex over the weekend. Doug had easily been the best Grey Knight player over the last year in NZ, and was a blank slate in that he would listen and follow instructions without question. Dougs biggest weakness historically has been giving up mentally early on, and over the weekend where this suddenly was not an option in any way shape or form, he really discovered that battling through this more often than not wound up with a fairly satisfying win! I'll be looking for this shift in attitude to continue, and see this as one of the biggest positive outcomes from this tournament.
Doug scored 16 points against Tasmanias Grey Knights, Snatched 15 points from Vic's Space Wolves, Eeked out a 13 point win against NSW's Necrons, an 11 point draw against QLD's IG, a 20 nil pasting of poor SA's Dark Eldar, but then went down with 1 point against WA's Necrons.
With the exception of South Australia (which was a move that cost them the round ultimately), Doug was always a player put forward early meaning his opponent got to pretty much pick who ever would face him. To do so well under these circumstances is a very impressive achievement.
Haydn "I Got This!" Korach, aka the man that lost the Battle of the Ditch to some Welsh chump! I had initially envisioned a different role for Haydn, but with Jack Dunn declining the offer to play Haydn was immediately the next best choice. Of my traditional "Match" players (which I will go into later), Haydn performed the best, so obviously I am very pleased with his results. With the army compositions Haydn didn't have a lot of strongly favorable match ups, but worked very well with what he had. Over the weekend Haydn scored 16 points against Tasmania's Orks, 17 points over Vic's Lash CSM, went down with 5 points against NSW's Mech BA, scored 16 against QLD's Lash CSM, went down with 5 points against SA's Necrons, and got a 19 point win against WA's Tyranids.
Henare Akari, AKA our token blackman. I had a lot of people challenge me on the inclusion of Hen in the team. In response, Hen effectively delivered two middle fingers to all those who doubted him, and was absolutely outstanding all weekend. A fairly unorthadox twist on Black Templars, Hen got a 10 point draw in a bad match up against Tasmanias Deathwing, scored 19 points vs Vic's Blood Angels, Scored 19 points against NSW's Space Wolves, got a 12 point draw against QLD's Tyranids (where if the game had gone to turn 6 it would have been a significant win to him), an unfortunate 2 points against SA's paladin list, and 18 points against WA's Space Wolves. Hen really stood up to the challenge over the weekend, and I am immensely proud of him. Hen is always a quiet, solid achiever who can be relied on to achieve when the going gets tough, which is why he was always an auto-inclusion for me.
Me! Charlie St Clair, or as I was known for the weekend, Le Coq... let's hope that one doesn't stick. Like Doug and Nikola, I was a "Put Forward" player, meaning that in 4-5 games my opponents got to choose the match up, and the remaining 1-2 games I was the secret "champion". Over the weekend I got a 20 point win against Tasmania's Dark Eldar, a 20 point win against Vic's Sisters of Battle, an 18 point win against NSW's Deathwing, a 19 point win against QLD's Spacewolves, 18 points against SA's Orks, and a 5 point loss against WA's Orks. Overall I was reasonably satisfied with how I went at the event, though ultimately am disappointed in myself with that last loss. While it was pretty much the one list at the entire event, I managed to set up a bit of a risk turn 2, so that if Snikrot and Ghazghull had shown up any other turn, it would have been a 20-0 win to me. A defeat is always that much more gutting when you get to taste victory for but the briefest of moments!
Dave Lewy... Hmmm. Dave will be quite disappointed with himself over the weekend, dropping quite a few games that going into the event he would be very confident in. It will be interesting to see how Dave bounces back from it, but he is a quality player and I'm sure he'll be fine. Daves help in the build up to the event, and taking on all the admin work was an absolute godsend. The only 2 flights I booked, I managed to book from the wrong damn city. If left up to me, we would be playing in the Mumbai Team Championship. Over the weekend, Dave was a dedicated "Match" player, and I managed to orchestrate fairly green match ups for him in most of his rounds. He scored an 18 point win against Tasmania's Blood Angels, a 3 point loss to Vic's Mech GK, a 4 point loss to NSW's triple landraider space marines, an 18 point win against QLD's Grey Knights, a 4 point loss against SA's Space Wolves, and a 3 point loss against WA's IG. All ribbing aside, QLD's Grey Knights were a list I had no real answer to, and Dave's win over it was crucial in securing that round. When Dave did lose, he was able to make it not an absolute pasting, and this was enough to carry it through. In fact, at the end of the round against SA, the entire round hinged on Dave being able to minimize his loss, which he did fantastically.
Nikola Jacsic. Oh my god. Going into this event, all the other Aussies thought Nikola was a girl, and were already basically arranging the order in which they would run a train in him(her). I threw him up first basically every single round, and despite logic and popular belief saying otherwise, he kept stomping face and producing mad results. After his display over the weekend, I am thankful that he is in Uni and not in High-school, otherwise I'd probably be on some registered list of offenders due to some of the thoughts I've been having. *awkward silence*. This boss crab-handed baller got an 18 point win vs Tasmania's IG, a 17 point win vs Vic's IG, an 18 point win vs NSW's Dark Eldar, an 11 point draw against QLD's Orks, an 18 point win against SA's IG, before joining me in the losers circle in round 6 going down with a 4 point loss to WA's paladins.
Brendan "Slowplay" Dee. Oh how he came to rue that nickname by the end of the event, despite only having one game called for time, and even that at least got 5 turns in I believe. Brendan was my "4th man" - meaning he would be a put up, but only in rounds I lost the roll off. I only won the roll off ~twice, which meant he wound up being put up a LOT. These days everyone inherently has multiple answers to Guard, which meant that Brendan was being thrown under a bus for almost the whole weekend. Not once did he ever complain about this, but completely understood that was the role he would be playing for the team and aimed to minimize his points bleed all weekend. He started with an 18 point win against Space Marines from Tasmania, played against Victoria's scarab farm and got a respectable 5 points (talk about one sided match up), got a handy 15 point win against NSW that was very important to the round, went down hard with a big 0 against QLD's Necrons, a 5 point loss against SA's Space Marines, and a 6 point loss against WA's Blood Angels.
Overall we also did quite impressively in the individual rankings, with me coming 1st, Nikola coming 6th, Hen coming 12th, Haydn coming 14th and Doug coming 20th. This was rounded off with Dave coming 42nd, Brendan 44th, and Dan 47th, out of the 64 people at the event.
So what did all this get us? These shiny pieces of bling, made lovingly by a very talented New Zealander over at .
Ohhhh Shiny
You may prefer this view however. I know I certainly do. *fap fap fap fap fap*
All polished off, sterilized after Nikola got a hold of them, and put into a nice comfy home.
I was going to add some content around the match up process itself, and why/how I felt this went significantly in our favor, winning the event for us, but lets be honest, this is already a novel and none of you are still reading! As such, I will slide it in later in the week.
Until then,
Au revoir!
1. As a side note, if anyone can help me get that sloppy text properly text wrapping next to those photos, I will love you forever. Or something.
2. Probably said it already but congratulations to the team.
Looking forward to getting the stories from everyone themselves.
Hopefully I can push myself into a position where I am an option for this next year as I would like to play in it. Is there any idea of how the team selection is going to change or stay the same for next year.
3. "I will slide it in later in the week." - lets try keep the reports pg next time as kids might read this blog.
At least I kept my man-panties on.
4. slide it in like a running heart-touch on the Hamilton Natcon slip&slide.
5. Trophy fills the hole left by the Battle of the Ditch trophy.....not really :-(
6. You'd have to talk to someone on the BoTD team about that one Pete ;O
7. No. I blame the BotD debacle on the two selectors
8. I think there was only one selector, I'm not sure who else Dave had helping him if there were two. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9777504801750184}", 'metadata': "{'Content-Length': '158103', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XDZ4L4TMNBNXC5DX5EHAU5RT7OCXBJSC', 'WARC-Concurrent-To': '<urn:uuid:7f4c6cc6-f844-4788-b980-6f69993ddf4e>', 'WARC-Date': datetime.datetime(2019, 2, 16, 17, 6, 2), 'WARC-IP-Address': '172.217.15.83', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:PSUGU6HS54V4EY46OBLDUP3QME6AVOYJ', 'WARC-Record-ID': '<urn:uuid:e9b2ceca-eb05-47b2-bdbd-53fca3c10a34>', 'WARC-Target-URI': 'http://www.thefieldsofblood.com/2012/09/how-west-was-won.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:045be8aa-ab67-42f4-b86b-d329006de45b>', 'WARC-Truncated': None}", 'previous_word_count': '2287', 'url': 'http://www.thefieldsofblood.com/2012/09/how-west-was-won.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-122-116.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.023487448692321777', 'original_id': '3564332d72e9847c2a21937c1fb1db4ed2d5c9f922bbb5801bafb576da04f540'} |
Para 1o.o ¿La omisión del análisis químico se opone al diagnóstico del envenenamiento, cuando los síntomas, la prontitud de la enfermedad, su violencia y la naturaleza de las lesiones cadavéricas le indican for¬ malmente? Hé en aquí un hecho que prueba cuan delicada : es la posición del perito semejantes circunstancias Una síntomas muy graves, y mujer de buena salud habitual fué atacada repentinamente de pereció en diez y ocho horas. El Dr. Raige de Montargis hizo la autopsia , y descubrió en el estómago una grande erosión con bordes frangeados y lívidos. A su alrededor y en otros diversos puntos hahia señales de inflamación lo mismo que en todo el (I) Revue méd., 1824, t. I, p. 348. ^2) T. II, p. 267. envenenamiento agudo. 81 digestivo. Raige encontró indicios suficientes y no recogió las en las vias digestivas; pero afirmó la existencia de un envenenamiento por un cáustico. Chaussier, que fué consulta¬ do, sostuvo que faltando el cuerpo del delito la conclusión carecía de pruebas. El doctor Raige-Delorme, hijo, discutió en su tesis (1)esta doctrina, y echando de menos la falta de los datos preciosos que habría suministrado el exámen químico, insistió en que los otros dos motivos del diagnóstico conservaban todo su valor. El ejemplo siguiente prueba también que no carecen de importan¬ cia. Cuatro individuos, después de haber comido juntos, fueron ata¬ cados de todos los síntomas de envenenamiento y sucumbieron. En la autopsia se encontraron lesiones que no podian atribuirse mas que á la acción de un corrosivo; pero en los órganos no quedó vestigio tubo materias contenidas alguno del veneno. Sin embargo se admitió la realidad de aquella cau¬ sa, y mezclado el arsénico con tos el acusado fué condenado, en el convencimiento de que habia la sal empleada para preparar los alimen¬ (2). Si, por falta de lo que se llama cuerpo del delito, se le hubiese , absuelto un gran culpable entraría escandalosamente en la sociedad los narcóticos no presenta las mas de las ultrajada. El envenenamiento por veces otras pruebas que los síntomas y la marcha del accidente. no se En general debe basar un juicio decisivo sobre un solo orden casi siempre circunstancias estrañas vienen á poner¬ nos en el camino del crimen y ó dar armas á la acusación. El perito se contiene en los limites circunscritos del hecho sometido á su apre¬ de datos; pero ciación, pre por las apariencias y uniendo siem¬ espresion de su pensamiento. 6.—Diagnóstico comparativo.—Las diversas clases de envenena¬ miento presentan muchas analogías con estados morbosos determina¬ dos, de lo cual surgen muchas dificultades y errores de diagnóstico. no dejándose influenciar la prudencia á la sincera Ya tendremos ocasión de examinar , á medida que se presente el estudio de los diversos teres que géneros de intoxicación, los síntomas y carac¬ distinguen unos de otros. intoxicación corrosiva é irritante, revisten muchas veces los caractéres del cólera. El doctor Louis, que fué llamado para visitar al La duque de Praslin, que habia tomado (1) Considór. méd. Paris, 1819 n.° 2Vi. , arsénico , creyó que estaba ata- légales sur l'empoisonn. par les subst. corrosives (2) Cases of poisoning, por Journal, t. XVIII, p. 167.) tomo ii. Alexander Murray. (Edinb. med. and surg 6 82 enfermedades en general. cado de síntomas de una aquella enfermedad. Frecuentemente se observan también los violenta gastritis, gastro-enteritis ó peritonitis. Se mismo los fenómenos del envenenamiento, con los han confundido así del ileo y de la estrangulación interna ó esterna (por hernia); pero hay pocos temores de inducir al error, no pueden hallarse en el estómago y los evitasen la confusión. La fiebre equivocarse. Las erosiones y perforaciones que intestinos, son muy propias para si varias circunstancias de que nos haremos cargo tifoidea puede tomar el aspecto de el cobre y el plomo, como lo prueba una consulta médico-legal contestada por Orfilaen 1838 (1). El envenenamiento por los estupefacientes y los narcóticos simula la meningitis, la encefalitis, la hidrocefalia aguda y la apoplegía. La intoxicación convulsiva y tetánica puede tomarse por un ataque de epilepsia, de eclampsia, ó por convulsiones de causa verminosa ú otra cualquiera. La intoxicación de la sangre por los gases se parece á los diver¬ sos casos de simple asfixia. Es muy necesario que el médico conozca bien los caractéres dis¬ la intoxicación por tintivos de estos diversos estados á fin de evitar el error. 1.—PRONÓSTICO DEL ENVENENAMIENTO AGUDO. El nos' según por tado al enfermo. El pronóstico del envenenamiento , siempre grave, lo es mas ó me¬ el agente tóxico, la causa de su administración, la via donde ha sido introducido y la clase de auxilios que se han pres¬ envenenamiento por los corrosivos es mas bido á los irritantes. Los venenos que el tétanos, son mas veces y mas peligroso que el de¬ determinan las convulsiones y prontamente funestos que los sim¬ plemente estupefacientes y narcóticos. Los que alteren la sangre tienen también una acción sumamente perniciosa. van espuestos, la sustancia tóxica ejerce los fenómenos que se desarrollan. El envenenamiento con objeto de suicidio es las mas de las veces mortal, á causa de la dosis crecida del veneno, y á mas porque el En todos los casos que muchísima influencia en desgraciado que atenta contra los cauciones para que no se Los irritantes y dias de su vida toma ya sus pre¬ le pueda socorrer inmediatamente. la los cáusticos pueden envenenar, sea cualquiera superficie con que se les ponga en contacto; pero producen ma(I) Bullelin de l'Acaddmie royale de J}Iédecine¡ t. III, p. 97. envenenamiento agudo. 83 yores los órganos digestivos. activi¬ dad, cualquiera que sea la via por donde se han introducido : su aplicación subcutánea ne es menos peligrosa que la inyección gástrica. El empleo inmediato ó tardío de un tratamiento apropiado le hace estragos cuando han sido ingeridos en venenos Los que matan hiriendo la inervación obran con mas ó menos eficaz. La edad (4), el temperamento, el estado anterior de salud y el grado de integridad de las vias digestivas hacen variar el pronóstico (2). DEL ENVENENAMIENTO AGUDO. relati¬ vamente á los envenenamientos. La disminución de la temperatura esterior acelera la muerte K.-TERAPÉUTICA El tratamiento de toda intoxicación debe ser enérgico y pronto. empleado, la via por donde se han presentado. Pueden dis¬ tinguirse dos épocas diferentes si el agente tóxico ha sido introducido en el estómago, ó todavía le contiene ó ya le ha espulsado. Varía, según la naturaleza veneno ha intraducido y los accidentes que se del a. — El veneno se existe todavía en los órganos digestivos.—Dos indicaciones que quede. 4.° Para presentan inmediatamente : espulsarle y las vias neutralizar lo evacuar digestivas ¿de qué medio nos valdre¬ pero mos? El tártaro estibiado y el sulfato de zinc son los vomitivos que se emplean con mas frecuencia; lorido ¿no hay peligro de aumentar venenamiento ha sido producido por cuando el epigástrio está muy do¬ el dolor y la irritación? Si el en¬ los narcóticos, el estómago estará como aletargado y será menester una gran dosis de emético para des¬ pertarle. Si un corrosivo ha convertido en anchas escaras las paredes del estómago, ó si le ha tapizado de falsas membranas ¿ qué puede hacer este medicamento en una viscera así alterada ? Si, esperando el efecto del vomitivo, se pierde un tiempo se precioso,, puede también, mientras dura la impaciencia de ver vomitar, ad¬ ministrar dosis de tártaro estibiado, ó de sulfato de zinc, capaces, con tal que permanezcan en el estómago, de aumentar en mucho los efectos deletéreos del veneno que tienen por objeto espulsar. Se vé, pues, que esta clase de medios tiene muchos inconvenientes. El agua tibia, tomada en abundancia, tiene la ventaja de diluir, y (1) Los venenos obran mas enérgicamente en los jóvenes. Chatin, p. 16. (2) Obs. de MM. Chaussat, Prévost, Brown-Séquard (Mém. de la Soc. Biologie, t. I, p. 102.) de 84 ENFERMEDADES EN GENERAL, por consiguiente duce y favorecer de debilitar el veneno, calmar la irritación que pro¬ el vómito. Los corrosivos y los irritantes producen casi siempre el vómito y las deyecciones, y en general no hay una necesidad urgente de admi¬ nistrar el vomitivo, porque son suficientes las bebidas abundantes, diluentes y Pero se emolientes. puede temer que los esfuerzos de la naturaleza no basten para que arrastrar todas las porciones de la sustancia tóxica, y mientras fatiga en infructuosas contracciones, el agente venenoso ejerce su influencia irritante ó corrosiva , ó bien es rápida¬ mente absorvido y trasportado al torrente circulatorio. Por lo tanto es de la mayor importancia libertar al estómago lo mas pronto posible del agente peligroso que encierra. La idea de vaciar este órgano por medio de una geringuilla y de una cánula exofágica ha debido ocurrirse á muchos prácticos. Idem , p. 416. ENVENENAMIENTO AGUDO. 85 órganos están como aletargados, y de producir una fuerte irritación. Seria de desear que está bastante puede obrarse sobre ellos sin temor esta especie de bomba, cuyo uso parece que generalizado, fuese mas conocida. 2.° Es necesario hacer lo posible para neutralizar los venenos que no se pueden evacuar, sirviéndose de los agentes llamados antídotos ó contravenenos. Un antidoto no obrar con contacto debe ser de naturaleza irritante ó tóxica; ha de prontitud á la temperatura de la economía, y á pesar de su con los jugos gástricos ú otras materias contenidas en el debería desnaturalizar completamente el veneno , estómago. Un antídoto dan¬ lo que su¬ cede con las sales de barita y de plomo descompuestas por los sulfatos solubles y con las de plata , á quienes desnaturalizan también los cloruros. Pero la alteración que se verifica por el antídoto, las mas de las veces es muy imperfecta, como sucede con la albúmina relativa¬ mente á las sales de cobre y de mercurio, y con la nuez de agallas do origen á un compuesto enteramente , inocente. Esto es respecto al opio, etc. (<1). veneno ha sido espulsado de las vias digestivas, ó está desnaturalizado.—Suponiendo que por un medio cualquiera de los precedentes, la sustancia tóxica ha sido evacuada ó neutraliza¬ da, todavía hay que llenar las siguientes indicaciones : .a Favorecer la evacuación por los emunctorios de las moléculas tóxicas que la ab¬ sorción hace circular en la economía; 2.a calmar los accidentes pro¬ ducidos por la acción directa ó indirecta del veneno. 1 .o Se favorece la evacuación del veneno absorvido á beneficio de los diuréticos y sudoríficos. Por muy corta que sea la permanencia de la sustancia venenosa en las vias digestivas, una porción de ella es absorvida y llevada por el intermedio del sistema venoso abdomi¬ nal al torrente circulatorio. Y como quiera que la eliminación por los emunctorios, y sobre todo por los ríñones, desembaraza la economía de tal modo, que al cabo de algunos dias no se encuentra en ella ves¬ tigio alguno del veneno ingerido y absorvido, es de la mayor impor¬ b.—El ellas en tancia favorecer inmediatamente las 2.o sos Deben combatirse las lesiones ó los secreciones escrementicias. diversos estados morbo¬ que espasmos, producen los venenos, tales como las flegmasías, gangrenas, parálisis , etc.; atacando á todos ellos como si dependien¬ , te Orfila t. I, p. 18. 8g sen caso enfermedades en general. de otras causas, pero con el mucha mas energía , porque en este agente morbífico es violento y rápidamente mortal. Mas para llenar este objeto se presentan grandes dificultades. ¿Cuál ha sido la modificación vital que ha determinado? ¿Están indicados antiflogísticos? ¿Los venenos irritantes que parece ocasionan la inflamación y aun la gangrena del estómago reclaman los emolientes y los sedantes? Apesar de los hechos citados por los los tónicos ó los italianos miendan. veneno no ha sido introducido por los órganos digesti¬ queda alguna porción de él aplicada todavía contra los teji¬ dos con que se ha puesto en contacto, lo primero que hay que hacer es separarla y obrar después como si la absorción se hubiera verifica¬ do por el aparato digestivo. (4)], estos son los medios que la esperiencia y la razón reco¬ c.—El vos.—Si d.—Accidentes consecutivos.—Los síntomas, los accidentes y las enfermedades que los venenos, siguen con tanta frecuencia al efecto deletéreo de exigen los medios ordinarios á que se recurre en casos análogos. § II.—©el envenenamiento crónico. manifiesta sino después del prolongado de la sustancia tóxica, tiene caractéres particulares que le diferencian del precedente. Puede aparecer como una enferme¬ dad aguda; pero si su causa persiste , aparecen como una série de ataques ó de recidivas. Las mas de las veces sus efectos son continuos y llevan tras sí desórdenes sumamente graves. La intoxicación crónica, resultado de una modificación general y profunda del organismo, dá idea de una alteración constitucional ó diátesis, la cual parece que afecta á la vez los líquidos y los sólidos. Estos están modificados en su vitalidad, y aquellos en su composición por la acción incesante de la sustancia venenosa que se introduce con¬ tinuamente, ó al menos con mucha frecuencia y á pequeñas dosis, ya por la absorción pulmonar ó cutánea, ya por la via alimenticia. En efecto, dos son los medios principales de intoxicación crónica : el udo por emanaciones, es decir, por los cuerpos sumamente dividi¬ dos ó volatilizados y esparcidos por la atmósfera , y el otro por mate¬ rias sólidas ó líquidas mezcladas con los alimentos ó administradas uso como El envenenamiento crónico que no se medicamentos. (I) J.des Connaissances méd.-chirurgt. XIII, p. 191. ENVENENAMIENTO Las causas comunes CRÓNICO. 