text
stringlengths
3
7.38M
source_data
stringclasses
5 values
info
stringlengths
83
12.5k
Search form Palm Sunday The curtain lifts again and we begin to recount ritually and relive interiorly the great events that took place over a few days a long time ago. The world did not stop when they happened. Only symbolically did the sun darken and the veil of temple split. Peoples’ commercial and emotional lives carried on as usual through the short tragic drama of the humiliation and extinction of a powerless pawn in the politics of the world. A short show-trial, public torture to keep the crowds satisfied, another execution of a religious (or political) activist who flared briefly in popular imagination and then lost their favour and sunk between the bigger waves of public affairs and personal concerns. His close friends ran away, disappointed and maybe angry with him, to save themselves. He was left to die with only his mother, one disciple he loved and a few loyal women at the foot of his cross. And here we are in 2012 telling the story again from the slightly disjointed but unforgettable accounts written down several decades afterwards. We do not have his own words except in translation. He put nothing in writing himself. We don’t know what he liked for breakfast or exactly who he thought he was. He is more present than any other historical or fictional figure and yet when you look at him closely he becomes transparent and disappears. If we meet him we are changed but we cannot get a grip on him. These inconsistencies and paradoxes that so irritate the rational mind, when it operates in isolation, are the medium of a great transmission.Children who like a story and those who recognise the value of a great work art are happy to repeat it indefinitely. In this story the repetition itself is an act of faith that strengthens faith and so clarifies vision. It is more powerful if we act theatrically in the telling rather than sitting like a passive audience. In this story there are no mere observers.We have a limited number of chances in one life to replay the drama and penetrate its meaning. Not knowing how many is a part of the process that connects us with the one who suffered and died but did not stay dead.
mini_pile
{'original_id': '37d0f0c26666a409737469601ebf4d6408deeec37fdc736f71d090063f6bad1f'}
Magazine article Ivey Business Journal Online Frugal Innovation: The Key to Penetrating Emerging Markets Magazine article Ivey Business Journal Online Frugal Innovation: The Key to Penetrating Emerging Markets Article excerpt There may be no better exemplar of the need to modify business practices when expanding to another country than innovation. Quick check-ins just won't cut it in India, for example. Instead, companies must understand that customers in emerging markets will not respond to a frivolous innovation but they will buy one tailor made for them, a frugal innovation. This author describes how to do it. In recent years, companies looking to expand have shifted their focus to emerging markets. But if they are to succeed in these markets companies must understand that they will also have to effect another, highly important shift. They will have to change their approach to innovation. For most companies in Western markets, innovation has meant the development of new products with more advanced features at premium prices. But in emerging markets, where their products must appeal to the millions who don't have millions, companies will need to master the art of frugal innovation. However, understanding frugal innovation and learning how to practice it are much easier said than done. Ten years ago, the late C.K. Prahalad and Allen Hammond described the potential benefits of creating viable products and services for the 4 billion people who earn less than $2000 per year[i]. This potential has become even more alluring, given the higher birth rate in poorer nations. But money is in short supply for the bottom-of-the-pyramid customers, so companies need to employ frugal innovation if their products are to offer the right value proposition. This article highlights the issues that companies need to manage well to succeed with frugal innovation. While planning innovations for bottom-of-the-pyramid customers, affordability becomes the key issue. Companies need to understand what customers feel is an affordable price. The answer can often surprise companies because the price point could be just a small fraction of prices in Western markets. For example, in India, small sachets of Tide are selling for one rupee, only ($1 = Rs. 50). The affordable sachet format is very popular in categories like detergents, shampoos, and even for products like coffee and tea. Though the cost per unit of volume/weight of the product is much higher for sachets, the price is considered attractive by the target customers. Grocery stores are able to push high volumes of sachets and consider it worth their efforts. A similar approach has worked well in the cellular telephone service category. Brands like Vodafone have been able to penetrate the Indian market by selling pre-paid cellular phone service vouchers for as low as Rs.10. Reaching mass consumers has been made possible by selling the vouchers through grocery and convenience stores. The challenge for companies is to use innovation to drive down the price to a level that economically disadvantaged consumers feel is affordable. This is what we mean by frugal innovation. Different approaches have been used to achieve this objective. The Aravind Eye Hospital in India is a case in point. The hospital carries out cataract removal on more than 200,000 people every year, with an average cost of each treatment of $25[ii]. This drastically lower cost has been achieved by introducing process efficiencies and getting more output from doctors and nurses. In fact, for all poor people (60 percent of the patients) the operation is free. This is made possible by subsidizing Aravind's cost, namely by charging the other patients between $50 and $300, which is still a fraction of the cost charged by hospitals in Western countries. This affordability is also backed up by state-of-the-art quality. The infection rate (a key determinant of quality for medical cases), is lower than that for conventional Western hospitals. Therefore, frugal innovation needs to be driven by developing a model wherein affordability is the central issue. The business model needs to be structured and innovated upon, but only after taking into account the aspect of affordable pricing. … Search by... Author Show... All Results Primary Sources Peer-reviewed
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.9553993344306946}", 'metadata': "{'Content-Length': '90457', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J5DRC2QNNC7FCUS462QIA643QOGVNSGG', 'WARC-Concurrent-To': '<urn:uuid:56805b14-598f-49dd-a53f-7d5dac695f77>', 'WARC-Date': datetime.datetime(2018, 12, 10, 20, 12, 11), 'WARC-IP-Address': '69.32.208.13', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:MR5QSOI5GH33VKYNXT3XBOTEG757SBFQ', 'WARC-Record-ID': '<urn:uuid:6f70ff25-e251-462f-9aa1-c8af8021ce1e>', 'WARC-Target-URI': 'https://www.questia.com/magazine/1P3-2760525201/frugal-innovation-the-key-to-penetrating-emerging', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5c3e0cb1-1aee-4a47-9656-532f36f0f8de>', 'WARC-Truncated': None}", 'previous_word_count': '702', 'url': 'https://www.questia.com/magazine/1P3-2760525201/frugal-innovation-the-key-to-penetrating-emerging', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-150-135-54.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02560603618621826', 'original_id': '84c5a07cd846eba9fc10de684580d031925675f1e532b999ee5a82be603a6958'}
Introduction: Bodily Integrity and Informed Choice in Times of War and Terror Vol. 30 No. 2 George J. Annas is Professor of Health Law at Boston University School of Public Health, School of Medicine, and School of Law, and cofounder of Global Lawyers and Physicians. We extend special thanks to Robyn S. Shapiro, Human Rights editorial board member, for her assistance as special issue editor of this edition discussing body rights and body ethics. Law is the dominant force behind American medical ethics, and has been for at least the past half-century. That lawyers and judges, rather than physicians, have set the agenda for medical ethics in the United States is a bit surprising to many in the field of medical ethics, but it should not be. Medicine has historically been based on paternalism. The Hippocratic physician was obligated to act in the best interests of the patient-as the physician judged those interests-and to "do no harm." American law, on the other hand, is based on liberty and justice, principles that, among other things, led to the law's adoption of the doctrine of informed consent-better termed informed choice-under which individuals make the ultimate decision about what, if anything, will be done to their bodies. All of the articles in this issue make that central point from a remarkable variety of perspectives. The question of when the law assumed the dominant role in defining ethical medical practice can be debated, but my nomination is at the "Doctors' Trial" at Nuremberg. The end of World War II was marked by the birth of the international human rights movement, the formation of the United Nations, and the adoption of the Universal Declaration of Human Rights. The "Doctors' Trial" was an important piece of this picture. U.S. judges, presiding under military jurisdiction in Nuremberg, Germany, found fifteen Nazi physicians guilty of war crimes and crimes against humanity for their actions in conducting or authorizing lethal and torturous medical experiments on concentration camp inmates. More importantly, the court articulated what has come to be called the Nuremberg Code, which sets forth the legal requirements for human experimentation. The most significant provision is the first of ten: "The voluntary consent of the human subject is absolutely essential . . . the person involved should have the legal capacity to give consent; should be so situated as to be able to exercise free power of choice, without intervention of any element of force, fraud, deceit, duress, overreaching, or other ulterior form of constraint or coercion; and should have sufficient knowledge and comprehension of the elements of the subject matter involved as to enable him to make an understanding and enlightened decision. . . " The 1948 Universal Declaration of Human Rights (UDHR) declares bodily integrity central to both human rights and human dignity, providing in Article 5, for example, that "No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment." Most physicians, of course, do not view human experimentation as torture, but the treaty that followed the declaration, the International Covenant on Civil and Political Rights, made the link unmistakable by adding an additional sentence to the UDHR's Article 5 in its Article 7: "No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment. In particular, no one shall be subjected without his free consent to medical or scientific experimentation." This is, of course, now a fundamental precept of international human rights law. Moreover, under the treaty, Article 7 is nonderogable, even "in time of public emergency which threatens the life of the nation." In the United States, our courts later adopted and applied the doctrine of informed consent to the therapeutic as well as the research setting, reversing the Hippocratic ethic by placing choice in the hands of patients rather than physicians. As pivotal as the doctrine of informed choice is now to both law and medical ethics, its application in some circumstances remains contested, as Robyn S. Shapiro discusses in her overview of the controversy surrounding the payment of living donors for solid organs. Lawyers continue to be called upon to advocate for their clients whose right to bodily integrity has been ignored or abused. Moreover, physicians sometimes have affirmative obligations to act to help their patients that reliance on informed consent alone cannot resolve. Kathryn L. Tucker, for example, accurately describes the epidemic of untreated pain as a "human rights tragedy." She could as accurately have described physicians' failure to treat their patients' pain and suffering as torture. It is a scandal that the medical profession ignores such widespread suffering, and it will likely take vigorous legal action to change medical practice in this realm. Similarly, Shawna L. Parks correctly notes that institutionalizing juvenile offenders should require that they be provided basic mental health care. Susan Berke Fogel and Lourdes A. Rivera demonstrate how religious guidelines can frustrate and prevent good medical care, and why lawyers should insist that when the two are in conflict, "the medical needs of the patient must prevail." Looking at informed consent directly, Stephen F. Hanlon and Robyn S. Shapiro argue persuasively that there is more at stake in human experimentation than physical injury: such experimentation without consent is also an affront to human dignity, and courts should recognize a dignitary harm even in the absence of physical harm when informed consent is not obtained. The Nazis showed us the extreme physicians could go to in the service of the state. Kathy Swedlow helps us understand that when physicians act as agents of the state to involuntarily medicate a death row inmate so that person (certainly not a "patient") can be executed, the drugging can meet neither the legal requirement of informed consent nor the Hippocratic injunction to "do no harm." And Thomas May reminds us that soldiers are people too. Although soldiers may relinquish their right to refuse medical treatment upon enlisting, they retain, as all humans do, their right to refuse to be subjects of human experiments-and so retain their right to refuse experimental or investigational drugs and vaccines, even in wartime. The Nuremberg Code is, after all, a wartime document and made no exceptions for informed consent for either war or the soldiers assigned to fight it. It should go without saying (but, of course, it doesn't) that civilians retain all of their rights to bodily integrity, even during war and times of domestic emergencies, and that under no circumstances should civilians be subjected to forced vaccination or other bodily invasions-even those deemed "necessary" by military, medical, or public health officials. Human rights lawyers should resist current proposals to grant public health officials the power over the bodies of civilians during a bioterrorist attack or other public emergency. Such proposals are not only destructive of basic human rights, they are counterproductive in that they replace a medical and public health system based on truthful communication and trust with one based on fear and arbitrary power. Terrorism by others is no excuse for torture by us. • About the Magazine • Copyright Information
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '84', 'language_id_whole_page_fasttext': "{'en': 0.9510801434516908}", 'metadata': "{'Content-Length': '45654', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BCT7LBAAQFD4X5Z3HHU2U6VVMHBFYVX2', 'WARC-Concurrent-To': '<urn:uuid:bb31df37-df3c-4db1-8975-d57f755dc512>', 'WARC-Date': datetime.datetime(2013, 12, 13, 15, 41, 14), 'WARC-IP-Address': '38.99.228.150', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:GZ6F3MLLNY5ZUAIR642WBZ2G5D4ALKWT', 'WARC-Record-ID': '<urn:uuid:ca2cf1c0-0f8a-49e8-a963-c041f3f4a046>', 'WARC-Target-URI': 'http://www.americanbar.org/publications/human_rights_magazine_home/human_rights_vol30_2003/spring2003/hr_spring03_intro.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6fbbfe70-46c2-4f98-8d9b-3ec0a46914a6>', 'WARC-Truncated': None}", 'previous_word_count': '1157', 'url': 'http://www.americanbar.org/publications/human_rights_magazine_home/human_rights_vol30_2003/spring2003/hr_spring03_intro.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0214272141456604', 'original_id': '97cc80c11e61046b61e03aa0f174ee8551e815aaa961c72b9b430e0c63f6cdd3'}
Oracle where case Preciso criar uma condição no where de acordo com um boolean. Se boolean = true então selecionarei as linhas com valores finais maiores que os esperados (ConfirmedVolume > ExpectedVolume, etc) se for falso eu seleciono tudo. Dei uma olhada em varios links mas nao consegui passar a ideia pra minha query, por exemplo: https://stackoverflow.com/questions/18104884/conditional-where-clause-with-case-statement-in-oracle https://stackoverflow.com/questions/29027425/oracle-conditional-where-clause Código: SELECT RouteId, Id, RouteStatusId, Address, Latitude, Longitude, ExpectedQty, ConfirmedQty, FinalQty, ExpectedWeight, ConfirmedWeight, FinalWeight, ExpectedVolume, ConfirmedVolume, FinalVolume, Comm, MAX(EndTime) - MAX(StartTime), MAX(StartTime), MAX(EndTime), WaitTime, MAX(CAST(EndTime AS DATE)), UOM, BPName FROM ( SELECT {RouteStop}.[RouteId] RouteId, {RouteStop}.[Id] Id, {RouteStop}.[RouteStatusId] RouteStatusId, {SiteAddress}.[Address] Address, {SiteAddress}.[Latitude] Latitude, {SiteAddress}.[Longitude] Longitude, SUM({RouteStop_Product}.[ExpectedQty]) ExpectedQty, SUM({RouteStop_Product}.[ConfirmedQty]) ConfirmedQty, SUM({RouteStop_Product}.[FinalQty]) FinalQty, SUM({RouteStop_Product}.[ExpectedWeight]) ExpectedWeight, SUM({RouteStop_Product}.[ConfirmedWeight]) ConfirmedWeight, SUM({RouteStop_Product}.[FinalWeight]) FinalWeight, SUM({RouteStop_Product}.[ExpectedVolume]) ExpectedVolume, SUM({RouteStop_Product}.[ConfirmedVolume]) ConfirmedVolume, SUM({RouteStop_Product}.[FinalVolume]) FinalVolume, {RouteStop}.[Comment] Comm, CASE WHEN {GPS}.[EventTypeId] = @RouteStopStarted THEN {GPS}.[DateTime] ELSE CAST(NULL AS DATE) END StartTime, CASE WHEN {GPS}.[EventTypeId] = @RouteStopCompleted OR {GPS}.[EventTypeId] = @RouteStopFailed THEN {GPS}.[DateTime] ELSE CAST(NULL AS DATE) END EndTime, {GPS}.[EventTypeId] EventTypeId, {RouteStop}.[WaitTime] WaitTime, {Order}.[UOM] UOM, {BusinessPartner}.[CardName] BPName FROM {RouteStop} LEFT JOIN {RouteStop_Product} ON {RouteStop}.[Id] = {RouteStop_Product}.[RouteStopId] LEFT JOIN {GPS} ON {RouteStop}.[Id] = {GPS}.[RouteStopID] LEFT JOIN {SiteAddress} ON {RouteStop}.[SiteAddress] = {SiteAddress}.[Id] LEFT JOIN {BusinessPartner} ON {SiteAddress}.[CardCode] = {BusinessPartner}.[Id] LEFT JOIN {Order} ON {RouteStop_Product}.[OrderId] = {Order}.[Id] LEFT JOIN {SitePlanningArea} ON {SiteAddress}.[Id] = {SitePlanningArea}.[SiteAddressId] WHERE {RouteStop}.[Id] = @RouteStopId AND ({SitePlanningArea}.[PlanningAreaId] = @PlanningAreaId OR @PlanningAreaId = 0) GROUP BY {RouteStop}.[RouteId], {RouteStop}.[Id], {RouteStop}.[RouteStatusId], {SiteAddress}.[Address], {SiteAddress}.[Latitude], {SiteAddress}.[Longitude], {RouteStop}.[Comment], {GPS}.[EventTypeId], {GPS}.[DateTime], {RouteStop}.[WaitTime], {Order}.[UOM], {BusinessPartner}.[CardName] ) GROUP BY RouteId, Id, RouteStatusId, Address, Latitude, Longitude, ExpectedQty, ConfirmedQty, FinalQty, ExpectedWeight, ConfirmedWeight, FinalWeight, ExpectedVolume, ConfirmedVolume, FinalVolume, Comm, WaitTime, UOM, BPName Obrigado Você pode fazer utilizando a seguinte sintaxe: Where ((Condicao boolean true and ConfirmedVolume > ExpectedVolume) or condicao boolean false ) Resolvido com a clausula abaixo: ((boolean = true and ConfirmedVolume > ExpectedValue) OR (boolean = false))
common_corpus
{'identifier': 'https://pt.stackoverflow.com/questions/326406', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2018.0', 'title': 'Stack Exchange', 'creator': 'Confundir, https://pt.stackoverflow.com/users/606', 'language': 'Portuguese', 'language_type': 'Spoken', 'word_count': '289', 'token_count': '1267', '__index_level_0__': '53', 'original_id': '2355bb9156b463ec0dee5e4f84041fe68bcc1e11afcafb5c8818ac360897231d'}
Not bad news yet but not music in New York Yankee fans ears either Not bad news yet but not music in New York Yankee fans ears either Not bad news yet but not music in New York Yankee fans ears either The bad news is that New York Yankees slugger Curtis Grandersonis hurting. Curtis Granderson Curtis Granderson (Photo credit: Wikipedia) Mark Feinsand of the New York Daily News reported that Yankees GM Brain Cashman confirmed that the reason Granderson was out of the line-up was due to a sore right elbow. So, why is this necessarily bad news? No not necessarily yet, but Cashman did go on to say that Granderson was having, “…a precautionary MRI tomorrow to make sure it’s nothing significant.” No one gets an MRI unless a doctor is looking for the source of the pain, and needs to dig deeper because the x-rays and physical tests could not determine anything. So, why does this make a “precautionary” MRI on Granderson’s elbow a serious concern? Well speaking for myself, yes I am concerned for two reasons. 1) The first being that the Yankees use the word “precautionary” before an MRI a lot and in the past has turned into a serious injury or a lengthy DL stint too many times. A recent example from last season is when Joba Chamberlain required Tommy John surgery. It was reported everywhere that Joba had a precautionary MRI exam. Also last season; remember when Rafael Soriano did not appear in the 8th inning on May 11th? The reason was stated as soreness in his throwing elbow, Soriano took the game off and will have a precautionary MRI exam. And he did not pitch again until end of July. 2) My own personal experience from a recent tennis injury. Here is a quick recap: In February of 2010, I had surgery on my right elbow to fix a decayed and torn-upped tendon, but it all started with what I described, as a sore elbow. The soreness began escalating to the point of interfering with everyday things, but it particularly flared when I gripped anything. Also, had numbness in my pointer and middle fingers. The x-rays and practical tests came back inconclusive, so I went to physical therapy and had cortisone shots but nothing seemed to help. Finally my father sent me to a new doctor and he immediately sent me for an MRI. Results came back and surgery was needed. And now just found out I need wrist surgery on the same arm, and the doctor only saw the damage to my wrist via a follow-up MRI, as nothing showed up on the x-ray again. I am well aware that I am not a pro-athlete like Granderson; and I know that comparing my injury to his is being a little paranoid. Still, you must keep in mind the Grandy-man is a position player, not a pitcher so to experience elbow pain is not as common and he has been injury prone in the past. So, in my opinion either the Yankees are being overly cautious because he is not a pitcher, or it just hurts him that badly. Who knows but Yankee fans have been down this road too many times to not be able to worry. So, until skipper Joe Girardi or Cashman say otherwise, I will continue to fret over the health of one of the team’s most vital players because losing Granderson for any amount of time could be upsetting.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.963205337524414}", 'metadata': "{'Content-Length': '81808', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:B6J62TP4UWRPEOVAHBFVHF67H7REPGTW', 'WARC-Concurrent-To': '<urn:uuid:469daafc-93fa-4827-8001-edcf12dd887d>', 'WARC-Date': datetime.datetime(2014, 9, 23, 8, 20, 48), 'WARC-IP-Address': '67.20.68.165', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:2F2LKHGS3QYNAHFCNJSLAED7GVSCF6OM', 'WARC-Record-ID': '<urn:uuid:76b91c19-420a-4a71-a130-180ecbef6fa3>', 'WARC-Target-URI': 'http://ladylovespinstripes.com/bad-news-music-york-yankee-fans-ears/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5ee0d68a-1b92-4fb7-aaa2-cd3d9e1b7dca>', 'WARC-Truncated': None}", 'previous_word_count': '591', 'url': 'http://ladylovespinstripes.com/bad-news-music-york-yankee-fans-ears/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-234-18-248.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-41\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for September 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1614997386932373', 'original_id': '6f904ae96d2c09aa9091f94838af7aec2548803dee2187d44613788018efea74'}
The Story In 2014 players from across the Middle East and Africa region were given their first chance to become “Fanta Gaming Masters” with PLG – Power League Gaming, the leading eSports operator in the Middle East and Africa region on the regions most popular game EA Sports FIFA. The program has developed to solidify these partners EA Sports and PlayStation 4, along with many others as a platform for amateur players to develop their skills, compete, achieve recognition and win some great prizes. Players have emerged quickly from across the region over the course of the three years, and the growth of the program into new markets from 2015 to 2017 is now producing some of the best talent in electronic sport. If you think you have what it takes to become a Fanta Gaming Master and progress to the regional finals, as well as get a chance to continue in international leagues such as the eCopa Coca-Cola and EA Sports FIFA Global Series, then register now to stay up to date to all upcoming qualifiers and tournaments that are coming your way.