87 de la intoxicación crónica profesión insalubre , de un mal régimen, de un y muy rara vez de una voluntad criminal (1). El tratamiento vicioso, dependen de una mas observa casi siempre en las clases sociedad, mucho menos tal vez á causa de la mise¬ ria que en razón de la incuria y la ignorancia. Esta consideración prueba la necesidad de aconsejar científica¬ mente, establecer reglas é intervenir activamente en los intereses de aquellos que ni aun para sí mismos saben tomar medidas útiles. Hay medios preservativos, reglas de prudencia que la higiene acon¬ seja, y la legislación prescribe, cuyo objeto es la separación ó ate¬ envenenamiento crónico se pobres de la , nuación de los Estos agentes tóxicos. servicios que presta la ciencia son de la mayor importancia, porque en no útil la profilaxis que en el que nos ocu¬ pa. Una vez hecho el mal, cuando la intoxicación se ha verificado, el arte tiene sino muy débiles recursos que oponerle. Lo que mas particularmente falta es el tiempo, pues cuando menos necesitaría para reparar el desorden tanto como el veneno ha necesitado para producirle. Aun cuando dispusiera de él, ¿cómo llegar hasta lo ínti¬ de los órganos para buscar y neutralizar las moléculas venenosas que parece se han incorporado á ellos? Para conseguirlo habia que emprender una regeneración orgánica, obra muy difícil, y las mas ningún caso es mas mo de las El mos veces imposible. envenenamiento crónico no se hecho del agudo. En nuestro pais no hay ejemplos de intoxicación crónica por los narcóticos (2), ni por los venenos que producen el tetó¬ nos siendo producida las mas de las veces por los corrosivos, y todo por los irritantes. Hay también algunos agentes que la nan de una manera casi especifica , como por ejemplo, el plomo, el , presta á la clasificación que he¬ sobre determi¬ mercurio, el fósforo, etc. Vamos a ocuparnos cación crónica, (1) Se habia una ligeramente de las siguiendo la série de las principales clases de intoxi¬ sustancias que la producen. venenos, conocimiento perfecto de los obrar con misterio y produ¬ cir muerte lenta, pero inevitable. El doctor bufa ha tratado de destruir preocupación muy generalizada en la Martinica. (Gaz.mcd., 1847, p. 1017.) (2) El hábito destruye sus efecios. Yo he visto tomar á algunas personas sin inconveniente sin el menor sintonía de envenenamiento dósis muy crecidas opio, á las cuales se habían acostumbrado lentamente. Pero en los orienta¬ les, que comen y fuman el opio, ¿no se irá verificando un envenenamiento supuesto que los negros tienen un particularmente de aquellos que pueden esta y de lento , que les hará sucumbir ? 88 ENFERMEDADES EN GENERAL. En cuanto á las enfermedades su por este orden de causas, estudio vá unido al de las afecciones de los diversos aparatos. engendradas consideraciones que voy á presentar no son mas que una espe¬ cie de introducción al estudio de las diferentes clases de envenena¬ mientos necesariamente diseminadas por Las muchos capítulos de la patoPOR EL PLOMO. logia especial. A.—INTOXICACION CRÓNICA Esta intoxicación es elemento monio y principal es producida por los diversos compuestos cuyo el plomo. Los óxidos, el carbonato, cromato, sus nitrato, acetato de este metal, aleaciones con el estaño, el anti¬ el cobre son susceptibles de producir por una acción conti¬ nua desórdenes perfectamente estudiados y caracterizados (4). Todas las profesiones que esponen á los individuos que las ejercen al contacto mas ó menos frecuente del plomo son las causas mas cons¬ tantes de la intoxicación saturnina. los trabajadores de las fábricas de albayalde, de minio y los pintores y molenderos de colores, los que hacen puche¬ ros de tierra, los refinadores de metales, los fundidores de plomo y caractéres de imprenta , los estañadores, los lapidarios, etc., están muy espuestos á esta clase de intoxicación. es Asi que , Jitargirio Las moléculas de plomo puestas en contacto con su piel ó volatili¬ zadas y mezcladas con las narices y la boca, ó los alimentos el aire, penetran en las vias respiratorias por mezcladas con la saliva y muchas veces con y llegan á los órganos digestivos saturan bien pronto todo el organismo. Esta clase de intoxicación se verifica en los individuos jóvenes mas fácilmente que en los adultos, y en estos mas comunmente que en los viejos! También se la observa mas veces en los hombres que en las mujeres. Sus efectos son mas frecuentes en los individuos poco que tregados á los higiene. veinte años escesos, que en aquellos aseados y en¬ siguen las reglas de la Se han visto también individuos que por espacio de diez, quince y se habian espuesto impunemente á las emanaciones sa¬ pero turninas, Los que acaban por han esperimentado sufrir las consecuencias de ellas (2). un ataque están muy espuestos á otro. ou (1) Trailé des maladies de plomb ches. París, 1839, 2 vol. saturnines; por Tanquerel de Plan¬ (2) Tanquerel. t. I, p. 184. ENVENENAMIENTO CRÓNICO. 89 El calor parece que io, agosto y junio se nen favorece esta intoxicación. En los meses de juobserva mayor número de casos; en seguida vie¬ y los de mayo, abril setiembre. El último del año es el que ofrece menos. La intoxicación saturnina los alimentos mo con puede verificarse por la mezcla del plo¬ ó las bebidas ; así es que las vasijas metálicas mal estañadas que se cidra emplean en las cocinas, alteradas por el litargirio; el agua contenida en los vinos, la cerveza y reservorios de plomo ('1), etc., suelen producir efectos tóxicos del mismo género. Todo el mundo sabe también que la absorción cutánea, sobre todo cuando el dermis está denudado, puede dar lugar á la intoxicación saturnina (2), la cual se conoce por una modificación notable que im¬ prime el organismo y por efectos especiales, esto es, por las enferme¬ dades Los determinadas que ocacionan. cambios que sobrevienen en el : conjunto del organismo son los siguientes rado , los dientes está cubierto de un barniz gris apizar¬ la membrana gingival toma un tinte livido parduzco , aplo¬ mado, que puede estenderse á los diversos puntos de la mucosa bucal. Las encías se adelgazan, parece que se atrofian, y los dientes se des¬ 1.° El cuello de y carnan. deprava sintiendo generalmente un sabor estíptico, el aliento está impregnado de un olor desagra¬ dable que distinguen los mismos enfermos. 2.° La piel, particularmente en la cara, presenta una coloración un poco amarillenta, sucia y terrosa, mezclada en las conjuntivas con un matiz azulado. Esta alteración del color de la piel, llamada icte¬ ricia saturnina (3), es estraña á la presencia de la bilis. El gusto se azucarado ó fétido, y 3.° El individuo en que se observan estos fenómenos y adelgaza y so debilita; el pulso se hace cuenta y aun tardo baja hasta cincuenta y cinco, cin¬ pulsaciones por minuto. Estas modificaciones generales, que constituyen una especie de diᬠtesis saturnina, preceden ó acompañan á estados morbosos mejor cuarenta y cinco caracterizados, los cuales consisten : En cólicos ó dolores abdominales intensos, con calambres, etc.; (1) Se han emitido algunas dudas acerca de la Traité pralique des eaux potables , por M. (2) Tanquerel, t. I, p. 60.—Tauíflieb de Barr constipación, le ninos p. producidos por los realidad de esta causa. Véase Jeannel. Bordeaux, 1847, p. 16 ha observado accidentes satur¬ vendoletes de diaquilon gomado. (Gaz. méd., t VI 92. (3) Tanquerel, t. I, p. 10. DO ENFERMEDADES EN GENERAL. 2.° Dolores vivos en las estremidades, en el tronco ó en la cabeza; 3.° Parálisis del movimiento que afecta mas particularmente á los miembros superiores; parálisis del sentimiento que ataca á los sentidos, particularmente al de la vista. 5.° Lesión profunda de las funciones encefálicas, manifestándose 4.° Anestésia ó bajo las formas delirante, comatosa ó convulsiva. en particular con los pintores, artralgia saturnina, parálisis saturnina, anestesia saturnina, y encefalopaiia saturni¬ na. Su distribución en los diferentes capítulos de la patología especial, será tanto mas fácil cuanto que estas lesiones, aunque resultantes Estas diversas enfermedades las estudiarémos nombres de cólico saturnino de los de de una su misma causa no desarrollo subordinación y son común consiguiente del sistema anatomía constante ellas tienen el carácter no hay en el orden encadenamiento necesario, y por independientes las unas de las otras (1). Pero todas están ligadas entre sí; de consistir en trastornos, alteraciones enfermedad. nervioso, en ser unas verdaderas neurosis. Así lo dice la patológica, que no demuestra ninguna lesión material y en los tejidos, que parece han sido el sitio principal de la consiguiente, esencialmente funcionales ó dinámicos, dependientes de la presencia de las moléculas del plomo, absorvidas y esparcidas en el organismo, las cuales se encuentran en la sangre, en el hígado, en los pulmones, en los riñones, el cerebro y el cerebelo (2), y en los músculos. El barniz grisáceo del cuello de los dientes está formado por el sulfuro de plomo. Este metal parece que obra sobre el sistema nervioso ganglionar y cerebro-espinal. En el primero desarrolla la sensibilidad animal en alto grado, y en el segundo la embota ó exalta, produciendo las aber¬ raciones sino que mas Los desórdenes son, por graves. no limita sus efectos á los dos sistemas nerviosos, al parecer modifica la composición ó la cantidad de la san¬ gre, y obra sobre el elemento vascular cuya actividad disminuye. El tratamiento preservativo de las enfermedades saturninas consiste en alejar de las vias respiratorias y digestivas, es decir, de la super¬ Pero el plomo los absorventes, las moléculas del plomo volatilizado. Se ha propuesto colocar delante de las narices y de la boca esponjas húme¬ das, con el objeto de impedir el paso de las emanaciones tóxicas; pero (1 ] Tanquerel, t. I. p. xvm. (2} American Journal of med. ficie de se., 1846, t. I, p. 462. envenenamiento este erónico. 91 medio es muy incómodo, sobre todo si ha de mente. Es mucho mejor recomendar una ventilación continua, pres¬ emplearse continua¬ cribir turninas que sulfúrica. grandes afusiones de agua , á ñn de separar las partículas sa¬ pudieran adherirse á la piel, y administrar la limonada al tratamiento curativo varía según el carácter especial lo tanto no nos ocuparémos aquí de él, limitán¬ dome á mencionarlos baños sulfurosos, como opuestos con éxito á muchas afecciones crónicas procedentes de la intoxicación saturnina En cuanto de la afección, y por B.—INTOXICACION Esta CRÓNICA POR EL MERCURIO. 1.a El atmósfera, puede impregnar el organismo del mismo modo que las emanaciones saturninas. En las minas de este mineral, y muy parti¬ cularmente en las de Almadén, es bastante fácil seguir los efectos de las emanaciones mercuriales. Teófilo Roussel, que ha visitado como observador hábil y filántropo esclarecido estos sitios llenos de interés, ha publicado noticias curiosas y positivas acerca de las que padecen los individuos empleados en la estraccion del mercu¬ rio intoxicación se verifica de varias maneras. mercurio muy dividido, volalatilizado y esparcido en la enfermedades espejos (1). doradores (2) y los que se Los dedican á la construcción de presentan accidentes En dos un análogos. niños que habitaban un cuarto cuyas ventanas se abrian á patio donde se destilaba el mercurio, se observaron mas graves de la intoxicación 2.a El uso continuo del sublimado mercurial (3). los indicios corrosivo (4), de los calomelanos y de cualquiera otra puede determinar una discrasia análoga (5). 3.a El uso perseverante de las pomadas déla misma naturaleza de aquellas, por ejemplo en que entra el nitrato de mercurio, los mismos resultados. ¡ lie visto un caso de este género en una joven que al fin sucumbió 1 (1) Folletines de la Union Médicale, (2) Ramazini; Mal• des artisans, p. 43. (3) Ollivier d'Angers, y Roger de l'Orne; (4) Véase las observ. de Achard-Lovort, Ihése nal preparación mercurial tomada interiormente, pueden dar 1848. Annales de hygihne, abril, 1841. p. 38.—Otro caso en el Jour¬ de la Dis. de Dietrich, de Munich, tológicos del mercurio. Gaz. Méd., t. Vil, p. 748 (5) Véase elestracto général , 1821, t. XIV, p. 313, etc. sobre los efectos pa¬ 92 Los ENFERMEDADES EN GENERAL. primeros efectos del mercurio, que se manifiestan en la boca, consisten en una estomatitis acompañada de tialismo y muchas veces de ulceraciones en la mucosa se bucal. ha hecho mas Cuando la intoxicación de la una estomatitis, que puede durar crónica, independientemente ó menos tiempo sobreviene , del sistema nervioso. El principal carácter de esta lesión es el desarreglo de la acción muscular, el temblor, una especie de corea, que puede ir acompañada de lesión grave convulsiones, de dolores vivos voz en las estremidades (1), alteración de la cia , con lesión de la inteligen¬ particularmente con la pérdida de la memoria. En general estos individuos, aunque sean robustos esperimentan y , déla palabra, ó bien parálisis poco tiempo después de haberse puesto en contacto con las emana¬ ciones mercuriales una debilidad muscular, algunas veces con indi¬ cios de irritación de las vias digestivas (diarrea, disenteria); otras con disnea, hipo, etc. son poco aseados y no se someten á las lociones cambian de vestidos, si cometen escesos y abusan de Si si no necesarias, los licores espirituosos, sufren tes causados por mas pronto esos ataques. En Almadén el viento de este aumenta la intensidad de los acciden¬ el mercurio (2). Hé tiene aquí todavía una intoxicación crónica muy notable que parece una perniciosa influencia sobre el sistema nervioso. la intoxicación saturnina, esta parece que se le asemeja bajo ciertos puntos de vista, y su historia puede esclare¬ cerse por estos rasgos de analogía. Pero todavía se necesitan nuevas investigaciones respecto á la química y anatomía patológicas. La discrásia mercurial se ha tratado de combatir por el ácido muriático, administrado tres veces por dia á la dosis de cinco gotas en una tisana emoliente (3), y por el ioduro de potasio, destinado á hacer el mercurio mas soluble y mas fácil de espulsar (4). En mi opinión, los baños sulfurosos indicados en el corea y en cier¬ tas formas de la intoxicación saturnina pudieran ser muy útiles. Menos estudiada que (1) Que principian en el dedo gordo del pie ó del pulgar. Th. Roussel; Union Méd., 1848, p. 511. (2) Th. Roussel, p. 511. (3) Seidel; Journal des Con. méd.-chir., t. XI, p. 32. (4) Memoria de M. Melsens, presentada á la Acad. de ciencias el 5 de febrero de 1849. ENVENENAMIENTO CRÓNICO. 93 C.—INTOXICACION Las este CRÓNICA POR EL COBRE. emanaciones del cobre es, metal, esto crónica de pueden ocasionar en los que trabajan los limadores, fundidores, etc., una flegmasía los intestinos gruesos y delgados, y por consiguiente esta intoxicación referiré se referirá á la historia de la algunos< ejemplos. entero-colitis, en la cual D.—INTOXICACION El zinc CRÓNICA POR EL ZINC. al rededor de las fábricas acción fuego, determina cierto estado le somete á la del febril aunque de poca duración, pero acompañado de síntomas ner¬ viosos. Sus efectos, que han sido comprobados por los señores Bccquerel, Reboulleau y Bouchut, los indicaré al tratar de las fiebres .° Por que se sus produce dos clases de efectos : emanaciones, muy sensibles en intermitentes. 2.° Por el contacto y la se difusión de las carbonato de zinc, ó diarrea, y El Doctor Bouvier han provocado moléculas del óxido y del cólicos, vómitos, constipación observó estos efectos en un obrero de una fábrica de Asniéres, en el cual se comprobó por el examen químico la presen¬ cia de moléculas de zinc sobre la superficie de todo el cuerpo (4). El valor de este Chevalier algunas veces hasta una flegmasía palatino-gutural. (2); pero las mené, de Beims, han discutido y puesto en duda por el Doctor observaciones de los señores Landouzy y Maudemostrado que el zinc, sirviendo para galva¬ nizar el alambre que se emplea para sujetar los tapones de las bote¬ llas, puede, por la acción de sus moléculas esparcidas al rededor do los obreros, alterar fácilmente su salud (3). hecho ha sido E.- INTOXICACION CRÓNICA POR LOS VAPORES ARSENICALES. El Doctor Blandet ha presentado á la resulsado de sus observaciones relativas á muchos obreros de las fábricas de papel de colores, donde se emplea el verde de Schweinfurt (compuesto del acetato de cobre y de ácido arsenioso). Los fenómenos Academia de ciencias (í-) el tían en una observados eran principalmente estemos, y erupción cutánea papulosa, el abotagamiento de p. consis¬ la cara {•2 (1) Gaz. IMéd , 1850, p. 384. Gaz. des Ilupilaux, 1830 (3) Gaz. Méd:, 1850, p. 409. (4) Sesión del 3 de marzo de , 481. 1345. 94 y ENFERMEDADES EN GENERAL.. el edema doloroso del escroto. También se presentaron algunos otros síntomas, y sobre todo cólicos intensos (1). El Doctor Chevalier, que ha visitado los establecimientos en donde estos podían ser mas frecuentes, se ha convencido que son bastante raros; pero sin embargo, ha dado algunos consejos para prevenirlos completamente (2). F.—INTOXICACION Se sabe que CRÓNICA POR LOS VAPORES ANTIMONIALES. estos vapores producen la disnea, la tos y los síntomas de la hemoptisis. El Doctor Lohmeier ha visto en cuatro obreros, independientemente de estos síntomas, presentarse el insom¬ nio el abatimiento, sudores generales, la anorexia y una debilidad profunda de los órganos sexuales (3) precursores , Orfila sospechaba que el antimonio solo no es capaz de estos accidentes. El del comercio contiene casi siempre una cantidad de arsénico producir pequeña (4). DE ORO. G—INTOXICACION CRÓNICA POR LOS VAPORES DEL CIANURO se produce, según el Doctor Chanet (5), en dedican á dorar al galvanismo. El cianuro de oro se des¬ compone por la corriente galvánica, y al paso que el oro va á fijarse en la pieza que se está dorando, el cianógeno se desprende y vá á Este envenenamiento los que se formar el ácido cianhídrico. rales. Los resultan, los unos son locales y los otros gene¬ primeros consisten en eritemas, vesículas eczematosas y ulceraciones cutáneas con dolores muy vivos; y los segundos son los mismos de la irritación ó congestión cerebral, de la congestión pulmonal y de la dificultad de la circulación de la sangre en el corazón. H.—INTOXICACION CRÓNICA POR LOS VAPORES DEL FÓSFORO. En 1834 comenzaron á prepararse en Los fenómenos que Yiena en gran cantidad los fósforos, estableciéndose las fábricas para este objeto en las inmedia¬ ciones al hospital de Wieden. El Doctor Lorinser, jefe de este estable¬ cimiento, vió por primera vez en 1839 una mujer atacada de una (II Journal de Médecine de M. Trousseau. 1845, p. 112. (2) Anuales d'hygihne, y Gaz. Méd., 1848, p. 641. (3) Extrait du Journal de Casper (Gaz. Med., 4840, p. 619). (4) Toxicologie, t. I, p. 504. (5) Gazelte midicale, 1847, p. 793. ENVENENAMIENTO CRÓNICO. 95 cua¬ necrosis délos huesos maxilares. Otro caso se tro en presentó en 1842, 1843, y tres en 1844 (1). Habiéndose presentado hechos análogos en Erlanger, en 1842, en Ileyfelder (2); en Nuremberh, al Doctor Diez (3); en Ludwigsbourg, para la observación de Hubbaner (4), y en Estras¬ burgo, en la clínica del Dr. Sédillot (5), y en la del profesor Strohl se convino generalmente en considerar á los vapores del fósforo como un agente tóxico que deba lugar á esa gangrena notable de los maxilares, del mismo modo que álos fenómenos generales debidos á la irritación de las membranas mucosas, y tal vez á la alteración de la sangre. Dupasquier, que emitió algunas dudas acerca de la acción especial, la clínica del Doctor atribuida en estas circunstancias al fósforo, hizo notar que esta sus¬ tancia está asociada por lo común con cierta cantidad El Doctor Chevalier fué del mismo modo de pensar berse convencido que en de arsénico (6). después de ha¬ los establecimientos donde se prepara el fós¬ observa ninguna alteración particular de los maxilares (7). Esta cuestión ha sido sometida á un examen pro¬ fundo por los señores Bibra y Geist, que han publicado sobre esta materia una obra ex-profeso (8), devolviendo al fósforo la parte prin¬ cipal en la producción de los efectos observados. Habiéndose establecido en París muchas fábricas de fósforo, los prácticos han tenido ocasión de convencerse de la realidad de los efectos funestos que producen los vapores fosfóricos. En las clínicas quirúrgicas se presentaron á poco muchos hechos de este género (9); y habiendo hecho el Doctor Teófilo Roussel observaciones muy exac¬ tas en los individuos atacados de esta especie de necrosis, se conven¬ ció que el punto de partida de todos los accidentes estaba en la foro con otro objeto, no se cáries dentaria. Según la teoría de Strohl, esta caries cantidad de ácido fosfórico formada en puede ser debida á una cierta la boca por la acción de la saliva mezclada con el vapor del fósforo. re, etc., (1) Ve la nécrose des os maxill. dét. par l'act. des vap. de trad. del Journal de Médecine de Bruxelles, 1845, p. 703. (2) Gaz Méd., 1846, p. 113. (3) (4) (3) (6) (7) (8) Id., p. 113. Id., p. 330. Sesión de la Academia de ciencias, 9 de marzo de 1846. Véase sus Memorias; Gaz Méd., 1846, p. 948. Academia de ciencias, sesión del 28 de setiembre de 1846. Véase en el estracto, Union méd., t. III, p. 94. phospho- (9) Gaz. des Ilópilaux, 1846, p. 297, 588.— Union, 1848, p, 101, 200, ctc- 96 ENFERMEDADES EN GENERAL. de la intoxicación, ó que sea la influencia en la producción de los siempre la atención y su constancia ha sido perfectamente establecida, como lo ha hecho observar el Dr. Geist. Sea lo que quiera, la ación de los vapores del fósforo empleado en Que la caries haya sido el efecto via por la cual esta se accidentes ha llamado efectúa, su , produce una clase de envenenamiento caractéres bien distintos, y una afección deter¬ minada, cual es la necrosis de los maxilares. En esto tal vez no pu¬ diera verse por algunos mas que un efecto local y directo, pero es im¬ posible desconocer en ella un sello especial dependiente acaso de una modificación del organismo. Hay también algunos hechos que atesti¬ guan la perturbación del sistema nervioso por el vapor del fósforo (1). la fabricación de los fósforos crónico que tiene sus I - INTOXICACION CRÓNICA POR EL IODO. prolongado del iodo determina la irritación de las vias diges¬ el enflaquecimiento. Jahn, de Meiningen, ha descrito con el nombre de enfermedad iódica el conjunto de síntomas que se atribuyen á esta causa. Los principales son : .° el enflaquecimiento; 2.° el aumento de las secre¬ ciones (orinas, materias alvinas, sangre menstrual y sudores); 3.° la disminución de consistencia de la sangre; 4.° una debilidad general; 5.° la sequedad déla boca y de la faringe; 6.° mayor irritabilidad (fenómenos histéricos, hipocondrio), y 7.° la tisis nerviosa. En la autopsia se ha observado una especie de atrofia general (2). En la actualidad no puede dudarse de la acción irritante del iodo, porque los espcrimentos de Orfila, hechos en sí mismo (3), no dejan la menor duda respecto de este punto. La sustancia que nos ocupa debe alterar profundamente la nutrición, á consecuencia de su in¬ fluencia perniciosa sobre los órganos digestivos. El ioduro de potasio, del cual se viene abusando hace ya algunos años, no tiene los mismos inconvenientes. Es verdad que muchas veces ha manifestado una eficacia muy notable; pero su empleo, aun escesivo, rara vez ha ido seguido de accidentes de iodismo. El uso tivas y K.—INTOXICACION CRÓNICA POR EL ALCOHOL. El uso escesivo y una prolongado de los licores espirituosos ejerce en la economía influencia tóxica. De él provienen diversos estados mor- (1) Obs. de IIuss. Archives de Méd.; febrero 1853, p. 219. (2) Véase el estrado de la Mem. de Jahn, en la Clinique, (3) Toxicologie , t. I, p. 60. 1830, t. II, p. 180. LESIONES VITALES Y ORGÁNICAS. 