mini_pile
{'original_id': 'da9ec9f606f54898d51b68945d6d3b8fa7344477a4780cc22a9e0a6c39f584ac'}
“Layers Part 8” by Kaine Andrews Part VIII That should have ended it. I’d never found her in the dreams, after all. This was the resolution that I’d been pushed to since I was about the age she was. Or had been. Who knows what tense to use when you’re dealing with ghosts? If she was a ghost. She was solid, having weight as I cradled her in one arm while running the steering wheel with the other. But it was just meat I was holding. Something she’d vacated long ago. A symbol and little else. But symbols had power, and by taking her battered body from the family and the burned, disfigured thing that had held her hostage for who knows how many decades, I’d given her the power to be free. She wasn’t crying, anymore. I could hear her breathing, though. Ragged and labored at first, then smoothing out to the sound of a sleeping child being broadcast through a baby monitor. In that breathing she whispered to me; I heard her thanking me, and she told me her name. “Deborah,” the corpse in my arms whispered. “Deborah Daphne King.” The name gave me a terrible chill. I’d had a sister… or was supposed to have one, at least. But she hadn’t made it out of the hospital. Only lasted three days. Birth defects, something to do with the lungs; I don’t know if I just didn’t remember, or had never been fully told. But she’d been a Deborah, too. That chill led to a shudder, and that led to the car drifting out of the thin lane. At the same time, a steep curve came into view. A terrible calm fell over me, a sense of resignation and deja vu that told me all I needed to know. It didn’t matter how things had changed. One thing was going to stay the same. I tried to pull the car straight again, to force it into the turn. I pumped the brake. Neither had any effect, as the car continued to drift, the guardrail growing larger. I looked down at her, the mangled thing that I’d been looking for my whole life, the thing that had driven me past the point of logic, of sanity. The thing that was going to kill me. There was no body. No Deborah. Just a filthy, matted rag that might have been a towel at some point. Tears began running down my cheeks, and a strangled sob escaped my lips. “You always knew,” a familiar voice said from the passenger seat. I drew my eyes up. The thing from the house was sitting there, trying to smile at me. One arm was dangling between its upraised knees, the other stretched towards me, clenching the steering wheel and urging the car to the left, towards the rail. I could hear it clearly now. I should have noticed it when it stated I’d finally come. But have you ever noticed that your voice sounds different, somehow alien when you hear it on a recording or an echo? The thing spoke in my voice. It had always been me. Some lost fragment of myself, calling out somehow through the years, begging me to claim the treasure that it had given its life for, somehow blind to the fact it was no treasure but a wad of broken repressed memories and carefully fabricated lies. “We’ll be together, now.” The car hit the rail. I let go of the wheel as the vehicle plowed through with the shriek of steel and the roar of the engine as it surged, no longer powering wheels on asphalt but spinning in thin air. “Forever,” I whispered to myself, hearing it both in my head as my voice always sounded, and in my ears as the thing had always spoken. Whether I meant myself and I, myself and Deborah, or all three of us together, I don’t know. The car flipped once, cracking my skull against the roof and sending a freshet of blood into my eyes. I hadn’t been wearing my seatbelt. There was no pain. The thing in the passenger seat reached out one claw, stroking the wound. Another flip jarred me back into the seat and drove me forward. I felt my rib cage give way, my lungs collapse, as the wheel plunged into my chest. The thing put its finger to its mouth. “Shhhh,” it said. “It’ll all be over soon.” The car hit the bottom of the ravine below, doing another backflip and landing on the roof. The windshield, designed before safety glass had become the standard, shattered. Thick shards embedded themselves in my face, my chest, my arms. Everything went dark as my eyes were popped like ripe grapes. I felt fluids from the emptied sockets leaking down my face, mingling with the tears and blood. The roof of the car had been punctured by a rock formation, dragging across it as the car burned the last of its momentum. It dug into my back as well, leaving a ragged gash that left the flesh hanging to either side like broken wings. There was a perfect stillness to the world, then. A moment of absolute silence and clarity. No birds sang, no bugs hummed. My breathing had stopped, and the thing in the passenger seat had apparently lost its taste for chatter. That silence was broken by a soft, unimportant sound. “Foomp,” it sounded like to me. But I knew what came next, knew it wasn’t unimportant. Something had cracked the gas tank. The metal body of the car dragging across the gravel and rocks had provided the spark. Smoke and the smell of scorched earth came first, then pain sank in as the smell of a roasted pig added to it. I couldn’t vomit, no matter how much I wanted to. Couldn’t hold my breath, even though it was coming only in shallow rasps. I just had to wait, to endure, as I burned alive. But again, one fresh change. I was spared having to endure it all the way through, didn’t have to wait as I crisped, blackened, and finally died trying to scream. The thing laid hold of me, was dragging me out. Through the undercarriage, back up the hill, passing through the guardrail, which seemed to stitch itself back together as we passed, my eyesight somehow returned. Back up the hill, a movie running backward. I passed the car going the other direction, then my other self pursuing it. Back to the house, where we were pulled through the hole in the front that it/me had created giving chase. Like the guardrail, it pulled itself back together like a flower closing its petals against the night. I saw the television I’d knocked over right itself, saw the doors I’d opened on the way in slam shut, the blanket replace itself on the bed and straighten out perfectly. I heard a thud and knew the dryer had slammed shut again, and a moment later the rhythmic thumping of the thing in the dryer started again. Back into the shower stall, where I stood still and watched as the curtain pulled shut in front of me. The house was as it had been, as it was supposed to be. It looked like a quaint little cabin, but underneath it was just a trap, a honeypot laid out just for me. Just like underneath the scars and claws and demon-like appearance, my tormentor had always been myself. I was alone. I had become him, and he was me again. Now we would wait. Perhaps not completely alone, though. Somewhere in the house, I heard the crying start again. Deborah was with me like she always had been. I waited. I had time. All the time in the world. I knew I’d come along. Eventually. THE END ≡ This story was originally published atKaineAndrews.com. Intrigued? Find out how it ends, next Thursday! ≡ About the Author Kaine Andrews was raised in the wilds of Nevada, molded by NASCAR-loving witches, a Catholic school education and typewriter theft, granting a natural fascination with all things dark and dreary and demented scribblings. He currently resides in Oregon, where the omnipresent drizzle keeps him somewhat sane. Owned by Alexis Chateau PR Copyright Notice Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to the respective authors and/or Alexis Chateau PR with appropriate and specific direction to the original content.
mini_pile
{'original_id': 'beb84d2c1cfd772c09e2d3e51ead45f42836b52f0e8ce81623080babefb22941'}
Proverbs 25 These also, are proverbs of Solomon,—which the men of Hezekiah king of Judah transcribed. The glory of God, is to conceal a thing, but, the glory of kings, is to search out a thing. The heavens for height, and the earth for depth, but, the heart of kings, cannot be searched. Remove the dross from the silver, and there cometh forth, to the refiner, a vessel: Remove a lawless man from before the king, that his throne, may be established in righteousness. Do not honour thyself before a king, nor, in the place of great men, do thou stand; For better it be said to thee, Come up hither,—than that thou be put lower down before a noble, whom thine own eyes, have beheld. Do not go forth to strive in haste,—lest [thou know not] what to do in the latter end thereof, when thy neighbour, hath put thee to shame. Thy contention, urge thou with thy neighbour, and, the secret of another, do not reveal: 10 Lest he that heareth expose thee, and, the report concerning thee, turn not away. 11 Golden fruit in figured silver baskets, is a word spoken on fitting occasion. 12 A ring of gold, and a vessel of precious metal, is a wise reprover, on a hearing ear. 13 As the cold of snow in the day of harvest, is a faithful messenger to them who send him,—when, the life of his masters, he restoreth. 14 Clouds and wind, when rain there is none, is the man who boasteth himself of a pretended gift. 15 By long patience, is a judge persuaded, and, a soft tongue, breaketh the bone. 16 Honey having found, eat to suffice thee, lest thou loathe it, and vomit it forth. 17 Withhold thy foot from the house of thy neighbour,—lest he be weary of thee, and hate thee. 18 A hammer and a sword, and a sharpened arrow, is a man becoming a false witness against his neighbour. 19 A broken tooth and a faltering foot, is confidence in the treacherous, in the day of danger. 20 As splendour of dress on a cold day—vinegar upon nitre, so is a singer with songs, unto a sad heart. 21 If he that hateth thee hunger, give him bread to eat, and, if he be thirsty, give him water to drink; 22 For, burning coals, shalt thou be heaping upon his head,—and, Yahweh, will repay thee. 23 A north wind, bringeth forth rain, and, a face stirred with indignation, a secretive tongue. 24 Better to dwell on the corner of the roof, than a quarrelsome wife, and a house in common. 25 As cold water to a thirsty soul, so is a good report from a far country. 26 A fountain fouled, a spring spoiled, is a righteous man tottering before one who is lawless. 27 To eat honey in abundance, is not good, nor is, searching out their own honour, an honourable thing. 28 A city broken down without a wall, is a man who hath no control over his own spirit. Copyright information for Roth
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9225776791572572}", 'metadata': "{'Content-Length': '201987', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:7BPABRUZUUYNE6PZB2N5KQYHXN2SR4BD', 'WARC-Concurrent-To': '<urn:uuid:f4eda326-57c4-4c5c-a089-212336a95dff>', 'WARC-Date': datetime.datetime(2018, 9, 23, 2, 15, 9), 'WARC-IP-Address': '54.77.138.81', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:EE2P5ABQ4OW37DIHA34XBWJZ7LRW4E34', 'WARC-Record-ID': '<urn:uuid:fb3775c6-9fdc-4bc2-aa68-f2d069b5a6fb>', 'WARC-Target-URI': 'https://www.stepbible.org/?q=version=Rotherham%7Creference=Pro.25', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:da8309d7-d7e1-4e72-8d2c-6c39b1e98dd1>', 'WARC-Truncated': None}", 'previous_word_count': '498', 'url': 'https://www.stepbible.org/?q=version=Rotherham%7Creference=Pro.25', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-113-176-82.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03290438652038574', 'original_id': '57a9544ea12b199be54f2d066812df6500d4394ef332bdea1e020882ace1b037'}
“Love Does”—A Lesson from Jim Gash Professor Jim Gash “What are you doing today that allows you to trust God?”  That was the challenge Jim Gash, Professor at Pepperdine Law, put forward to all of us that had the fortunate opportunity to hear him speak about his experience of answering God’s call to show that “Love Does.”  During the speaking event students heard from Jim, and the Ugandan boy, Henry, and how God used Jim’s answer to God’s calling to answer Henry’s prayer for hope. Jim Gash graduated first in his class at Pepperdine law school in 1993, and after working in multiple areas in the legal field, is currently a professor at Pepperdine law school.  In 2009, Jim attended the Christian Legal Society National Conference with keynote speaker, Bob Goff, and upon hearing his talk urging those in the law profession to “do something” to help those in need, Jim decided it was time to answer the call, but how? Jim was very candid with us in attendance; he explained that his preferred method of “doing something” was the call to action of Sally Struthers television—send money.  But in 2010, his reluctance subsided and he answered God’s call, saying, “Here I am Lord, send me.”  What Jim did not know was that answering the call to go and do something was the answer to years of prayers by a young boy in Uganda named, Henry who had been sitting in prison in Uganda for over a year and a half for two murders that he did not commit. When Jim arrived at the prison in Uganda, Henry remembers being filled with joy.  He recalls his mother always telling him that nothing lasts forever, except the Word of God.  Seeing Jim, Henry said he saw “hope” coming and he knew that God had heard his prayers and was answering them. Indeed, God was showing up in Henry’s life.  Because of Jim, both murder charges were dropped and Henry was finally free after about two years of wrongful imprisonment. Today, Henry is in medical school studying to be a cardiologist. After Jim’s flagship trip to Uganda, he was approached by senior members of the Judiciary in Uganda asking for help to make structural changes to their judicial system.  They would ask him to move to Uganda and help set up an entirely different and more efficient criminal justice system, and in 2012, Jim and his family would make the move to Uganda. Moving to Uganda and “doing something” made a huge transformation in Jim’s life on his ability to trust control of his life to God.  Jim said he had successfully “written” his own story for over 40 years, but when he finally said, “Okay God, you write the story,” everything changed. Jim’s story of answering God’s call for us to “go” and “do” can be scary to hear.  Jim expressed that what stops people from “doing” is not a fear of failure, but a fear of success.  Because, deep down we know that if we succeed at what God has called us to do, nothing will ever be the same again.  For “type-A” law students, the idea of all our carefully thought out plans being thrown out the window for something entirely new, that we most likely have little experience or knowledge in, can make us apprehensive. So, what of Jim’s challenge to us to answer the question, “What are we doing today that allows us to trust God?”  For some, I think they can see themselves in Jim’s testimony regarding his reluctance to be the one to “go” and “do.”  But I also think there are others, such as myself, that want to “go” and “do,” but see so many areas of need in the world that the thought of where to start is itself scary.  Whichever category you see yourself in, remember we are all called to trust in God alone and lean not on our own understanding (yes, I understand, incredibly hard for law students to actually do).  The “going” and “doing” will be different for every person, but asking ourselves Jim’s question on a consistent basis may help us see ways in which we are not answering God’s call to us.  If there is nothing in my life that allows for me to put my trust in God, there is too much “I” and not enough “He.” Jim answered God’s call to “go,” and he met Henry, whom opened his eyes to the work God had for him to do.  When Jim went to Uganda, it was only to help a few boys held in prison without due process of law. And indeed, Jim’s work literally “set the captives free.” But God did not stop there. God used Jim to transform an entire criminal justice system by implementing plea bargaining. This change will literally affects thousands of lives by moving cases through the docket and enabling those who are truly innocent to have trial dates set quickly and those are guilty to accept a plea and serve their time, rather than languishing in prison for years just to wait for a trial. God may be calling you to impact one person or an entire country, and either one of those scenarios may frighten you.  To follow God’s calling, we must leave behind our own plans and potentially change our definition of what “do something” means in our lives. by Debbie Stieglitz 1. Thank you for the inspiration. I will add that this reluctance to lean not on our own understanding is pervasive across the human spectrum; I certainly stand guilty. 2. Mary S. Hernandez An workplace chair, additionally called a table chair, is because the name suggests, associated designed to be used as a seat in an workplace. will|they will|they'll} typically be adjusted on the rear and height can swivel 360 degrees and makers like international workplace chairs try to create them as comfy as potential.Charles Darwin and therefore the workplace Chair
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9781674146652222}", 'metadata': "{'Content-Length': '75424', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:A34RD64NDD7RYELRGPBDEC2CDC2ECFO7', 'WARC-Concurrent-To': '<urn:uuid:5ebffd44-d14d-4c07-9077-cf93ea5ddd76>', 'WARC-Date': datetime.datetime(2018, 7, 17, 10, 2, 8), 'WARC-IP-Address': '172.217.7.129', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:XFKBJHGDZH63IPLZT4MNF76UN3VHPHR5', 'WARC-Record-ID': '<urn:uuid:ee8cf123-7d82-44f7-aa22-c22c877224ac>', 'WARC-Target-URI': 'http://globaljusticeblog.blogspot.com/2016/02/love-doesa-lesson-from-jim-gash.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:82239040-1b60-4d16-9b2d-56ee885a858a>', 'WARC-Truncated': None}", 'previous_word_count': '955', 'url': 'http://globaljusticeblog.blogspot.com/2016/02/love-doesa-lesson-from-jim-gash.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-93-215-215.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.031495630741119385', 'original_id': 'eb29c3466a389bf7f43c45c3d155b508c78158ab7bc8593c387983e732d6afec'}
Best time to visit Mount Abu Discussion in 'Rajasthan' started by MohitRaj, May 10, 2017. 1. MohitRaj MohitRaj New Member Rajasthan is a hot place to visit especially during the summer season and our family has been there many times. This year round we are hoping to visit Mount Abu which is also in Rajasthan. Although it is a hill station we are quite unsure about the weather there and don't know if it would be a good time to visit or not. We would like some suggestions to know when the best time to visit Mount Abu is? It is not necessary that we would be going during the summer it can be a trip in the winters as well, we would make a decision after getting a response from the members. 2. Arushi Jain Arushi Jain New Member Mount Abu you can visit during September-February, which is best time and its hill station in desert which you will enjoy definitely. 3. briannagodess briannagodess Well-Known Member Hello, welcome to the forum! (Images from Sampa, Kondephy, Ssteaj and Wikimedia) Mount Abu is the sole hill station of the desert state of Rajasthan. It is aptly given the title as Oasis of Rajasthan, set amidst the lovely hills of Aravalli and even having a lake of its own. After exploring the state, make your way unto this paradise of greenery and pleasant climate, truly the gem of the desert. That's not all, for those who enjoy checking off places to visit from their list, Mount Abu has a number of heritage sites and religious sites that are truly worth exploring. Scenic view points? Another check, because this hill station marvels in both its known and unknown peaks from where you can enjoy the view of the surrounding valleys. So for those already planning their trip to this green paradise, read on and find out when is the best time for exploring the hill station. Best Time to Visit Mount Abu We can divide the seasons of Mount Abu into three, namely: summer, monsoon and winter. In general, Mount Abu has pleasant climate almost all-year round especially as compared to the temperatures of the surrounding cities of the state. Located over 1,200 metres above sea level, you can enjoy the cooler breeze here that is accentuated more during the last season of the year. Below is a complete guide about these seasons, their average temperatures, also including their advantages and disadvantages. 1. Summer Season (April to June) (Images from Sampa, Correct Knowledge and Selmer) Being a part of western India, summer season in Rajasthan, including Mount Abu, extends from April to June. Summers here are quite warm, with temperatures in April reaching around 38°C. By May, temperatures can go as high as 40°C, sometimes even higher than that. In both months, rainfall is none to scanty so it adds to the scorching effect of the heat. June is somewhat cooler, as temperatures begin to drop to 36°C by the end of this month. Sporadic rainfalls can also be experience but not as intense as in other states. The saving grace is the cooler nights, with temperatures around 28°C or less, so you can certainly have a more comfortable sleep. When it comes to the crowds, summers see a lot of them, as the locals and tourists seek some respite from the heat of the plains. In addition, it's vacation time for schools so that's an added factor. Most hotels and resorts are open during this time though so you have plenty of options for accommodation. On the downside, their rates would be on the higher side being a peak tourist season. Sightseeing is possible but be prepared for queuing in some attractions. Light clothing would suffice during this time and make sure you bring water to keep you hydrated. For exploring the region, do so during early mornings or late afternoons, when the sun isn't glaring so harshly. So what attractions should you be exploring during this season? A recommended one is the Mount Abu Wildlife Sanctuary, an open wildlife reserve near Trevor's Tank. During summer, you might be able to spot animals here more easily like the sloth bears, langurs, sambars and wild boars. Trevor's Tank is a small lake area which has a number of crocodiles that you can view. The trail is around seven kilometres long, an enjoyable trek through the lush forests of the hill station. Indoor attractions like the Government Museum and Dadta Sea World Museum can be visited during this time as well. Do visit scenic view points such as Sunset Point and Honeymoon Point as they would have the best clear views during summer. 