9T bosos; tales como el temblor nervioso habitual, el delirium tremens, y una especie de caquéxia que tenido á la diátesis purulenta. Las combustiones observan principalmente en ocasión de observar parecida llamadas espontáneas se las mujeres de edad entregadas á la be¬ he CRÓNICA POIt EL VINAGRE. bida del vino y aguardiente. L.-INTOX1CACION esceso Hay muchos jóvenes que por miedo de engordar beben vinagre con (I) y otros que lo toman por una depravación del gusto, tan frecuente en la edad de la pubertad. De cualquier modo, el uso de este su ácido altera lesión grave y y les pone pálidos, delgados y débiles. lie visto una rebelde de los órganos digestivos debida á esta causa. salud M.-INTOXICACION Los individuos que CRÓNICA POR EL CORNEZUELO DE CENTENO. hacen uso del pan en cuya composición entra cierta cantidad de tizón de centeno graves, que son mas esperimentan accidentes muy de dos órdenes : los unos parece que van á herir particularmente el sistema nervioso y consisten en espasmos, convulsiones, que es el ergotismo convulsivo, del cual nos ocupare¬ mos mas tarde; y los otros parecen el resultado de una debilidad profunda del sistema vascular (2), tal vez de la alteración de la san¬ gre. El efecto de esta sustancia que mas llama la atención es la gan¬ grena délas estremidades fergotismo gangrenoso), de la cual tenhablar. drémos también ocasión de 3.a DIVISION. LESIONES VITALES Y ORGANICAS. Llámase vital la acción de los una lesión cuando consiste su en un cambio anormal de órganos, de su modo de sentir ó funcionar, pero sin alteración apreciable de mas estructura. lesión el nombre de orgánica, cuando por la alteración manifiesta y prolongada de las cualidades físicas y de la textura de los órganos Recibe, por el contrario, una está caracterizada particularmente afectados. (1) Poitevin; Diss. sur le vinaigre. París, 1813 , p. 19. 12) Véase una memoria de Mojon sobre la acción dinámica del centeno cor¬ nezuelo. Gaz. méd., 1839, p. 37. TOMO II. 7 98 ¿ ENFERMEDADES EN GENERAL. Existen en fermedades simplemente vitales ? ¿ Las hay pura¬ mente orgánicas ? La primera cuestión suscita ya una dificultad, cual es ; ¿nuestros medios de investigación son suficientes para dar una idea exacta de todos los cambios que pueden esperimentar los tejidos? ¿No llegará la ciencia á descubrir muchos que harán distinguir alteraciones que en vano trataríamos de percibir hoy? No alcanza nuestra inteligencia á preveer todos los progresos que hará la anatomía patológica; pero esperándolos, estamos en el caso de razonar sobre los hechos tales como la observación nos los pre¬ senta y sin contar por mucho con las eventualidades del porvenir. Por , lo tanto nos creemos con derecho á admitir, al menos provisional¬ mente, que cierto número de enfermedades se engendran, y hasta matan sin haber alterado notablemente la organización de los tejidos, De este número son el tétanos, la hidrofobia , la aplopegía nerviosa, ciertos estados atóxicos, algunas especies de ejemplos se pueden unir ciertos venenos que van á los centros nerviosos, como los particularmente el ácido cianhídrico. Varias cina de Burdeos disnea, etc. A estos ó ejercer su acción estupefacientes, los narcóticos, y corporaciones científicas, y entre otras la Sociedad de Medi¬ en 1823, la de Moselle en 1829 (1) y el congreso de Poitiers en 1834 (2) han llamado la atención sobre el problema que rae ocupa. El examen de los hechos ha dado siempre por resultado la conclusión siguiente, á saber : que ciertas enfermedades deben consi¬ derarse como simplemente vitales, puesto que no dejan en los órga¬ nos ningún vestigio material, ninguna cicatriz. Boisseau, uno de los mas celosos partidarios de la doctrina orgánica, quería que se lla¬ masen estas enfermedades astigmáticas (3). nerviosas por suponer que Han recibido también el nombre de único elemento afectado porque el juego de los únicos primitivamente nifestar que es el el de la inervación, y órganos y alterados. de funcionales, el ejercicio de las funciones eran los Los médicos italianos han preferido llamarlas dinámicas, para ma¬ consisten principalmente en una alteración de las tuerzas que animan á los órganos. Estas denominaciones son casi sinónimas, y todas ellas no son mas que palabras convencionales, á las cuales hay necesidad de recurrir (1) Recue médicale, 1830, t. (2) Idem, 1834, t. IV, p. 148. IV, p. 313. (3j Journal hebdomadaire, 1831, t. III, p.'233. LESIONES VITALES V ORGÁNICAS. 99 para entenderse y distinguir las enfermedades que se limitan á modi¬ ficar las propiedades y alterar las funciones orgánicas, de las que des¬ naturalizan los tejidos, ó al menos que les hacen esperimentar cam¬ bios físicos evidentes. enfermedad puramente orgánica? ¿La estructura que la vitalidad haya sido ó esté modificada? Las lesiones orgánicas que no dependen de la acción in¬ mediata de las causas químicas, siendo perturbaciones del trabajo nutritivo y la nutrición un acto vital, no se concibe cómo los órga¬ nos pueden esperimentar en su constitución material alteraciones sensibles sin una modificación prévia de las fuerzas que presiden á su desarrollo ó mantenimiento. Con razón, pues, se ha dicho : toda en¬ ser una ¿Puede de los órganos puede cambiar sin fermedad es vital ó nerviosa , Tenemos, por una parte vitales en en su principio (4). enfermedades que no pueden ser mas que otra muy pocas que sean púramente orgánicas. Las mas de las veces son á la par vitales y orgánicas. En general la lesión de la vitalidad abre la escena y vá seguida bien pronto de la alteración de estructura (2). La inflamación, por ejem¬ plo, enfermedad primitivamente vital, determina en el color, consis¬ tencia, volumen, y mas tarde en la colocación molecular de las par¬ tes afectadas, alteraciones considerables. Del mismo modo una pro¬ su todo curso, y por ducción su vez orgánica, una alteración material de los tejidos, engendra á fenómenos nerviosos y lesiones funcionales. Las relaciones que existen entre la vitalidad y la textura, entre las lesiones vitales y ximación las alteraciones orgánicas, son tales, que la apro¬ consagrada por el título de este capítulo se halla plénamente en su justificada. Consideradas desarrollo ya En su partida, cuando principio son conjunto deben estudiarse : 4.° en su punto de simples y rudimentarias; 2.° en su estado de mas que en efectuado. no generadoras, primitivas ó fundamentales, bajo rifican los diversos sus modificaciones elementales, cuya influencia se ve¬ estados morbosos; al paso que consideradas en susceptibles. De aquí morbosos elementales consisten resultados ofrecen enfermedades formadas, recorriendo dos di¬ versos nacen periodos y trasformaciones de que son dos subdivisiones importantes : estados y enfermedades constituidas. (1) Dubois d'Amiens; Palh. générale, t. I, p. 175; t. II, (2) Lobstein; Anal, palhol., t. I, protégemenos, p. 37. 136 p. 400 ENFERMEDADES EN GENERAL. 1.a SUBDIVISION. AFECCIONES Ó ESTADOS MORBOSOS ELEMENTALES. Cuando la Escuela de afecciones elementales sus Mompeller proclamó la (4), fué necesario fijar su importancia de las número y determinar caractéres. | common_corpus | {'identifier': '0000255364_75', 'collection': 'Spanish-PD-Books', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1855.0', 'title': 'Tratado teórico y clínico de Patologia interna y de Terapeútica médica', 'creator': 'Gintrac, Elie -aut // Guerrero Vidal, Félix aut // Sánchez Ocaña, Estéban aut //', 'language': 'Spanish', 'language_type': 'Spoken', 'word_count': '7335', 'token_count': '12428', '__index_level_0__': '31641', 'original_id': '1262c5f5ed231970e074ad2f1abb81fd740baf7c149d50cee9524cfa7a3a83bd'} |
Background {#Sec1}
==========
Regular physical activity (PA) is associated with numerous health benefits \[[@CR1], [@CR2]\]. Adherence to PA recommendations is associated with a significant reduction in cardiovascular disease and all-cause mortality \[[@CR3]\].
Engagement in PA, especially at moderate and high intensities, decreases with ageing \[[@CR4], [@CR5]\], whereas multimorbidity increases \[[@CR6]\]. Additionally, sedentary behaviors are highly prevalent in older adults \[[@CR7]\]. The increase in sedentary behaviors and the concurrent decrease in PA in older adults are positively associated with weight gain and an increased incidence of obesity and obesity-related comorbidities \[[@CR8], [@CR9]\]. Therefore, it is paramount to implement PA intervention programs to improve physical and mental health in this growing segment of contemporary society.
A recently published meta-analysis \[[@CR10]\] of the effectiveness of PA interventions in older adults showed a moderate effect size of a difference of 73 min per week in favor of the intervention group compared with the control group. Whether this effect size is sufficient to promote a clinically significant reduction in weight gain is questionable \[[@CR11]\]. In contrast, short-term interventions with multiple structured and controlled sessions of moderate to vigorous exercise per week have a higher effect size regarding PA increase in the intervention group, and support weight loss and a reduction in waist circumference (WC) in older adults \[[@CR12]\]. However, maintaining such an intervention strategy is hardly feasible in the long run.
The present study assessed the effectiveness at one year of a PA intervention program included as one of the main aspects of the multilevel intervention in the ongoing PREDIMED-Plus primary prevention randomized trial, designed for older individuals at high risk for cardiovascular disease (CVD). We gave special attention to potential effect moderators, in particular sex, age, education, and obesity. Finally, we evaluated the one-year change in PA and changes in body mass index (BMI) and WC.
Methods {#Sec2}
=======
Study design {#Sec3}
------------
PREDIMED-Plus is a six-year, multicenter, parallel-group, randomized trial. Details on the protocol can be found at <http://predimedplus.com>/ \[[@CR13]\]. The ongoing PREDIMED-Plus trial was registered at the International Standard Randomized Controlled Trial (<http://www.isrctn.com/ISRCTN89898870>; registration date, 24 July 2014) \[[@CR14]\]. From October 2013 to December 2016, 6874 participants were recruited from 23 Spanish centers. Participants were randomly assigned, in a 1:1 ratio, to one of two groups: an intensive weight-loss intervention group (based on a Mediterranean diet (MedDiet) with energy restrictions, individualized PA promotion, and behavioral support) or a control group, which included an unrestricted-energy MedDiet and traditional health care. The primary endpoint of the ongoing PREDIMED-Plus trial is a combined cardiovascular outcome: myocardial infarction (acute coronary syndromes with positive troponin test), stroke, or cardiovascular mortality. The present study involved a secondary analysis of the PA data; this was not pre-specified in the PREDIMED-Plus trial protocol. The primary outcome in this analysis was the change in total-PA, light-PA, and moderate-to-vigorous PA, assessed within and between intervention groups. The analysis was a partial intention-to-treat analysis (PITT) with treatment group membership as per random allocation, but including only trial participants with complete one-year follow-up data \[[@CR15]\] related to the primary outcome of the present study (*n* = 6059).
Participants {#Sec4}
------------
Eligible participants were men (aged 55--75 years) and women (aged 60--75 years) at high risk of CVD. The inclusion criteria were overweight or obesity (BMI ≥27 and \< 40 kg/m2) and the presence of metabolic syndrome (i.e., fulfilling at least three of the metabolic dysfunction criteria defined by the International Diabetes Federation, American Heart Association, and National Heart, Lung, and Blood Institute \[[@CR16]\]. Exclusion criteria included previous history of cardiovascular disease, any chronic medical condition (cancer, inflammatory bowel disease, cirrhosis, etc.), acute infectious processes, institutionalization, psychiatric disorders, any condition inhibiting PA, alcohol and drug abuse, use of specific medications (cytotoxic agents, immune-suppressors, etc.), important weight loss within a short time-period, and any allergy to MedDiet foods. Data were recorded in each of the 23 centers of the ongoing PREDIMED-Plus trial. Research Ethics Committees from all 23 recruitment centers approved the protocol for the present study, according to the ethical standards of the Declaration of Helsinki and all participants provided written informed consent. This study followed the CONSORT guidelines for reporting \[[@CR17]\].
Intervention {#Sec5}
------------
The ongoing PREDIMED-Plus trial delivers a dietary and PA intervention aimed to promote weight loss and reduce hard cardiovascular events (<http://predimedplus.com>/) \[[@CR13]\]. Energy restriction and an increase in PA are essential to achieve weight loss. The PA intervention is a face-to-face tailored intervention program including goal setting (BCT taxonomy1.1) \[[@CR18]\], action planning (BCT taxonomy 1.4), feedback (BCT taxonomy 2.2), informational materials, motivation, and self-monitoring (BCT taxonomy 2.3). During the first year of the ongoing trial (the time period analyzed in the present study), participants in the intervention group received PA recommendations by means of a tailored face-to-face educational program including 12 individual one-hour sessions, 12 telephone calls, and 3 one-hour group sessions focused on PA. The program was delivered by dietitians who received additional training in PA recommendations. The one-year retention rate was high (89.7%).
During the individual face-to-face sessions in each of the 23 centers participating in the trial, the dietitians explained to each participant the health benefits of being physically active (BCT taxonomy 5.1). Together, they set tailored PA goals and an action plan, taking into account individual preferences and possibilities.
During the first 6 months of intervention, participants were encouraged to gradually increase their activity level to at least 150 min/week of moderate-to-vigorous PA (MVPA), with the ultimate goal of walking at least 45 min per day, 6 days per week, and doing static exercises to improve strength, flexibility, and balance according to specific instructions. In each individual session with the dietitian, feedback (BCT taxonomy 2.2) was provided on progress toward personal goals associated with other activities that improve strength, resistance, balance, and flexibility. Participants could discuss difficulties in completing individual goals with the dietitians, who provided options tailored to each participant (BCT taxonomy 1.2). In addition, videos and brochures were provided and discussed, and a monthly motivational phone call from the dietitian reinforced PA goals.
Due to the specific characteristics of the study population, goal-setting for aerobic PA was mainly based on walking. Participants received a pedometer (Yamax SW200 Digi-Walker) and a PA diary as self-monitoring and motivational tools. In each individual visit with the dietitian, participants were encouraged to continue a progressive increase in their level of PA. Fidelity to intervention adherence was measured by periodically administered REGICOR Short Physical Questionnaire (RSPAQ) and pedometers. Additionally, all participants in both groups received free virgin olive oil (6 l every 6 months) and nuts (3 kg every 6 months) to increase adherence to the PREDIMED-Plus protocol. Advice on PA was not given to the control group.
Measurements {#Sec6}
------------
At baseline, a general questionnaire \[[@CR19]\] was used to record socio-demographic variables, smoking status, medical history, and use of medication. Education level was dichotomized as having more or less than a primary education.
MedDiet adherence was measured by a 14-item diet questionnaire, previously validated \[[@CR20]\]. A 17-item questionnaire was used to assess adherence to the energy-restricted MedDiet and a 143-item food frequency questionnaire \[[@CR21]\] to measure energy intake. These three questionnaires were completed at baseline and after 6 and 12 months of follow-up. In the ongoing trial, these data are being collected annually.
Outcomes {#Sec7}
--------
The primary outcome of the present study, change in PA duration and intensity, was measured using the validated RSPAQ \[[@CR22]\] at baseline and at 6 and 12 months. The main construct of this questionnaire covers all four dimensions of PA: type of activity, frequency, duration, and intensity. The questionnaire lists 6 types of activities: walking, brisk walking, walking on trails/hiking, gardening, climbing stairs, and sport activities. To complete the questionnaire, trained personnel asked participants the number of days per month and the average minutes per day they performed the activity.
The validation study of the RSPAQ \[22\] revealed a high reliability (intraclass correlation coefficient for total-PA = 0.82) and a reasonable validity (Spearman correlation coefficient for total-PA = 0.39). Additionally, the RSPAQ was sensitive in detecting changes in moderate and vigorous PA from baseline to the last visit analyzed (week 27). The Spearmen correlation coefficients between changes in PA derived by the RSPAQ and by accelerometers were 0.34 (*p* = 0.001) and 0.28 (*p* = 0.008) for moderate and vigorous PA, respectively.
Total energy expenditure in PA was estimated in Metabolic Equivalent of Tasks (METs)/min/day. An intensity code was assigned to each activity according to the Compendium of Physical Activities \[[@CR23]\]. The METs assigned to each activity were then multiplied by the number of times per month and by the minutes per day the activity was performed. Finally, the values obtained were divided by 30 (days). PA was further classified according to intensity: light (\< 4 METs), moderate (4--5.5 METs), and vigorous (≥6 METs).
Secondary outcomes of the present study were changes in body mass index (BMI) and WC. Anthropometric variables (height, weight, WC) were directly measured using a wall-mounted stadiometer, electronic scale, and anthropometric tape, respectively. The BMI was calculated by dividing weight (kg) by the height squared (m^2^). Obesity was defined as BMI ≥30 kg/m^2^.
Sample size and randomization {#Sec8}
-----------------------------
Assuming a two-tailed alpha error of 0.05, a cumulative incidence in the control group after 6 years of at least 10%, an anticipated hazard ratio (HR) for the combined primary cardiovascular end-point of 0.70, and dropout rates of up to 20%, the required sample size was approximately 1600 participants per group. To be conservative, we aimed to recruit at least 6000 study participants (3000 in each group). Sample size calculation was performed for the primary outcome of the PREDIMED-Plus trial but not for secondary data analysis. Nonetheless, the secondary analysis is more than 99% powered for the main finding of the present study: daily average MVPA increased 123.1 (95%CI 109.7--136.6) METs-min/day between baseline and follow-up in the intervention group. Applying a potential drop-out rate of 20% and accepting an alpha risk of 0.05 and a beta risk of 0.2 in a two-sided test, 91 subjects were needed to recognize as statistically significant a difference greater than or equal to 0.05 units.
To assess willingness to participate in the study and to predict adherence to the intended intervention, participants attended a screening visit followed by a four-week run-in period before randomization. Study participants were randomized 1:1 into two groups; this procedure was blinded to all staff members and investigators. The random allocation was centralized and internet-based, generating blocks of 6 subjects stratified by sex, age (\< 65, 65--70, \> 70), and participating center. Spouses who wished to belong to the same group were randomized as a unit; this was the case for 806 participants (403 couples). Participants at each of the 23 centers received the information about their group allocation in the baseline visit.
Statistical analysis {#Sec9}
--------------------
Baseline characteristics of the study population are presented as means ± standard deviations (SD) or median and interquartile range for quantitative variables, and as numbers and percentages for categorical variables. Student t, Mann--Whitney U, and Chi-square tests were used to determine differences in baseline characteristics between the intervention and control groups.
Generalized estimating equation (GEE) models were used to asses i) time trends of BMI, WC, total-PA, light-PA, and MVPA in each group and ii) differences between the intervention and control groups in these same variables, taking into account repeated measurements in each participant. GEE models were also fitted for the analysis of total PA, light PA, and MVPA, stratified by the following potential moderators: sex (male/female), age (\< 65 years vs ≥65 years), educational level (primary vs more than primary education), and BMI (\< 30 kg/m^2^ vs ≥30 kg/m^2^).
Finally, we conducted multiple linear regression analysis with cubic spline modeling to determine dose-response associations between changes in MVPA and changes in BMI and WC in the control and the intervention group, using the 'gam' package in R version 3.0.2. No change in MVPA was set as the reference value. Models were adjusted for age, sex, education, smoking, changes in MedDiet adherence, and the corresponding anthropometric baseline value.
Associations were considered statistically significant if *P* \< 0.05. The SPSS for Windows version 21 (IBM Corp.: Armonk, NY, United States) and R-project, version 3.0.2 (R Foundation for Statistical Computing) were used for statistical analysis.
Results {#Sec10}
=======
From October 2013 to December 2016, 6874 participants were recruited from 23 Spanish centers (Flow chart, Figure [1](#Fig1){ref-type="fig"}). The majority of baseline characteristics (6 of 10) did not differ statistically between the intervention and control groups in this sub-sample of the ongoing PREDIMED-Plus trial (*n* = 6059), selected because of self-reported changes in PA levels. More participants in the intervention group (*n* = 2097) smoked and had lower baseline levels of total PA and MVPA, compared to the control group (*n* = 3086) (Table [1](#Tab1){ref-type="table"}).Fig. 1Flow chart of the PREDIMED Plus trialTable 1Baseline characteristics of study participantsAll\
(*n* = 6059)Control\
(*n* = 3086)Intervention\
(*n* = 2973)*P* ^1^Men3117 (51.4%)1583 (51.3%)1534 (51.6%)0.814Age, y65.0 (4.9)65.0 (4.9)64.9 (4.9)0.415Smoker863 (14.2%)405 (13.1%)458 (15.4%)0.011Education^2^3075 (50.8%)1522 (49.3%)1553 (52.2%)0.023BMI, kg/m^2^32.5 (3.45)32.5 (3.48)32.5 (3.43)0.948Waist, cm107 (9.69)108 (9.73)107 (9.65)0.511Light PA, METs min /d63.9 \[0.00;160\]63.9 \[0.00;160\]63.9 \[0.00;160\]0.659MVPA, METs min /d158 \[11;360\]160 \[12;375\]150 \[8;349\]0.015Total PA, METs min /d273 \[123;488\]280 \[130;499\]260 \[120;480\]0.012MDS, unit8.49 (2.68)8.54 (2.71)8.45 (2.65)0.180*BMI* body mass index, *MET* metabolic equivalent of task, *MDS* Mediterranean diet score, *MVPA* moderate-to-vigorous physical activity, *PA* physical activityCategorical, continuous normal, and continuous non-normal distributed variables are expressed as n (proportion), mean (standard deviation), and median (interquartile range), respectively^1^*p* value for difference between groups from t-test or chi-square test^2^more than primary school
MVPA increased a mean of 27.2 (5.7--48.7 95% CI) METs-min/day and 123.1 (109.7--136.6 95%CI) METs-min/day in the control and intervention group, respectively. An increase in MVPA was reported in 46.9% of the control group and 62.8% of the intervention group.
Total-PA, light-PA, and MVPA increased in both groups. The difference in PA at one-year follow-up, compared to baseline, was greater (*p* \< 0.001) in the intervention group, compared to the control group (Table [2](#Tab2){ref-type="table"}). At the same time-point, BMI and WC decreased significantly (*p* \< 0.001 for both), from 32.5 kg/m^2^ to 32.2 kg/m^2^ and from 107.5 cm to 106.4 cm, respectively, in the control group and from 32.5 kg/m^2^ to 31.1 kg/m^2^ and 107.4 cm to 103.0 cm, respectively, in the intervention group.Table 2Secular trends of physical activity in intervention (*n* = 2973) and control (*n* = 3086) groups^1^Baseline6 months12 months*p* ^2^*p* ^3^*Total PA (METs min/day)* -Intervention Absolute values228 (0.48)338 (0.48)359 (0.48)\< 0.001\< 0.001 Relative changeRef.1.06 (1.03 to 1.10)1.57 (1.51 to 1.64) -Control Absolute values247 (0.52)262 (0.52)277 (0.52)\< 0.001 Relative changeRef.1.06 (1.02 to 1.10)1.12 (1.08 to 1.17)*Light PA (METs min/day)* -Intervention Absolute values101 (0.49)120 (0.49)127 (0.49)\< 0.0010.064 Relative changeRef.1.06 (1.01 to 1.10)1.25 (1.19 to 1.31) -Control Absolute values103 (0.50)113 (0.50)121 (0.50)\< 0.001 Relative changeRef.1.06 (1.02 to 1.11)1.17 (1.11 to 1.23)*Moderate-to-vigorous PA (METs min/day)* -Intervention Absolute values126 (0.73)219 (0.73)231 (0.73)\< 0.001\< 0.001 Relative changeRef.1.05 (1.00 to 1.11)1.82 (1.71 to 1.95) -Control Absolute values142 (0.80)154 (0.80)160 (0.80)0.002 Relative changeRef.1.04 (0.98 to 1.10)1.12 (1.05 to 1.20)^1^General estimating equation models adjusted for sex, age, education, smoking, adherence to an energy-restricted Mediterranean diet, and baseline body mass index (BMI) were used to analyze the effect of the intervention on secular trends of leisure-time physical activity in comparison with the control group. Leisure-time PA data were log-transformed for analysis. Absolute values are presented in mean and standard error (SE) and relative change in exponential beta coefficient (95% confidence interval)^2^p for linear trend within groups^3^p between group comparison (group\*time interaction)
Table [3](#Tab3){ref-type="table"} shows the one-year PA trend in the intervention and control groups, stratified by sex (men/women), age (≤65y years / \> 65 years), BMI (\< 30.0 kg/m^2^ / ≥30 kg/m^2^), and educational level (primary education or less/more than primary education). Total PA increased in all of these strata in both groups, but significant differences between the two groups were observed in each stratum. In contrast, the increase in MVPA was significantly higher in the intervention group compared to the control group in 6 strata --men, women, both age strata, and both educational levels-- but did not differ according to BMI.Table 3Secular trends of physical activity according to intervention (*n* = 2793) and control (*n* = 3086) group stratified by sex, age, educational level, and body mass index^1^Baseline6 months12 monthsP^2^P^3^*Total PA (METs min/day)* Men - InterventionAbsolute values263 (0.65)397 (0.65)409 (0.65)\< 0.001\< 0.001Relative changeRef.1.03 (0.99 to 1.08)1.56 (1.47 to 1.65) - ControlAbsolute values294 (0.73)306 (0.73)332 (0.73)\< 0.001Relative changeRef.1.08 (1.03 to 1.14)1.13 (1.07 to 1.19) Women - InterventionAbsolute values195 (0.65)284 (0.65)310 (0.66)\< 0.001\< 0.001Relative changeRef.1.09 (1.04 to 1.15)1.60 (1.50 to 1.69) - ControlAbsolute values205 (0.70)221 (0.71)229 (0.71)0.001Relative changeRef.1.04 (0.98 to 1.10)1.12 (1.05 to 1.19)*Light PA (METs min/day)* Men - InterventionAbsolute values105 (0.68)124 (0.68)129 (0.68)\< 0.0010.147Relative changeRef.1.04 (0.97 to 1.10)1.23 (1.15 to 1.32) - ControlAbsolute values107 (0.70)116 (0.71)125 (0.71)\< 0.001Relative changeRef.1.08 (1.02 to 1.15)1.17 (1.09 to 1.25) Women - InterventionAbsolute values98 (0.65)116 (0.65)124 (0.65)\< 0.0010.226Relative changeRef.1.07 (1.01 to 1.14)1.27 (1.19 to 1.36) - ControlAbsolute values100 (0.66)111 (0.66)116 (0.66)\< 0.001Relative changeRef.1.04 (0.98 to 1.11)1.17 (1.09 to 1.25)*MVPA (METs min/day)* Men - InterventionAbsolute values150 (0.98)264 (0.98)273 (0.98)\< 0.001\< 0.001Relative changeRef.1.03 (0.96 to 1.11)1.82 (1.66 to 1.98) - ControlAbsolute values174 (1.08)187 (1.08)196 (1.08)0.014Relative changeRef.1.05 (0.97 to 1.14)1.13 (1.03 to 1.23) Women - InterventionAbsolute values103 (1.04)177 (1.04)190 (1.04)\< 0.001\< 0.001Relative changeRef.1.07 (0.99 to 1.17)1.84 (1.66 to 2.04) - ControlAbsolute values113 (1.12)123 (1.13)126 (1.12)0.070Relative changeRef.1.03 (0.94 to 1.12)1.12 (1.01 to 1.24)*Total PA (METs min/day)* Age, ≤ 65 years - InterventionAbsolute values216 (0.66)337 (0.66)353 (0.66)\< 0.001\< 0.001Relative changeRef.1.05 (1.00 to 1.10)1.64 (1.54 to 1.74) - ControlAbsolute values241 (0.72)261 (0.72)284 (0.72)\< 0.001Relative changeRef.1.09 (1.03 to 1.14)1.18 (1.11 to 1.24) Age, \> 65 years - InterventionAbsolute values242 (0.64)340 (0.64)365 (0.64)\< 0.001\< 0.001Relative changeRef.1.07 (1.03 to 1.12)1.51 (1.42 to 1.60)Baseline6 months12 monthsP^2^P^3^ - ControlAbsolute values253 (0.72)261 (0.72)270 (0.72)0.085Relative changeRef.1.03 (0.98 to 1.09)1.07 (1.00 to 1.13)*Light PA (METs min/day)* Age, ≤ 65 years - InterventionAbsolute values95 (0.69)115 (0.69)122 (0.70)\< 0.0010.102Relative changeRef.1.06 (1.00 to 1.13)1.28 (1.20 to 1.37) - ControlAbsolute values100 (0.65)112 (0.65)116 (0.65)\< 0.001Relative changeRef.1.03 (0.97 to 1.10)1.16 (1.09 to 1.24) Age, \> 65 years - InterventionAbsolute values109 (0.66)126 (0.66)132 (0.66)\< 0.0010.269Relative changeRef.1.05 (0.98 to 1.12)1.21 (1.14 to 1.30) - ControlAbsolute values107 (0.68)115 (0.68)126 (0.68)\< 0.001Relative changeRef.1.10 (1.03 to 1.16)1.18 (1.10 to 1.26)*MVPA (METs min/day)* Age, ≤ 65 years - InterventionAbsolute values123 (0.95)222 (0.95)229 (0.95)\< 0.001\< 0.001Relative changeRef.1.03 (0.96 to 1.11)1.87 (1.71 to 2.04) - ControlAbsolute values141 (1.06)162 (1.06)172 (1.06)\< 0.001Relative changeRef.1.06 (0.98 to 1.15)1.22 (1.11 to 1.33) Age, \> 65 years - InterventionAbsolute values131 (1.06)216 (1.06)232 (1.06)\< 0.001\< 0.001Relative changeRef.1.07 (0.99 to 1.16)1.78 (1.61 to 1.96) - ControlAbsolute values144 (1.17)145 (1.18)147 (1.17)1.00Relative changeRef.1.02 (0.93 to 1.11)1.02 (0.93 to 1.13)*Total PA (METs min/day)* BMI \< 29.9 kg/m^2^ - InterventionAbsolute values278 (0.79)386 (0.79)405 (0.79)\< 0.001\< 0.001Relative changeRef.1.05 (0.99 to 1.11)1.46 (1.35 to 1.56) - ControlAbsolute values287 (0.88)295 (0.88)313 (0.88)0.032Relative changeRef.1.06 (1.00 to 1.13)1.09 (1.02 to 1.17) BMI ≥ 30 kg/m^2^ - InterventionAbsolute values211 (0.57)322 (0.57)343 (0.57)\< 0.001\< 0.001Relative changeRef.1.06 (1.03 to 1.11)1.62 (1.54 to 1.71) - ControlAbsolute values233 (0.63)250 (0.63)265 (0.63)\< 0.001Relative changeRef.1.06 (1.01 to 1.11)1.14 (1.08 to 1.19)*Light PA (METs min/day)* BMI \< 29.9 kg/m^2^ - InterventionAbsolute values107 (0.87)124 (0.88)127 (0.87)\< 0.0010.527Relative changeRef.1.03 (0.94 to 1.12)1.19 (1.08 to 1.30) - ControlAbsolute values104 (0.94)111 (0.94)120 (0.94)0.004Relative changeRef.1.08 (1.00 to 1.17)1.16 (1.05 to 1.27) BMI ≥ 30 kg/m^2^ - InterventionAbsolute values99 (0.56)119 (0.56)126 (0.56)\< 0.0010.073Relative changeRef.1.07 (1.01 to 1.12)1.27 (1.20 to 1.35) - ControlAbsolute values103 (0.59)114 (0.59)121 (0.59)\< 0.001Relative changeRef.1.06 (1.01 to 1.12)1.17 (1.11 to 1.24)*MVPA (METs min/day)* BMI \< 29.9 kg/m^2^ - InterventionAbsolute values160 (1.18)251 (1.18)274 (1.18)\< 0.0010.001Relative changeRef.1.09 (0.99 to 1.20)1.72 (1.53 to 1.93) - ControlAbsolute values171 (1.41)189 (1.41)205 (1.41)0.003Relative changeRef.1.08 (0.98 to 1.20)1.20 (1.07 to 1.34) BMI ≥ 30 kg/m^2^ - InterventionAbsolute values115 (0.89)208 (0.89)215 (0.89)\< 0.001\< 0.001Relative changeRef.1.04 (0.97 to 1.11)1.87 (1.73 to 2.03) - ControlAbsolute values133 (0.97)142 (0.97)145 (0.97)0.065Relative changeRef.1.02 (0.95 to 1.10)1.09 (1.01 to 1.19)*Total PA (METs min/day)* Primary education or less - InterventionAbsolute values230 (0.67)333 (0.67)361 (0.67)\< 0.001\< 0.001Relative changeRef.1.09 (1.04 to 1.14)1.57 (1.48 to 1.67) - ControlAbsolute values242 (0.74)260 (0.74)273 (0.74)\< 0.001Relative changeRef.1.05 (1.00 to 1.11)1.13 (1.06 to 1.20) More than primary education - InterventionAbsolute values226 (0.64)343 (0.64)356 (0.64)\< 0.001\< 0.001Relative changeRef.1.04 (0.99 to 1.09)1.58 (1.49 to 1.67) - ControlAbsolute values252 (0.71)263 (0.71)282 (0.71)\< 0.001Relative changeRef.1.07 (1.02 to 1.13)1.12 (1.06 to 1.18)*Light PA (METs min/day)* Primary education or less - InterventionAbsolute values105 (0.70)124 (0.70)129 (0.70)\< 0.0010.170Relative changeRef.1.04 (0.97 to 1.11)1.23 (1.14 to 1.32) - ControlAbsolute values107 (0.67)115 (0.67)123 (0.67)\< 0.001Relative changeRef.1.06 (1.00 to 1.13)1.15 (1.07 to 1.23) More than primary education - InterventionAbsolute values98 (0.64)116 (0.64)125 (0.64)\< 0.0010.355Relative changeRef.1.07 (1.01 to 1.14)1.27 (1.19 to 1.36) - ControlAbsolute values99 (0.71)112 (0.71)119 (0.71)\< 0.001Relative changeRef.1.06 (1.00 to 1.13)1.19 (1.11 to 1.28)*MVPA (METs min/day)* Primary education or less - InterventionAbsolute values128 (1.03)208 (1.03)220 (1.03)\< 0.001\< 0.001Relative changeRef.1.06 (0.98 to 1.15)1.73 (1.56 to 1.91) - ControlAbsolute values132 (1.17)144 (1.17)152 (1.17)0.008Relative changeRef.1.05 (0.97 to 1.15)1.16 (1.05 to 1.27) More than primary education - InterventionAbsolute values125 (0.99)230 (0.99)240 (0.99)\< 0.001\< 0.001Relative changeRef.1.04 (0.97 to 1.12)1.92 (1.75 to 2.10) - ControlAbsolute values154 (1.05)164 (1.05)168 (1.05)0.128Relative changeRef.1.02 (0.94 to 1.11)1.09 (1.00 to 1.19)^1^General estimating equation models adjusted for sex, age, education, smoking, adherence to an energy-restricted Mediterranean diet, and baseline BMI were used to analyze the effect of the intervention on secular trends of leisure-time physical activity in comparison with the control group. Leisure-time physical activity data were log-transformed for analysis. Absolute values are presented in mean and standard error (SE) and relative change in exponential beta coefficient (95% confidence interval)*BMI* body mass index, *MET* metabolic equivalent of task, *MDS* Mediterranean diet score, *MVPA* moderate to vigorous physical activity, *PA* physical activity^2^p for linear trend within groups^3^p between-group comparison (group\*time interaction)
Figure [2](#Fig2){ref-type="fig"} shows the dose-response relationship between one-year changes in MVPA and changes in BMI and WC in each group. In both groups, BMI and WC decreased significantly (*p* \< 0.001) with increasing MVPA, compared with participants who reported no changes in MVPA.Fig. 2Dose-effect association between one-year differences in moderate/vigorous physical activity and one-year differences in body mass index (BMI) and waist circumferences. **a**: BMI intervention group; **b**: BMI: control group; **c**: Waist circumferences intervention group; **d**: Waist circumferences control group. All models were adjusted for sex, age, smoking, educational level, and baseline value of the corresponding anthropometric variable. Moderate-to-vigorous PA (MVPA) was measured in METs·min/day
Discussion {#Sec11}
==========
Participants in the personalized PA intervention program in the ongoing PREDIMED-Plus trial significantly increased all levels of PA studied after the first year of intervention; a modest but significant increase was also found in the control group. The increase of total PA and MVPA in the intervention group was significantly greater than that in the control group. Furthermore, increased MVPA was associated with a decrease in BMI and WC in both groups.
There is abundant evidence on the effectiveness of intervention programs aimed to improve PA behaviors in older adults \[[@CR24]\]; a recently published meta-analysis found a significant difference of 73 more minutes of PA per week in the intervention versus the control group \[[@CR10]\]. However, the heterogeneity in study design makes it difficult to determine which intervention strategies and components exert this desirable effect on PA behaviors. There is evidence that setting tailored intervention goals to specifically address questions of when, how, and where the participant is able to engage in PA are a promising approach to improvement of PA behaviors \[[@CR24]\]. The PREDIMED-Plus PA intervention program was designed to support tailored goal-setting not only for the type of PA but also where and how the activity is feasible. It includes additional intervention components such as problem-solving, self-monitoring, feedback, informational materials, and motivation. PREDIMED-Plus trial participants are older adults with overweight or obesity and high cardiometabolic risk. Therefore, setting a daily walking goal was the first choice to increase aerobic activity in this population. As an incentive to complete individually tailored walking goals, intervention group participants received a pedometer, a motivational tool that has been shown to promote PA and consequently improve health \[[@CR25]--[@CR27]\]. The 52% increase in daily MVPA observed in the intervention group might be partially explained by the motivational effect of the pedometer.
An increase of 10% in daily MVPA was observed in the control group, although PA was not specifically promoted to this group; only MedDiet adherence was emphasized, and without restrictions on energy intake. A healthy change in other lifestyle determinants such as PA could be an additional effect of the usual clinical counseling; alternatively, trial effect (either contamination of some portion of the control group or the influence of participation in a study) could be responsible for the slight increase in MVPA.
A recent meta-analysis of pooled data on the effect of walking on cardiovascular risk factors showed a significant reduction in systolic and diastolic blood pressures and anthropometric surrogate markers of body fat \[[@CR28]\]. In the present study, BMI and WC measurements significantly decreased as MVPA levels increased, with a comparable effect size in both groups; however, the mean increase in MVPA was considerably higher in the intervention group. Together with the concurrent dietary caloric restriction in the intervention group, this drastic increase in MVPA would explain, at least partly, the significant difference between the study groups in BMI and WC after 1 year of intervention.
Finally, we addressed the question of whether a particular subgroup of participants benefitted less from the first year of the PREDIMED-Plus PA intervention program. Evidence from the English Longitudinal Study of Ageing \[[@CR29]\] indicates that being younger, male, a non-smoker, and of normal weight are predictors for being continuously physically active over 10 years. Furthermore, a higher educational level is associated with more PA engagement in older adults \[[@CR30], [@CR31]\]. In the present study, these moderators did not meaningfully influence the effectiveness of the PREDIMED-Plus PA intervention, perhaps due to the affordability of walking, the main activity that was promoted. An increase in the daily duration of walking did not imply additional costs such as joining a fitness club or the purchase of exercise-specific clothing. Therefore, adherence was feasible independently of economic status. Previous reports have shown that economic costs of adherence to a PA intervention program are an important barrier to participation, especially for individuals with low income \[[@CR32]\].
A limitation of the present study was the use of self-reported data to evaluate the effectiveness of the PA intervention. Recall and reporting biases are inherent limitations of self-reported data. Furthermore, it has been shown that data from questionnaires overestimate the engagement in PA, compared to objective measurement by accelerometer \[[@CR33]\]. However, it is reasonable to assume that these biases have similar effects in intervention and control groups. A further limitation was that the present analysis was not based on intention-to-treat. Tailored recommendations were focused on walking, assumed to be an affordable activity for all participants, as the first choice to increase aerobic activity. However, program affordability was not assessed. The strengths of the present study were the clinical trial design, repeated data collection, standardized measurements of anthropometric variables, and the relatively large sample size. In a multi-component intervention, we cannot rule out the possibility that the dietary component also had an effect on the reported PA outcomes, and vice versa. Future analysis will explore possible interactions between the dietary and PA components.
The study results showed the effectiveness of the PREDIMED-Plus PA intervention to increase daily PA in older adults. Implementation of this program in clinical practice would be an important step to combat the increasing prevalence of physical inactivity. Most importantly, this PA intervention program is affordable for participants.
Conclusion {#Sec12}
==========
The PREDIMED-Plus PA intervention program increased PA in older adults at high risk of cardiovascular disease after 1 year of intervention. This increase was not affected by potential moderators analyzed: sex, age, education level, and obesity.
BMI
: Body mass index
GEE
: Generalized estimating equation
MedDiet
: Mediterranean diet
MET
: Metabolic Equivalent of Task
MVPA
: Moderate-to-vigorous PA
PA
: Physical activity
SD
: Standard deviation
WC
: Waist circumference
The authors thank the participants for their enthusiastic collaboration, and the PREDIMED-Plus personnel and investigators, as well as all affiliated primary care centers, for their excellent work. We appreciate the English revision by Elaine M. Lilly, Ph.D.
Funding {#FPar1}
=======
This work was supported by the Spanish Ministry of Health (Carlos III Health Institute) through the Fondo de Investigación para la Salud (FIS), which is co-funded by the European Regional Development Fund (two coordinated FIS projects led by Jordi Salas-Salvado and Josep Vidal, funded by the following grant codes: PI13/00673, PI13/00492, PI13/00272, PI13/01123, PI13/00462, PI13/00233, PI13/02184, PI13/00728 PI13/01090 PI13/01056, PI14/01722, PI14/00636, PI14/00618, PI14--00696, PI14/01471, PI14/01206, PI14/01919, PI14/00853 \[JV and JSS\]; the European Research Council (Advanced Research Grant 2013--2018; grant number 340918) \[MAMG\]; Recercaixa (2013ACUP00194); the Consejería de Salud de la Junta de Andalucía (grant number PI0458/2013) and a SEMERGEN grant. None of the funding sources took part in the design, collection, analysis or interpretation of the data, or in the decision to submit the manuscript for publication. CIBERobn (Centros de Investigación Biomedica en Red: Obesidad y Nutrición), CIBEResp (Centros de Investigación Biomedica en Red: Epidemiología y Salud Publica) and CIBERdem (Centros de Investigación Biomedica en Red: Diabetes y Enfermedades Metabolicas asociadas) are initiatives of ISCIII, Madrid, Spain.
Availability of data and materials {#FPar2}
==================================
There are restrictions on the availability of data for the PREDIMED-Plus trial, due to the signed consent agreements around data sharing, which only allow access to external researchers for studies following the project purposes. Requestors wishing to access the PREDIMED-Plus trial data used in this study can make a request to the PREDIMED-Plus trial Steering Committee chair: jordi.salas\@urv.cat. The request will then be passed to members of the PREDIMED-Plus Steering Committee for deliberation.
HS and JSS drafted the manuscript. JSS supervised the study. HS and GCF completed the analysis. All authors were involved in oversight of recruitment, data collection, and revision pf the manuscript. MAMG, DC, JV, DR, JAM, FJT, JLM, RE, ABC, FA, JAT, JW, LSM, CV, JL, XP, JV, LD, JJG, PMM, ER, MF, JSS receive funding. All authors read and approved the final manuscript.
Ethics approval and consent to participate {#FPar3}
==========================================
Research Ethics Committees from all recruitment centers approved the study protocol, according to the ethical standards of the Declaration of Helsinki. All participants provided written informed consent.
Consent for publication {#FPar4}
=======================
Not applicable.
Competing interests {#FPar5}
===================
The authors declare that they have no competing interests.
Publisher's Note {#FPar6}
================
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
| mini_pile | {'original_id': '3c7102e21939cc19f9137de83a177e8360bacd03de0dac7a46d1b0a903b533e3'} |
Bromley-Heath housing complex to get $16 million learning center that focuses on entire families
Share via e-mail
Boston officials and education leaders will break ground Friday on a $16 million learning center at the Bromley-Heath housing development that aims to teach children, their parents, and other members of their community in the same space.
“The more we looked at what really moves the dial for low-income, at-risk kids, we realized we had to focus on the economic stability of the entire family,” said Wayne Ysaguirre, head of Associated Early Care and Education, a Boston nonprofit that is spearheading the project.
The organization has specialized in teaching young children for more than a century and opened an early education center at Bromley-Heath 60 years ago. The complex is located where Jamaica Plain, Mission Hill, and Roxbury converge.
Latoya Taromino’s 3-year-old son, Anthony, is one of about 80 children enrolled at the old center. Working full time as a receptionist and raising three children by herself, the 31-year-old Bromley-Heath resident said she had struggled at times to teach her youngest son. He could not count to 10, for instance, and he fell behind his peers.
Get Fast Forward in your inbox:
Forget yesterday's news. Get what you need today in this early-morning email.
But since Anthony joined the early-learning program two summers ago, she said, he has made dramatic improvement. He can count to 30; he knows his ABCs and shapes; he speaks in clear, full sentences, she said. “He’s actually a little ahead.”
Already appreciative, she said, she could not have been more excited to learn about the new, cutting-edge center, expected to open in 2014 .
The existing site at Bromley-Heath is located in an old basement. After trying for two decades, operators secured new property nearby four years ago, and planning began.
The core component will be early education. The new facility will have room for about 175 children up to age 8.
More than a dozen other organizations will share resources, including the Thrive in 5 initiative, which is run by the city and the United Way of Massachusetts Bay and Merrimack Valley. The initiative prepares Boston children for kindergarten.
The center’s 150 educators will be required to have at least a bachelor’s degree, a high requirement for early education, Ysaguirre said.
The 20,000-square-foot facility will be run as a lab school, incorporating the latest research on creative curriculum and teaching methods.
The energy-efficient building will be paid for by a $5 million federal grant, a $1.5 million state grant, and private donations.
“We can’t engage a kid without engaging their parents,” said Kate Bennett, chief of development for the Boston Housing Authority, which oversees the city’s public housing.
Career-focused courses will be offered to about 150 adults. Another 700 can enroll in programs on parenting, financial stability, and nutrition.
Officials also envision that the center will improve the well-being of Bromley-Heath’s 1,800 residents. More than 40 percent of adults do not have a high school diploma.
“There’s so much going on in that community; they need a catalyst for change,” said state Representative Jeffrey Sanchez.
Sanchez said that when he was 4, he enrolled in the Associated Early Care and Education center in the Mission Main housing development after his Spanish-speaking family moved from New York City.