2. Monsoon Season (July to September) (Images from Praveen and Mount Abu) The monsoon season extends from July to September. During July, temperatures 30°C to 36°C and rainfall is frequent but intermittent during the day. In the month of August, temperatures can go as low as 28°C during the day. Rainfall is frequent as well but don't worry as despite this, it is not continuous throughout the day. They can be referred to as rain showers which occurs in intermittent schedules throughout the day. By September, rainfall lessens while temperatures remain roughly around 28°C still. Being a part of the desert state, Mount Abu experiences less rainfall but there were times that the hill station was ravaged by incessant rains and flooding, because it's really difficult to predict the course of nature at times. The beauty of the Aravalli ranges comes out more during monsoon season. Sure, humidity might be on the rise but if you're someone who always gets mesmerised by nature, this is your best bet for visiting Mount Abu. The lush greenery surrounding the hill station is evident during this time. There aren't as much tourists too but you can still find some in popular attractions. Hotels and resorts in the hill station are open during this time too, their rates might be on the lower side. A downside is that if you would be relying on public transportation, rates might be higher as there's not much tourists to share the fare with you, since the main mode of transport here is via shared jeep. Do bring rain essentials such as umbrellas and even boots if you intend to walk or trek a lot. Attractions worth exploring during this time are plenty. Do venture into the temples around the hill station which would provide some cover even in the midst of the rain. Include the most popular religious attractions such as the Dilwara Jain Temples, Adhar Devi Temple, Gamukh Temple and Achal Garh Temple. The serene Nakki Lake becomes fuller during this time too and surrounded by lush greenery, it's sure to enamour the nature lovers. You can enjoy boating or strolling around the lake. There are plenty of food stalls around the satisfy your tummy issues as well. 3. Winter Season (October to March) (Images from Sundeep, Chirag and Paragliding Map) The last season is winter which extends from October to March. During October, rainfall can still occur during it's first few days but thereafter, the month remains dry. Temperatures usually remain below 27°C during this time. The months of November and December usually have temperatures ranging between 15°C t0 23°C. By January, temperatures remain below 20°C and sometimes can go as low as 10°C. For the last two months of February and March, temperatures climb back up, at around 15°C to 24°C, setting the way for the succeeding summer season. Do keep in mind that night time temperatures are lower as compared to the day time, and it's not unusual for temperatures to drop below 10°C when evening comes in. Winter is a good time for sightseeing as the pleasant climates would allow for lots of walking. During October, you can still enjoy the lush greenery of the hill station. The annual Winter Festival of Mount Abu happens during the end of December as well. You can enjoy the festivities during this time like dancing, musical performance, kite flying, fireworks display and more. Hotels and resorts have high rates during this time as this is one of the peak tourist seasons of the hill station. Crowds are thicker too, but if you want a lively and touristic approach to Mount Abu, then opt for the winter season. Do book your hotels or transportation in advance as you might face some problems with fully booked properties or full vehicles once you reach the hill station in winter. For sightseeing, you can cover all the attractions in the hill station during this season. So there's the usual Nakki Lake, Dilwara Jain Temples, Sunset Point and more. You also can't miss the Guru Shikhar, the highest peak of Mount Abu, which is approachable by over a hundred steps. Other offbeat attractions such as the Achalgarh Fort and Bailey's Walk also require some trekking to reach but are worth it for the adventure seekers. Speaking of adventure, visit the Thrill Zone Adventure Park where you can enjoy zip lining, rock climbing, rappelling and many more activities. So there you have it, a guide on the seasons of Mount Abu and which is the best out of all of these seasons. As it goes with any hill station, Mount Abu can be visited at any time of the year. However, winter season is the best time for sightseeing, because the climate is pleasant enough to enjoy the attractions of the hill station. Monsoon season is suitable for nature lovers, as the whole hill station becomes enveloped in verdant greenery. Summer sees the highest temperatures so you won't enjoy much the pleasant climate during this time, except during night time when temperatures are comparatively lower. But if you love wildlife, then you might be able to spot animals in the sole sanctuary of the hill station. I hope this helps you!:)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '15', 'language_id_whole_page_fasttext': "{'en': 0.9766408205032348}", 'metadata': "{'Content-Length': '45637', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AA7T67TL3AH5MUCUHAB3YJBWSGWZ3EYM', 'WARC-Concurrent-To': '<urn:uuid:b57a5e97-170a-48b5-a999-92d6720c8b52>', 'WARC-Date': datetime.datetime(2018, 9, 23, 2, 59, 3), 'WARC-IP-Address': '35.200.197.133', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7UMMLPHW5TOKS4ITTIT2DHG4CEBONRUU', 'WARC-Record-ID': '<urn:uuid:09d6162d-00d0-46c4-a4d2-e1f02eb8fdc7>', 'WARC-Target-URI': 'https://www.indiatravelforum.in/threads/best-time-to-visit-mount-abu.3828/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ca1707ed-1548-4455-a53b-e5f630af89df>', 'WARC-Truncated': None}", 'previous_word_count': '1664', 'url': 'https://www.indiatravelforum.in/threads/best-time-to-visit-mount-abu.3828/', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-47-244-60.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.020768702030181885', 'original_id': '4c1749f85eb7732c16a5e4250f922385c5f223c67434e88140bf1c32246c6b9d'}
Craptions Classics April 27, 2010 "If you keep making that face you'll be stuck like that" -Unknown, Pompeii AD 79 Other Craptions To make pure baby oil, first you must drain all the natural moisture from a baby. Kelly Robinson My First Tragic Skin Disease, by Hasbro. Having a Fantastic Four-Some was a bad idea. He's being bullied at school by another kid - made of paper. Thomas Calnan What gnomes put in their front yards. Look Medusa, it's your very first baby b-- ...oops. Lot's son didn't actually look at anything, but he cried a lot, and God hated that too. Kamikaze Phoenix And for Christmas I want a pentagram..and and and..candles...and and a tunnel to the nether world.... Games of freeze tag used to have much more devastating consequences It's a difficult age. You know... the stone age. Thomas Calnan Let this be a warning, parents: water your children regularly That's disgusting. What kind of parents would let their child go out and get plastered? When the Invisible Woman gave birth, Mr. Fantastic immediately became suspicious. The Weekly Hit List
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '11', 'language_id_whole_page_fasttext': "{'en': 0.934031903743744}", 'metadata': "{'Content-Length': '53835', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BVVQBCPDW3LSFDIW4CBMBEHQT6QXKHJX', 'WARC-Concurrent-To': '<urn:uuid:d95dac80-dccd-469a-a56b-05dc88eaeb19>', 'WARC-Date': datetime.datetime(2014, 4, 18, 5, 46, 31), 'WARC-IP-Address': '72.21.91.19', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:4XFWXY2FZQH6YXDH67P3C76HRN3MW75T', 'WARC-Record-ID': '<urn:uuid:1f01c6c3-a907-4706-9d53-2351b9ac2845>', 'WARC-Target-URI': 'http://www.cracked.com/craptions/craption/1569/?classic=false', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:555938f6-e4fe-4b1c-8a93-05f843a983c8>', 'WARC-Truncated': 'length'}", 'previous_word_count': '220', 'url': 'http://www.cracked.com/craptions/craption/1569/?classic=false', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-4-33.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-15\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for April 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0232427716255188', 'original_id': 'a0bafcdcf7a78e857eadc9ada35505ed0778e071e06cee673f1f982b44cee3eb'}
Issue Brief: Beyond Traditional Eligibility Verification Tags: Decision Analytics, Government/Public Sector, Fraud Management How Data and Analytics Can Reduce Fraud and Deliver Better Program Compliance In this Issue Brief from GOVERNING, we will discuss the innovative tools and techniques that are enabling government agencies to rapidly authenticate individual identities and understand applicants more thoroughly. We'll also show you how they can make a difference in your organization's programs today.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9049248099327089}", 'metadata': "{'Content-Length': '37555', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LXAKWR2CPBATNOMHGBNQ63BYERVKFRX7', 'WARC-Concurrent-To': '<urn:uuid:f60f0d82-afd9-4eed-b260-7c45fa495e37>', 'WARC-Date': datetime.datetime(2015, 3, 1, 16, 42, 6), 'WARC-IP-Address': '205.174.34.33', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:PDCSYOHZYYAMPK57HFKWSS65DCK25MXT', 'WARC-Record-ID': '<urn:uuid:735b030a-34ed-4d2a-bf1c-1649e7f99aef>', 'WARC-Target-URI': 'http://www.experian.com/innovation/business-resources/governing-beyond-traditional-eligibility-verification.jsp', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3c135b7c-1bd0-4ca3-8cea-dbe96a4c6469>', 'WARC-Truncated': None}", 'previous_word_count': '79', 'url': 'http://www.experian.com/innovation/business-resources/governing-beyond-traditional-eligibility-verification.jsp', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.25769782066345215', 'original_id': 'fb15bcd8b815c4368d81713ebceea04bbd95bfed4b3a1884d78a78a4bebce630'}
Arrested Development Pays Off for Male Orangutans: Meek Ones Often Get the Girls By Sarah Zhang | May 17, 2012 12:00 pm A sexually mature male with cheek flanges, throat pouch, and very long fur. Why would a sexually mature male orangutan want to look too young to father children? Just ask male dung beetles or goby fish. All these species have two types of males: big, aggressive ones that elaborately woo females and smaller sneaker males who, well, sneak behind the backs of the bigger ones. Both can end up successful fathers. Male orangutans become sexually mature around age 10, but some will stay in arrested development for up to 20 years, even after fathering children of their own. These immature-looking males don’t have the broad cheek flanges, throat pouches, and long orange hair we normally associate with male orangutans. They also don’t produce the long calls that mature-looking males use to attract mates. Even with none of these secondary sex characteristics, male orangutans can get mates and have children. A previous study that tracked an orangutan population in Sumatra for 27 years found that 6 of 11 new babies were fathered by the immature-looking males. A new paper in the American Journal of Physical Anthropology models how arrested development works in a population. The key is whether dominant, mature-looking males monopolize all female attention. In Sumatra, the dominant male will attract all the females in his area but only mate with one. They can’t tell whether young, adolescent females are actually ready to have offspring, so the dominant male will prefer to mate with a female who’s given birth before. That’s where the immature-looking males come in. They will take the chance, whatever chance they can get with young females, and it pays off: the first born offspring of most females are sired by these immature-looking males. The nonthreatening look of these males is how they sneak in for access to the females.  When two dominant males encounter each other, violent and even deadly fights can ensue. But the dominant males will tolerate immature-looking ones who hang around their territories. In the animal kingdom, strength and aggressiveness isn’t the only  evolutionary strategy—being sneaky works too. [via Hominid Hunting] Image via Wikimedia Commons / David Arvidsson • Brian Schmidt Are the immature-looking males also physically smaller? That might explain why they’re tolerated by dominants – the smaller males can climb more quickly and on smaller branches, so the dominants just can’t catch them, and ignore them instead. • Scott Hedrick And the meek shall have a good time… Discover's Newsletter See More Collapse bottom bar Login to your Account E-mail address: Remember me Forgot your password? Not Registered Yet?
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '20', 'language_id_whole_page_fasttext': "{'en': 0.8845810294151306}", 'metadata': "{'Content-Length': '493020', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RZGD2YLPOSODUPFVXZPYEV363HYEMP3F', 'WARC-Concurrent-To': '<urn:uuid:a0745831-5569-40a6-be2e-efa04956e7cb>', 'WARC-Date': datetime.datetime(2014, 8, 1, 22, 52, 19), 'WARC-IP-Address': '173.226.48.205', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:6OFZ6WBNDNT2DPNEVEKBVDYLNBTFV7RX', 'WARC-Record-ID': '<urn:uuid:97e48bf1-1ea4-4613-97fd-18c477a79a26>', 'WARC-Target-URI': 'http://blogs.discovermagazine.com/80beats/2012/05/17/arrested-development-pays-off-for-male-orangutans-meek-ones-often-get-the-girls/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6f08aa27-a289-4645-9c36-c5a64e1c57c9>', 'WARC-Truncated': None}", 'previous_word_count': '514', 'url': 'http://blogs.discovermagazine.com/80beats/2012/05/17/arrested-development-pays-off-for-male-orangutans-meek-ones-often-get-the-girls/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03451371192932129', 'original_id': '70d5395a9224a7a0b2a2c15e9f21460834a4db40414f038277ba4f8cc539a145'}
 Parafrenarii - Biblical Cyclopedia Parafrenarii the coachmen of the higher clergy in the ancient Christian Church. They had also the care of their stables and horses. They were sometimes reckoned among the number of the clergy, but of an inferior order. Verse reference tagging and popups powered by VerseClick™.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.899526059627533}", 'metadata': "{'Content-Length': '8688', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TEGDK5OEDS4S2ABW2EQUUCTHPMFAV2YE', 'WARC-Concurrent-To': '<urn:uuid:afe3ef7f-0428-454d-960b-3d1e5a8331eb>', 'WARC-Date': datetime.datetime(2018, 12, 13, 20, 33, 39), 'WARC-IP-Address': '216.92.70.28', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:X7JHBIHBRTKFJERTBU36GQYXRGHIC7MO', 'WARC-Record-ID': '<urn:uuid:622e75dc-6928-48b0-ad80-eb902e223811>', 'WARC-Target-URI': 'https://www.biblicalcyclopedia.com/P/parafrenarii.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7e711aa6-5015-4c7b-97b8-b75132482c03>', 'WARC-Truncated': None}", 'previous_word_count': '65', 'url': 'https://www.biblicalcyclopedia.com/P/parafrenarii.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-146-95-138.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.5290783643722534', 'original_id': 'ec380fc4e83ecd6531fec026550d909c3bcb5342d0b2f13f8af2ab3bec8f1bdd'}
Slintel Image Recruitment tech company conquers LATAM and APAC region using Slintel This case study focuses on a company that builds an AI recruitment Chabot. It leverages the power of messaging and social media to enable recruiters to evaluate and hire candidates faster than ever before.  Please fill your details. Get your free copy now.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.839464545249939}", 'metadata': "{'Content-Length': '26598', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CGRKGQPNVX3JORLQV3IKESY57FLNJ6QG', 'WARC-Concurrent-To': '<urn:uuid:e7cc0771-2ad5-4d01-b65a-f42598ad5f70>', 'WARC-Date': datetime.datetime(2019, 8, 25, 22, 24, 40), 'WARC-IP-Address': '3.19.95.204', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:PXAX7TECZFQ6W5Y5SR76MA3562UUGFTB', 'WARC-Record-ID': '<urn:uuid:3b7b2b94-ed7f-464b-8a57-085a4bbaae44>', 'WARC-Target-URI': 'https://www.slintel.com/resources/recruitment-chatbot-casestudy', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d49770d2-11c3-4fb8-adea-b13c0834d7c3>', 'WARC-Truncated': None}", 'previous_word_count': '56', 'url': 'https://www.slintel.com/resources/recruitment-chatbot-casestudy', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-238.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.998887836933136', 'original_id': '553298582e351224ecbfe31e39c64bc6e3350fe19b5bc242bc1845f7f288d93a'}
Two True Freaks Thursday, January 30, 2014 Which Quasar do you mean? We here at Quantum Bands were recently asked (by no less than The Irredeemable Shag) which Quasar would be the focus of the blog?  The answer is all of them.  Marvel has had a number of heroes that have call themselves Quasar, and while Wendell Vaughn is the most notable, we'll be covering all heroes using the name.  Here's a run down: Wendell Elvis Vaughn Wendell was the first one to use the name Quasar, although he originally went by "Marvel Man".  This is the hero most people think of when hearing the name and the star of the 60 issue comic series that ran from 1989 through 1994.  You'll probably see the most about him here. Phyla-Vell is the successor to Wendell Vaughn as Quasar, and the daughter of the Kree Captain Mar-Vell. Richard Rider The man known as Nova, Richard Rider, temporarily took over the use of the Quantum Bands from Wendell Vaughn in order to save Rider's life when he was separated from the Nova Force. A member of the Shi'ar Imperial Guard, Neutron was originally called Quasar.  He has never wielded the Quantum Bands, though. Captain Marvel Although never known as Quasar, and never connected to the Quantum Bands, the Kree Captain Mar-Vell was the Protector of the Universe before Wendell Vaughn.  We'll be touching on him, but like Neutron, we probably won't be spending a lot of time on him. Band together and support Quasar! 1. Thanks for answering my question. Looking forward to more posts here!! 1. Thanks, Shag. Hopefully we can live up to other character specific blogs, like Firestorm Fan. :D
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9678017497062684}", 'metadata': "{'Content-Length': '80799', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:X4PQRHVFLEQITZI6QQCIIAYQZNHCFI7K', 'WARC-Concurrent-To': '<urn:uuid:097ff9ef-5d24-4025-92b2-b2ea3cb25d3a>', 'WARC-Date': datetime.datetime(2017, 10, 23, 7, 47, 10), 'WARC-IP-Address': '216.58.218.225', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AZPGWIH3HTTXP57WTTLP56KIOSB44AGZ', 'WARC-Record-ID': '<urn:uuid:4a3405e7-566e-4185-9345-0c89a6be8bd4>', 'WARC-Target-URI': 'http://quantumbands.blogspot.com/2014/01/which-quasar-do-you-mean.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7a3a8fb1-13b2-4106-819b-1ac4a8a06135>', 'WARC-Truncated': None}", 'previous_word_count': '276', 'url': 'http://quantumbands.blogspot.com/2014/01/which-quasar-do-you-mean.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-183-219-92.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08428758382797241', 'original_id': '305ea6c7e04b667e98fcd3019e584df53892455cf4b26a96f04608fb35c393a2'}
\section{Products of Consecutive Integers in 2 Ways} Tags: Factorials \begin{theorem} The following integers are the product of consecutive integers in $2$ ways: :$-720, 720, 5040$ \end{theorem} \begin{proof} From 720 is Product of Consecutive Numbers in Two Ways: :$720 = 6 \times 5 \times 4 \times 3 \times 2 = 10 \times 9 \times 8$ From 5040 is Product of Consecutive Numbers in Two Ways: :$5040 = 7 \times 6 \times 5 \times 4 \times 3 \times 2 = 10 \times 9 \times 8 \times 7$ Then: :$-720 = \left({-6}\right) \left({-5}\right) \left({-4}\right) \left({-3}\right) \left({-2}\right) = \left({-10}\right) \left({-9}\right) \left({-8}\right)$ The same trick cannot be used for $-5040$ because there are four divisors in $10 \times 9 \times 8 \times 7$, and negating them makes the product positive. Hence the result. {{qed}} Category:Factorials \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '8936c87e7e44b5d3cb3347e4812874e05a33cb3917cffc4f362462548360ce22'}
--- layout: default permalink: docs/keyframes.html --- # @keyframes Stylus supports `@keyframes` both with curly braces or without them, you can also use interpolation both in names or steps of @keyframes: $keyframe-name = pulse @keyframes {$keyframe-name} for i in 0..10 {10% * i} opacity (i/10) Yielding (expanded prefixes ommited): @keyframes pulse { 0% { opacity: 0; } 20% { opacity: 0.2; } 40% { opacity: 0.4; } 60% { opacity: 0.6; } 80% { opacity: 0.8; } 100% { opacity: 1; } } ## Expansion By using `@keyframes`, your rules are automatically expanded to the vendor prefixes defined by the `vendors` variable (default: `moz webkit o ms official`). This means we can alter it at any time for the expansion to take effect immediately. **Note that expansion of `@keyframes` to the prefixed at-rules would be removed from the Stylus 1.0 when we'd get to it** For example, consider the following: @keyframes foo { from { color: black } to { color: white } } This expands to our three default vendors, and the official syntax: @-moz-keyframes foo { from { color: #000; } to { color: #fff; } } @-webkit-keyframes foo { from { color: #000; } to { color: #fff; } } @-o-keyframes foo { from { color: #000; } to { color: #fff; } } @keyframes foo { from { color: #000; } to { color: #fff; } } If we wanted to limit to the official syntax only, simply alter `vendors`: vendors = official @keyframes foo { from { color: black } to { color: white } } Yielding: @keyframes foo { from { color: #000; } to { color: #fff; } }
mini_pile
{'original_id': 'ffb67b1e3bc5389524ad438370a729d819ed229532d7195a9dcc4f8bd725f84b'}