“It’s where I learned English,” he said. “I hope more children who are in the same situation that I was in can access programs like this.” | mini_pile | {'original_id': '7436bc6bd6a09d2900c84fb95f6c3e83a9ca1681f5734a5a671d7df16fe5a86a'} |
0.366119
0.331233
0.610695
1.524935
1.176618
1.924630
1.857426
2.551698
2.605480
2.788697
3.627434
3.708286
4.391315
4.495612
4.394221
5.076522
5.265078
5.673888
5.277732
5.677844
6.111120
6.678736
6.202205
6.450976
6.989453
7.738616
7.458914
7.212135
7.977031
7.721584
8.161013
8.674436
8.129790
8.685869
8.520756
9.314461
8.677553
9.415245
8.921136
9.494561
9.973517
9.705965
9.687609
9.969769
9.754941
10.345648
9.461419
10.246713
10.187114
9.630470
9.669675
10.267918
10.284341
9.713584
10.256162
10.310564
9.356800
9.575991
9.278806
9.472037
9.237942
9.198652
9.150295
8.637154
9.091571
9.118206
8.164727
8.348762
8.260666
8.061010
7.965709
8.030991
7.654971
7.472360
6.940392
6.387030
6.326270
6.090253
6.455388
6.298251
5.677700
5.342790
4.786785
4.346588
4.815064
3.794358
4.413742
3.594544
3.751812
2.974342
2.446709
2.390452
2.191868
2.340247
1.281311
0.835827
1.325776
0.862604
0.493945
0.017983
-0.386180
-0.907713
-1.169537
-1.189903
-1.124533
-1.927129
-2.389336
-2.778833
-3.031388
-2.644393
-3.815588
-3.215374
-4.378330
-3.815479
-4.591347
-4.856185
-4.963528
-4.923010
-5.602814
-6.369850
-6.495893
-6.497077
-7.059734
-6.587248
-6.594100
-7.011402
-7.343208
-7.918342
-8.249964
-7.941911
-8.259644
-8.407434
-8.462273
-8.794008
-8.710494
-8.829889
-9.504753
-9.578112
-9.833780
-9.273801
-10.032940
-10.002729
-9.793140
-9.698123
-9.651685
-9.705378
-9.688603
-9.601584
-10.339045
-10.169548
-9.610776
-9.883268
-10.121709
-9.701113
-9.973556
-9.460434
-10.203069
-9.720142
-9.494389
-9.060266
-9.873612
-9.659427
-8.907117
-9.092027
-8.529023
-8.855924
-8.648604
-8.380416
-8.284173
-8.141981
-8.023554
-7.569727
-7.577965
-7.170856
-6.811703
-7.013923
-7.046021
-5.920619
-6.238431
-6.231047
-5.902378
-5.600168
-5.148984
-4.913023
-4.377938
-4.753683
-3.986709
-3.305330
-3.830635
-2.726288
-3.145013
-2.124463
-1.817415
-2.262110
-1.820787
-1.724851
-1.042548
-0.426663
-0.489976
-0.250578
| the_stack | {'hexsha': '486ae1ff13860970c2a6142cda55784c8ecf23e1', 'size': '2113', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'data/signal05/signal6136.txt', 'max_stars_repo_name': 'ECE1747Project2016/final', 'max_stars_repo_head_hexsha': '29fdc3e354efcde68be161132ab1a12c0beb8934', 'max_stars_repo_licenses': "['BSD-3-Clause']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'data/signal05/signal6136.txt', 'max_issues_repo_name': 'ECE1747Project2016/final', 'max_issues_repo_head_hexsha': '29fdc3e354efcde68be161132ab1a12c0beb8934', 'max_issues_repo_licenses': "['BSD-3-Clause']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'data/signal05/signal6136.txt', 'max_forks_repo_name': 'ECE1747Project2016/final', 'max_forks_repo_head_hexsha': '29fdc3e354efcde68be161132ab1a12c0beb8934', 'max_forks_repo_licenses': "['BSD-3-Clause']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '10.5124378109', 'max_line_length': '11', 'alphanum_fraction': '0.6687174633', 'original_id': 'f07a3224a2e4239e6d1035fc12e8665b79b41e186d41cf978417d04567b4f09f'} |
Loading Downloads
A monthly podcast about roleplaying games as a social activity
Episode 10: New Gamers, Playing with Canon
October 28, 2014
In this episode we have two discussion segments, with two sets of guests.
In the first segment we talk about novice gamers. What did new gamers expect coming into the game, and what drew them in in the first place? What learning curves exist? What pitfalls exist for GMs and experienced players when gaming with first-timers? Many thanks to Sonya and Hermina for joining me for this segment.
In the second segment we talk about playing a game with existing fictional canon. What is it like to play a game in an existing fictional universe? What are some of the challenges when you aren't familiar with the source material? Many thanks to Marcus, Courtney and Susie for returning to the show for this segment.
Show links:
Music by Jason Pfaff, released under the CC BY-SA license. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9520127177238464}", 'metadata': "{'Content-Length': '54211', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ED3TUETDWGQNFHOXLWW2BOKD3TDB67I3', 'WARC-Concurrent-To': '<urn:uuid:1de1eab8-672c-466c-9230-e4a3cd08ce14>', 'WARC-Date': datetime.datetime(2019, 5, 21, 1, 36, 14), 'WARC-IP-Address': '35.170.137.140', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:LVFNB2BH6W26XBAG5E65PGIVQN67GQDS', 'WARC-Record-ID': '<urn:uuid:eb40364f-8437-4dc5-a626-fe3c0e0f1429>', 'WARC-Target-URI': 'http://podcast.howweplay.com/e/episode-10-new-gamers-playing-with-canon', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:326808b7-1669-4627-a820-6ebc45458b39>', 'WARC-Truncated': None}", 'previous_word_count': '158', 'url': 'http://podcast.howweplay.com/e/episode-10-new-gamers-playing-with-canon', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-171-211.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0363461971282959', 'original_id': 'fa634674e1b718cb6e52bdf1499304ace49e5b551a2465a375eaac6ab0522b45'} |
680 P.2d 1135 (1984)
Howard WICKERSHAM, James Wickersham, Leroy Clendenen, Roy Beaver, Grigory Gostevskyh, and Artemy Polushkin, Appellants,
v.
STATE of Alaska, COMMERCIAL FISHERIES ENTRY COMMISSION, Appellee.
No. 5780.
Supreme Court of Alaska.
March 30, 1984.
*1138 C. Michael Hough, Homer, for appellants.
John B. Gaguine, Asst. Atty. Gen., Wilson L. Condon, Atty. Gen., Juneau, for appellee.
Before BURKE, C.J., and RABINOWITZ, MATTHEWS, COMPTON and MOORE, JJ.
OPINION
BURKE, Chief Justice.
I. INTRODUCTION
This case is a consolidation of six appeals arising under the Alaska Limited Entry Act, AS 16.43.010-16.43.990.[1] All six appellants filed untimely applications to the Commercial Fisheries Entry Commission [hereinafter "CFEC" or "Commission"] for entry permits into either the Prince William Sound or Cook Inlet drift gill net fisheries. One of the appellants, Leroy Clendenen, was an Isakson applicant, meaning that he held a gear license for the first time in 1973 or 1974 and, therefore, had to file an application by September 30, 1977 with a 30 day extension available for good cause. 20 AAC 05.510(f). See Isakson v. Rickey, 550 P.2d 359 (Alaska 1976). The other appellants were all eligible to apply during the original application period[2] which ended April 18, 1975 with a 30 day extension available for good cause.[3] Since all of these applications were received after the applicable deadline, the Commission mailed each of the appellants a form letter denying evaluation of their respective applications. Each of the appellants requested a hearing to explain the reason for their untimeliness, but the Commission also denied these requests. The Commission informed each applicant that it would only accept an untimely application if it was late because of reliance upon misinformation given by the Commission or one of its agents, or the application was timely submitted but lost in the mail, the "misadvice or lost in the mail" policy. The Commission found that none of the reasons advanced by any of the appellants came within either of these two exceptions and, therefore, refused to grant administrative hearings.[4]
*1139 Each of the applicants appealed the CFEC's denial to the superior court, but that court affirmed the Commission's decision as to all six appellants. This appeal followed.
The appellants present three primary reasons why the Commission should be required to consider their applications. First, appellants contend that the Commission's practice of internally circulating memoranda violated both the Administrative Procedure Act (APA), AS 44.62.010 44.62.650, and appellants' rights to due process. Second, they contend that the Commission's use of an application deadline violated their rights to equal protection. Third, appellants contend that the notice they received of the permit application process was constitutionally inadequate under the due process clauses of the federal and state constitutions. U.S. Const., amend. XIV § 1, Alaska Const. art. I, § 7.
For the reasons discussed below, we affirm the summary denial of the applications of James Wickersham, Howard Wickersham, Clendenen and Polushkin. As to appellants Beaver and Gostevskyh, we reverse and remand. We find that the Commission's efforts at notification of these two appellants were insufficient under the due process clause of the Alaska Constitution.[5]
II. THE ADMINISTRATIVE PROCEDURE ACT
Appellants contend that the Commission violated the Administrative Procedure Act, AS 44.62.010-44.62.320 and 44.62.640,[6] by adopting what were in effect regulations without complying with notice and publication requirements. They also contend that Commission reliance on these regulations, characterized as memoranda or policy within the Commission, violated appellants' rights to due process.
Appellants submitted over twenty Commission documents acquired under a Freedom of Information Act request of July 25, 1979. The documents are primarily memoranda circulated within the Commission on a variety of issues. For example, they include guidelines for deciding what unavoidable circumstances will warrant "special circumstances" consideration by a hearing officer, treatment of investment points for spouses, apportionment of vessel points between married couples fishing as a de facto partnership, and criteria for awarding military service credit. These documents are primarily communications between Commissioners and hearing officers. Eight of the documents deal specifically with the treatment of late applications. These include a letter from one of the hearing officers to the three Commissioners and the other hearing officer in response to a request from one of the Commissioners for input regarding late applications, a letter from the Attorney General's Office to the Legislative Affairs Agency detailing the CFEC position on late applications, and a Commission adjudication decision denying consideration of an application due to its untimeliness. From these documents, it is apparent that the Commission's policy was to accept late applications only in two situations when the application was timely postmarked but lost in the mail, or the failure to apply was due to reliance on Commission misadvice.
At the outset, the Commission maintains that appellants lack standing to contest these Commission procedures. In challenges to administrative practices, "this court has `liberally construed the judicial limitation of standing and has favored increased accessibility to the courts.'" Sisters of Providence in Washington, Inc. v. Department of Health and Social Services, 648 P.2d 970, 974 (Alaska 1982) quoting State v. Lewis, 559 P.2d 630, 634 (Alaska 1977); Coghill v. Boucher, 511 P.2d 1297, 1303 (Alaska 1973). We nonetheless seek a demonstration of a sufficient personal stake in the outcome of the controversy to *1140 assure that the proceedings will be adversarial in nature. Sisters, 648 P.2d at 974.
In so far as appellants' challenge extends beyond the late application policy, we readily agree with the Commission's assertion that appellants lack standing. Appellants have as yet no personal stake in the manner in which points are allocated to individuals whose applications are under consideration by the Commission. Appellants' applications were denied any consideration by the Commission. Thus, they have not established a competitive effect on their economic interest sufficient to ensure adversariness and confer standing on these issues. K & L Distributors, Inc. v. Murkowski, 486 P.2d 351, 353-54 (Alaska 1971).
The appellants challenge to the manner in which the two exceptions to the filing deadline were adopted presents a more difficult question. This court faced a similar challenge to the "misadvice or lost in the mail" policy in Estate of Miner v. Commercial Fisheries Entry Commission, 635 P.2d 827 (Alaska 1981). In that case, Miner's estate contended that the CFEC was required to grant an exception to the filing deadline for applicants who could demonstrate that they failed to timely file because of insanity. We rejected Miner's contention that the alleged invalidity of the "misadvice or lost in the mail" policy established her equal protection and due process claims to a hearing:
Assuming arguendo that the "misadvice or lost in the mail" policy for accepting late applications was improperly promulgated, we still conclude that such a holding does not require Miner to be given the opportunity to demonstrate to the CFEC that her case... is equally as compelling as those situations in which the CFEC has indicated it will accept late applications... . [T]he CFEC is not required to grant exceptions to the applicable filing deadlines for persons with severe mental problems.
Estate of Miner, 635 P.2d at 834 n. 14.
When a policy is invalidly promulgated under the APA, generally the appropriate remedy is to invalidate the offending policy until the procedures required by the APA are observed.[7] If the "misadvice or lost in the mail" policy was invalidated, there would no longer be any exceptions to the deadlines specified in 20 AAC 05.510. Under this validly adopted deadline regulation, the Commission would still have the authority to refuse consideration of the appellants' applications.[8] In the present case it is inappropriate to consider the validity of Commission procedures which regardless of their validity have no impact on the appellants. Since appellants have no stake in the resolution of the validity of the policy, they are without standing. Our review in this case is limited to whether there are underlying constitutional infirmities in the Commission's refusal to consider these late applications.[9]
III. THE APPLICATION DEADLINE
The six appellants also challenge the Commission's use of an administrative deadline for the receipt of applications. Essentially, appellants argue that one of the primary tasks of the Commission was to locate and rank those persons who would suffer significant hardship if excluded from the fishery. The deadline operated to automatically exclude a number of hardship cases; thus, the deadline classification bears no rational relationship to the legislative purpose. As a result, appellants' rights to equal protection are violated.[10]*1141 For the reasons set forth below, we reject this claim.
20 AAC 05.510(c) states:
The Commission will consider only those entry permit applications that are received on or before the closing date for application for that fishery.[11]
This regulation was adopted pursuant to AS 16.43.260(b) of the Limited Entry Act, which provides in part:
The Commission shall establish the opening and closing dates, places and form of application for entry permits for each fishery.
The deadline regulation operates to classify permit applicants into two groups those who send in applications before the deadline and those who miss the deadline. Applications of the former group will be evaluated, while those of the latter group will not be.
But the mere fact that the regulation and statute impose a classification does not in and of itself violate equal protection. Rather, in cases not involving fundamental rights or suspect classifications,[12] we require as a minimum "that the legislation be based on a legitimate public purpose and that the classification `be reasonable, not arbitrary, and ... rest upon some ground of difference having a fair and substantial relation to the object of the legislation... .' Isakson v. Rickey, 550 P.2d at 362 (quoting State v. Wylie, 516 P.2d 142, 145 (Alaska 1973))." State v. Ostrosky, 667 P.2d 1184, 1193 (Alaska 1983).[13]
The more important the individual right asserted, the greater the degree of relationship between the classification and the object or purpose of the legislation must be. Ostrosky, 667 P.2d at 1193. Although the interest of an applicant in the entry permit is not fundamental,[14] a prior gear license holder's stake in the application process is important. Commercial Fisheries Entry Commission v. Apokedak, (Apokedak I), 606 P.2d 1255, 1266 (Alaska 1980). Cf. Estate of Miner v. Commercial Fisheries Entry Commission, 635 P.2d 827, 832 (Alaska 1981) (applicant's interest under Limited Entry Act a property interest entitled to due process protection). We will therefore require a relatively high degree of relationship between the legislation's purpose and the application deadline.
In Apokedak I we discerned three legitimate purposes of the Limited Entry Act:
1) enhancing the economic benefit to fishermen since too many involved in the industry prevented those relying on fishing for a livelihood from securing adequate remuneration; 2) conserving the fishery; . .. [and] 3) avoiding unjust discrimination in the allocation of a limited number of entry permits.
606 P.2d at 1265.[15]
Moreover, in enacting the Limited Entry Act, the legislature found that fishery levels of participation "have impaired or threaten to impair the economic welfare of the state, the overall efficiency of the *1142 harvest, and the sustained yield management of the fishery resource." AS 16.43.010(b). When the purposes of the Act are viewed in light of this legislative finding of fact, the intent of the legislature that the limitation of entry into the fisheries be expeditiously effectuated seems clear. We find such an intent to fall well within the legitimate police power of the state.[16]
The use of an application deadline substantially furthered an expeditious enhancement of the economic benefit to fishermen and conservation of the fishery. By setting a date after which applications would no longer be accepted, the Commission insured distribution of a fixed number of permits within a reasonable time.[17] The sooner such permits were distributed, the better off economically those permit recipients were since the number of people involved in the fishery was restricted. By the same reasoning, the second purpose of the Limited Entry Act, conserving the fishery, was also benefitted by establishing a time period within which applications had to be received.
The basic issue raised by the appellants is whether the automatic exclusion of untimely hardship cases caused by the deadline conflicted with the third purpose of the Limited Entry Act, avoiding unjust discrimination. The key word is "unjust". Certainly the application deadline discriminated as does any classification. But we are not persuaded that the use of a deadline by the Commission amounted to unjust discrimination. To the contrary, the overall allocation of permits may well have been more equitably accomplished by the enforcement of a permit application deadline, since such a deadline enabled the Commission to rank a defined pool of applicants rather than make continual ad hoc determinations of eligibility for consideration.[18]
The Commission's refusal to consider late applications allowed it to compare applicants and issue permits without risking the possibility that a late application would upset the rankings on which it had decided.[19] Moreover, the use of the deadline was essential to the effective administration of the Act. Setting a deadline defined and limited the group of applicants among whom the Commission had to choose. Until such a group was defined, the permits could not be fully distributed. In this light, we think that the Commission's decision to allocate permits to less meritorious but timely fishermen over untimely but potentially more meritorious fishermen did not unjustly discriminate in contravention of the Act's purposes. We conclude that the deadline requirement does not violate the equal protection provision *1143 of either the Alaska or federal constitutions.[20]
IV. NOTICE OF THE APPLICATION PROCESS
Appellants also contend that the form of notice they received of the permit application process was constitutionally inadequate. They contend that the gravity of the interest at stake obtaining an entry permit required the Commission to make greater efforts to insure notification of each of the appellants.
The Commission did make considerable efforts to alert many of the potential applicants of the permit application process and deadline. In July, 1973, direct mailings explaining the entry permit program were mailed to all gear license holders from 1969 to 1972. An additional informational letter was mailed to all gear license holders from 1970 to 1973 in September, 1973. When a deadline was later established, the Commission publicized the deadline in numerous radio and newspaper ads in many parts of the state. Moreover, individuals and organizations were hired to provide application assistance.
In the fall of 1974, the Commission sent out two mailings to all names on the fisherman's history file. The fisherman's history file was a compilation of all gear license holders for any year from 1969 to 1972 who had made actual deliveries of fish under their license number during those years. One mailing was a pamphlet containing the newly adopted Commission regulations and an explanation of the regulations. The other mailing was a yellow card which the recipient could use to request permit applications from the Commission.[21]
The Commission also compiled a log book of potential Isakson applicants, those fishermen who first had a gear license in 1973 or 1974. All fishermen in the log book were sent Isakson applications by the Commission in 1976. The Commission also distributed news releases and made Isakson applications available at local Fish and Game offices. Finally, the Commission again contracted with individuals and organizations to provide application assistance.
The Commission contends that none of these outreach efforts were constitutionally mandated. It argues that the applicable rule of notice is that all individuals dealing with the government are charged with knowledge of its laws and regulations. Thus, according to the Commission, inclusion of the application procedure and deadline in the regulations, 20 AAC 05.500-05.510, was by itself constitutionally adequate notice.
The cases on which the Commission relies to support this principle are distinguishable. In San Diego Building Contractors Association v. City Council of San Diego, 13 Cal.3d 205, 118 Cal. Rptr. 146, 529 P.2d 570 (1974), appeal dismissed, 427 U.S. 901, 96 S.Ct. 3184, 49 L.Ed.2d 1195 (1976), San Diego had adopted a zoning ordinance by initiative without providing notice to all affected property owners. The California Supreme Court upheld the lack of notice. The court noted:
the decisions applying the due process requirements of notice and hearing have all involved governmental decision making in an adjudicative setting, in which the government's action affecting an individual was determined by facts peculiar to the individual case; the present matter, by contrast, involves the adoption of a broad, generally applicable, legislative rule. The seminal decisions of the United *1144 States Supreme Court clearly indicate that the due process requirements of notice and hearing are applicable only to governmental actions of an adjudicatory nature.
529 P.2d at 574 (emphasis in original, footnote omitted).
In Federal Crop Insurance Corp. v. Merrill, 332 U.S. 380, 68 S.Ct. 1, 92 L.Ed. 10 (1947), Merrill had received crop insurance from the Federal Crop Insurance Corporation for his spring wheat. The local agents who provided the insurance assured Merrill that his crop was insurable. Unbeknownst to both the agents and Merrill, a published regulation of the Insurance Corporation specified that the particular wheat was uninsurable.
The Supreme Court held that the regulations were binding on Merrill. The Court found a "duty of all courts to observe the conditions defined by Congress for charging the public treasury. The `terms and conditions' defined by the Corporation, under authority of Congress, for creating liability on the part of the government preclude recovery for the loss." 332 U.S. at 385, 68 S.Ct. at 3, 92 L.Ed. at 15.
Neither of these cases is controlling. In San Diego the city had adopted a zoning ordinance a statutory enactment. Individuals do not have a constitutional right to personal notice of potential statutes of general applicability prior to their enactment. In Merrill the regulation specified the liabilities of the federal treasury. The Court had no power to exceed a treasury allocation authorized by Congress.
In the instant case, however, this court has found that the applicant's interest in the application process is a property interest entitled to due process protection. Estate of Miner v. Commercial Fisheries Entry Commission, 635 P.2d 827, 832 (Alaska 1981). In Miner, we noted that "the statutory scheme as applied to prior [gear license] holders is more accurately characterized as a revocation than as an application." 635 P.2d at 831. A revocation of the right to fish would result if an individual failed to learn of the limited entry program in time to obtain a permit.
When viewed as a revocation procedure, the application process approaches an adjudicative action undertaken by the Commission. The applications that were timely submitted were factually investigated by the Commission and then awarded a point total based on a Commission determination. An applicant that disagreed at this stage was entitled to an administrative hearing with judicial review. The Limited Entry Act authorized the CFEC to begin an adjudicatory process for all permit applicants. The fact that a large number of people were involved does not alter the characterization of these proceedings. When an agency makes individual factual determinations on which the impact of the law on the individual depends, it is acting in an adjudicative capacity. Adams v. Marshall, 212 Kan. 595, 512 P.2d 365, 369 (1973). See also City of Homer v. State, Department of Natural Resources, 566 P.2d 1314, 1317 (Alaska 1977).
Due process requires "that deprivation of life, liberty or property by adjudication be preceded by notice ... appropriate to the nature of the case." Mullane v. Central Hanover Bank and Trust Co., 339 U.S. 306, 313, 70 S.Ct. 652, 656, 94 L.Ed. 865, 873 (1950). "An elementary and fundamental requirement of due process in any proceeding which is to be accorded finality is notice reasonably calculated, under all the circumstances, to apprise interested parties of the pendency of the action." 339 U.S. at 314, 70 S.Ct. at 657, 94 L.Ed. at 873. Aguchak v. Montgomery Ward Co., Inc., 520 P.2d 1352, 1356 (Alaska 1974) (adoption of Mullane language for analysis under Alaska Constitution).
Appellants contend personal service of written notice to each potential applicant was required. But in determining the type of notice that is constitutionally required, the interest of the state in efficiently carrying out the purposes of the Limited Entry Act must be balanced against the individual interest sought to be *1145 protected by the due process clause. Mullane, 339 U.S. at 314, 70 S.Ct. at 657, 94 L.Ed. at 873. See also Mathews v. Eldridge, 424 U.S. 319, 334, 96 S.Ct. 893, 902, 47 L.Ed.2d 18, 33 (1976) ("whether the administrative procedures provided here are constitutionally sufficient requires analysis of the governmental and private interests that are affected"); Aguchak, 520 P.2d at 1357 ("Whenever a party demonstrates a prima facie denial of due process of law, the reviewing court must balance the interest of the state in the act or procedure challenged against the right denied the individual."). We therefore proceed to an analysis of the competing interests at stake in the permit application process to determine whether the form of notice directed at each of the appellants was constitutionally sufficient.