Amplero Upgrades its Artificial Intelligence Marketing Platform Amplero, provider of an artificial intelligence marketing (AIM) platform, today bolstered its tool set with the addition of Learned Insights, a capability designed to give marketers a clear understanding of the tactical decisions they must make to sharpen their outreach efforts. According to Olly Downs, Amplero’s CEO, there are a number of sophisticated technologies marketers can use to engage customers across messaging channels, but many of the capabilities contained in these systems are barred by rules and fields that end users must configure manually. The granularity with which marketers can engage a given individual is often "gated by the combination of intuition, BI projects to build predictive models and customer segments, and [driving] the rules to address them," before measuring the effects of customer interactions, he says. Amplero's AIM platform attempts to solve this problem by using "closed loop" machine learning capabilities to build an AI system that "learns over time what interactions to send to what customers, over what channel, and at what time." As the system continues to gain feedback, it "dynamically optimizes" its view and perspective regarding the best actions to take in order to drive campaigns. The Learned Insights capability not only surfaces learnings and insights for analytics stakeholders within dashboards and reporting tools, but it "proactively distills and surfaces" them in readable format to executives who can then convert them into strategic marketing actions. The software is designed to show how marketing decisions are arrived at and illustrate the impact a particular element—e.g. the region a customer is in, or the device they are on—can have on an outcome in the context of a customer interaction. Amplero's technology combines two capabilities, Downs explains. The first is inspired by the human-led marketing optimization process termed "uplift modeling." Typically, when companies use the uplift modeling method, they run an initial wave of the outreach campaign to a subset of target customers to identify segments who've responded positively or negatively to an email, push notification, or text message, for instance. The standard "BI" approach would be to update the targeting rules to exclude those customers who responded negatively. Amplero performs the process recursively, continuously exploring message permutations to determine which elements have impacted positive or negative responses. The second element Amplero leverages is called the "multi-armed bandit," a strategy that allows the system to focus on audiences that responded positively while tactically and carefully examining audiences that responded negatively to see if there are pockets of more refined context or targeting beneath those broad audiences for which there were positive responses. "This allows Amplero to nano-segment the entire customer base in terms of their response to the campaign," Downs says says. Amplero doesn't deliver messages directly, but it integrates with CRM and marketing automation systems that can process its commands to send the messages out through different channels. In the system, end users configure campaigns similar to the way they would in Salesforce.com's Marketing Cloud or Adobe's Campaign but aren't required to orchestrate or lay out the journeys they want customers to go through, because Amplero learns them. Today's release coincides with Amplero's $17.5 million Series B announcement, led by Greycroft and Ignition. While the company, launched in July of 2016, has been focused primarily on servicing clients in the telecom, financial services, and gaming and subscription software industries, it is expanding to retail, travel and hospitality, and media and entertainment, Downs says. CRM Covers for qualified subscribers Subscribe Now Current Issue Past Issues Related Articles Amplero Launches Influencer Optimization Amplero's new socially-aware marketing measurement tool helps marketers pinpoint influential customers and measure their ripple effect on campaigns. Amplero Expands Artificial Intelligence Marketing Platform Amplerohas added machine learning capabilities to its Artificial Intelligence Marketing Platform.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9412825703620912}", 'metadata': "{'Content-Length': '52472', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J2SGBMHESZBQQXAFTI6O3STAL5BB5KD5', 'WARC-Concurrent-To': '<urn:uuid:2c525583-3e50-405b-b5a0-cf28a2544ff9>', 'WARC-Date': datetime.datetime(2021, 1, 23, 17, 11, 9), 'WARC-IP-Address': '71.188.75.78', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7MUZS4DLSEN2KCY4TCYYIK6MISOJBVTK', 'WARC-Record-ID': '<urn:uuid:54e5900f-e80e-413c-958c-1cef013e12ad>', 'WARC-Target-URI': 'https://www.destinationcrm.com/Articles/CRM-News/CRM-Featured-Articles/Amplero-Upgrades-its-Artificial-Intelligence-Marketing-Platform-120213.aspx', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c08c89d6-e6b0-4e86-a1e9-3d79490533d5>', 'WARC-Truncated': None}", 'previous_word_count': '613', 'url': 'https://www.destinationcrm.com/Articles/CRM-News/CRM-Featured-Articles/Amplero-Upgrades-its-Artificial-Intelligence-Marketing-Platform-120213.aspx', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-206.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1904301643371582', 'original_id': 'bb3057af5ad3b128bb634ebab140dadb0aee5225e4137c5ed4cc1458c1fa0bae'}
Q: Getting multiple rows of a single employee while using Subqueries in SQL I am writing a query to get the benefits details of employees. I need to fetch the deduction amount of different plans and options. For the deduction amount there is one field in a table. I am fetching that field multiple times for different plans and options. I did this using subqueries. But my query is returning multiple rows of a single employee and in multiple rows its displaying the amount. I want all deduction amounts in a single row for a single employee. This is how I have written the query:- select papf.person_number, csv.salary_amount, (select bprv.rt_val from ben_prtt_rt_val bprv, ben_opt_f bof, ben_pl_f bpf, ben_pl_typ_f bpt where bprv.prtt_enrt_rslt_id=bper.prtt_enrt_rslt_id and bper.pl_typ_id=bpt.pl_typ_id and bpf.pl_typ_id=bpt.pl_typ_id and bper.pl_id=bpf.pl_id and bper.opt_id=bof.opt_id and bpt.name ='abcd' and bpf.name='abcd' and bof.name='Participant' and (sysdate between bof.effective_start_Date and bof.effective_end_Date) and (sysdate between bpt.effective_start_Date and bpt.effective_end_Date) and (sysdate between bpf.effective_start_Date and bpf.effective_end_Date)) as "abcd Amount", (select bprv1.rt_val from ben_prtt_rt_val bprv1,ben_opt_f bof1, ben_pl_f bpf1, ben_pl_typ_f bpt1 where bprv1.prtt_enrt_rslt_id=bper.prtt_enrt_rslt_id and bper.pl_typ_id=bpt1.pl_typ_id and bpf1.pl_typ_id=bpt1.pl_typ_id and bper.opt_id=bof1.opt_id and bper.pl_id=bpf1.pl_id and bpt1.name ='efgh' and bpf1.name='efgh' and bof1.name='Participant' and (sysdate between bof1.effective_start_Date and bof1.effective_end_Date) and (sysdate between bpt1.effective_start_Date and bpt1.effective_end_Date) and (sysdate between bpf1.effective_start_Date and bpf1.effective_end_Date)) as "efgh Amount", (select bprv2.rt_val from ben_prtt_rt_val bprv2,ben_opt_f bof2, ben_pl_f bpf2, ben_pl_typ_f bpt2 where bprv2.prtt_enrt_rslt_id=bper.prtt_enrt_rslt_id and bper.pl_typ_id=bpt2.pl_typ_id and bpf2.pl_typ_id=bpt2.pl_typ_id and bper.opt_id=bof2.opt_id and bper.pl_id=bpf2.pl_id and bpt2.name ='ijkl' and bpf2.name='ijkl' and bof2.name='Participant' and (sysdate between bof2.effective_start_Date and bof2.effective_end_Date) and (sysdate between bpt2.effective_start_Date and bpt2.effective_end_Date) and (sysdate between bpf2.effective_start_Date and bpf2.effective_end_Date)) as "ijkl Amount" from ben_prtt_enrt_rslt bper, per_all_people_f papf , cmp_salary csv where bper.assignment_id=csv.assignment_id and bper.person_id=papf.person_id and (sysdate between papf.effective_start_Date and papf.effective_end_Date) AND CSV.DATE_TO=(SELECT MAX(CSV1.DATE_TO) FROM CMP_SALARY CSV1 WHERE CSV.ASSIGNMENT_ID=CSV1.ASSIGNMENT_ID) I want the result like this:- Employee Salary abcd_amt efgh_amt ijkl_amt 1234 10000 200 300 400 But using the query I am getting result like this:- Employee Salary abcd_amt efgh_amt ijkl_amt 1234 10000 200 1234 10000 300 1234 10000 400 and also duplicate rows. Please help me out. How can I resolve this problem? A: Just add group by and Max in your query like this : select papf.person_number as Employee, csv.salary_amount as Salary max(-query of abcd_amt-) as abcd Amount, max(-query of efgh_amt-)as efgh Amount, max(-query of ijkl_amt-) as abcd Amount from --tables names where -- where condition group by papf.person_number, csv.salary_amount;
mini_pile
{'original_id': 'f9787ee37d9f0f04334c7c22952230db601f86fbccd1baa6e445d10159af173f'}
#include "PapyrusEvents.h" #include "GameMenus.h" #include "GameRTTI.h" #include <set> //// Global instances RegistrationMapHolder<BSFixedString> g_menuOpenCloseRegs; RegistrationMapHolder<UInt32> g_inputEventRegs; RegistrationMapHolder<BSFixedString,ModCallbackParameters> g_modCallbackRegs; EventDispatcher<SKSEModCallbackEvent> g_modCallbackEventDispatcher; SKSEEventHandler g_skseEventHandler; //// Generic functors template <typename T> void SetVMValue(VMValue * val, T arg) { STATIC_ASSERT(false); } template <> void SetVMValue<bool> (VMValue * val, bool arg) { val->SetBool(arg); } template <> void SetVMValue<SInt32> (VMValue * val, SInt32 arg) { val->SetInt(arg); } template <> void SetVMValue<float> (VMValue * val, float arg) { val->SetFloat(arg); } template <> void SetVMValue<BSFixedString> (VMValue * val, BSFixedString arg) { val->SetString(arg.data); } template <typename T1> class EventQueueFunctor1 : public IFunctionArguments { public: EventQueueFunctor1(BSFixedString & a_eventName, T1 a_arg1) : eventName(a_eventName.data), arg1(a_arg1) {} virtual bool Copy(Output * dst) { dst->Resize(1); SetVMValue(dst->Get(0), arg1); return true; } void operator() (const EventRegistration<void*> & reg) { VMClassRegistry * registry = (*g_skyrimVM)->GetClassRegistry(); registry->QueueEvent(reg.handle, &eventName, this); } private: BSFixedString eventName; T1 arg1; }; template <typename T1, typename T2> class EventQueueFunctor2 : public IFunctionArguments { public: EventQueueFunctor2(BSFixedString & a_eventName, T1 a_arg1, T2 a_arg2) : eventName(a_eventName.data), arg1(a_arg1), arg2(a_arg2) {} virtual bool Copy(Output * dst) { dst->Resize(2); SetVMValue(dst->Get(0), arg1); SetVMValue(dst->Get(1), arg2); return true; } void operator() (const EventRegistration<void*> & reg) { VMClassRegistry * registry = (*g_skyrimVM)->GetClassRegistry(); registry->QueueEvent(reg.handle, &eventName, this); } private: BSFixedString eventName; T1 arg1; T2 arg2; }; //// Specific functors class ModCallbackEventFunctor : public IFunctionArguments { public: ModCallbackEventFunctor(BSFixedString & a_eventName, BSFixedString & a_message) : eventName(a_eventName.data), message(a_message.data) {} virtual bool Copy(Output * dst) { dst->Resize(2); dst->Get(0)->SetString(eventName.data); dst->Get(1)->SetString(message.data); return true; } void operator() (const EventRegistration<ModCallbackParameters> & reg) { VMClassRegistry * registry = (*g_skyrimVM)->GetClassRegistry(); registry->QueueEvent(reg.handle, &reg.params.callbackName, this); } private: BSFixedString eventName; BSFixedString message; }; //// Event handlers EventResult SKSEEventHandler::ReceiveEvent(MenuOpenCloseEvent * evn, EventDispatcher<MenuOpenCloseEvent> * dispatcher) { #if _DEBUG _MESSAGE("Received internal MenuOpenCloseEvent. Name: %s, Opening: %d", evn->menuName, evn->opening); #endif BSFixedString eventName = evn->opening ? BSFixedString("OnMenuOpen") : BSFixedString("OnMenuClose"); g_menuOpenCloseRegs.ForEach( evn->menuName, EventQueueFunctor1<BSFixedString>(eventName, evn->menuName) ); return kEvent_Continue; } EventResult SKSEEventHandler::ReceiveEvent(InputEvent ** evns, EventDispatcher<InputEvent,InputEvent*> * dispatcher) { // Function is called periodically, if no buttons pressed/held *evns == NULL static UInt8 keyState[0x100] = { 0 }; static float keyTimer[0x100] = { 0 }; for (UInt32 i = 0; i< 0x100; i++) if (keyState[i] && (--keyState[i] == 0)) g_inputEventRegs.ForEach( i, EventQueueFunctor2<SInt32, float>(BSFixedString("OnKeyUp"), (SInt32)i, keyTimer[i]) ); if (! *evns) return kEvent_Continue; for (InputEvent * e = *evns; e; e = e->next) { switch(e->eventType) { case InputEvent::kEventType_Button: { ButtonEvent * t = DYNAMIC_CAST(e, InputEvent, ButtonEvent); //_MESSAGE("kInput_Button"); //_MESSAGE("\tdevice type: %08X", t->deviceType); //_MESSAGE("\tdevice id: %08X", t->deviceID); //_MESSAGE("\tscanCode: %d", t->scanCode); //_MESSAGE("\tmodFlags: %08X", t->modFlags); //_MESSAGE("\ttimer: %f", t->timer); if (!keyState[t->scanCode]) { //_MESSAGE("KeyDown: %c", t->scanCode); g_inputEventRegs.ForEach( t->scanCode, EventQueueFunctor1<SInt32>(BSFixedString("OnKeyDown"), (SInt32)t->scanCode) ); } keyState[t->scanCode] = 2; keyTimer[t->scanCode] = t->timer; break; } case InputEvent::kEventType_MouseMove: { MouseMoveEvent * t = DYNAMIC_CAST(e, InputEvent, MouseMoveEvent); //_MESSAGE("kInput_MouseMove"); break; } case InputEvent::kEventType_Char: { CharEvent * t = DYNAMIC_CAST(e, InputEvent, CharEvent); //_MESSAGE("kInput_Char: %c", t->keyCode); break; } case InputEvent::kEventType_Thumbstick: { ThumbstickEvent * t = DYNAMIC_CAST(e, InputEvent, ThumbstickEvent); //_MESSAGE("kInput_Thumbstick"); break; } case InputEvent::kEventType_DeviceConnect: { DeviceConnectEvent * t = DYNAMIC_CAST(e, InputEvent, DeviceConnectEvent); //_MESSAGE("kInput_DeviceConnect"); break; } case InputEvent::kEventType_Kinect: { KinectEvent * t = DYNAMIC_CAST(e, InputEvent, KinectEvent); //_MESSAGE("kInput_Kinect"); break; } }; } return kEvent_Continue; } EventResult SKSEEventHandler::ReceiveEvent(SKSEModCallbackEvent * evn, EventDispatcher<SKSEModCallbackEvent> * dispatcher) { #if _DEBUG _MESSAGE("Received internal SKSEModCallbackEvent. EventName: %s. Message: %s", evn->eventName, evn->message); #endif const char * eventNameData = evn->eventName.data; g_modCallbackRegs.ForEach( evn->eventName, ModCallbackEventFunctor(evn->eventName, evn->message) ); return kEvent_Continue; }
common_corpus
{'identifier': 'https://github.com/schlangster/skyui.plugins/blob/master/PapyrusScaleform/PapyrusEvents.cpp', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Unlicense, MIT', 'date': '2021.0', 'title': 'skyui.plugins', 'creator': 'schlangster', 'language': 'C++', 'language_type': 'Code', 'word_count': '519', 'token_count': '2237', '__index_level_0__': '39192', 'original_id': '46b5a5b1a187cba312cfdd809b6ba412e83d4d2fc1e7153f26ea0efa9ce33502'}
Q: How do I make ndk-build create executable named like a library? I want my native executable to be auto-populated to /data/data/.../lib/. For this it is to be named like lib*.so. But if I try to set this name, Android NDK complains: LOCAL_PATH := $(call my-dir) include $(CLEAR_VARS) LOCAL_MODULE := libhello.so LOCAL_SRC_FILES := hello.c include $(BUILD_EXECUTABLE) Android NDK: jni/Android.mk:hello.so: LOCAL_MODULE_FILENAME must not contain a file extension A: A workaround: install with a name Android NDK wants, then rename after installation: LOCAL_PATH := $(call my-dir) include $(CLEAR_VARS) LOCAL_MODULE := hello LOCAL_SRC_FILES := hello.c include $(BUILD_EXECUTABLE) all: mv ${NDK_APP_DST_DIR}/hello ${NDK_APP_DST_DIR}/libhello.so And your application can call the executable /data/data/<package>/lib/libhello.so without any preparatory steps.
mini_pile
{'original_id': '09a103eacf10b0fd70234dd1f18cf475958b04d47f108a0fb2e55c0e6fc832e2'}
News | Results | Columns | Forums Posted in: My Two Centsss My Two Centsss - Punk or Lesnar: Who Needs The Win At SummerSlam More? By Super Chrisss Jul 26, 2013 - 9:40:51 AM (Credit: Tom Jenner @ImageBlownOut) The Best vs. The Beast In less than a month, the WWE Universe (God, I hate that term - can't they just address us as "fans"?) will witness a clash between two of the most popular superstars of the 21st Century - CM Punk and Brock Lesnar. Some people are Punk fans; others are pro-Lesnar. If you're like me, then you like both guys. But no matter where you stand, it's pretty hard not to get excited about their now-official match at this year's SummerSlam. And we have every reason to be excited. In just two short weeks, the CM Punk/Brock Lesnar rivalry (featuring Paul Heyman) has already eclipsed the entire Lesnar/Triple H feud in terms of anticipation. While WWE has wasted no time recapping Lesnar's attack on Punk last week multiple times on RAW - just like they did with Lesnar's assault on Vince McMahon and The Game - this year, they have a full-time wrestler feuding with The Beast to keep things interesting. Punk is one of the best promo men in the company today, and his interactions with another master of the mic (Heyman) the past few weeks have been nothing short of phenomenal. Even if Lesnar doesn't make a single TV appearance prior to the Pay-Per-View, Punk would be able to carry the feud by himself, something which HHH was unable to do last year, mainly because Hunter has always excelled at playing the dastardly heel, not the lovable hero. But I digress, as this column is not about comparing Triple H/Lesnar to the current Punk/Lesnar program. Rather, I want to share my thoughts on who I feel should have his arm raised in victory next month - Punk or Lesnar. Maybe it's a bit early to preview their match, as plenty of things could happen between now and the SmackDown tapings before SummerSlam to change my mind on who the favourite will be, but as it stands, I can see the company going with one outcome and one outcome only: Brock Lesnar wins. When you think about it, Brock Lesnar - a former UFC and WWE Champion who is supposed to be one of the most drawing stars on the roster - needs a SummerSlam victory more than his opponent does - a former WWE Champion as well who many people felt couldn't draw at all. That's because since returning to the WWE in April 2012, Lesnar's win/loss record has been less than impressive. He's had a grand total of four matches since then, and he's only won two of them. If Lesnar loses to Punk next month, he'll have lost more matches than he's won. That's not exactly intimidating for someone who's billed as "The Beast Incarnate" nor someone who his opponents are supposed to be terrified to get in the ring with. On the other side of the coin, CM Punk has not had a very good 2013 on paper. He's only won one PPV match this year, as he's suffered defeats at Royal Rumble, Elimination Chamber, Wrestlemania, and Money in the Bank. If he does the job to Lesnar at SummerSlam, Punk's PPV record this year will look even worse. For the former longest reigning WWE Champion in 25 years, that doesn't make Punk look very strong, does it? At the same time, consider the quality of his opponents - The Rock, Undertaker, Chris Jericho, and Brock Lesnar. Punk might have lost most of those match-ups, but he's been headlining PPVs with nothing but future Hall of Famers and taking each one of them to their limit. Even in defeat, simply being in the same ring with those kinds of names has boosted Punk's profile and he has solidified himself as a main-eventer. I also feel Lesnar should/will get the win at SummerSlam because there's a good chance we may not see Brock wrestle another match until Wrestlemania 30, where his two rumoured opponents are Rock or The Undertaker. Should that indeed be the case, then Lesnar absolutely needs a victory over Punk at SummerSlam. The Rock has beat John Cena and CM Punk in recent years; The Undertaker has defeated Triple H and CM Punk at the last few Wrestlemanias. Why would anyone think Lesnar poses a threat to The Rock at Wrestlemania if Lesnar has lost to two men Rock has proven he can beat? How could Lesnar be presented as a threat to 'Taker's undefeated Streak considering Lesnar suffered losses to The Deadman's previous Wrestlemania victims? Lesnar needs to regain some of his lost credibility, and losing to Punk at SummerSlam won't cut it. Going back to the Punk side of the argument, I realize that a victory over Lesnar could help turn Punk into even bigger of a star. In fact, I've seen people compare Lesnar vs. Punk to Lesnar vs. Rock for the WWE title from eleven years earlier. Basically, they view it as a chance for Lesnar to cleanly put over Punk as a "passing of the torch" like Rock did for Lesnar. Personally, I don't see it that way. If any match at this year's SummerSlam could mirror the significance of Lesnar vs. Rock, it would be Cena vs. Bryan, not Brock vs. Punk. That match feels more like a shifting of generations, although I'm not convinced it will happen there either (but that's a story for another day). Like I said, a Punk victory would definitely boost his resume, but Punk could lose to Brock after a great match, and walk out on RAW the very next night to begin a feud with someone else and he would be perfectly fine. Not physically, of course, but in terms of character strength. Punk isn't quite on Cena's level where he could job to everyone and their mother and still recover, but losing to Brock Lesnar won't hurt Punk's credibility won't help. So when you take everything into consideration, come SummerSlam, I feel Lesnar has a lot to gain, but a lot to lose as well. Punk, on the other hand, is probably looking to give the fans a unique, exciting match that will hopefully become a future classic. As a fan of both men, I cannot wait to see them go at it, and I hope they deliver. If Lesnar wins, I'll be happy. If Punk wins, I'll still be happy. As a fan, Lesnar vs. Punk is win/win for everyone. But when you stop and think about it, The Beast might need the win a lot more than you might have thought. What do you think? Does Brock really need to defeat Punk at SummerSlam? Or am I wrong, that a Punk victory could actually push The Best in the World to levels of superstardom he's never seen before? BREAKING: For all you #LoPRadio listeners, The Doc and myself will be on-air this coming Wednesday (July 31) at 6pm EST. Tune in to our show where among other topics, we'll try and predict the triple-main-event for Wrestlemania 35. No, that is not a typo. So tune in! It's time to pull a WWE and plug the crap out of my social media! - Email: captain_charisma16@hotmail.com - Twitter: @ChrisssLOP -XboX Live Gamertag: Good Guy Chris Thank you very much for reading.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '80', 'language_id_whole_page_fasttext': "{'en': 0.9581324458122252}", 'metadata': "{'Content-Length': '22205', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GCWGBVTF2UONBXDVDHIXVMGSDKSGRQAI', 'WARC-Concurrent-To': '<urn:uuid:3e1e6abe-2bb9-4d50-8ac8-a2df0432745f>', 'WARC-Date': datetime.datetime(2017, 2, 27, 7, 4, 24), 'WARC-IP-Address': '75.125.244.34', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:FLFU77BWPSMEVMPLSEQGRLNWC23ALZFZ', 'WARC-Record-ID': '<urn:uuid:f72907d7-bec1-4292-9c01-c5646eb4ed8f>', 'WARC-Target-URI': 'http://www.lordsofpain.net/columns/mytwocentsss/My_Two_Centsss_-_Punk_or_Lesnar_-_Who_Needs_The_Win_At_SummerSlam_More.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:decba75b-7328-4998-8129-b7582139aa51>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1398', 'url': 'http://www.lordsofpain.net/columns/mytwocentsss/My_Two_Centsss_-_Punk_or_Lesnar_-_Who_Needs_The_Win_At_SummerSlam_More.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-171-10-108.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-09\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for February 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019080638885498047', 'original_id': '6294ef793f80f7955fd7f2349a3e9a1b35fb117ae70ff69891edea0608d4949c'}
What are the Benefits of an Electric Bike? Technology is improving human life in all aspects weather it is economical, health, entertainment. We are surrounded by technology and the advancement in it is making life even easier and charming to live. Electric bikes are the amazing invention for today that help is in many ways. We have seen bikes that used to work by paddling then we got patrol bikes n now we have e-bikes. What Is An Electric Bike And How It Is Different From Conventional Bikes? Electric bikes have four components while the conventional ones have only three. Such as in conventional bike you have a seat, paddles, and chain that helps the bike to work. On the other hand, components of an electric bike are four in number. It has got one battery, motor, one drivetrain, and the throttle. Battery is the first part we will discuss. This component is heaviest yet expensive most in an electric bike. It is responsible to give power to the motor of the e-bikes that we will discuss ahead. The battery comes in different powers and if we take 36V10Ah battery, it can give power to motor of the bike for forty miles. The best thing about the battery is it is detachable from the battery and you can take it to work for charging after reaching your office. Motor is also called as mid drive motor that’s located in the center, below the frame. The main function of the motor is to help the rider to bike effortlessly. It looks just like a motor of a traditional bike because it exerts the pressure on the cranks rather than wheels that helps rider to ride an electric bike faster even with less power. Moreover, it helps you to divide the body weight equally throughout your bike to give a good driving experience. Drivetrain component is the power deliverer of the e-bikes and helps user to ride an electric bike with ease. It works by sending power to the driving wheels. Lastly, the fourth part in the e-bikes is throttle. Throttle is more like a mechanism than being physical part and allows a rider in controlling the motor to ride an electric bike. It works by twisting the handles by using which motor starts and works. All with this, e-bikes you also get some components resembling to electric bike such as frame, wheels, brakes, seat, paddles, handlebars, and suspension etc. Why Electric Bikes Use Is Increasing at Rapid Fast Rate? Basically, electric bikes are faster, eco-friendly, and very convenient in use. Due to their amazing and outclass benefits regarding health, economy, environment, and social. Following are the benefits discussed in detail regarding e-bikes to help you understand why its use is increasing with each passing day. Physical Health Benefits of Electric Bikes: You would have seen electric paddling machines in all the gym corners and exercising places. This is because the continuous paddling improves your physical being from head to toe. Riding an electric bike brings so many benefits. Given below are some physical health benefits of E-Bikes: 1.    Cycling Strengthens Muscles, Bones, and Joints: First of all, when you ride an electric bike, your whole body parts and organs come in state of motion. Such as, you are using feet, knee muscles, and hip muscles to paddle the bike; you are using your hand joins and arm muscles to grip the handle; and you are using your overall back and body to make a posture. All with this, you are breathing more deeply while riding bikes to keep up with your body temperature. By doing so, the inner and outer muscles of your body are getting strong while your bones and joints are getting more vigorous too. 2.     Helps in Reducing Weight: Gyms have cycles because it directly hits the problems of your body related to stomach. Stomach issues are basically responsible for stole blocking and bloating of the body. The continuous paddling of the bike helps you to improve the digestion and stomach functioning. When stomachs works better the digestion process becomes fast hence no food stays in the body to get you fat. Therefore, when you ride an electric bike you get help in reducing weight. 3.    It Helps You Adopt Fit Physique: Health benefits of electric bikes are more than conventional bikes because it divides whole body weight to the overall bike. Now, when you paddle more, your whole body functions and all muscles are being stretched and strain. This stretching and straining of the muscles play the role of yoga and helps you in getting fit and maintained body. When you ride an electric bike continuously for 2 miles a day, you can see visible difference in your weight and physique within just one month. Mental Health Benefits of Electric Bikes Mental Health Benefits of Electric Bikes: Along with physical, the mental health benefits of E-Bikes are also enormous. It is the most famous proverb in the world that says “a sound body has the sound mind”. So, when you physically active by riding e-bikes, you are also improving your mental health. Following are some Mental Health Benefits of Electric Bikes: 1.     Reduces Stress: According to a researches and studies, we need to keep ourselves active and strong in order to reduce stress. By riding the e-bikes, you are keeping your body busy. When you are not active certain chemicals and substances start to build in your mind that becomes reason of bringing negative thoughts to your brain. When you ride an electric bike, this physical activity stops the formation of such substances and hence helps you in reducing stress. Moreover, you get to see so many scenic places that enhance your mood and take away the negativities of the brain that are stressing you. 2.    Builds Confidence: Lack of confidence is not only bad for your personal life but social life as well. When you don’t have courage to speak up or to get accepted the way you are, you remain quite behind from the success. Now, when you ride the e-bikes more often, your body and mind become relaxed. You start to accept things better and this thing helps you in boosting your confidence. It is one of the best health benefits of electric bikes so far. 3.    Helps in Improving Sleep: You need to make yourself tired if you want to get an instant and improved sleep. According to researches, people who are involved in the jobs that are more creative, get a hard time sleeping in the night. This is because their mind is in condition of continuous functioning. When your mind works, you get deep and sometimes depressing thoughts never let you fell asleep in the night. However, improving sleep is also amongst the health benefits of electric bikes because they keep your body and mind on same page and never make you feel disturbed so you get good sleep in the night. Economic Benefits of Electric Bikes: Economic benefits to ride an electric bike are also not less. Electric bikes prices are very easy to afford yet they are easy to drive as well. You don’t need an instructor to help you in learning to drive electric bikes. How, e-bikes help you economically, here are some benefits: 1.    Saving on Patrol: Electric bikes work on batteries that can be recharged easily at home. If you use battery with more strength, it will take 2 to 3 days till the next charge. You have no need to get expensive patrol in your bikes to ride. Therefore, you will save money. 2.    Saving on Gym Fee: When you don’t do exercise on daily basis, you become fat and hence require joining a gym. On the other hand, when you use electric bikes to go to work and come home or for doing groceries, you are completing your quota of physical activities. Now, you don’t have to go an expensive gym so you are saving on your gym fees and charges. 3.    Saving on Buying Medicines: Riding electric bikes keeps you physically and mentally fit. To ride an electric bike a day, keeps the doctor away. When you are physically and mentally fit, you will not have to consume expensive BP, sugar, or other types of medicines. So, you are saving money again only because of electric bikes. Along with having economic benefits and health benefits of electric bikes, you also get environmental and social benefits of riding e-bikes. The Environmental Benefits to ride an electric bike are: 1. Reduction in the pollution because electric bikes produce no smoke 2. Reduction in the noise pollution because e-bikes do not produce noise 3. There are no any sorts of chemicals emitted from electrical bikes; hence no any sort of pollution is being added in the environment. All with this, e-bikes also help you in getting better socially such as, you remain entertained because bike rides are amusing, you remain juvenile because of utmost health benefits and you have always something to go for groceries etc. About Haider Ali Khan
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.9549037218093872}", 'metadata': "{'Content-Length': '41281', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XBBTLH24H7WXGDVTJMS2VEVCXRRBY53Z', 'WARC-Concurrent-To': '<urn:uuid:5f3bbc12-75fa-457b-8cb5-681ce7486682>', 'WARC-Date': datetime.datetime(2019, 11, 15, 0, 47, 44), 'WARC-IP-Address': '149.56.18.177', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:B2TLZT6IYUO7RZAX6YKCBQNIWEJOEC4C', 'WARC-Record-ID': '<urn:uuid:3725dcc7-fb74-4cbf-8411-acd0eefab002>', 'WARC-Target-URI': 'https://www.newsmaritime.com/2019/benefits-electric-bike/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ccd73a4b-4409-4399-ab88-c8367b918d04>', 'WARC-Truncated': None}", 'previous_word_count': '1542', 'url': 'https://www.newsmaritime.com/2019/benefits-electric-bike/', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-165.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14293456077575684', 'original_id': 'fa54fbabf235834df2c9930103e8e838488fe46d310354e73d09f23e4937115e'}
Loss of serotonin neuron activity blunts the body’s ability to recover from interrupted breathing Scientists trying to identify the roots of sudden infant death syndrome (SIDS), the leading cause of death in U.S. infants between 1 month and 1 year old, have increasingly turned their attention to the neurotransmitter serotonin and the brain cells that produce it. Studies have linked serotonin-producing neurons to the regulation of breathing, which may go awry in SIDS. In addition, tissue samples from SIDS infants often show abnormalities specifically in those neurons. The findings, published Oct. 23 in eLife, show that an acute loss of normal activity in the serotonin-producing nerve cells blunts the body's ability to recover from interrupted breathing. The results provide evidence that young animals need properly functioning serotonin neurons to maintain normal cardiorespiratory function. "If we can determine whether serotonin-producing neurons play an active and necessary role in regulating breathing, heart rate and the recovery response to apneas in young mouse pups, it could provide a plausible biological explanation for at least some SIDS cases," said Susan Dymecki, professor of genetics at Harvard Medical School and senior author of the study. "This possible explanation might provide some hope, even if minutely, for the profound grief experienced by families who have lost a child to SIDS, and may one day help researchers prevent SIDS altogether," she said. Normally, the brain coordinates the heart and lungs to provide a continuous flow of oxygen into the body and carbon dioxide out. In conditions such as sleep apnea, when breathing temporarily stops, oxygen levels in cells can fall too low and carbon dioxide levels can rise too high. To restore healthy levels, the brain triggers a series of gasps and raises the heart rate, a process called autoresuscitation. But heart rate monitor readings in some SIDS infants support the hypothesis that this fail-safe mechanism doesn't always kick in, and that its failure can lead to SIDS. Dymecki and colleagues set out to explore the role of serotonin-producing neurons in regulating autoresuscitation in week-old mice, which the researchers estimate are within the corresponding age window that conveys highest risk of SIDS in humans. The researchers genetically modified the mice so their serotonin neurons would quickly and temporarily be inhibited in response to an injected chemical. Other neurons remained unaffected. Setting up this inducible neuron perturbation technique in mouse pups and coupling it with the ability to measure respiratory and heart function was the key, said Dymecki. "Although initially technically challenging, this novel approach allowed for precise brain cell manipulation and real-time measurement of cardiac and respiratory activity," said Ryan Dosumu-Johnson, a graduate student in the Dymecki lab and first author of the paper. The researchers then induced apneas in the mice. Those with inhibited serotonin-producing neurons had weaker breathing recovery and more instances of sudden death in the face of apneas than mice with a normally functioning serotonin production system. "These results indicate a vital role for serotonin neurons at an early age after birth," said Dymecki. To the researchers' surprise, the heart rates in mice with inhibited serotonin neurons recovered normally, at least initially, even though their breathing was impaired. "This uncoupling of the breathing and heart-rate recovery responses was unexpected," said Dymecki. "It suggests that these two vital physiological responses--heart rate and breathing--could be more separable at the level of brain cells and circuits than previously anticipated, despite their interwoven physiology." Although further studies will be needed to uncover whether the same principles hold true in humans, the current findings support the theory that defects in the functioning of serotonin neurons can render infants more vulnerable to dying from apneas and other cardiorespiratory challenges, the authors said. If replicated in human studies, the new findings could eventually help improve screening tools to identify infants at higher SIDS risk and suggest new strategies for drug development, said Dymecki. You might also like... × Researchers discover new mechanism that contributes to airway hyperresponsiveness in asthma
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '34', 'language_id_whole_page_fasttext': "{'en': 0.917540729045868}", 'metadata': "{'Content-Length': '117121', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KCBZNEARSD5JJEV46KLK6H3TU7UNE33X', 'WARC-Concurrent-To': '<urn:uuid:56cc0a5c-82f5-4e25-aab2-4fa97b73ed78>', 'WARC-Date': datetime.datetime(2021, 5, 18, 6, 1, 43), 'WARC-IP-Address': '104.20.84.7', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VJBF2WXC47G4CHNQHXQCZL5YJM2FB3JL', 'WARC-Record-ID': '<urn:uuid:2debf17b-f6bf-4a0a-8879-fd16b0b1c6d6>', 'WARC-Target-URI': 'https://www.news-medical.net/news/20181025/Loss-of-serotonin-neuron-activity-blunts-the-bodys-ability-to-recover-from-interrupted-breathing.aspx', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7b84f3e8-b27c-4b7f-8c61-115bb10620cc>', 'WARC-Truncated': None}", 'previous_word_count': '703', 'url': 'https://www.news-medical.net/news/20181025/Loss-of-serotonin-neuron-activity-blunts-the-bodys-ability-to-recover-from-interrupted-breathing.aspx', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-74.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.16005170345306396', 'original_id': '0ab96812b8f7fc7e5ff037eb301bea9cbab82615bb93d174483effc14018ac4b'}
Metal band singer gets 6 years for murder plot VISTA, Calif. (AP) — The lead singer of the band As I Lay Dying has been sentenced to six years in prison for plotting to kill his wife. U-T San Diego ( ) reports 33-year-old Timothy Lambesis was sentenced Friday in San Diego County. He had pleaded guilty to soliciting murder. Authorities say Lambesis hired an undercover sheriff's detective to kill Meggan Lambesis last year. The singer said she had restricted his visits with their children after a separation, and he also was angry that his wife would get a large share of his income in a divorce settlement. His attorney said Lambesis acted out of character and the behavior was sparked by steroid use. As I Lay Dying was formed in San Diego in 2000. The metal band was nominated for a Grammy in 2008. Information from: U-T San Diego,
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.992150068283081}", 'metadata': "{'Content-Length': '36743', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VEKEMZDXKD7HR4ZXV2XAATHUICIQ6ZS5', 'WARC-Concurrent-To': '<urn:uuid:dadcb275-2fc4-4582-803f-b64c3ec6c579>', 'WARC-Date': datetime.datetime(2016, 7, 30, 3, 32, 12), 'WARC-IP-Address': '74.84.206.74', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WZB3XWS5GETT56Y2I5BC7FIHGGXPIXAK', 'WARC-Record-ID': '<urn:uuid:94406dc9-7772-4fc0-a96c-26cb52d3c2e3>', 'WARC-Target-URI': 'http://www.am1280thepatriot.com/news/articles/metal-band-singer-gets-6-years-for-murder-plot', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b836d96b-1bbc-4f01-bb8a-a87ab0a467ba>', 'WARC-Truncated': None}", 'previous_word_count': '146', 'url': 'http://www.am1280thepatriot.com/news/articles/metal-band-singer-gets-6-years-for-murder-plot', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.020554065704345703', 'original_id': 'd9d6992e16ffd3209b0cede85b20ab25bb13248748ac95da8eeae90a2f442c60'}
Q: Implementation of Fourier Domain Denoising with Hard Threshold I just tried the Fourier denoising method with a hard threshold and my code is as follow: F = imnoise(phantom(128),'gaussian'); B = fft(F); s = 0.3; for i = 1:128 for j = 1:128 if abs(B(i,j))<s B(i,j)=0; end end end C=ifft(B); subplot(121) imshow(F,[]) subplot(122) imshow(C,[]) Left is the phantom after adding noise and the right is the denoised image from my code. The Fourier denoising hard threshold method just uses threshold value to keep high frequency coefficients and the coefficients below the threshold to be 0. In my code, I just added gaussian noise with default mean 0 and variance 0.01 to my phantom image and then I set the threshold to be 3 times of the standard deviation of the noise, which is 0.3 (this is some good practical threshold I looked at from literature). But why the result is not good? It seems it is still very noisy. Even I change my threshold the result is not good. Why? And I want to my denoised image as close to the original phantom. Thanks in advance! A: Thresholding in the Fourier domain is an archaic method sometimes called spectral subtraction, used for background noise removal in speech. Bad results in image processing can be due to several factors: Misinterpretation: you say "The Fourier denoising hard threshold method just uses threshold value to keep high frequency coefficients". Not quite. You keep "high amplitude coefficients", no matter low or high frequency. Test data: the Shepp-Logan model is known to be quite specific. Bad results on it do not imply bad results on real data, yet: Transform choice: Fourier is very good for close-to-stationnary data. Standard images with smooth parts inside contours are not well represented in the Fourier domain, at least not concentrated enough for acurate data compaction and reconstruction with few (high) coeffcients. Derivatives, or multiscale directional derivatives like wavelets can help better. Implementation: Fourier implementation via FFT suffers boundary artifacts coefficients, not talking about the 1D implementation you seem to use (prefer fft2 here) Coefficient selection: hard and scalar thresholding typically yields more important visual artifacts than "smoother" thresholding and vector or group thresholding. Formulation: you can generally get better results when you do not use a "parameter-tuned algorithm", but prefer a variational formulation based on your priors, including noise statistics. So you have plenty of room to improve your results. Two references for multivariate image denoising with automated threshold (for Gaussian noise): A nonlinear Stein based estimator for multichannel image denoising, 2008 Wavelet transform for the denoising of multivariate images, 2010
mini_pile
{'original_id': '889b8b0b7cdf42b3c2e8974227a16e955ed92ee8e20b1c2f60a9aa8b883d213e'}
6.16 Inline assembler and instruction expansion in C and C++ code An ARM instruction in inline assembly code might be expanded into several instructions in the compiled object. The expansion depends on the instruction, the number of operands specified in the instruction, and the type and value of each operand. Related concepts 6.17 Expansion of inline assembler instructions that use constants 6.18 Expansion of inline assembler load and store instructions 6.1 Compiler support for inline assembly language Non-ConfidentialPDF file icon PDF versionARM DUI0375E
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.7286308407783508}", 'metadata': "{'Content-Length': '6640', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BFJOQ2U55XTBX72JPRXK3OZSL72ROFGL', 'WARC-Concurrent-To': '<urn:uuid:042b3371-5be7-42f0-8d70-1468e5e65abd>', 'WARC-Date': datetime.datetime(2019, 4, 20, 12, 43, 15), 'WARC-IP-Address': '217.140.98.26', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AN3M37ZOSYGC34WNWXQRPARU6BXS7KZW', 'WARC-Record-ID': '<urn:uuid:ac82b602-c6b1-4c9a-b8fd-169918346fde>', 'WARC-Target-URI': 'http://infocenter.arm.com/help/topic/com.arm.doc.dui0375e/chr1359124249882.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae365904-b67a-42d7-a127-1c16d788e03e>', 'WARC-Truncated': None}", 'previous_word_count': '89', 'url': 'http://infocenter.arm.com/help/topic/com.arm.doc.dui0375e/chr1359124249882.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-45-27.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.998634934425354', 'original_id': '6489e2cd15b3f412e2fad0567d47fc51372285c3da62d210578dd39a02bd4875'}
The present invention relates to a semiconductor memory circuit, particularly to a flip-flop circuit suitable for logic circuits in high speed operation. In conventional flip-flop circuits using a high speed GaAs semiconductor device, for example, there has been a device described in IEEE GaAs IC Symposium (1988) pp. 27-30. FIG. 20 shows a flip-flop circuit diagram on the basis of the GaAs semiconductor device described in the above-mentioned thesis. Hereinafter, a filed-effect transistor is referred to as "FET" for the sake of simplicity. The flip-flop circuit shown in FIG. 20 comprises transfer FETs 2001 and 2002, inverters 2003 and 2004 for holding data, and inverters 2005 and 2006 for buffering. In the flip-flop circuit shown in FIG. 20, when a clock signal CKT is turned to the Low level, the transfer FETs 2001 and 2002 become the cut-off state irrelevant to levels of data signals DT and DB. Because of this, potentials of terminals 2007 and 2008 are held by the inverters 2003 and 2004, unchanging thereof. That is, when the clock signal CKT is turned to the Low level, the flip-flop circuit holds information. Also, turning the clock signal CKT to the High level turns the transfer FETs 2001 and 2002 On to determine the potentials of the terminals 2007 and 2008 of the inverters 2003 and 2004 in response to the data signals DT and DB, respectively, so that information of the flip-flop circuit is rewritten. For example, when the data signal DT is the Low level while the data signal DB is the High level, the potential of the terminal 2007 is brought down to each threshold voltage of the inverters 2003 and 2004 by the transfer FET 2001. When the potential of the terminal 2007 goes down beyond each threshold voltage of the inverters 2003 and 2004, the potential of the terminal 2007 is more decreased by the inverter 2004 to turn to the Low level. Conversely, the potential of the terminal 2008 is brought up to each threshold voltage of the inverters 2003 and 2004 by the transfer FET 2002. When the potential of the terminal 2008 goes up beyond each threshold voltage of the inverters 2003 and 2004 by the transfer FET 2002, the potential of the terminal 2008 is more increased by the inverter 2003 to turn to the high level. At this time, both inverted logical levels of the terminals 2007 and 2008 are outputted from output signals QT and QB by the inverters 2005 and 2006, respectively. At a trailing edge of the inverted clock signal CKB, a flip-flop circuit receives the data signal DT and transfers a signal to a succeeding stage. Such flip-flop circuit is known as an edge trigger type flip-flop circuit as shown in FIG. 21. Such an edge trigger type flip-flop circuit is also disclosed on "Design and Application MOS/LSI" published by Electronics Digest Co., November 20, 1977, pp. 122-126.