Four of the appellants, Leroy Clendenen, Artemy Polushkin, Howard Wickersham and James Wickersham, are listed in either the fisherman's history file or the Isakson log book.[22] Therefore, absent clerical error, the Commission sent each of these appellants either a yellow card to submit for an application or, for Isakson applicant Clendenen, the application itself. Appellants contend that this form of notice was insufficient to insure contact with each of the appellants and, therefore, resulted in denial of their right to procedural due process.
Certainly these individuals all have a considerable stake in being apprised of the application deadline. They had all fished commercially and absent a permit would be precluded from fishing in the manner they had done in the past.
However, the state had an interest in administering the program in a cost-effective manner. The Commission used a wide variety of communication media in an attempt to reach eligible applicants. In addition to the yellow card and application mailing, the CFEC attempted to recontact individually those individuals on the fisherman's history file that had not requested an application some six months after the yellow card was mailed. Moreover, the Commission contracted for individualized assistance and advertised the deadline on radio, television, and in newspapers. We find that the Commission's effort to notify these four appellants was constitutionally adequate, even if the materials sent by the Commission never actually reached them.[23] The efforts at individualized notice as to these four appellants, combined with the media coverage, produced a sufficient probability of notification to comply with due process.[24]
The other two appellants, however, did not receive yellow card application request forms. Roy Beaver last had a gear license in 1969. He had not fished from 1969 to 1978. Although he had a gear license in 1969, Beaver apparently made no deliveries under that license number in that year. As a result, he was not listed in the fisherman's history file. Similarly, Grigory Gostevskyh held a gear license in 1971, but apparently made no deliveries under the license number in that year. Therefore, Gostevskyh was not listed in the fisherman's history file either.
Although both Beaver's and Gostevskyh's names and addresses were initially in the Commission's computer records when the fisherman's history file was developed, *1146 their names were removed since no fish deliveries were credited to their license numbers. Each had presumably been mailed 1973 informational leaflets about limited entry since they were both gear license holders sometime between 1969 and 1972.[25] However, neither received any subsequent Commission mailings.
Gostevskyh's correspondence with the Commission gives some indication of the degree of his unawareness of the need to apply for a limited entry permit. In January, 1975, during the original application period, he sent a handwritten letter to the Commission which stated:
[Please send me] license issued subject to federal law relating to alien commercial fisherman's license n. 45403 and gear license no. 38578.
Regardless of whether such communication was received by the Commission, it is indicative of Gostevskyh's lack of knowledge of the need for a limited entry permit in addition to gear and fishing licenses. As a CFEC staffperson observed, it "does not indicate that [Gostevskyh] was applying for anything other than a commercial fishing license or a gear license."
Gostevskyh renewed his request for a "license" in 1977. Again, the request exhibits his lack of knowledge of a new permit process supplementing the license requirements. This letter, dated January 12, 1977, stated:
I obtained a license in 1971 for commercial salmon fishing. Please, send me an application for a renewal or new license.
It was not until October 21, 1977 that the Commission sent a letter to Gostevskyh's attorney explaining the limited entry program. It is apparent from these communications that Gostevskyh had little, if any, awareness of limited entry prior to 1977.
Roy Beaver submitted an affidavit along with his application which stated:
On the date this Affidavit is signed [January 19, 1979], Affiant learned that persons having gear licenses prior to January 1, 1973 and who made deliveries under such gear licenses were entitled to apply for a free limited entry permit... . [I]t was only following the death of his wife [June 22, 1978] that he contacted a close friend who is involved in the fishery and, after discussing his predicament with local Fish and Game officials in Tok, concluded that he was a person who should have received the opportunity to apply for a permit ...
Similarly, in his brief before the superior court, Beaver alleged he "was never informed of his right to apply."
Thus, both of these applicants have sufficiently alleged that they lacked actual notice of their qualification to apply for a permit within a specified time period.[26] We must therefore determine whether the efforts the Commission made in attempting to notify these individuals were constitutionally sufficient.
The Commission had the addresses of both of these individuals in 1973, yet decided to remove their names from the computer mailing list they were developing. This policy was based on the view that these gear license holders would have insufficient points to qualify for a permit.[27] The *1147 omission of these names reduced the number of yellow cards mailed by only a "small degree" according to a Commissioner. Yet this same Commissioner recognized that those individuals deleted were potentially eligible applicants.
In Mullane v. Central Hanover Bank and Trust Co., 339 U.S. 306, 70 S.Ct. 652, 94 L.Ed. 865 (1950), trust beneficiaries alleged insufficient notice of a March, 1947 settlement of their trust account. The trust had been formed in January, 1946. At the time of formation, the bank had notified known beneficiaries of the creation of the common trust fund. It had also sent a copy of the Act authorizing the periodic judicial settlement of the account and stated that notice by publication would be used to inform the beneficiaries when such periodic settlements occurred. Despite this general notice in 1946, the Supreme Court found the failure to give notice by mail to known beneficiaries of the specific settlement in 1947 constitutionally defective. The Court held:
The trustee has on its books the names and addresses of the income beneficiaries represented by appellant, and we find no tenable ground for dispensing with a serious effort to inform them personally of the accounting, at least by ordinary mail to the record addresses. Certainly sending them a copy of the statute months and perhaps years in advance does not answer this purpose. The trustee periodically remits their income to them, and we think that they might reasonably expect that with or apart from their remittances word might come to them personally that steps were being taken affecting their interests.
339 U.S. at 318, 70 S.Ct. at 659, 94 L.Ed. at 875-76 (citations omitted; emphasis added).
Like the trust beneficiaries in Mullane, Beaver and Gostevskyh received only a brochure explaining the program in general terms in 1973. They were not individually notified of the application process or deadlines despite the ease of access to their addresses. "Where the names and post-office addresses of those affected by a proceeding are at hand, the reasons disappear for resort to means less likely than the mails to apprise them of its pendency." Mullane, 339 U.S. at 318, 70 S.Ct. at 659, 94 L.Ed. at 875.
We find the Commission did not take steps reasonably calculated to apprise appellants Beaver and Gostevskyh of the application process. The Commission made a decision to not notify these appellants by individual letter of the application procedure and deadline in 1974 despite the accessibility of their addresses. Yet an examination of the applications which were eventually submitted from these appellants shows that each alleged sufficient points to qualify immediately for a permit.[28] We find the notice given to Beaver and Gostevskyh was constitutionally inadequate under the Alaska due process clause, Alaska Const. art. 1, § 7.[29] We therefore remand this case to the superior court with direction to order the Commission to evaluate the applications of appellants Beaver and Gostevskyh.
AFFIRMED in part; REVERSED and REMANDED in part.
NOTES
[1] Our decision in this case was deferred pending our determination of the constitutional issues raised in State v. Ostrosky, 667 P.2d 1184 (Alaska 1983).
[2] There is some ambiguity in the record as to whether Artemy Polushkin was an Isakson applicant or an original applicant. Neither the CFEC nor the superior court directly resolved this issue. An examination of the record, however, reveals that Polushkin alleges to have fished the Prince William Sound drift gill net fishery in 1972 and was in possession of a gear license during that year. In his brief before this court he characterizes himself as an original applicant. Although his characterization as an original applicant or an Isakson applicant does not affect our holding in this case, we will refer to him as an original applicant.
[3] All of the applications in this case were received after the expiration of the "good cause" period, so this exception is not relevant to our decision.
[4] The reasons advanced for untimeliness were as follows: (1) Howard Wickersham medical disability and failure to receive application materials (2) James Wickersham failure to receive application materials (3) Leroy Clendenen lack of notice of Isakson application period until deadline had passed (4) Roy Beaver lack of notice of right to apply and of application deadline (5) Grigory Gostevskyh failure to receive notification of the application process, inability to speak English, and Commission failure to interpret a 1975 letter as a request for an application (6) Artemy Polushkin no reason offered.
[5] Alaska Const. art. 1, § 7.
[6] These provisions of the Administrative Procedure Act are made applicable to the Commission under AS 16.43.120(b).
[7] See Kenai Peninsula Fisherman's Cooperative Ass'n.v. State, 628 P.2d 897, 906 (Alaska 1981).
[8] See infra Part III where we conclude that the use of a deadline does not violate appellants' rights to equal protection.
[9] Although in their reply brief appellants make a generalized assertion that they fall within the exceptions, the Commission rejected this contention for each appellant. We find these conclusions supported by substantial evidence in the record. Keiner v. City of Anchorage, 378 P.2d 406, 411 (Alaska 1963).
[10] Appellants also contend that the Commission's "misadvice or lost in the mail" policy violates their rights to equal protection. For the reasons expressed in Part II of this opinion, this contention is without merit.
[11] See supra note 3 for a discussion of the closing dates applicable to appellants.
[12] We have previously determined that the right to a limited entry permit is not a fundamental right, nor is the classification in question suspect. Isakson v. Rickey, 550 P.2d 359, 363 (Alaska 1976). Thus, there is no need to invoke the strict scrutiny analysis required in such cases under the federal constitution. State v. Erickson, 574 P.2d 1, 11-12 (Alaska 1978).
[13] Since the intensified rational basis test adopted in Alaska subjects classifications to greater scrutiny than the federal rational basis test, we limit our discussion to whether the challenged regulations satisfy state equal protection. Rose v. Commercial Fisheries Entry Comm'n, 647 P.2d 154, 158 (Alaska 1982). Since we determine that the Alaska test is satisfied, it follows necessarily that federal equal protection is also satisfied.
[14] Isakson, 550 P.2d at 363; Commercial Fisheries Entry Comm'n.v. Apokedak, 606 P.2d 1255, 1262 (Alaska 1980).
[15] Apokedak I also noted that the gear license requirement made administration of the program more convenient. Undoubtedly, the use of a deadline also aids the Commission in administering the limited entry program. However, such convenience is insufficient reason alone to justify the deadline. See Apokedak I, 606 P.2d at 1266.
[16] See Alaska Const. art. VIII, § 15; see also Apokedak I, 606 P.2d at 1265.
[17] The legislature's decision to restrict the number of permits is constitutional. Apokedak I, 606 P.2d at 1265.
[18] In support of their position, appellants cite AS 16.43.270(a) which provides:
The commission shall issue entry permits, for each fishery, first to all qualified applicants in the priority classifications designated under AS 16.43.250(b) and then to qualified applicants in order of descending priority classification, until the number of entry permits issued equals the maximum number of entry permits ... except that a person within a priority classification ... may not be denied an entry permit.
(Emphasis added). Appellants contend this statute requires that any person who would have been classified in the significant hardship category if he had timely applied must be given a permit.
We reject this contention. The final clause of AS 16.43.270(a) must be read in conjunction with the rest of the section. Estate of Hutchinson, 577 P.2d 1074, 1075 (Alaska 1978). Using this principle it is clear that the "person" referred to in the last sentence must be a "qualified applicant" referred to in the remainder of the section. A person does not fall within a classification until his application is accepted by the CFEC.
[19] See Noden v. State, Commercial Fisheries Entry Comm'n, 680 P.2d 493, (Alaska 1984). In Noden, the timing of the hearing opportunity was challenged as violative of due process. We discussed there the need for a 45 day time limit for requesting hearings following classification in order for the Commission to be able to effectively rank applicants and thus award permits. 680 P.2d at 499-500. Similar considerations apply here.
[20] We will, however, consider specific due process challenges to the failure of the Commission to consider late applications. Thus, we conclude in Part IV of this opinion that consideration of late applicants who received inadequate notice is compelled by due process.
[21] The Commission made efforts to send application request yellow cards to all gear license holders in families engaged in set net fishing, even though all the fish were often landed under only one gear license number. However, a person involved in cooperative arrangements with gear other than set nets, who had a gear license but did not make the deliveries under his own gear license number, would not receive either the pamphlet or the yellow card.
[22] The listings of Howard Wickersham and Leroy Clendenen are included in the record. Also included is a copy of a yellow card completed by Howard Wickersham and received by the Commission on November 22, 1974. As to appellants James Wickersham and Artemy Polushkin, pursuant to Alaska Rule of Evidence 201, we take judicial notice of the fact that each of these names was on Commission lists to which individualized notice was sent. Those facts are included in Commission Record # R01-03B-6729.
[23] Given the number of potential applicants, bulk mailing was not an unreasonable method of assistance. Cf. State v. Bowers Office Products, Inc., 621 P.2d 11, 13 (Alaska 1980).
[24] Nor do we find these four appellants were denied equal protection. Indeed, appellants brief places these four appellants in the group of applicants receiving preferential treatment in comparison to those applicants allegedly denied equal protection.
[25] Two informational mailings were made in 1973. The first was to all gear license holders from 1969 to 1972, and thus would have been directed to both Beaver and Gostevskyh. The second was made to license holders from 1970 to 1973, and would have been sent to Gostevskyh but not Beaver.
[26] We leave open for determination by the Commission whether in fact Beaver and Gostevskyh had actual notice of their personal interest in the application process. Despite the constitutional infirmities of Commission efforts at notification of these individuals, if the Commission can sufficiently refute the allegations of these individuals and establish that they did in fact have actual notice of their specific entitlement to apply for a permit within the applicable time period, then their untimely applications need not now be accepted.
[27] AS 16.43.260(a) defines eligible applicants as those "who have harvested fishery resources commercially while participating in the fishery as holders of gear licenses" prior to specified time limits. Neither the statute nor the CFEC's regulations require deliveries of fish to be made under one's own gear license hence it provides the CFEC no basis for according Beaver and Gostevskyh less notice.
[28] Permits were distributed according to a point system. See 20 AAC 05.600-686. The higher the total number of points, the greater the degree of hardship the applicant would suffer by exclusion from the fishery. If an applicant had 20 or more points verified by the Commission, a permit was automatically granted. Beaver's application alleged 20 points; Gostevskyh's alleged 31 points.
[29] We rest our holding on this issue on the Alaska due process clause, Alaska Const. art. I, § 7. Since we determine that notice was inadequate under our state constitutional provision, we need not determine whether federal due process was also violated.
| mini_pile | {'original_id': '561c4b762e7498ed61ad001f83ef899bd24c7bca703dec051f3ab5ad48439826'} |
const createVendorTypeFromName = require("./createVendorTypeFromName");
const { VENDOR_PROPS_TO_OMIT } = require("./constants")
module.exports = { createVendorTypeFromName, VENDOR_PROPS_TO_OMIT }
| common_corpus | {'identifier': 'https://github.com/JupiterOne/vendor-stack/blob/master/src/index.js', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'vendor-stack', 'creator': 'JupiterOne', 'language': 'JavaScript', 'language_type': 'Code', 'word_count': '16', 'token_count': '67', '__index_level_0__': '40241', 'original_id': '5d61442bbf7101d13643d44aedf9e9b425c4471e97774f9db307c605dd100a99'} |
Got a drawer full of flash drives collecting dust? Do not throw them in the recycling bin, do not craft them into tiny sleds for your pet mouse, and do not, under any circumstances, dump them in the landfill, where they could cause problems. Besides, those antiquated USB sticks have a place in the world yet, and that place is North Korea.
Flash Drives for Freedom helps smuggle flash drives into North Korea, a notoriously repressive state where the government has almost total control of information. The project, founded by the New York-based Human Rights Foundation and Silicon Valley’s Forum 280, collects donated flash drives, wipes them clean, and loads them with media — from American movies to South Korean soap operas to Wikipedia pages to interviews with North Korean defectors (Flash Drives for Freedom says North Korean defection organizations select the content). The point is to expose North Koreans to life outside their government-controlled bubble.
Wired reports:
“You can be involved just by shipping a USB drive to Palo Alto, and we’ll help to get it sent to North Korea,” says HRF’s chief strategy officer Alex Gladstein. “This is a viable technology that works there, that North Koreans have decided is a way to reach people.” Gladstein says that despite Americans’ notion of thumb drives as a near-obsolete technology, they still have the power to pierce North Korea’s internet blackout and give the country’s citizens a radically different view of America, their Southern neighbor and their own impoverished homeland. “Each one has the potential to literally change someone’s life,” he says.
PCs remain rare in North Korea, and the internet inaccessible to all but a few elites. But cheap, Chinese-made USB-compatible video players known as notels, and even smartphones, are increasingly common. With those devices in mind, groups like the North Korean Strategy Center, North Korean Intellectual Solidarity, and Fighters for a Free North Korea have all joined a growing movement to smuggle data in the form of USB drives and SD cards into the country.
Getting the drives into North Korea is no easy feat, and often requires bribing officials.
Flash Drives for Freedom isn’t the only group doing this: The North Korea Strategy Center has been smuggling data drives into the country for years, and its founder Kang Chol-hwan believes, as Andy Greenberg wrote last year, that “the Kim dynasty’s three-generation stranglehold on the North Korean people — and its draconian restriction on almost any information about the world beyond its borders — will ultimately be broken not by drone strikes or caravans of Humvees but by a gradual, guerrilla invasion of thumb drives filled with bootleg episodes of Friends and Judd Apatow comedies.”
You can be a part of this revolution by donating your own flash drives. Or, if bringing down dictators one flash drive at a time isn’t your thing, you can always turn the USB sticks into your next Pinterest project. | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9144105911254884}", 'metadata': "{'Content-Length': '73534', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FUXQWIGJC4VDOB4H6RYMRPC7V6UQTL3U', 'WARC-Concurrent-To': '<urn:uuid:e860ee99-6ddc-4f39-9462-23a196af275c>', 'WARC-Date': datetime.datetime(2019, 5, 25, 5, 50, 2), 'WARC-IP-Address': '192.0.79.32', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KLTIONBCD3PCFVOHFRK23L72756Q5IGK', 'WARC-Record-ID': '<urn:uuid:62569ca0-f441-44da-9cc5-46412593cde9>', 'WARC-Target-URI': 'https://grist.org/living/your-old-flash-drive-could-bring-subversive-media-to-north-korea/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:87f9f45f-8e52-4821-a144-69c182bb25fb>', 'WARC-Truncated': None}", 'previous_word_count': '460', 'url': 'https://grist.org/living/your-old-flash-drive-could-bring-subversive-media-to-north-korea/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-142-79-158.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.01944667100906372', 'original_id': '43c324983e702947e0f0fe73bae382a8a1ce50e9ae534d106b52bec3d6416962'} |
We all feel angry at times; it’s a natural response to threats and attacks, injustice and disappointment.
Anger is a powerful emotion and releasing the pressure that builds inside you can be essential to deal with problems and move on. But if anger isn’t dealt with in a healthy way, it can have a significant effect on your daily life, relationships, achievements and mental well-being.
What is anger?
Anger is one of the most basic human emotions. It is a physical and mental response to a threat or to harm done in the past. Anger takes many different forms from irritation to blinding rage or resentment that festers over many years.
"I get this bubble of rage. I go wild. I feel like crying cos I don’t know how to control myself. It happens too quickly."
At any point in time, a combination of physical, mental and social factors interact to make us feel a certain way. It’s different for each of us. Our feelings are influenced by our emotional make-up, how we view the world, what happens around us and our circumstances. Like other emotions, anger rarely acts alone.
How does anger work?
As we go about our lives, we’re constantly weighing up situations and deciding what we think about them: good or bad, safe or unsafe etc. How we interpret a situation influences how we feel about it. If we think we are in danger, we feel afraid. If we feel we have been wronged, we feel angry. These feelings determine how we react to the situation. We translate meanings into feelings very fast. With anger, that speed sometimes means that we react in ways we later regret.
How do our bodies respond to anger?
Many of our emotions are linked to a particular physical response. Anger gets the mind and body ready for action. It arouses the nervous system, increasing the heart rate, blood pressure, blood flow to muscles, blood sugar level and sweating. It also sharpens the senses and increases the production of adrenalin, a hormone produced at times of stress.
At the same time as these physical changes, anger is thought to affect the way we think. When we are first faced with a threat, anger helps us quickly translate complex information into simple terms: 'right' or 'wrong' for instance. This can be useful in an emergency as we don’t waste valuable time weighing up information that doesn’t instantly affect our safety or well-being.
But it can mean that we act before we've considered what else is relevant and made a rational decision about how to behave. It may be that we need to take more time to look at the situation and deal with it differently. When anger gets in the way of rational thinking we may give way to the urge to act aggressively, propelled by the instinct to survive or protect someone from a threat.
Why do we get angry?
"I could scream down the throat of people who try to crowd into the train before people have the chance to get off."
Reasons for getting angry include:
• facing a threat to ourselves or our loved ones
• being verbally or physically assaulted
• suffering a blow to our self-esteem or our place within a social group
• being interrupted when pursuing a goal
• losing out when money is at stake
• someone going against a principle that we consider important
• being treated unfairly and feeling powerless to change this
• feeling disappointed by someone else or in ourselves
• having our property mistreated.
If we think someone has wronged us on purpose, this can make us angrier. If we’re having a bad day and are in a state of constant tension, we’re more likely to snap when something else goes wrong, even if it’s something that wouldn’t usually bother us.
We may feel angry immediately or only feel angry later when we go back over a situation. Anger can surface years later that has its roots in abuse or neglect long ago. Sometimes anger stays locked inside us for decades because it wasn’t dealt with sufficiently at the time.
How do people behave when they are angry?
"When someone physically threatened my daughter when she was a newborn I exploded. I got a real physical sense of something being different that I haven’t experienced before or since."
Anger isn’t always negative. It can be a force for good. Moral outrage can drive people to campaign for change, right wrongs and enforce the rules that govern our society.
People often think of anger and aggression as the same thing, but they aren’t. Anger is an emotional state and aggression is just one of the ways that people behave when they are angry. Aggression often takes over when people act on their instinct to protect themselves or others. Alcohol can make some people act more aggressively and drug use can similarly lower our inhibitions.
People often express their anger verbally. They may:
• shout
• threaten
• use dramatic words
• bombard someone with hostile questions
• exaggerate the impact on them of someone else's action.
Some people who are angry get their own back indirectly by making other people feel guilty and playing on that guilt. Others develop a cynical attitude and constantly criticise everything, but never address problems constructively.
Some people internalise their anger. They may be seething inside and may physically shake, but they don’t show their anger in the way they behave when they are around other people.
People who internalise their anger may self harm when they are angry as a way of coping with intense feelings they can’t express another way. This may give temporary relief from the angry feelings, but it doesn’t solve the problems in the long-term.
What kind of problems can be linked to anger?
Anger in itself is neither good nor bad; it becomes a problem when it harms us or other people. Anger is the emotion most likely to cause problems in relationships in the family, at work and with friends. People with a long term anger problem tend to be poor at making decisions, take more risks than other people and are more likely to have a substance misuse problem.
Long term and intense anger has been linked with mental health problems including depression, anxiety and self-harm. It is also linked to poorer overall physical health as well as particular conditions, such as:
• high blood pressure
• colds and flu
• coronary heart disease
• stroke
• cancer
• gastro-intestinal problems.
How can managing my anger help me?
"If I could have expressed my anger more openly and constructively it would have been less damaging to me. Otherwise you carry the hurt with you."
Most people get angry quite often, but their anger is within a normal and healthy range. Other people experience anger frequently and intensely enough for it to interfere with their everyday life.
Both sets of people can benefit from learning how to deal with their anger more effectively. There’s lots of evidence to suggest that managing your anger in a healthy way can help people look after their mental and physical health, feel more positive about themselves, achieve their goals, solve problems and enjoy relationships with the people around them.
Anger can lead you to action, or even violence, you will regret. Bottling up your anger for a long time isn’t a good thing either. It’s important to deal with anger and move on, not let it stew inside you.
How can I manage my own anger?
Buy time
When you feel the first surge of anger boiling up inside you, pause for a moment. Think about what has made you angry, think about the consequences of exploding in a rage and then choose how to respond.
Even in the middle of an argument, it’s not too late to take a deep breath and choose to express your feelings differently. Give rational thinking time to kick in.