mini_pile
{'original_id': 'a796124be71ee7debc0a5c0ec78502b564dd18a13af6b08128292395a2eaa487'}
Rita Hernandez de Alba de Acosta Stokes Lydig ( octobre 1875 - 27 octobre 1929) est une mondaine américaine considérée comme « la femme la plus pittoresque d'Amérique ». Elle a été photographiée par Adolf de Meyer, Edward Steichen et Gertrude Käsebier, sculptée dans l'albâtre par Malvina Hoffman, et peinte par Giovanni Boldini et John Singer Sargent, entre autres. Famille Rita de Acosta nait à New York en 1875 de Ricardo de Acosta (1837-1907), un dirigeant de ligne de bateaux à vapeur d'origine cubaine, et d'une mère espagnole, Micaela Hernández de Alba y de Alba (1853-1921), une relations connue des Ducs d'Alba. Elle a sept frères et sœurs : Joaquín, Enrique, Ricardo, Mercedes, Aida, Maria et Ángela. Sa sœur Mercedes de Acosta, une amante de la star de cinéma Greta Garbo, est auteure, scénariste et critique sociale. Une autre sœur, Aida de Acosta, est devenue la première femme à piloter un avion motorisé en solo et est la deuxième épouse du United States Assistant Secretary of War Henry Skillman Breckinridge ; une autre , Maria, est l'épouse du compositeur Theodore Ward Chanler. Influence sur l'art et la mode Rita vit à New York, Paris et Londres, et compte parmi ses amis Edgar Degas, Auguste Rodin, Léon Tolstoï, Sarah Bernhardt, Ethel Barrymore et Claude Debussy . Elle soutient la cause des suffragettes. Célèbre pour son style de vie extravagant, « . . . Rita était également accueillie à Paris, où elle passait une partie de l'année. Elle arrivait au Ritz avec un coiffeur, une masseuse, un chauffeur, une secrétaire, une femme de chambre,... et quarante malles Louis Vuitton. . . A Paris, elle rejoint les rangs des musiciens, artistes, intellectuels et philosophes tels que Rodin, Eleonora Duse, Yvette Guilbert etc. » Impressionnée par l'esprit créatif inné de Rita, Isabella Stewart Gardner, la grande collectionneuse et créatrice du musée Gardner à Boston, a un jour demandé à leur ami commun, John Singer Sargent, pourquoi Lydig ne s'était jamais exprimée artistiquement.« Pourquoi devrait-elle? » a répondu Sargent: « Elle-même est de l'art. » Elle écrit un roman, Tragic Mansions (Boni & Liveright, 1927), sous le nom de Mrs Philip Lydig, un mélodrame mondain décrit comme « émotionnellement émouvant et attrayant » par The New York Times. Vie privée Rita de Acosta a été mariée deux fois. Son premier mariage a lieu le 3 janvier 1895 lorsque la jeune fille de 16 ans est devenue la première épouse du multimillionnaire William Earl Dodge Stokes (1852–1926), qui a construit The Ansonia dans l'Upper West Side de Manhattan. Ensemble, Rita et William sont les parents d'un fils, qu'ils appellent « Weddie ». Selon sa sœur, Rita déteste l'enfant et peut à peine se résoudre à le tenir. William Earl Dodge Stokes Jr. (1896–1992) dirigera l'hôtel Ansonia après en avoir hérité de la propriété de son père. Le mariage est malheureux, apparemment en raison du tempérament et de la cruauté physique de Stokes. Lorsqu'il est dissous par divorce en 1900, Rita reçoit un règlement de près de deux millions de dollars, un record pour l'époque. En février 1922, elle témoigne devant un tribunal contre Stokes, alors en instance de divorce avec sa deuxième épouse, déclarant qu'il la battait pendant leur mariage. Avant leur divorce, ils vivent au 262 West 72e Rue et sont devenus les parents d'un fils, William Earl Dodge Stokes Jr. (1896–1982). En 1902, Rita se marrie au major Philip Mesier Lydig, un officier à la retraite riche ayant une place socialement éminente dans l'United States Army, dans la chapellenie de Grace Church, par le révérend. William R. Houghton. Elle est menée à l'autel par son frère Ricardo ; sa sœur Aida est sa demoiselle d'honneur et William A. Chanler est le témoin de Lydig. En 1913, elle vend sa collection d'art, qui comprend des pièces de Sandro Botticelli. Le couple se sépare en 1914 et divorce en 1919. En 1921, Lydig annonce ses fiançailles avec le révérend Percy Stickney Grant (1860-1927), recteur de l'Église épiscopalienne des États-Unis de l'Ascension du diocèse épiscopalien de New York. Leurs plans de mariage sont interrompus en 1924 lorsque l'évêque William Manning refuse d'autoriser le mariage, Lydig étant divorcée avec deux anciens maris vivants. Le révérend Grant meurt peu de temps après, laissant sa fortune personnelle à la femme qu'il espérait épouser ; Lydig dépense de grosses sommes en vêtements, art, meubles et autres objets pour surmonter son chagrin. Lourdement endettée, elle est forcée de vendre sa maison de Washington Square Park et son contenu, et est déclarée en faillite. Lydig décède d'une anémie pernicieuse à l' hôtel Gotham, aujourd'hui The Peninsula New York, le 27 octobre 1929 à l'âge de 54 ans. Elle est enterrée avec sa mère et sa sœur Mercedes au Trinity Church Cemetery dans le lower Manhattan à New York. Postérité Sa garde-robe personnelle est devenue la base du Costume Institute du Metropolitan Museum of Art. Références Liens externes Sotheby's Catalogue 2007 Documenting the Gilded Age: New York City Exhibitions at the Turn of the 20th Century Romancier américain du XXe siècle Socialite américain Naissance en octobre 1875 Décès en octobre 1929 Personnalité inhumée au Trinity Church Cemetery Naissance à New York Décès à Manhattan
common_corpus
{'identifier': 'https://fr.wikipedia.org/wiki/Rita%20de%20Acosta%20Lydig', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'Rita de Acosta Lydig', 'creator': 'https://fr.wikipedia.org/w/index.php?title=Rita de Acosta Lydig&action=history', 'language': 'French', 'language_type': 'Spoken', 'word_count': '860', 'token_count': '1415', '__index_level_0__': '13693', 'original_id': '38caa11a7738ec30b1e784ae2c7faa03c73d2653aaaa30888d54e82b77712e93'}
\section{Knaster-Tarski Theorem} Tags: Complete Lattices \begin{theorem} Let $\left({L, \preceq}\right)$ be a complete lattice. Let $f: L \to L$ be an increasing mapping. Let $F$ be the set (or class) of fixed points of $f$. Then $\left({F, \preceq}\right)$ is a complete lattice. \end{theorem} \begin{proof} Let $S \subseteq F$. Let $s = \bigvee S$ be the supremum of $S$. We wish to show that there is an element of $F$ that succeeds all elementd of $S$ and is the smallest element of $F$ to do so. By the definition of supremum, an element succeeds all elements of $S$ {{iff}} it succeeds $s$. Let $U = s^\succeq$ be the upper closure of $s$. Thus we seek the smallest fixed point of $f$ that lies in $U$. Note that $U = \left[{s \,.\,.\, \top}\right]$, the closed interval between $s$ and the top element of $L$. First we show that $U$ is closed under $f$. We have that: :$\forall a \in S: a \preceq s$ so: $a = f \left({a}\right) \preceq f \left({s}\right)$ Thus $f \left({s}\right)$ is an upper bound of $S$, so by the definition of supremum, $s \preceq f \left({s}\right)$. Let $x \in U$. Then $s \preceq x$. So: : $f \left({s}\right) \preceq f \left({x}\right)$ Since $s \preceq f \left({s}\right)$, it follows that: : $s \preceq f \left({x}\right)$ so: : $f \left({x}\right) \in U$ Thus the restriction of $f$ to $U$ is an increasing mapping from $U$ to $U$. By Interval in Complete Lattice is Complete Lattice, $\left({U, \preceq}\right)$ is a complete lattice. Thus by Knaster-Tarski Lemma, $f$ has a smallest fixed point in $U$. Thus $S$ has a supremum in $F$. A precisely similar argument shows that $S$ has an infimum in $F$. Since this holds for all $S \subseteq F$, it follows that $\left({F, \preceq}\right)$ is a complete lattice. {{qed}} \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '7defe2deb52b03366437169f3a405bec0ea057165a375c49e73f4e51ded45e90'}
Clinical spectrum of Pseudomonas putida infection. The clinical and microbiologic characteristics of 55 cases of Pseudomonas putida infection in 53 patients in a medical center in Taiwan from April 1988 to March 1993 are reported. P. putida was cultured in the decreasing order of frequency from urine (24 isolates), sputum (12), blood (10), wound discharge (3), peritoneal fluid (3), cerebrospinal fluid (2) and umbilical swab (1). Of the adult patients, 23% (12/53) were considered to be contaminated or colonized with P. putida. Of the 41 patients with manifest disease. 17 (41%) had urinary tract infections, 10 (24%) had pneumonia, 8 (19%) had septicemia, 3 (7%) had wound infections, 2 (5%) had meningitis and 1 (2%) had peritonitis. Of these, 55% were nosocomial infections. The case fatality rate was 29% (12/41). There was no significant correlation between patient mortality and the type of disease caused by the bacterium. Results of in vitro susceptibility tests suggested that imipenem and ceftazidime were more effective than other antimicrobials. This study indicates that the clinical spectrum of diseases caused by P. putida is broader and the incidence of true infection is higher than previously expected, especially among hospitalized patients who undergo invasive procedures such as placement of intravascular devices, urinary catheterization and intubation.
mini_pile
{'original_id': 'c949bab85629958ec9bd9bc8157d828331fb6f3e9dbbcd8d547273ccc3a5c3fc'}
Here are the easiest meals to make in a slow cooker or crock pot: two ingredient slow cooker recipes! This is one of the best tips I have, and it requires so little cooking or skill, I’m almost hesitant to share it here for fear you’ll take away my cooking license. The good news is that I don’t have a license. So. Tell me if you can relate: Sometimes I just don’t have the time or the energy to create a delicious meal — even a meal in my slow cooker, which yes, is the saving grace of sanity. Sometimes all I want, all I need in the world, is my own personal *Jamie Oliver. *For strictly cooking purposes you guys! Obviously. And when those times come calling, I reach into my back pocket for this tip. The two-ingredient slow cooker recipe. It saves my life, and I know that if you’re not using it, you should be! So here it is: You can combine any meat (chicken, beef, pork) with just about any bottled sauce (a marinade, salsa, marinara…you name it) in your crock pot, and cook on low for 6 to 8 hours, and the resulting meat will be nothing short of marvelous. It will taste just as good as some of the crock pot meals you take 15 minutes to put together! Two ingredients, friends — one of which you didn’t make yourself! And you don’t even have to use a sauce; you can use broth, too. Chicken, vegetable, or beef broth work really well if you want to leave the flavor of the meat fairly simple so that you can use it in a variety of dishes throughout the week! An example: Combine boneless skinless chicken breasts with chicken broth in your slow cooker, cook on low until tender, shred the meat, then use some of it in chicken salad sandwiches for lunch, in chicken pot pie for dinner, and then add the rest to enchiladas another night. But play around! Chicken and salsa? It works. Pork and barbecue sauce? Pulled pork! Ground beef and marinara? Don’t make me say it again! Use enough sauce just to cover the meat and let the mix slowly cook all day long. The finished product will be infused with the flavor of the sauce (a reason to use only sauces you love!) and so tender it falls apart upon fork contact. Try it! What’s your favorite slow cooker combination?
mini_pile
{'original_id': '210f16f1a3077338da598743bb63e324b020f06ff85e7f719046d778334c1372'}
Question: Is A Summary A 5 Sentence? What is a sentence for summary? Noun He concluded the report with a brief summary. They gave a summary of their progress in building the bridge. These example sentences are selected automatically from various online news sources to reflect current usage of the word ‘summary.. What are the steps in writing a summary? The Steps of Summary WritingFind the main idea. … When you begin writing, set the article aside and work from your list. … Organize your summary. … Keep opinions to yourself. … Make your summary concise. … When you are finished drafting your summary, compare what you have written with the original. What does a good summary look like? A good summary should give an objective outline of the whole piece of writing. It should answer basic questions about the original text such as “Who did what, where, and when?”, or “What is the main idea of the text?”, “What are the main supporting points?”, “What are the major pieces of evidence?”. How do you start a summary example? Start a summary with an introductory sentence about an article by mentioning the name and surname of the author (s), including the title. Write about the main message in the article made by the author(s). Cover supporting points found in the article. Include relevant details to the topic used by the author(s). How many sentences is a summary? How many paragraphs are in a summary? The conclusion of an essay usually consists of one paragraph, but you may choose to write a longer summary . As any essay paragraph the summary should include a topic sentence and supporting sentences. What is a good summary for a resume? Here’s how to write a resume summary:Describe your strong character traits in just a couple of words.Mention your current job title and professional experience.Say how you want to help the employer achieve their goals.Add info on your key achievements to prove you can deliver results when hired.More items… Can a summary be long? Depending on the length and complexity of the original text as well as your purpose in using summary, a summary can be relatively brief—a short paragraph or even a single sentence—or quite lengthy—several paragraphs or even an entire paper. Can a summary be one sentence? summarize, describe, sequence, compare and contrast and show problem/solution. While there are different levels of summarization-from a thorough summarization of a main idea and supporting details, to a one or two- word summarization-One Sentence Summary falls between the two extremes. What is a 5 sentence summary? The Five Sentence Summary Format: Sentence One: Tell who had a problem, what the problem was, and what the main character(s) did to solve the problem. … Sentence Five: Tell the result or outcome of what happened. (Relate this sentence back to the problem above.) How long is a summary? What are three characteristics of a good summary? A good summary has three basic characteristics: conciseness, accuracy, and objectivity. Conciseness: unlike paraphrase, summary condenses information. The degree of density can vary: while you can summarize a two-hundred page book in fifty words, you can also summarize a twenty-five-page article in five hundred words. What is a good summary? What is a summary example? The definition of summary is a statement presenting the main points. An example of summary is a type of review of what happened at a meeting. … Summary is defined as a quick or short review of what happened. An example of summary is the explanation of “Goldilocks and the Three Bears” told in under two minutes. What should not be in a summary? A summary should not include your opinions about the subject matter or the author’s argumentative strategy. Even if you disagree with the text’s content, you must relay only its factual elements. DOs and DON’Ts for writing summaries: Do point out the author’s purpose for writing (Ex: to inform, to persuade). How do you start a summary sentence? The first sentence should provide the author and title of the article, as well as a clear restatement of the main idea. That is, in a single sentence, tell your reader what the article is called, who wrote it, and what the author is trying to say. Use your own words. How do you write a summary example? Example of a summary•Only the main points have been included.•The text is shortened without losing the essence of the material.•The summary writer’s own words are used.•Technical terms do not change.•Reporting verbs are used to discuss the text (i.e. suggests, contends, argues)•An In-text citation is provided.More items…•Mar 24, 2021 What are the types of summary? There are two primary types of summary: Descriptive and evaluative. As with many types of writing, not all summaries will fit perfectly into one of these categories, but these descriptions can help you know where to start when writing a summary.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '163', 'language_id_whole_page_fasttext': "{'en': 0.9309687614440918}", 'metadata': "{'Content-Length': '38331', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3MRLMNI3UGCEB7LZS3C4KNMPBGYDKCG7', 'WARC-Concurrent-To': '<urn:uuid:f29fc7b9-4c3e-4456-ab5e-827c40aff29a>', 'WARC-Date': datetime.datetime(2021, 5, 11, 6, 32, 22), 'WARC-IP-Address': '193.200.73.184', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:QGJROVYM6TOGYNYHYDZ2RLWFOVT2RLK6', 'WARC-Record-ID': '<urn:uuid:ff985ec2-598f-4a5c-b7c8-dcebf0601839>', 'WARC-Target-URI': 'https://ronparsonswriter.com/qa/question-is-a-summary-a-5-sentence.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d3b5e83f-0b7d-4763-befd-f7f67acc7055>', 'WARC-Truncated': None}", 'previous_word_count': '940', 'url': 'https://ronparsonswriter.com/qa/question-is-a-summary-a-5-sentence.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-101.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9945164322853088', 'original_id': 'dae7e94246febb373ad033d2c2ab4bdaa327816b7eaab69c794926869423c572'}
Evictions, otherwise known by their more technical name unlawful detainers can be a burdensome part of real estate ownership.  Doing the unlawful detainer process on your own not only takes your time and energy, it often can lead expensive complications. If you find yourself needing eviction services, we are happy to take the stress off of your shoulders and provide you with efficient and cost-effective service so you can get back to making your property productive again. San-Diego-Business-Lawyer 3 Vicky P. Stephen C. Paul F. Martin R. Justin C. Anthony T. Doralice F. Garik M. Ron G. Daniela G. When Tenant’s Won’t Leave Quietly While every landlord hopes for tenants who pay their rent on time, don’t make trouble, and who stay for years or longer without complaint, every landlord sooner or later will face nightmare tenants who need to be evicted. These are the tenants who are habitually late with rent or don’t pay rent at all, who have the sheriff’s called to the residence repeatedly for domestic issues, refuse to follow the lease terms, use illegal substances and so on. These are the tenants that need to be removed with an unlawful detainer. Sometimes landlords will get lucky and these tenants will leave on their own without having to be evicted, or others will leave with gentle prodding, but when they don’t—that’s when the true misery begins. It is best to consult us immediately when it seem like a tenant is going down the road of refusing to pay rent or breaching the rental contact because we can negotiate a preventative move-out and prevent you from suffering significant distress and loss of profits. However, we also are happy to provide diligent eviction services for tenants who have already reached the point of no return. Problem Tenants: Legal Justifications for Getting Them Out                   Due to the large number of lease types (residential, commercial, agricultural, etc.) there are countless types of lease provisions which tenant’s might breach and force you as a landlord to seek their removal from your property. However there are a couple of common reasons you might want a tenant evicted such as failure to pay rent, failure to leave after expiration of a fixed term lease or after a 30 day notice (tenancy under a year) or 60 day (tenancy of a year or more), refusal to comply with a 3 day notice to comply with a lease term, or failure to leave after a 3 day notice to quit due to illegal tenant activities (e.g. drug use). In any of these cases a landlord should take care to seek legal advice prior to embarking on the difficult eviction process because the reason for eviction determines the type of notice and procedures needed to ensure the process goes smoothly. Missteps regarding the type of notice or other actions such as accepting even one dollar of partial rent can derail the entire eviction process and require you as landlord to start over. This costs you lost rents, court costs, gives tenants longer to damage the premises and gives you undue stress and frustration. While we cannot eliminate the inconvenience and unpleasantness associated with getting rid of a problem tenant, we can minimize it and ensure your unlawful detainer doesn’t last any longer than necessary.Labor-Board-Hearing Navigating the Eviction Process Minefield While it is your tenant who has acted wrongfully, you as landlord are always at risk of being hung up or sued for accidentally overlooking some obscure technicality when they try to evict problem tenants. This is why you should always turn to legal counsel prior to taking any actions in an eviction which may expose you to liability. As an example, some landlords may believe they can engage in what courts call “self help” to get a tenant to leave without going through with an unlawful detainer. These “self help” actions include but are not limited to turning off a tenant’s utilities, threats, attempts to physically remove and others. These actions can lead to big money lawsuits against you for wrongful eviction, assault, libel, trespass, intentional infliction of emotional distress, etc. Aside from risking being sued, performing an eviction without legal counsel can lead to the unlawful detainer taking far longer than you would probably like. Seemingly minor errors can lead to the entire eviction being thrown out which would force you to endure starting the process all over again which can take weeks or longer depending on the length of the notice required. One such common error is misstating the rent due in the unlawful detainer paperwork—an error of even a dollar can cause the judge to dismiss your case. The Eviction Process If a deal cannot be negotiated to get a difficult tenant out of your unit, we will submit and serve the proper unlawful detainer documents to the tenant and anyone else residing in the unit. Prior to drafting and serving any eviction papers we will ensure that the proper type of notice was provided to the tenant and that the notice contained the correct information as determined by the circumstances of your particular eviction. If for whatever reason the eviction notice served by you or your property manager is incorrect, we will provide you with the information a corrected notice should contain so you don’t have to suffer losing the eviction lawsuit. After the appropriate notice time expires we will draft the summons and complaint and ensure that it contains the correct information.  The summons provides the tenant and anyone living in the unit with notice that there is an eviction suit pending, and allows them the legally required notice that they can defend the suit if they wish. It is highly important that the summons contains the appropriate language regarding unknown occupants, since if it does not these persons could seek to challenge the eviction suit based on a lack of notice.san-diego-real-estate-lawyer The complaint contains the information the court needs to determine why the tenant is being evicted, how much rent is due (if any) and other miscellaneous details they need to properly proceed with the case. Once these documents and any other documents required by your specific case are completed we file the original with the court and keep a copy to serve on the tenant. We will refer you to a professional process server or inform your property manager regarding the proper method of service of the eviction documents. The rules regarding correct service of the summons and complaint are very specific and incorrect service can derail your eviction and cost you valuable time and money or even lead to harsher consequences if there is evidence of bad faith or overly aggressive conduct. Once the unlawful detainer documents have been filed and served we must wait five calendar days (or longer if there are court holidays or if the last day is a weekend day) in order to see if the tenant decides to answer the eviction suit or not. Some of the time tenants may decide they are not willing to fight the eviction and will leave before the five days are over, which of course saves you time and money and is better than their filing an answer. Other times the tenant will not file an answer to the unlawful detainer, but will still remain in the unit. While not as ideal as the case where the tenant simply moves out, this situation allows you to file papers with the court which cause the tenant to automatically lose the eviction suit. In the event the tenant does file an answer to the eviction suit, we will need to prepare for the possibility that the tenant will show up for the unlawful detainer hearing. This hearing will occur within 21 days after the tenant files their answer to the eviction. Often tenants will not show up to the court at all and we are then able to file papers to win the eviction automatically. Other times tenants will show up to the court but will be prepared to negotiate a move-out instead of being forcefully evicted. We can file documents with the court to ensure that in event the tenant does not comply with the settlement agreement that they are evicted from the unit without having to start the process over again. In the event you decide to retain a tenant on condition they pay past due rent or leave by a certain date, we can file papers with the court so they could be evicted without restarting the suit. When Evictions Go to Trial Some tenants refuse to negotiate at any time during the eviction process and will force you to go to trial in order to get them out. When this happens you are very likely to face at least some resistance from the tenant in the form of what are called affirmative defenses—basically claims the tenant has to prove in order to reduce or eliminate their responsibility for rent, or even seek damages from you. In these instances it is very important that you are able to successfully disprove the tenants claims in order to evict them and prevent any negative consequences for you.Labor-Board-Hearing We will provide you with professional representation in the eviction hearing and ensure that the tenant is held to task for any and all defenses they may raise so that you can get them out and get on with business. Commercial Property Evictions Evictions or disputes with commercial tenants have different rules and requirements, and you may have more rights as a landlord in these cases. That said, these types of eviction cases can involve more complicated issues and you as a landlord might want to seek more involved damage awards than are typically sought or awarded in residential evictions. We have experience dealing with commercial property issues and with negotiating with tenants regarding the failure to pay rent and other issues, so that you can prevent having to resort to an eviction in the first place. Successfully Evicting Tenants in Bankruptcy Occasionally, landlords might face a curveball when trying to evict a deadbeat tenant when a tenant files for bankruptcy. As you may know bankruptcies prevent creditors from attempting any further collections of debt, and landlords seeking evictions are included in this restriction on creditors. Unless you follow the correct procedures when trying to evict a bankrupt tenant you may find yourself in hot water with the bankruptcy court. To proceed with an eviction against a bankrupt tenant we will submit the proper documents on your behalf to get the bankruptcy court to allow you to continue with the eviction and get your space rented again. If you’re having difficulty with a tenant who simply won’t pay, won’t comply or who is unruly or doing something illegal it would be best for you to give us a call before things get out of hand to save yourself time and money. We’re happy to help you evict problem tenants so you can get your units back to positive cash flow status.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '358', 'language_id_whole_page_fasttext': "{'en': 0.9592774510383606}", 'metadata': "{'Content-Length': '96887', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OGLFVQHOLAHLSJRPVE73C6UKRHSIGOCN', 'WARC-Concurrent-To': '<urn:uuid:ff6cf0fe-c380-47e5-bb1b-b8a99fc516be>', 'WARC-Date': datetime.datetime(2019, 4, 19, 0, 41, 54), 'WARC-IP-Address': '98.142.109.186', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3ZJM5R4QUW7BMDFYG5BBQ3CQJ75PMXW2', 'WARC-Record-ID': '<urn:uuid:3ae01fa5-71ad-4c7e-8ecf-3bf8fa2f4518>', 'WARC-Target-URI': 'https://www.sandiegobizlaw.com/san-diego-unlawful-detainer/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:90f91be4-e3ca-4a9b-848e-fa48e6fba690>', 'WARC-Truncated': None}", 'previous_word_count': '2262', 'url': 'https://www.sandiegobizlaw.com/san-diego-unlawful-detainer/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-97-181-44.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14543676376342773', 'original_id': '4d136e4040462276bc0113233dd7049f71c0e640d636cdc6fa79602952354d13'}
<div class="row"> <div class="twelve columns"> <h2>Tree - expandNode() / collapseNode()</h2> <br/><br/> <button type="button" id="btn-toggle-node" class="btn-secondary"><span class="btn-text">Toggle Node</span></button> <button type="button" id="btn-toggle-all" class="btn-secondary"><span class="btn-text">Toggle All</span></button> </div> </div> <div class="row top-padding"> <div class="twelve columns"> <ul role="tree" aria-label="Asset Types" class="tree" data-init="false" id="json-tree"> </ul> </div> </div> <script id="test-script"> var sampleData = [{ "id": "node1", "text": "Node One", "open": false, "selected": false, "href": '/somelink/' }, { "id": "node2", "text": "Node Two", "open": true, "selected": false, "children": [{ "id": "node3", "text": "Node Three" }, { "id": "node4", "text": "Node Four", "children": [{ "id": "node5", "text": "Node Five", "children": [{ "id": "node6", "text": "Node Six", "icon": "icon-tree-chart", "children": [{ "id": "node7", "text": "Node Seven" }, { "id": "node8", "text": "Node Eight" }] }] }] }] }]; var treeElem = $('#json-tree'); // Initialize tree treeElem .tree({ dataset: sampleData }) .on('selected', function (e, args) { console.log('selected:', args); }); // Get tree Api var treeApi = treeElem.data('tree'); var btnToggleNode = $('#btn-toggle-node'); var btnToggleAll = $('#btn-toggle-all'); var btnToggleNodeTextElem = btnToggleNode.find('.btn-text'); var btnToggleAllTextElem = btnToggleAll.find('.btn-text'); // Set target node var node = $('#node5'); // Get target node text var nodeText = node.find('.tree-text').text(); // Get node state collapsed/expanded var isExpanded = { node: function () { return node.attr('aria-expanded') === 'true'; }, all: function () { var all = treeElem.find('ul.folder'); var open = treeElem.find('ul.folder.is-open'); return all.length === open.length; } }; // Set button text based on current state var setButtonText = function () { var toggleText = { node: (isExpanded.node() ? 'Collapse' : 'Expand') + ' (' + nodeText + ')', all: isExpanded.all() ? 'Collapse All' : 'Expand All' }; btnToggleNodeTextElem.text(toggleText.node); btnToggleAllTextElem.text(toggleText.all); }; // Initialize tree the button text setButtonText(); // Bind toggle button text on collapsed/expanded treeElem.on('collapsed expanded', function () { setTimeout(function() { setButtonText(); }, 300); // wait for animation }); // Bind toggle node button on click btnToggleNode.on('click', function() { if (treeApi) { if (isExpanded.node()) { treeApi.collapseNode(node); // Pass node as jQuery element // treeApi.collapseNode('node5'); // Pass nodeID as string // node.collapse(); // Run on node (jQuery element) } else { treeApi.expandNode(node); // Pass node as jQuery element // treeApi.expandNode('node5'); // Pass nodeID as string // node.expand(); // Run on node (jQuery element) } } }); // Bind toggle all button on click btnToggleAll.on('click', function() { if (treeApi) { if (isExpanded.all()) { treeApi.collapseAll(); } else { treeApi.expandAll(); } setButtonText(); } }); </script>
the_stack
{'hexsha': '682854cd36b09a76a3626424a37f7f246a8e4d72', 'size': '3657', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'app/views/components/tree/test-expand-collapse-node.html', 'max_stars_repo_name': 'whernebrink/enterprise', 'max_stars_repo_head_hexsha': '7353b9a32d7a29def5dd0bf41f1c31785c1cc66c', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '114', 'max_stars_repo_stars_event_min_datetime': '2018-05-02T15:55:30.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-02T10:39:18.000Z', 'max_issues_repo_path': 'app/views/components/tree/test-expand-collapse-node.html', 'max_issues_repo_name': 'whernebrink/enterprise', 'max_issues_repo_head_hexsha': '7353b9a32d7a29def5dd0bf41f1c31785c1cc66c', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '4461', 'max_issues_repo_issues_event_min_datetime': '2018-05-07T16:48:02.000Z', 'max_issues_repo_issues_event_max_datetime': '2022-03-31T16:01:46.000Z', 'max_forks_repo_path': 'app/views/components/tree/test-expand-collapse-node.html', 'max_forks_repo_name': 'whernebrink/enterprise', 'max_forks_repo_head_hexsha': '7353b9a32d7a29def5dd0bf41f1c31785c1cc66c', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '77', 'max_forks_repo_forks_event_min_datetime': '2018-05-08T02:46:06.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-02-22T04:00:41.000Z', 'avg_line_length': '27.2910447761', 'max_line_length': '119', 'alphanum_fraction': '0.5529122231', 'original_id': 'b495d66b138f81340916627768827c04d14d1447d89e9157d176f1a6b4b5b684'}
Dmitri Iakovlevitch Laptev (en ), né en 1701 et mort le , est un explorateur de l'Arctique et un vice-amiral russe. Biographie Dmitri Laptev est né dans le village de Bolotovo, près de Velikié Louki, en 1701. Bolotovo était une propriété de son père, Iakov Laptev. Le frère de Iakov, Prokofy Laptev, possédait un autre domaine dans les environs, appelé Pokarevo, où un cousin de Dmitri, Khariton Laptev, est né en 1700. Dmitri Laptev commence sa carrière dans la marine comme cadet en 1718. Il devient enseigne de vaisseau de deuxième classe en 1721, lieutenant en 1731 et lieutenant-major en 1733. Le commandement d'un navire de la Flotte de la Baltique lui est alors confié. Il incorpore la deuxième expédition du Kamtchatka en 1735 comme adjoint de Vitus Béring. En 1736, il est nommé chef d'un des groupes de la deuxième expédition du Kamtchatka. Bloqué le 11 août par les glaces aux commandes de l' Irkoutsk, il retourne à l'embouchure de la Léna le 6 septembre et écrit à Béring que selon les indigènes, la voie n'est jamais libre. Il se rend, avec l'autorisation de Béring, à Saint-Pétersbourg pour y faire son rapport. À l'été 1739, à Iakoutsk, il prépare avec son cousin Khariton Laptev, une nouvelle campagne et reprend la mer en juillet. Il passe la Iana et le détroit qui porte de nos jours son nom et arrive en septembre à l'embouchure de l'Indiguirka. Il hiverne alors à et entreprend de vastes relevés de la région. Un canal est creusé pour continuer l'exploration mais le navire est bloqué devant le fortin de Nijné-Kolymsk. En juillet 1741, il tente une nouvelle percée qui échoue au même endroit. À pied, il quitte Nijné-Kolymsk le 27 octobre et rejoint Anadyrsk à la mi-novembre. Il décrit la côte entre la Léna et le cap Bolchoï Baranov (à l'est de l'embouchure de la Kolyma), le bassin et l'embouchure de l'Anadyr et la route terrestre de la forteresse d'Anadyr à la baie de Penjinskaïa. Il fait aussi le relevé de la Bolchoï Aniouï et de l'Anadyr. De retour à Yakoutsk en mars 1743, après l'expédition, il continue sa carrière militaire dans la Flotte de la Baltique. Promu capitaine-commandeur en 1755, contre-amiral en 1756, il devient vice-amiral en 1762 et prend sa retraite la même année, le 30 avril. Un cap dans le delta de la Léna et un détroit entre l'île Grande Liakhov et le continent asiatique portent son nom. La mer des Laptev doit son nom à Dmitri Laptev et à son cousin Khariton Laptev. Notes et références Article connexe Nikita Chalaourov Liens externes Les cousins Laptev Naissance dans l'Empire russe Naissance en 1701 Décès en janvier 1771 Militaire de l'Empire russe Explorateur de l'Arctique Explorateur de l'Empire russe au XVIIIe siècle Explorateur de la Sibérie
common_corpus
{'identifier': 'https://fr.wikipedia.org/wiki/Dmitri%20Laptev', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'Dmitri Laptev', 'creator': 'https://fr.wikipedia.org/w/index.php?title=Dmitri Laptev&action=history', 'language': 'French', 'language_type': 'Spoken', 'word_count': '463', 'token_count': '816', '__index_level_0__': '6492', 'original_id': 'ab013f3f0af574500e676a1743e9b4aa1a294d7766296d79100163ddf271d0ce'}
Q: Get a SQLite row based on title and date I want to get a single row based on title and date. I have created some code, but i it correct? What are all the null-fields in the code? public Cursor getRecordFromMondayByTitleDate(String inpRowTitle, String inpRowDate) throws SQLException { Cursor mCursor = db.query(DATABASE_TABLE_MONDAY, new String[] {KEY_M_ROWID, KEY_M_TITLE, KEY_M_DATE, KEY_M_WEIGHT, KEY_M_SET_A, KEY_M_SET_B, KEY_M_SET_C, KEY_M_SET_D}, KEY_M_TITLE + "= '" + inpRowTitle + "'", null, KEY_M_DATE + "= '" + inpRowDate + "'", null, null, null); if (mCursor != null) { mCursor.moveToFirst(); } return mCursor; } My database table DATABASE_TABLE_MONDAY layout is the following: private static final String DATABASE_CREATE_TABLE_MONDAY = "create table if not exists " + DATABASE_TABLE_MONDAY + " (m_id integer primary key autoincrement, " + "m_title VARCHAR not null, m_date date, m_weight DOUBLE, m_set_a INT, m_set_b INT, m_set_c INT, m_set_d INT);"; Thanks for the help! A: I believe your query should look more like this: db.query(DATABASE_TABLE_MONDAY, new String[] {KEY_M_ROWID, KEY_M_TITLE, KEY_M_DATE, KEY_M_WEIGHT, KEY_M_SET_A, KEY_M_SET_B, KEY_M_SET_C, KEY_M_SET_D}, KEY_M_TITLE + "='" + inpRowTitle + "' AND " + KEY_M_DATE + "='" + inpRowDate + "'", null, null, null, null); Your table and columns parameters were correct. The third parameter, the selection parameter, is essentially the WHERE clause from SQL, so you want both your title and date specified here. The fourth parameter is selectionArgs, and is there to "help" with coding the selection. If you specify a selection with question marks, the question marks are replaced, in order, with the values in the array you provide. Using selectionArgs is not necessary, and you can pass null if your selection is written in full. After that, the parameters specify how you want the query returned to you, and all may be passed a null value. The fifth is groupBy, and corresponds to the SQL clause GROUP BY. The sixth corresponds to HAVING, the seventh to ORDER BY. The last parameter is limit, and just puts a cap on how many records a query returns. If you don't need to limit your query, you can just omit this parameter, as there is a query() method without limit. If you're unfamiliar with SQL, you may want to do a little studying to know what each of those clauses does for your query.