• Count to ten before you act.
• Drop your shoulders and breathe deeply to help you relax - your instincts may be telling your body to get ready to fight, but your rational self can reverse this message by telling your body to chill out.
• Try screaming if it won’t disturb people near you or scream into a pillow to release your tension.
• Talk yourself down – imagine what your calmest friend would say to you and give yourself the same advice
• Imagine yourself in a relaxing scene.
• Distract yourself or take yourself out of the situation that made you angry - read a magazine, do a crossword, listen to soothing music, go for a walk.
• Pour out how you feel in writing or redirect your energy into another creative activity.
• Offload to a friend who will help you get perspective on the situation.
There are other activities which may help you almost immediately, later the same day or if you make them part of your lifestyle longer term.
• Work off your anger through exercise - channelling your energy into exercise instead will increase the release of feel good brain chemicals called endorphins which help us relax.
• Use relaxation techniques like yoga or meditation - techniques like these challenge the physical aspects of anger, such as the brain chemicals that prepare you to fight, before these chemicals lead you to act impulsively.
Be assertive
Being assertive is a healthy way to express anger. Take ownership of the situation and your feelings.
• Tell people that you are feeling angry and why.
• Talk slowly and clearly.
• Use the word "I" to make it about you, not about them.
• Make requests rather than demands or threats.
• Say "I could" and "I might" instead of "I must" or "I should".
Good communication skills can help you get your message across. Keep the lines of communication open. Listen to other people's point of view. Assuming you know where they stand can create a problem where there is none and escalate a situation from bad to worse.
Know yourself
"Now I can control it. I just think 'For goodness sake'. I recognise the situation for what it is."
In the longer term, it can be really helpful to work out what makes you angry and how it makes you behave. Think about it when you're not feeling angry. Talk it through with someone who you trust and who knows you well.
• What triggers your anger?
• What signs tell you that you're on the brink of uncontrolled anger?
• Have you fallen into any unhelpful patterns of behaviour?
• What have the consequences been?
• What works to calm you down?
• Are there any triggers in your daily routine or your environment that you could change?
Protect your mental health
People in good mental health are better able to cope when things go wrong; feeling stressed makes it harder for us to cope with problems. The following are some of the things known to be good for our mental health.
• Keep physically active.
• Eat a balanced diet - some foods are more effective than others at supplying us with a steady flow of fuel to help us function well, while nutrients found in certain foods can affect mood in different ways.
• Drink sensibly, however tempted you may be to improve your mood with a drink or by using drugs.
• Keep in touch with friends and loved ones – talk about your feelings with them and ask for help when you need it.
• Take time to relax and enjoy yourself.
• Accept who you are and do something you’re good at.
• Care for others.
"Now I play the drums. It’s a very good way of dealing with my anger. Then I feel worked up, I think 'I'm just going to pound something for a few hours.' It works really quickly. It takes my mind off it and then I just enjoy playing."
How can I deal with other people's anger?
Being on the receiving end of anger or just being a witness to it can be tough. If other people's anger is having a bad effect on you, you shouldn't have to put up with it.
Anger tends to be catching, but staying calm yourself can help both of you. If you get angry as well, things can quickly escalate.
• Bear in mind the tactics that calm people down - use them yourself and remind the other person what can help them relax or distract themselves.
• Help them to consider why they are angry and encourage them to explain it to you calmly.
• Explain that sometimes anger is justified, but it can also make people lose perspective - unnecessary aggression makes things worse.
It may help to take yourself away from an angry person. Give them time to cool down, wait a few minutes, then talk to them when they seem less agitated and may be more able to look at the situation neutrally.
No one needs to put up with violence. If you are afraid or feel threatened by someone's anger, you should ask for help. If you have been assaulted, call the police.
Where can I go for further help?
If you are worried about your own anger or another aspect of your mental health, go to your GP is a good place to start. They may be able to suggest ways you can manage your anger yourself or they may refer you for further support. You may be able to get help on the NHS or, if you can afford it, pay for it yourself.
Talking therapies such as counselling or CBT (cognitive behavioural therapy) can help people explore what makes them angry, work out why anger has become a problem for them and learn how to change the way they respond to the situations that typically make them angry. Talking therapies are usually provided over a course of several weeks or months.
Anger management courses often involve counselling and group work with other people with similar problems. The courses take place either over a day or a weekend or in sessions over a period of weeks.
Domestic violence programmes help people whose anger leads them to violence against members of their family. They usually help people take responsibility for their actions and understand their impact on those close to them. They may also ask people to change other parts of their life such as addressing any problems with alcohol or drugs.
Local support groups can be a way for people with a problem in common to share their experiences and support and encourage each other to change their behaviour. They may be led by someone who has themselves had a problem with anger in the past.
Faith leaders or others of the same community can help people reflect and get perspective on a situation that has made them angry. They will help set the situation in the context of the values that the faith follows.
Anger management courses
The British Association of Anger Management runs weekend and evening courses for people who want help dealing with their own anger and for people who work with those who have difficulties with their anger.
Talking therapies
You can find more information about talking therapies and how to find a therapist on our information page.
• Relate can help people talk through relationship difficulties, whether they are married, living together, in a same-sex relationship, separated, divorced or single. There is a fee for Relate counselling.
Getting Help
Get help for yourself or someone you know.
Support Us
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '96', 'language_id_whole_page_fasttext': "{'en': 0.959865927696228}", 'metadata': "{'Content-Length': '59858', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Y5FAURHYJ7OWIOQDNPPUXKOQX3U7HIXQ', 'WARC-Concurrent-To': '<urn:uuid:ca04d560-b34d-488f-99b9-ba8ce0d28f5f>', 'WARC-Date': datetime.datetime(2014, 8, 2, 4, 28, 50), 'WARC-IP-Address': '83.244.175.213', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:HLVLISL3XUM7QDYWCQ6A5VPX5XMI67SR', 'WARC-Record-ID': '<urn:uuid:560f81c1-ff0c-4bee-bcb7-7bb11f95d1f7>', 'WARC-Target-URI': 'http://mentalhealth.org.uk/help-information/mental-health-a-z/A/anger/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:20773312-fec4-4836-b43b-f9105a341f52>', 'WARC-Truncated': 'length'}", 'previous_word_count': '2608', 'url': 'http://mentalhealth.org.uk/help-information/mental-health-a-z/A/anger/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.095814049243927', 'original_id': 'adb6ca9f3d6fd8d803df0c043a37d9d36b837f3897c1bbe4c148b65d091df06b'} |
Sunday, 16 June 2013
Chanel Taboo - How Could You?
So when I was walking through Myers the other day, I happened to notice a new bottle on display... imagine my excitement when I discovered it was the new Chanel Taboo that everybody is talking about. And it was everything I expected to be, so what is my problem? Well I have taken eleventy billion pictures over several days and not one of them is showing the true beauty that other bloggers have managed to capture and I can see so clearly in real life!
My mani then, three coats of Chanel Taboo! The second coat was to cover any imperfections in the first coat. The third coat was for depth and sparkle which Chanel Taboo delivered. This mani lasted four days before it chipped, which is excellent staying power seeing as I hadn't used a top coat.
1. Boo! I hate it when polishes don't want to play nice in photos :( It's still gorgeous though.
1. Thank you Kierra, it truly is a very pretty polish but a diva to photograph | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9726389646530152}", 'metadata': "{'Content-Length': '104090', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CKULNB4OZM7K52XOG6TW4BD77GH5BMJ6', 'WARC-Concurrent-To': '<urn:uuid:ba0cf5f9-f13a-48c1-9a10-e753036aaafb>', 'WARC-Date': datetime.datetime(2019, 10, 21, 10, 55, 54), 'WARC-IP-Address': '172.217.164.179', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:5V5EOJW2UD4LWSPHUKQCWRWSVO4ST3P6', 'WARC-Record-ID': '<urn:uuid:553dc0a6-ce03-4429-b03f-8949ce4d0a5c>', 'WARC-Target-URI': 'http://www.kittensilksthecatsclaws.com/2013/06/chanel-taboo-how-could-you.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f7f87582-d81d-4444-9d5b-1f286f453784>', 'WARC-Truncated': None}", 'previous_word_count': '186', 'url': 'http://www.kittensilksthecatsclaws.com/2013/06/chanel-taboo-how-could-you.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-191.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.2147911787033081', 'original_id': 'c3ff1f77f91ca07aacdc338c006158c691217090c58d7b1835ba012fc497ec37'} |
Forgot your password?
AMD Technology
AMD Readies "Lottery-Core" CPUs 80
Barence writes "AMD has announced a radical shake-up of its CPU strategy, in an exclusive interview with PC Pro. The company has revealed that the next generation (codenamed Tyche) will be offered as a single 'lottery-core' SKU, with the number of functional cores in each part left for the customer to discover. 'We know gaming is very important to our customers,' explained regional marketing manager Ffwl Ebrill, 'and we're innovating to bring that win-or-lose experience out of the virtual world and into the marketplace.' Anyone discovering more than ten functional cores could consider themselves 'a lottery winner,' while unfortunates discovering their new CPU had no working cores at all would be encouraged to 'roll again.'"
AMD Readies "Lottery-Core" CPUs
Comments Filter:
• by TrisexualPuppy ( 976893 ) on Thursday April 01, 2010 @02:13PM (#31701818)
How about you get the number of cores proportional to the post number? FIRST!
Wait a sec...holding off on this one...
• Okay, I know it's a joke, but isn't it kinda true? Grab one of AMD's chips with disabled cores, and it truly is random how many cores (if any) you might be able to unlock using ACC. :P
• The thing about lotteries is that they defy physics. Take a machine designed to give out specific units of force, and balls designed to weigh the same weight they are prescribed, and you've got a very predictable physical system.
So, how do they avoid drawing the same numbers every time? They let a computer mess up the given statuses... do they use Set 1, Set 2, or Set 3 of balls? Do they put the balls in numerical order? When does the machine start moving?
The thing is... you can't let humans decide these va
Predictable for how long?
• Chaos theory (Score:4, Insightful)
by tepples ( 727027 ) <tepples@ g m> on Thursday April 01, 2010 @02:23PM (#31701898) Homepage Journal
Even if it is predictable, it isn't necessarily tractable. The air inside one of those table tennis ball blenders, for instance, is a chaotic system []. The "specific units of force" aren't always constant given fluctuations in power supply.
your state lottery is just as random as the PRNG at headquarters.
More likely, the PRNG that dictates exactly how long the machine runs isn't entirely pseudo but instead tied to an entropy-gathering process such as hashing room noise received through the microphone.
• by CyprusBlue113 ( 1294000 ) on Thursday April 01, 2010 @02:29PM (#31701928)
Except they don't, because the vast majority of the systems are based on the concept of turbulent flow of a fluid (in this case air generally), which is for all practical purposes due to the number of variable points of deflection impossible to model for any time period signifigant enough to allow for predictions of these machines as they are designed to long pass this point before the balls would lock in position.
Heck trying to model turbulent flow on a fixed path is hard enough, trying to model turbulent flow through a mass of shifting floating deflectors is downright masochistic.
• Re: (Score:3, Insightful)
and given that you have to lock in your picks before you even know the initial state, i wouldn't worry too much about it.
• by llvllatrix ( 839969 ) on Thursday April 01, 2010 @02:16PM (#31701838)
Didn't go over so well. Just ask newegg.
• We can only hope that the supplier they traced it to, once they realized that they were totally fucked no matter what they did at that point, responded: "You can't make a profit without breaking some neweggs..."
• by fredrated ( 639554 ) on Thursday April 01, 2010 @02:16PM (#31701840) Journal
Stop with the April fools posts already!
• Actually it would probably work as long as the cpu had enough cores to be worth the cost. I would go for it!
• And I lost, it had fewer working MBs than it was advertised. ;/ So this is very real actually.
• Those jokes aren't even funny nor interesting.
They are just bad.
Except the youtube 1/4 that thing was good !
• Intel got there first, years ago.
• April first :|
• It is all fun and 1 of April games until someone gets a 0-core processor.
• I'm thinking of installing a small generator on my abacus powered by the motion of the beads and calling it a minus-1-core processor. I put processing in to it, and I get energy out.
• that was already how they determined processor speed: []
• It's such a completely humorless waste of time. Yes, that's right-Bah humbug.
• Enough already. It's done to death and not funny.
At least the OMGPONIES joke was fun, since it didn't rely on an endless avalanche of stupid fake news stories.
• by BitZtream ( 692029 ) on Thursday April 01, 2010 @02:59PM (#31702120)
To whomever decided to add the 'dontruinitwithtags' tag ...
I get excited at a glimmer of hope of something to read while I sit here and wait for this batch to run ... only to find out another moronic April Fools post was made ... because 10 in one day just isn't enough.
• by MORB ( 793798 )
Who would be stupid enough to believe this anyway even in the absence of tags and of a billion other jokes?
• Isn't there a tech site that sells a daily "Bag of Crap"? People buy it, every day. Sometimes it's full of nice stuff. Often it's crap. People buy it. Because the price is right.
So, same here. I'd go for it. I'd pay $10 for a "Box of Crap" from AMD. It can have anywhere from 0 to 12 operational cores. As long as neither I nor AMD know ahead of time which it is, I'd buy it. I'm willing to gamble my $10 on the yield of AMD's production line.
'course, given their yield, the price would probably have t
• Save money on QA (Score:3, Insightful)
by DarthVain ( 724186 ) on Thursday April 01, 2010 @03:17PM (#31702236)
A boon for Overclockers really..
No longer are things priced by binning, now every one has an equal chance.
I would seriously buy one if the price was right. I mean I already own a C2D 1.8 I bought on the assumption that I could overclock the thing to 3.2 or whatever, and then was sorely dissapointed when it couldn't take an OC at all. I mean the ONLY reason I bought it was to OC it.
This would fill that niche. You don't have to sort or test them, heck, you don't even need to market them... what are you gonna say... erm we don't know how fast it will run, nor do we really know how many cores it contains... buy one and find out! Sure I will, just price 'em cheap and I would be all over that! (so long as your secretly not binning all the good ones and just selling rejects!)
I dunno, sounds find to me if the price is right. Overclockers everywhere would have a field day posting their finds! Not sure how you would do the package with a possible variable number of cores. I guess your MB would have to be uber compatible with everything...
Yes yes I know it is an April Fools joke. I still want one for fun though! :)
• by twosat ( 1414337 )
Sir Clive Sinclair and his Anamartic company were involved in something like this with "Wafer-Scale Integration" many years ago which used the "Catt Spiral" developed by Ivor Catt to make solid-state memory disks. Mr Catt is proposing something very similar to the "Lottery Core" cpus with his plans for the "Kernel Machine" []
• First, I am a fan of AMD and I'm glad they are being creative with how they might approach the market in the future.
But, this "lottery core" concept, if legal, is a very dangerous precedent pawned off to the consumer. Like atm transaction fees, or any financial transaction fees whatsoever, the only reason they persist is because no one has decided to sue for the practice; all those who might afford the lawsuit in some way benefit from the practice or the short changing effect has negligible effect on them
• I still like the odds better than my state lottery.
• Intel was already getting ready to roll out their own lottery-core [] However there was a bit of public backlash because units leaked out early.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '79', 'language_id_whole_page_fasttext': "{'en': 0.965575098991394}", 'metadata': "{'Content-Length': '192114', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HRMJYYOQAPNOUXLD3OJYYUK7RMZJ7EJQ', 'WARC-Concurrent-To': '<urn:uuid:b174b12b-d3d9-47fc-b5a9-9ec58cf65d6f>', 'WARC-Date': datetime.datetime(2016, 7, 30, 17, 5, 46), 'WARC-IP-Address': '216.34.181.48', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:M2V4S7CGKR5RRMF7W5SQY5O42PETZNEJ', 'WARC-Record-ID': '<urn:uuid:51de540d-da8e-49eb-afef-59b778d53866>', 'WARC-Target-URI': 'https://tech.slashdot.org/story/10/04/01/152257/amd-readies-lottery-core-cpus', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:32e02839-feae-4fba-82de-3a4149cfacb1>', 'WARC-Truncated': None}", 'previous_word_count': '1480', 'url': 'https://tech.slashdot.org/story/10/04/01/152257/amd-readies-lottery-core-cpus', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.044902145862579346', 'original_id': '8aac1321f77d00d074c4bee57045cdeca2fd19416f440676bb60915db5304ecb'} |
Wednesday, 5 February 2014
Writing Poems (Terza Rima)
The following was the result of a ten minute class exercise to write a poem with a nod towards the Terza Rima style. I've done a couple of minor edits since so that it reads better.
Writing Poems
Iambic pentameter. Isn't it great?
Its hurdles: they curdle my creative flow;
Tetrameter's better - the rhythm of eight.
I like playing with words to see where rhymes go;
Don't like their arrangement to sound like a sham.
It helps if I write on a subject I know.
And so, when I'm writing, I don't give a damn.
This counting of syllables gets in the way.
I write what I write: iamb, what iamb? | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9545754194259644}", 'metadata': "{'Content-Length': '60848', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AJDKNH2EMI5KX4MSSC4LQJA4ZBM2FUIH', 'WARC-Concurrent-To': '<urn:uuid:e7184058-d2f3-4287-82f3-00e3b97f6e5e>', 'WARC-Date': datetime.datetime(2018, 12, 13, 20, 17, 2), 'WARC-IP-Address': '172.217.7.129', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6ZWKVQPITJZ2437DAYBLTLPDUDZAVPDB', 'WARC-Record-ID': '<urn:uuid:f532aa2a-9085-4d61-9ccd-5039882b7e26>', 'WARC-Target-URI': 'http://somewrytings.blogspot.com/2014/02/writing-poems-terza-rima.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2daae7a4-14a9-4eef-8810-1ec312543877>', 'WARC-Truncated': None}", 'previous_word_count': '118', 'url': 'http://somewrytings.blogspot.com/2014/02/writing-poems-terza-rima.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-143-18-132.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07036322355270386', 'original_id': '9bf85496fbc70b5b6dfbf639a6ce7419404d2a7c3bb9a4876030f60f267c60ca'} |
This Costco Kobe Beef Slider Meal Kit Is Actually Super Cheap
Published 09-20-2018
0 Ratings
Costco is famous for its everyday great deals - but every once in a while, they offer a deal that is just hands down the best. Costco will sell a Kobe beef slider meal kit for less money than a steak dinner from your favorite chain restaurant. Why is this such a big deal? Kobe beef is considered some of the best beef in the world. The meal kit comes from the brand Hak's, a manufacturer of barbecue sauce, salad dressings and cooking sauces, and it only takes a half an hour to make.
11 Things You Didn't Know About the Costco Food Court
According to a press release, Hak's 30-minute Kobe sliders meal kit will include six Kobe beef slider patties, American cheese, caramelized onions, and six pretzel buns that can be topped with mustard aioli. Because it's a meal kit, it also comes with a side of pan-fried sweet potato fries. The best part is that it's just $16.99.
But we have to tell you, before you get too excited about getting some Kobe beef in your belly at such an awesome price: The burgers may not contain any actual Kobe beef, as it's incredibly expensive and was not widely available in the U.S. until recently. According to Forbes, Kobe labeling is one of food's biggest scams. The Kobe Beef Marketing and Distribution Promotion Association currently only lists 32 restaurants and distributors in the U.S. who serve and sell the real deal. Hopefully these are the real thing; we've reached out to Hak's and Costco and will continue to update this story.
The sure-to-be-coveted item is a limited-time offer and will only be sold in Costco stores in Los Angeles and Orange County from September 21 until the first week of November. So while your time to grab the Kobe slider kit is short, it's probably worth scooping one up. However, these are 10 things you should never buy at Costco.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9576427936553956}", 'metadata': "{'Content-Length': '50020', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:366S6O6SEGMXJ5EEBVYDO7EGUJYPDAVF', 'WARC-Concurrent-To': '<urn:uuid:69ce07c1-6558-401b-aa84-d27bec8d4e7e>', 'WARC-Date': datetime.datetime(2020, 1, 18, 8, 32, 11), 'WARC-IP-Address': '50.17.97.127', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RU3SNRWHTHZU7SCCLQD4RZ62YHAS3Z6A', 'WARC-Record-ID': '<urn:uuid:be302a9b-684e-4e8e-8a8d-091ff47cddc5>', 'WARC-Target-URI': 'https://www.helloerie.com/news/food/224871/this-costco-kobe-beef-slider-meal-kit-is-actually-super-cheap', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:75330c92-26da-4c6a-a664-2279f7480d6f>', 'WARC-Truncated': None}", 'previous_word_count': '348', 'url': 'https://www.helloerie.com/news/food/224871/this-costco-kobe-beef-slider-meal-kit-is-actually-super-cheap', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-163.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05905497074127197', 'original_id': 'e4b3e506f0ef560ee1cd3c5f20b049a49c3bc717dc30d92bda498b7577759532'} |
This research project investigates descriptions of “experimentation” with different religious practices/traditions, and self-conceptions of spiritual practice as “experimental,” in Western and Indian sources of the 19th, 20th, and 21st century. The project harbours two closely cooperating subprojects.
The first, entitled Religious Practice as Experimentation: Autobiographical Sources in India and the West, collects and contextualizes autobiographical descriptions of “experimenting” with religion/s. The second subproject, Experimental Systems, Spiritual Practices, and Religious Experience, takes a theoretical and systematic interest in the practices of spiritual experimentation as described by their protagonists.
Both subprojects combine narratological analysis with metaphor theory in order to interpret autobiographical narratives, and to analyze relevant cognitive metaphors used to describe the process of experimentation with experience. In addition, the first subproject contextualizes the narratives in their religious, historical, and biographical settings. In particular, it will show how this specific discourse emerged in 19th century Europe, how it gained traction in Western Spiritualism and in the reception of Indian Yoga and Buddhism, and, finally, how “spiritual seekers” of the 20th and 21st centuries regarded themselves as “experimentalists.” The inclusion of modern Neo-Hinduist and Neo-Buddhist sources is of special importance, as it is in these widely read works that religious practices are prominently conceptualized as “experimental.” | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9222569465637208}", 'metadata': "{'Content-Length': '70302', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RLFOZ4UZQCWMIIRATPZCL2TUGDAJ2WFH', 'WARC-Concurrent-To': '<urn:uuid:66d46d8a-da2f-41b6-831c-9a762ec6bbdd>', 'WARC-Date': datetime.datetime(2021, 9, 26, 12, 46, 18), 'WARC-IP-Address': '46.30.215.177', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DP5FNNDASAT26PKDCJAHST5R3DJ6CP3J', 'WARC-Record-ID': '<urn:uuid:423e2926-8970-43a0-915b-30ae732eb901>', 'WARC-Target-URI': 'https://experiments-with-experience.org/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:26bb22b9-76e3-46e2-bf7b-ee1cd88ebca2>', 'WARC-Truncated': None}", 'previous_word_count': '200', 'url': 'https://experiments-with-experience.org/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-112\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.12526357173919678', 'original_id': 'd8ff6c21be517d2abc4ddf5c56b443fdce36a76ab5540c22d1c5264a860703d1'} |
by James C.
March 2, 2016
Design 4 min read
5 ways to get results from responsive design
Responsive design is the hottest thing to happen to websites since having a website. No exaggeration, a fully responsive site is just about the most important thing you can do for your business online, after having a web address that's easy to remember. But what does it even mean? How can a website not be "responsive," and why should you even care?
The basics
WAP allowed us to be free from the shackles of our desktop computers (those of us who didn't have laptops) and to view some poorly-designed websites on the move. And so began the growth of the mobile web.
This was all very well, but as a solution it hasn't been ideal. Laptops were getting smaller, mobile phones were getting bigger and more powerful, tablets have become more popular, and smart watches are now gaining on Swiss watches for popularity. It's not enough to just have an alternate "mobile" site any more.
Are you responsive?
The term "Responsive" design was originally coined by Ethan Marcotte in the article Responsive Web Design.
Responsive means that your website responds to the visitor. We're not talking a redirect to an alternate site, or a small number of alternate screen sizes, but instead really taking the time to have a website that will respond and adapt to any screen size, to change orientation when a device is rotated. Marcotte said:
CSS is part pf the key to being responsive, with careful attention given to fluid grids and images. There are lots of great tutorials and how-to guides, with Marcotte sharing a lot of good information in his article. Another good place to start is with 70+ essential resources for creating liquid and elastic layouts.
But why should you care?
You get it. Websites that are fluid and responsive for visitors. But why should you care? Do your customers really care if your site is fancy, so long as they can get the information they need? Let's quickly look at the top reasons to give a damn.
Your customers do care
A recent report from found that the top mobile shopping problems reported by customers were all related to responsive design, with the top problems including "having to enlarge [the page]" "having to use the 'full site' version" and "Text is too small." Your poor design is driving away customers and visitors.
Google cares
They may not be personally interested in your business, but what Google does care about is indexing your site. From April 2015, Google actively started ranking more highly sites that were mobile friendly, and the search giant has long held a dim view of duplicated content: meaning that if you have different versions of your site with the same content, you could be penalised in Google's results for it. Take the test here to see if your site is mobile friendly.
It's the future
On the balance of probability, devices aren't likely to become any less varied. Desktops gave us laptops, laptops gave us tablets, tablets have opened the door to wearables – and who knows where we go from here. The fact is, the technology is here to stay, and multiple devices with various screen sizes are only going to proliferate further. As Marcotta says, making a whole design for every different device, input mode, and browser is "a zero sum game".
One site to rule them all: for visitors
Isn't it annoying if you don't know the address of the website you want to visit? You can't remember if they have a separate mobile site, if you need to prefix the address with m. first, or if it will be enough to visit the main site, which may or may not redirect you? Responsive design means your visitors only ever need to know your one address, and will be confident that only is it the right one, but that it will work.
One site to rule them all: for designers
Why waste valuable time making different websites for every device or screen size under the sun, when your valuable assets can make one website and do it right? Responsive design is an investment in your business, but it saves you both time and money in the long run, and keeps visitors when they cone to your site.
Enter Google and Accelerated Mobile Pages
Except that the major industry players are shaking up the internet in a big way. With Facebook and Apple now publishing news directly on their platforms, Google has stepped into the ring to defend the internet from the "walled garden" of content locked on platforms. Google's Accelerated Mobile Pages aims to provide "web pages that are optimised to load instantly on users’ mobile devices."
AMP is, essentially, a stripped down version of HTML using a restricted set of tags, and boasting load times "as much as 10 times faster than the standard mobile web," publishers including the Guardian and New York Times have already signed up. The only trouble is, some argue, is the it is creating "a two-tiered system separating the Web from the mobile Web," making the open Web less of a level playing field.
Will Google AMP signal a return to separate mobile sites? Will responsive design win out? Only time will tell.
Start building your own great looking and responsive website today with Crazy Domains: it's so quick and crazy easy with our Website Builder.
Skip to section | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '313', 'language_id_whole_page_fasttext': "{'en': 0.964702606201172}", 'metadata': "{'Content-Length': '124801', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SOM6FQS6JD3HPULB5H3B32X4R3LWSRXQ', 'WARC-Concurrent-To': '<urn:uuid:f6ea1b36-0335-48d6-9f4c-3db82638797a>', 'WARC-Date': datetime.datetime(2021, 2, 27, 10, 24, 51), 'WARC-IP-Address': '104.21.65.111', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WMBSSYC36O7UZIRI65TZ66ZBPQYPESN6', 'WARC-Record-ID': '<urn:uuid:588e722c-dbeb-43fc-a13f-06d7748fc01a>', 'WARC-Target-URI': 'https://www.crazydomains.id/learn/responsive-design/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:299459aa-5404-48f2-beaf-b7c2c8688334>', 'WARC-Truncated': None}", 'previous_word_count': '1139', 'url': 'https://www.crazydomains.id/learn/responsive-design/', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-119.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.022961974143981934', 'original_id': '2bb07dda3d1721623989449cd66750b1c3f1887c40a2a7450fc93db4c82eb374'} |
PAT-Advanced-1101. Quick Sort
There is a classical process named partition in the famous quick sort algorithm. In this process we typically choose one element as the pivot. Then the elements less than the pivot are moved to its left and those larger than the pivot to its right. Given N distinct positive integers after a run of partition, could you tell how many elements could be the selected pivot for this partition?
For example, given N = 5 and the numbers 1, 3, 2, 4, and 5. We have:
• 1 could be the pivot since there is no element to its left and all the elements to its right are larger than it;
• 3 must not be the pivot since although all the elements to its left are smaller, the number 2 to its right is less than it as well;
• 2 must not be the pivot since although all the elements to its right are larger, the number 3 to its left is larger than it as well;
• and for the similar reason, 4 and 5 could also be the pivot.
Hence in total there are 3 pivot candidates.
Input Specification:
Each input file contains one test case. For each case, the first line gives a positive integer N (<= 105). Then the next line contains N distinct positive integers no larger than 109. The numbers in a line are separated by spaces.
Output Specification:
For each test case, output in the first line the number of pivot candidates. Then in the next line print these candidates in increasing order. There must be exactly 1 space between two adjacent numbers, and no extra space at the end of each line.
Sample Input:
Sample Output:
PAT-Basic-1045. 快速排序的英文版。
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.9204781651496888}", 'metadata': "{'Content-Length': '64396', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:W7N24CHIOM25QXS54X5GJCLUVU7JVG32', 'WARC-Concurrent-To': '<urn:uuid:6418c64b-0451-4214-a5f0-d18b45697048>', 'WARC-Date': datetime.datetime(2021, 5, 18, 4, 11, 31), 'WARC-IP-Address': '122.10.113.37', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OTMNJZYITSTETEJTTYUHOBEOJUGKZ27V', 'WARC-Record-ID': '<urn:uuid:741b59c3-abc9-4048-9d15-eb8869a2dcdb>', 'WARC-Target-URI': 'https://www.llonely.com/pat-advanced-1101-quick-sort/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cc0db746-f391-4c3b-a15f-02f06d480eb5>', 'WARC-Truncated': None}", 'previous_word_count': '289', 'url': 'https://www.llonely.com/pat-advanced-1101-quick-sort/', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-212.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.8657628297805786', 'original_id': '2b42911341b16b615691ece902628008e88e45c6b7909efbfda2f05759e08e93'} |
Zoic Studios has expanded its creative team, adding VFX Supervisor Chad Wanstreet to its Culver City studio, as well as promoting Nate Overstrom to Creative Director in its New York studio. Wanstreet has nearly 15 years of experience in visual effects, working across series, feature film, commercial and video game projects. He comes to Zoic from FuseFX, where he worked on top series including NBC’s “Timeless,” Amazon Prime’s “The Tick,” Marvel’s “Agents of S.H.I.E.L.D.” for ABC and Starz’s Emmy-winning series “Black Sails.” Wanstreet thrives as a creative problem solver, fusing a streamlined pipeline approach with an impeccable attention to detail, partnering with directors to bring any visual concept to life. Overstrom has spent over 15 years of his career with Zoic, working across the Culver City and New York City studios, earning two Emmy nominations and working on top series including “Banshee,” “Maniac” and “Iron Fist.” He is currently the VFX Supervisor on Cinemax’s “Warrior.”
The growth of the creative department is accompanied by the promotion of several Zoic lead artists to VFX Supervisors, with Andrew Bardusk, Matt Bramante, Tim Hanson and Billy Spradlin stepping up to lead teams on a wide range of episodic work. Bardusk just wrapped Season 4 of DC’s “Legends of Tomorrow,” Bramante just wrapped Noah Hawley’s upcoming feature film Lucy in the Sky, Hanson just completed Season 2 of Marvel’s “Cloak & Dagger” and Spradlin just wrapped Season 7 of CW’s “Arrow.”
“Chad is a great fit for us and a nice addition to what has become a really strong creative team,” notes Zoic Executive Creative Director/Co-Founder Chris Jones. “Each of these artists share the same core values we established from our start in 2002 of bringing a tireless work ethic in pursuit of creative excellence. Congrats to Nate, Tim, Matt, Bill and Andrew. It’s an exciting time at Zoic and we couldn’t ask for better creative leadership.”
“Zoic’s dedication to design and visual storytelling is in their DNA and that is truly evident in their work,” adds Wanstreet. “I’m thrilled to be a part of a team that has creative intent at its core.”
About Chad Wanstreet:
Wanstreet leveraged his studies in architecture to launch his career in visual effects by bringing structural designs to life through architectural rendering software. He worked as a VFX artist in Detroit at Speedshape, working on projects for top brands such as Ford, GE and General Motors, eventually stepping up as a CG Supervisor. In 2014, he relocated to Los Angeles, joining Blur Studio and quickly stepping up as a lead artist. He worked on full CG in-game cinematics and VFX elements for game clients including Microsoft, Marvel, DC and 343.
Shifting to episodic, he joined Encore VFX as CG Supervisor, where he managed a team of 70 artists, delivering up to 100 shots daily. There he helped to develop and execute the creature-heavy aesthetics for “Arrow” and “The Flash.” He then spent a year as a CG Supervisor and eventually VFX Supervisor at FuseFX, working on series including “The Tick.”
About Nate Overstrom:
Overstrom has worked on dozens of projects that span across feature film, television and commercials. With well over a decade of industry experience, he is known for his mastery of CG and live-action compositing. He earned a BFA in Computer Art from SVA in New York, then went on to intern for Zoic in Los Angeles. He later moved back to NYC and spent two years with Look Effects.
In 2014, Zoic recruited Overstrom to spearhead its NYC studio as a VFX Supervisor. There his work has earned him multiple Emmy nominations as well as three VES Award nominations. He has lent his talents to numerous projects since joining Zoic, including the Amazon original series “The Man in the High Castle” which was nominated for a 2016 Emmy for “Outstanding Special Visual Effects.” Additional credits include “Homeland” and “The Defenders” in 2017, as well as “Manifest” in 2018.
The news comes on the heels of a bustling start of the year for Zoic across all divisions, including the recent announcement of the company’s second development deal, optioning New York Times best-selling author Michael Johnston’s fantasy novel “Soleri” for feature film and television adaptation as well as the addition of Daniel Cohen as Executive Producer, Episodic and Series in NYC and Lauren F. Ellis as Executive Producer, Episodic and Series in Culver City.
About Zoic Studios
Zoic Studios is an entertainment company based in Culver City, California, New York, NY and Vancouver, B.C., which creates computer-generated visual effects for film, television, commercials and video games.
“Visual Evolution” is their mission: to evolve the story, art, and technology of the moving image. Zoic’s accomplished artists and producers understand story, process, technique and relationships. Their team has a proven track record of success in a range of media including episodic, film, commercials and gaming. Masters in the fields of 3D, Compositing, and Production Management, their elite reputation attracts additional talent and encourages a strong work ethic. Zoic’s relationships with its clients are deep and long lasting. The company is known for results-driven excellence in all endeavors. | mini_pile | {'original_id': '161d3a25c676abd330cbf40ceba5459f8806c345a0c771b86fc848144c510fd4'} |
Iraqi army builds up first tank division
| Dec. 21, 2010 at 2:37 PM
1 of 2
| License Photo
BAGHDAD, Dec. 21 (UPI) -- The new Iraqi army has started building up its armored forces with the first batch of 140 U.S.-built M1A1 Abrams main battle tank, the same type that crushed Saddam Hussein's military in March 2003.
The 9th Armored Division, based near Baghdad, will be the spearhead of an army that will likely have a strength of more than 300,000 troops in up to 20 divisions, six of them armored.
That's a far cry from the 1 million-man army, with 5,500 mainly Soviet- built T-72 and T-62 MBTs, that Saddam once fielded when Iraq was a major Middle East power. But the new army isn't designed to conduct the ill-fated military adventures undertaken by the power-hungry Saddam, such as the 1980 invasion of Iran and the 1990 conquest of Kuwait.
Its mission is first to crush insurgent forces and restore order and stability in the oil-rich country then to protect its borders against outside aggression.
The army received the first 11 Abrams in August. That was part of a $6 billion arms package approved by the United States in December 2008 to provide 140 M1A1s and 400 Stryker combat vehicles. Both are built by General Dynamics Land Systems.
"This step is part of preparations by Iraqi forces to take over security responsibilities and build a strong army as the U.S. withdraws," said Maj. Gen. Mohammed al-Askari, the Defense Ministry spokesman.
"This delivery will help to form the military's first armored division since 2003."
The Iraqis are training crews at the Besmaya military base near Baghdad on 22 M1A1s leased from the U.S. Army, which is equipped with the more advanced M1A2.
Delivery of the rest of the 140 M1A1s is to be completed by the end of 2011, when the U.S. military is slated to wrap up its withdrawal from Iraq.
Along with the MBTs, the United States is supplying 100 support vehicles, including 35 tank transporters.
Iraq's Abrams are newly built and are equipped with infrared thermal imagers, a special air filer for the engine to deal with the sand and dust of Iraq, systems that are components of the U.S. Army's Situational Awareness standard.
But they don't have the depleted uranium armor or the Blue Force Tracker, a satellite tracking system that displays the location of all U.S. vehicles and aircraft in the Abrams' operational vicinity.
Although Iraq's military and security forces are being trained by the Americans, U.S. officials disclosed in January 2009 that the Iraqis, on American advice, planned to purchase up to 2,000 retrofitted T-72s, redesignated the T-91 and built to be interoperable with U.S. forces.
These were to be upgraded, at an estimated cost of $3 million per tank, to near-M1A1 standard with modern guns and armor as well as new fire-control systems.
That made sense since Iraqi forces were familiar with the systems as Iraqi military doctrine was built around Soviet-era weapons supplied to Saddam's regime by Moscow.
Most of the equipment used by Saddam's army was either destroyed by U.S. and British forces in the 2003 fighting or was looted in the chaos that ensued Saddam's defeat.
In 2005, Hungary, a former Soviet satellite state, agreed to donate 77 T-72s to the Iraqis. Others were expected to come from Eastern European countries such as Poland, the Czech Republic, Ukraine and Slovakia.
However, that idea seems to have fallen from favor with the Pentagon and whether it will be pursued to one extent or another remains to be seen.
The Abrams is more than a match for the largely antiquated armor fielded by Iran, Iraq's eastern neighbor and traditional enemy that has long had its eyes on conquest.
But supplying Iraq with M1A1s opens the possibility of its Abrams having to go up against other U.S.-built tanks in the armies of Saudi Arabia, which has more advanced M1A2s, and Turkey, which has older M-60A1s.
Right now, the possibility of that happening seems remote. But if, for instance, the bloodletting between Iraq's Shiite majority and Sunni minority flares once U.S. forces have quit Iraq, Sunni-dominated states like Turkey and Saudi Arabia could intervene to support their endangered co-religionists.
| dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '30', 'language_id_whole_page_fasttext': "{'en': 0.9710628390312196}", 'metadata': "{'Content-Length': '55243', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TXFMORQWSBCZRAVO4A2TGAS35XY42ADW', 'WARC-Concurrent-To': '<urn:uuid:1018d183-0722-4f9a-845e-9ff06a49939a>', 'WARC-Date': datetime.datetime(2015, 1, 25, 4, 12, 59), 'WARC-IP-Address': '38.118.71.121', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:RGJ4ROKCGWEYUVW5STCDPEEHTRBTIKBK', 'WARC-Record-ID': '<urn:uuid:5dee85be-d2b5-48af-91ee-8feb6c5a2acf>', 'WARC-Target-URI': 'http://www.upi.com/Business_News/Security-Industry/2010/12/21/Iraqi-army-builds-up-first-tank-division/UPI-89891292960243/?rel=68981296231791', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:06c5c44c-af17-4c15-bb7f-17243e16a79a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '730', 'url': 'http://www.upi.com/Business_News/Security-Industry/2010/12/21/Iraqi-army-builds-up-first-tank-division/UPI-89891292960243/?rel=68981296231791', 'warcinfo': 'robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.023457646369934082', 'original_id': 'd1cf576a7368dbdd639f280ac42d6e342d1c83dbd66bc5a724f6834ceda05177'} |
Stereochemistry of the reaction of Si-phenyl silenes with butadienes: elaboration of the silacycloadducts to provide a novel route to substituted lactones.
Silenes generated through a silyl-modified Peterson olefination procedure can be trapped with a range of alkyl butadienes via a [4 + 2] cycloaddition pathway to afford silacycles accompanied by variable amounts of competing ene, [2 + 2] and silene dimer by-products. The silacycles are formed with good chemo- and stereo-selectivity and provide access to diols and lactones via a phenyl-triggered Fleming-Tamao oxidation. | mini_pile | {'original_id': '3ab815231e85b39560ea5b95209eb20a11937df017282c4c4a1b9e1ebb5a3b35'} |
Skip to main content
Part of complete coverage from
How Obama can win a deal
By Julian Zelizer, CNN Contributor
December 3, 2012 -- Updated 1310 GMT (2110 HKT)
• As deadline approaches, officials trying to find a solution to tax/budget issues
• Julian Zelizer: President Obama should look at how former presidents handled such issues
• Clinton broke promise not to raise middle class taxes; LBJ cut spending deeply
• Presidents who anger their party's base can use that to help reach a deal, he says
(CNN) -- Most officials in Washington are dreading the consequences of falling off the fiscal cliff.
President Barack Obama and his advisers have met in the White House trying to figure out a deal that will protect them politically while avoiding the draconian deficit reduction option that will occur should the parties fail to reach agreement. And on Friday he traveled to a Pennsylvania toy factory to seek public support to pressure Congressional leaders to pass legislation extending tax cuts for middle-income Americans.
Obama is not the first president to confront the challenges of deficit reduction, one of the least pleasant tasks in politics because it forces elected officials to take things away from voters rather than do what they prefer: hand out benefits. In the next few days, the president would do well to look at how previous chief executives have handled this task.
Julian Zelizer
Julian Zelizer
In 1967 and 1968, in a period of united government and regionally divided parties, President Lyndon Johnson grudgingly undertook a brutal campaign to push through Congress a 10 percent tax surcharge and spending cuts to curb the growing size of the federal deficit that had resulted from spending on Vietnam.
Under pressure from Southern Democrats who controlled the key committees and their Republican allies, Johnson agreed to much steeper spending cuts than his advisers wanted him to so that he could get the package through the House and Senate.
Become a fan of CNNOpinion
Many liberals were furious with the president, believing that he had sold them out and placed their programs in jeopardy. But Johnson had become convinced that the deficit reduction passage was essential to stabilize the dollar in international markets and ensure that the federal government had enough revenue to keep most of his domestic programs intact.
In 1990, President George H.W. Bush undertook one of the most embarrassing about-faces in modern politics. Though he had promised in his 1988 acceptance speech, "Read my lips, no new taxes!" two years later Bush agreed with Democrats on a deal that implemented major restraints on spending while increasing taxes.
The decision caused a firestorm. "Read My Lips: I Lied" said the New York Post. Republicans like Congressman Newt Gingrich were furious with his decision. To overcome this opposition, Bush took to the airwaves, making a speech in which he directly appealed to citizens to build support for this. Bush watched as his approval ratings plummeted. Gingrich refused to have his picture taken with Bush at the Rose Garden and publicly criticized the president.
Tax cuts and political reality
Sen. Barrasso discusses the fiscal cliff
Obama & Romney do lunch ... no beef
Three years later, President Bill Clinton took a stab at the deficit that continued to grow despite the 1990 deal. After the election of 1992 had made deficit reduction a major issue he used all his partisan muscle to push through Congress an increase in taxes for Americans earning $125,000 or more.
Clinton abandoned his campaign promise that he would not raise taxes on the middle class. He allied with fiscal conservatives such as Alan Greenspan, chairman of the Federal Reserve who were insisting on deficit reduction. The bill was hugely unpopular. Every Republican voted against the bill, along with some blue dog Democrats. Many liberal Democrats felt that he had betrayed them. The final package increased tax rates and enacted spending cuts.
Marjorie Margolis-Mezvinsky, a freshman Democrat who the administration pressured into casting the decisive vote in the House despite her knowing it would be politically devastating and despite her earlier opposition, lost her seat, as expected in 1994. "Goodbye Marjorie," Republicans had yelled when she voted. Clinton ended up benefiting politically from this controversial decision, as the economy boomed and deficit disappeared by the end of the decade, both providing his most lasting legacy.
Angering the base is clearly part of what lies ahead for President Obama. Johnson, Bush, and Clinton all cut against what core members of the party wanted to reach a deal.
At the most basic level, Obama will need to win enough House Republican votes for a deal and this will entail more cuts in domestic spending than liberals want to swallow. Equally important, the president will have to win over moderate Democratic senators who are nervous about reelection.
In addition to helping achieve compromises on specific numbers, angering the base also has symbolic value to the White House. The criticism from supporters demonstrates that a president is bending over backward, pushing as far as he can, thereby offering an incentive for the other party to shift closer to the center.
The president will also need to use the bully pulpit to sell the idea of sacrifice combined with the promise of growth. Obama must not simply work in closed rooms with House Speaker John Boehner. He must continue to take to the airwaves to build support for the bill. With regards to sacrifice, he must explain to voters why hard choices are necessary. He must tap into the legacy of Clinton by outlining the long-term economic rewards that could come from a good deal.
Obama must also consider breaking some promises that he has made along the way. Johnson started his presidency by reducing taxes and assuring Congress he would not raise taxes to pay for his program. Bush did the same, as did Clinton. But when dealing with major challenges this is necessary.
Effective politics is often about the need to be flexible. More than almost any other issue, deficit reduction requires this skill given that all the tradeoffs are unpopular. This might include being flexible on his assurances to avoid raising taxes on the middle class.
Finally, the president will need to employ all the partisan muscle that he has. In 1993, Clinton famously leaned on Democrats who were dragged along kicking and screaming. Politics ain't bean bag, as the saying goes, and Obama must act like a tough partisan to win.
Achieving a deal won't be easy and it won't be fun. But a deal is possible if the president throws all of his weight behind the effort.
Follow us on Twitter @CNNOpinion
Join us on Facebook/CNNOpinion
Part of complete coverage on
Al Awlaki | dclm_baseline | {'bff_contained_ngram_count_before_dedupe': '454', 'language_id_whole_page_fasttext': "{'en': 0.950425148010254}", 'metadata': "{'Content-Length': '72791', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UO2QDKIWXOFQ7QXUHBUBSPFFYXIOK3GP', 'WARC-Concurrent-To': '<urn:uuid:bf3db499-66b2-47a8-adb8-842501b69c5c>', 'WARC-Date': datetime.datetime(2014, 4, 18, 3, 2, 15), 'WARC-IP-Address': '157.166.248.13', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LPXN3JGMNUOQTVJJIOGAIDYQ5PJNOOLC', 'WARC-Record-ID': '<urn:uuid:27102f94-d540-4717-8850-d4af283af464>', 'WARC-Target-URI': 'http://www.edition.cnn.com/2012/12/03/opinion/zelizer-obama-budget-deal/index.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0fea7b2c-1a6d-4c7e-8bc0-307401622992>', 'WARC-Truncated': 'length'}", 'previous_word_count': '2026', 'url': 'http://www.edition.cnn.com/2012/12/03/opinion/zelizer-obama-budget-deal/index.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-4-33.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-15\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for April 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07202279567718506', 'original_id': 'c79f788b3a1ee5be8c90da84699f938f2f2866fb0b15d2090d1aecd455507355'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.