mini_pile
{'original_id': '1fd74547151ce0c343fc93b4ee598e5c2787deebd99ce4d9eaee3530508429a2'}
Skip over navigation Oliver Cromwell Cromwell's Youth Important Terms, People, and Events A Farmer and Backbench Reformer Oliver Cromwell was born in a small English country estate called Huntingdon in East Anglia on April twenty-five, 1599. Of his origins, Cromwell himself wrote, "I was by birth a gentleman, living neither in any considerable height, nor yet in obscurity." Oliver's father was Robert Cromwell, a gentleman and the younger son of Sir Henry Cromwell, the "Golden Knight of Hinchbroke." Sir Henry Cromwell was himself the grandnephew of the famous Thomas Cromwell, the chief architect of King Henry VIII's political and religious reformation. Cromwell's mother was Elizabeth Steward, whose family had acquired lands confiscated by Henry VIII from the Roman Catholic Church during the sixteenth century. Very few details are known about Cromwell's early years. Biographer Barry Coward writes that all we have are a "tiny handful of disconnected 'facts'–the equivalent of the archaeologist's pieces of broken pottery." Together with such "facts" are many myths about Cromwell's upbringing that were probably invented by Cromwell's royalist opponents after his death in 1658. One of the more amusing of these myths holds that when King James I visited the estate of Oliver's rich uncle in 1603, the four-year-old Oliver Cromwell bloodied the nose of the toddler who would later become King Charles I. One of the better- established circumstances of Cromwell's upbringing is that his mother Elizabeth had great influence on her young son. In addition to this strong female influence in Cromwell's life, the young Cromwell also had seven sisters. Cromwell grew to be an athletic, boisterous boy who enjoyed playing practical jokes. He received his boyhood education from a Puritan minister by the name of Thomas Beard. Dr. Beard was rector of the local parish, as well as the headmaster of the local school and the author of several plays and theological tracts. One of those treatises, which Cromwell very likely read, was called The Theatre of God's Judgments. Later, in 1625, Beard wrote a tract that attempted to prove that the Catholic pope was the antichrist. It is unknown, however, exactly how much of Beard's Puritan beliefs were passed on to the young Cromwell. Some historians tend to doubt that Cromwell developed any deep religious fervor at this stage of his life. On the other hand, he was taught from an early age to detest Roman Catholicism as a corrupt, superstitious, and politically dangerous form of Christianity. In 1616, the seventeen-year-old Oliver Cromwell packed his bags to attend Sidney Sussex College at the University of Cambridge. The faculty of Sidney Sussex was notable for being the Puritan stronghold among the Cambridge schools; its Master from 1610 to 1643, Samuel Ward, was a well-known Calvinist, one of the strictest Protestant sects. While at school Oliver seems to have excelled at mathematics, though early biographers report that he was more serious about athletics than his schoolwork. Cromwell's education was cut short by his father's death in June 1617. As Robert Cromwell's only son, Oliver Cromwell became the legal heir and master of Huntingdon. It is unknown if he ever returned to Cambridge, although it is certain that he never took a degree there. It is also possible that during the three years following his father's death, Oliver studied law for a time at the Inns of Court in London. He may also have gone abroad to fight in the Thirty Years' War, a religious conflict that ravaged much of Europe from 1618 to 1648. However, no definite traces of his whereabouts during these years exists. Cromwell's whereabouts come to light once again with the record of his marriage to a certain Elizabeth Bourchier on August twenty-two, 1620. The wedding took place at St Giles's Church in Cripplegate. Elizabeth was the daughter of a wealthy, knighted London merchant who was in the fur and leather trade, and her family connections were beneficial to the twenty-one-year-old Cromwell. Elizabeth's cousins, the Barringtons, were a powerful family in the English political scene. Cromwell biographer Christopher Hill writes that Cromwell's marriage "brought him closer to the heart of the powerful group which was to lead the Parliamentary opposition" to King Charles I and the Royalists during the English Civil War. For the moment, however, Cromwell settled in with his bride at Huntingdon and began raising a family. He and Elizabeth would have eight children between the years 1621 and 1638. More Help Previous Next Follow Us
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '37', 'language_id_whole_page_fasttext': "{'en': 0.985399067401886}", 'metadata': "{'Content-Length': '63211', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PDMM57YQ4UZJ5WOA352VHEIQWMNCYSH2', 'WARC-Concurrent-To': '<urn:uuid:70a8d555-404c-46f0-911d-66b4b12a9e7a>', 'WARC-Date': datetime.datetime(2015, 1, 25, 3, 51, 59), 'WARC-IP-Address': '23.202.255.124', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:ASRNWMHG5SPTVOERF5DGDZNQ7IDXM2NC', 'WARC-Record-ID': '<urn:uuid:0f279422-26eb-446c-9dca-73257255cc47>', 'WARC-Target-URI': 'http://www.sparknotes.com/biography/cromwell/section1.rhtml', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:06c5c44c-af17-4c15-bb7f-17243e16a79a>', 'WARC-Truncated': None}", 'previous_word_count': '767', 'url': 'http://www.sparknotes.com/biography/cromwell/section1.rhtml', 'warcinfo': 'robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02149122953414917', 'original_id': '01d436619b6105848fcc236ec33671f73a29c8f5c5f743d09ed6482fba5ee176'}
Best Tips For Getting Loans Approved While Having Bad Credit Tips For Getting Loans Ask yourself if bad credit will haunt you? If you’re already having goosebumps while answering the question, it probably will. Otherwise, there’s a good chance that not only can you improve the score but also get loans approved while having a worse than an expected credit report. All those who are still afraid of not getting enough opportunities for loans while having bad credit, this article is for you. It’s a list of top tips you can follow to get your loan approved instantly. However, some tips might not be easy to follow. You might not even know some of them, while some might be too obvious. But first, let’s help you understand the importance of mortgage financing in your life. Importance of Mortgage Financing Everyone wants to improve their standard of living. And the first step towards that is adequate finance. Your income is never enough to fulfill your dreams right away. Mortgage financing is one way to do it. If you can get your loans approved instantly, and you can repay in time, it’s probably the best way. That is why we recommend you to give you an entire focus on this article if you have bad credit. How would your bad credit affect loan approval? Before we start with the tips, addressing this question is very important. As we mentioned above, if you have bad credit, it might hold you for life unless you take a step. However, we agree that every lender looks at your credit report at least once. He might charge you a higher interest rate and pose many formalities in the process of sanctioning the loan. We can still assure you that your loans can be accrued within time. The amount can be as much as you want as long as you follow the next few tips. Poor Credit Mortgage Approval Tips Be ready to pay a larger down payment A larger down payment means to show the lender that you can put some money towards your loan. For example, when you want to buy a car, a certain percentage is given as a down payment while you pay installments for the other. This down payment has to be higher to cope up with that bad credit report. To pay a higher down payment, you need to cut some expenses and increase your monthly savings. It’s the best solution if you want to fulfill your need/want right away. And of course, you need to be regular in your installment payments as well. Act towards the betterment of your credit report Another tip is to make sure your credit report shows your true self. Any wrong negative information can ruin your lawn opportunity. If you can file a dispute after assessing the reason why that information was present in your credit report, it will help you make it better. Your credit score is the ultimate number that lenders see. Their procedure for sanctioning the loan depends on the score. Make sure you have the backing of a credit repair service if you want to avoid bad credit mortgage loans at a higher interest rate. Consult a credit counselor Credit counselors have the experience of analyzing different situations. Your complicated situation of getting a loan approved while having bad credit is also one of them. Credit counselors can review the details of your financial situation and suggest a way forward. You can have the most personalized advice go get your life on the right track financially. Try credit consolidation One reason for your bad credit is irregularities in paying back debt. To resolve that issue, you can opt for credit consolidation. It means to consolidate all your loans and create one installment that you have to pay monthly. It doesn’t reduce your debt but makes it less complicated. It’s like you’re making a one-time payment for all your installments, and consequently, your credit score is improving. Analyze your track record of on-time payments When lenders check your credit report, they resort to an automated underwriting system. It generally takes into account all your latest late payments. If you have an extensive history of late payments, make sure you take care of the ones you did in the last 6 months. If you can minimize that impact, you’ll probably get your loan approved. However, this is no excuse for you having a late payment history. Make sure you play all your installments on time, not because it affects your credit report but because it’s your obligation. With these five tips and some information about getting loans approved while having bad credit, you probably can move in the right direction. Also, all these options are viable if you have the backing of bad credit mortgage lenders. They look for people with bad credit and land them on their own terms and conditions. It’s a good option if you need instant approval. For more articles visit this website. Show More Techni Expert Related Articles Leave a Reply Back to top button
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '42', 'language_id_whole_page_fasttext': "{'en': 0.9604809284210204}", 'metadata': "{'Content-Length': '117127', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2DOCKFN52VGWCFNO33XWEA4YLUWBSCSI', 'WARC-Concurrent-To': '<urn:uuid:a18ddb6b-c236-4776-9585-3fcbab34880c>', 'WARC-Date': datetime.datetime(2021, 9, 28, 9, 57, 58), 'WARC-IP-Address': '104.21.24.180', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:YT6DWAYJIJ7V6YHYJ52SXSP7PC4JRFL4', 'WARC-Record-ID': '<urn:uuid:0616cf1b-7d63-458d-b9f1-4012260b9a0f>', 'WARC-Target-URI': 'https://techniexpert.com/best-tips-for-getting-loans-approved-while-having-bad-credit/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f4bfdc12-2a2f-4de9-9294-a1b0653f05e4>', 'WARC-Truncated': None}", 'previous_word_count': '907', 'url': 'https://techniexpert.com/best-tips-for-getting-loans-approved-while-having-bad-credit/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-142\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019095122814178467', 'original_id': 'd15e4c0b24b13c6240f758d0807a6df9d2b7e5b050c081a5d5199a6f57cd3052'}
<?xml version="1.0" encoding="UTF-8"?> <Scheme LastUpgradeVersion = "0700" version = "1.3"> <BuildAction parallelizeBuildables = "YES" buildImplicitDependencies = "YES"> <BuildActionEntries> <BuildActionEntry buildForTesting = "YES" buildForRunning = "YES" buildForProfiling = "YES" buildForArchiving = "YES" buildForAnalyzing = "YES"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9DF43E541965A8E3005D9BA1" BuildableName = "Performing a Task Only Once.app" BlueprintName = "Performing a Task Only Once" ReferencedContainer = "container:Performing a Task Only Once.xcodeproj"> </BuildableReference> </BuildActionEntry> </BuildActionEntries> </BuildAction> <TestAction selectedDebuggerIdentifier = "Xcode.DebuggerFoundation.Debugger.LLDB" selectedLauncherIdentifier = "Xcode.DebuggerFoundation.Launcher.LLDB" shouldUseLaunchSchemeArgsEnv = "YES" buildConfiguration = "Debug"> <Testables> <TestableReference skipped = "NO"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9DF43E661965A8E3005D9BA1" BuildableName = "Performing a Task Only OnceTests.xctest" BlueprintName = "Performing a Task Only OnceTests" ReferencedContainer = "container:Performing a Task Only Once.xcodeproj"> </BuildableReference> </TestableReference> </Testables> <MacroExpansion> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9DF43E541965A8E3005D9BA1" BuildableName = "Performing a Task Only Once.app" BlueprintName = "Performing a Task Only Once" ReferencedContainer = "container:Performing a Task Only Once.xcodeproj"> </BuildableReference> </MacroExpansion> <AdditionalOptions> </AdditionalOptions> </TestAction> <LaunchAction selectedDebuggerIdentifier = "Xcode.DebuggerFoundation.Debugger.LLDB" selectedLauncherIdentifier = "Xcode.DebuggerFoundation.Launcher.LLDB" launchStyle = "0" useCustomWorkingDirectory = "NO" buildConfiguration = "Debug" ignoresPersistentStateOnLaunch = "NO" debugDocumentVersioning = "YES" debugServiceExtension = "internal" allowLocationSimulation = "YES"> <BuildableProductRunnable runnableDebuggingMode = "0"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9DF43E541965A8E3005D9BA1" BuildableName = "Performing a Task Only Once.app" BlueprintName = "Performing a Task Only Once" ReferencedContainer = "container:Performing a Task Only Once.xcodeproj"> </BuildableReference> </BuildableProductRunnable> <AdditionalOptions> </AdditionalOptions> </LaunchAction> <ProfileAction shouldUseLaunchSchemeArgsEnv = "YES" savedToolIdentifier = "" useCustomWorkingDirectory = "NO" buildConfiguration = "Release" debugDocumentVersioning = "YES"> <BuildableProductRunnable runnableDebuggingMode = "0"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9DF43E541965A8E3005D9BA1" BuildableName = "Performing a Task Only Once.app" BlueprintName = "Performing a Task Only Once" ReferencedContainer = "container:Performing a Task Only Once.xcodeproj"> </BuildableReference> </BuildableProductRunnable> </ProfileAction> <AnalyzeAction buildConfiguration = "Debug"> </AnalyzeAction> <ArchiveAction buildConfiguration = "Release" revealArchiveInOrganizer = "YES"> </ArchiveAction> </Scheme>
mini_pile
{'original_id': '6b9c9b359af2ea0fa66b0872e59204fc194774b6bb1777b87dda503528390d45'}
Crowds, Security May Cause Air Travel Woes This Summer WASHINGTON (AP) -- Anyone who took an early flight for a Memorial Day getaway has already gotten a taste of what summer air travel will be like: full planes, crowded airports and weather delays. Airlines said they carried more passengers than usual Thursday, the kickoff of the summer season. Flights were delayed to some of the biggest airports - Chicago O'Hare, Boston Logan, Newark, N.J., New York LaGuardia and Fort Lauderdale, Fla. - according to the Federal Aviation Administration. ''We had small pockets of weather to contend with in the Northeast and some wind at O'Hare, but overall we got off to a good start,'' said FAA spokesman Greg Martin. Things went more smoothly in the West, where America West airline has hubs in Phoenix and Las Vegas. ''Everything's going great, we have a really good on-time performance,'' said America West spokesman Phil Gee. Aviation experts predict the upcoming vacation season could rival 2000, the worst ever for flight delays, cancellations and cranky travelers crammed into airports. Takeoffs are now returning to pre-Sept. 11, 2001, levels, and millions of tickets have already been sold. Security-related delays are a concern, and so is one thing that no one controls: Mother Nature. Hot, humid air produces summer thunderstorms, typically in a zone that stretches from Texas to Michigan. They're too high to fly over, too dangerous to fly through and often too wide to fly around. At hub airports - especially O'Hare - bad weather can combine with huge numbers of passengers to cause delays that cascade through the entire system. That's what happened in 2000, forcing thousands of passengers to sleep on terminal floors or sit fuming while their planes lingered on runways for hours. Much has been done to improve things since then. Airports have added runways and terminals and improved efficiency, and the FAA has adopted new strategies. But the system has yet to be tested during a bad thunderstorm season, and the signs so far aren't encouraging. The Memorial Day rush at Washington Dulles International Airport began early Thursday afternoon as security lines suddenly ballooned to thousands of travelers. Many took advantage of cheap ticket prices. The average airfare for a 1,000-mile flight is now $118, 20 percent lower than it was in 2000, according to Transportation Department Inspector General Kenneth Mead. Bargain airfares allowed Nancy Cross, a physician's assistant from Ashburn, Va., to take her husband and two stepdaughters with her to Orlando, Fla., where she was attending a medical conference. Cross couldn't believe the security line. ''I can't even see where it begins,'' she said, standing on tiptoes. For the first 10 weeks of this year, slightly more flights were delayed, and delayed longer, than they were during the same period in 2000. Most delays were caused by weather. Mead said Thursday that six airports are likely to experience delays this summer: Philadelphia, LaGuardia, Newark, Dulles, Atlanta and Fort Lauderdale. To avoid massive weather disruptions throughout the whole system, the FAA has planned alternate routes based on where storms are likely to develop. Faster and more accurate weather prediction equipment allows air traffic controllers and the airlines to respond more quickly to changes in weather systems. The FAA, though, can't control the volume of passengers or delays caused by understaffing at the airlines. In 2000, there were 698.9 million passenger boardings of commercial planes in the United States, according to the FAA. In 2004, there were almost as many - 698.7 million - and that number is expected to rise in 2005. Cash-strapped air carriers slashed their work forces in the past few years to save money. U.S. airlines cut 81,717 jobs between July 2000 and July 2004, and another 16,990 by February, leaving a total of 400,253 full-time equivalent workers, according to the Bureau of Transportation Statistics. Understaffing was responsible for more than 500,000 US Airways passengers being delayed during the December holidays, according to a report issued by Mead. The report criticized the way US Airways Group Inc. handled the shortages of fleet service employees and flight attendants, particularly in Philadelphia. US Airways spokeswoman Amy Kudwa said the airline is adding staff in key hubs - Washington, Philadelphia and Charlotte, N.C. - as part of a renewed focus on on-time performance. The airline is also working to get flights off the gate and in the air on time by doing things like closing the aircraft door five minutes before departure. To avoid a repeat of 2000, several airlines have altered their schedules to eliminate rush-hour traffic jams at hub airports. The FAA also has ordered airlines to reduce their schedules at O'Hare - a hub for both American and United Airlines - during peak travel periods. The move has helped reduce congestion, Mead said.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '22', 'language_id_whole_page_fasttext': "{'en': 0.9661121964454652}", 'metadata': "{'Content-Length': '52304', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:AAK3Q47UMX23ONPKFZU2ESVAZBBEQ64E', 'WARC-Concurrent-To': '<urn:uuid:d04ee04c-b9c8-4bd4-b068-6737aebd66cf>', 'WARC-Date': datetime.datetime(2014, 8, 2, 7, 33, 41), 'WARC-IP-Address': '208.86.102.222', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:5BYOP5B5SXLJV4NNVVSELFTU3GBKCYMO', 'WARC-Record-ID': '<urn:uuid:12af48b7-ea8c-4cc1-abc7-d69578f44b8d>', 'WARC-Target-URI': 'http://www.aviationpros.com/news/10435014/crowds-security-may-cause-air-travel-woes-this-summer', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:20243c86-e4ba-4430-ae23-3b58f2e097f0>', 'WARC-Truncated': 'length'}", 'previous_word_count': '784', 'url': 'http://www.aviationpros.com/news/10435014/crowds-security-may-cause-air-travel-woes-this-summer', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.026521027088165283', 'original_id': '62eeb159a000df46538004fba5c75431ae0d9e824898c34a0e5d06ec9c9b472b'}
Skip to Main Navigation Skip to Main Content 5 Questions to Ask Before Choosing a Fixed Indexed Annuity Travel to faraway lands. Fun with the grandkids. Freedom to engage in hobbies galore. These are some of the many benefits of retirement — and are often the ones people daydream about most. However, along with the joys of retirement comes the critical question: How do I actually get there from here? There are many options available for those planning for their golden years, but it could be difficult to decide on a course of action without the right information. These five questions could help you learn more about a fixed indexed annuity — which is one possible option — and determine if such an annuity is right for your needs. 1. What Is a Fixed Indexed Annuity? A fixed indexed annuity is a long-term investment product made for retirement savers. Like all annuities, a fixed indexed annuity is a tax-deferred savings product that can offer a guaranteed stream of income in retirement. You can purchase this annuity type by making either multiple premium payments over several years or one lump sum payment. During the accumulation period, the rate of return for this annuity type is tied to an investment index instead of a set interest rate. 2. What Are the Benefits? What could be better than a lifetime of financial security? Fixed indexed annuities have less risk during the accumulation phase, which means that the value of the annuity cannot decline due to market performance (although it could decline if you were to take a withdrawal). And fixed indexed annuities generally have higher rates of returns than certificates of deposit (CDs) or savings bonds — and less risk than stocks. Annuity payments are usually taxed as ordinary income. However, if you fund your annuity with a Roth individual retirement account (IRA) — i.e., with after-tax funds — and satisfy specific requirements, some or all of the annuity payments might not be subject to income tax. 3. When Can I Use a Fixed Indexed Annuity? Fixed indexed annuities are generally purchased several years before the purchaser intends to start withdrawing funds. They can be used to help build retirement or other savings to be drawn upon at the policyholder's option. They could also be annuitized, which creates a stream of fixed payments lasting for a lifetime, or a specific number of years. You can choose when you want to start receiving payments, which could be in retirement or a few years into it. 4. What Are the Different Rates? Fixed indexed annuity payment amounts are determined by the performance of the underlying index, the cumulative amount of premiums paid and the age of the annuitant when the annuity owner begins receiving payments (keep in mind the annuitant and annuity owner may or may not be the same person). The older the annuitant, the higher the payments. 5. Could It Be Right for You? Fixed income annuities could work for people in various life stages. Let's imagine you're a bit behind schedule on your retirement savings goals, but you've recently received an inheritance. Putting these funds into a fixed indexed annuity could give you the benefit of tax deferral on future earnings and help preserve your investment during the accumulation period. This protection could then allow you to take on a more aggressive investment strategy with your 401(k) or Roth IRA. Now, what if you're risk-averse with your investments? You may have heard that putting most of your money into CDs and savings bonds won't earn you much. Investing a portion of your retirement savings into a fixed indexed annuity could allow you to potentially earn a higher return without as much risk as other investment strategies. Are you concerned about outliving your retirement savings? By using this annuity type as a lifetime income stream a few years into your retirement, you could help protect against the risk of outliving your savings. On the other hand, if you're young and not too worried about the ups and downs of the stock market — and also don't want to tie your money up — a fixed indexed annuity might not be the right solution for you. Why? You might want to avoid having to pay a surrender charge should you decide to withdraw some of your savings for another purpose, like a down payment on a house. The fixed indexed annuity is anything but a one-size-fits-all product. But exploring what's on the racks could lead to a happy discovery. Ready to Continue? Are you ready to move forward?
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '164', 'language_id_whole_page_fasttext': "{'en': 0.9534536004066468}", 'metadata': "{'Content-Length': '219243', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UENPHGST3NASTHS43RTKGK3TRLKPENW6', 'WARC-Concurrent-To': '<urn:uuid:17ee45f1-1fc2-484c-824f-160c426ccb3f>', 'WARC-Date': datetime.datetime(2019, 5, 19, 19, 39, 31), 'WARC-IP-Address': '52.179.97.15', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AZMKVXX7TEFZAXLOJXJAPZTHX3MJFEJX', 'WARC-Record-ID': '<urn:uuid:a9798935-a06b-428d-97bb-bc5c5d5661b6>', 'WARC-Target-URI': 'https://www.westernsouthern.com/learn/financial-education/5-questions-to-ask-before-choosing-a-fixed-indexed-annuity', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:40fde431-adf4-401a-924f-266bbdc6fefc>', 'WARC-Truncated': None}", 'previous_word_count': '942', 'url': 'https://www.westernsouthern.com/learn/financial-education/5-questions-to-ask-before-choosing-a-fixed-indexed-annuity', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-47-182-244.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06159716844558716', 'original_id': 'a4124ee46af1f37fd93a885c9200311bbd272b34a2824d2683d022f7fd869907'}
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <title>Result System</title> <link href="//netdna.bootstrapcdn.com/bootstrap/4.2.0/css/bootstrap.min.css" rel="stylesheet" /> <style> body, html, .app { height: 100%; } .login-page { position: fixed; top: 50%; left: 50%; transform: translate(-50%, -50%); } .user-form { position: fixed; top: 50%; left: 50%; transform: translate(-50%, -50%); width: 40rem; } .edit-user { color: #00a9f2; text-decoration: none; cursor: pointer; } a { cursor: pointer; } .modal-mask { position: fixed; z-index: 9998; top: 0; left: 0; width: 100%; height: 100%; background-color: rgba(0, 0, 0, 0.4); display: table; transition: opacity 0.3s ease; box-shadow: 0px 16px 48px rgba(0, 0, 0, 0.25); border-radius: 8px; } .modal-wrapper { display: table-cell; vertical-align: middle; } .modal-container { width: 30rem; height: 22rem; margin: 0px auto; padding: 20px 30px; transition: all 0.3s ease; background: #ffffff; box-shadow: 0px 16px 48px rgba(0, 0, 0, 0.25); border-radius: 8px; font-family: Mulish; text-align: center; } .modal-header { display: block !important; border: none !important; margin-top: 3rem !important; } .modal-footer { border: none !important; text-align: center; display: block !important; } .modal-header h3 { text-align: center; font-style: normal; font-weight: 600; font-size: 24px; text-align: center; color: #000000; } .modal-default-button { background: rgba(226, 21, 74, 0.9); border-radius: 48px; color: white; height: 48px; border: none; width: 120px; } .modal-default-button:focus { outline: unset !important; } .btn-cancel { background: #ffffff; color: rgba(0, 0, 0, 1); } .btn-cancel:hover { background: rgb(0, 0, 0, 0.05); } .btn-delete:hover { background: rgba(226, 21, 74, 1); } .modal-enter { opacity: 0; } .modal-leave-active { opacity: 0; } .modal-enter .modal-container, .modal-leave-active .modal-container { -webkit-transform: scale(1.1); transform: scale(1.1); } fieldset[disabled] .multiselect { pointer-events: none } .multiselect__spinner { position: absolute; right: 1px; top: 1px; width: 48px; height: 35px; background: #fff; display: block } .multiselect__spinner:after, .multiselect__spinner:before { position: absolute; content: ""; top: 50%; left: 50%; margin: -8px 0 0 -8px; width: 16px; height: 16px; border-radius: 100%; border: 2px solid transparent; border-top-color: #41b883; box-shadow: 0 0 0 1px transparent } .multiselect__spinner:before { animation: spinning 2.4s cubic-bezier(.41, .26, .2, .62); animation-iteration-count: infinite } .multiselect__spinner:after { animation: spinning 2.4s cubic-bezier(.51, .09, .21, .8); animation-iteration-count: infinite } .multiselect__loading-enter-active, .multiselect__loading-leave-active { transition: opacity .4s ease-in-out; opacity: 1 } .multiselect__loading-enter, .multiselect__loading-leave-active { opacity: 0 } .multiselect, .multiselect__input, .multiselect__single { font-family: inherit; font-size: 16px; -ms-touch-action: manipulation; touch-action: manipulation } .multiselect { box-sizing: content-box; display: block; position: relative; width: 100%; min-height: 40px; text-align: left; color: #35495e } .multiselect * { box-sizing: border-box } .multiselect:focus { outline: none } .multiselect--disabled { background: #ededed; pointer-events: none; opacity: .6 } .multiselect--active { z-index: 50 } .multiselect--active:not(.multiselect--above) .multiselect__current, .multiselect--active:not(.multiselect--above) .multiselect__input, .multiselect--active:not(.multiselect--above) .multiselect__tags { border-bottom-left-radius: 0; border-bottom-right-radius: 0 } .multiselect--active .multiselect__select { transform: rotate(180deg) } .multiselect--above.multiselect--active .multiselect__current, .multiselect--above.multiselect--active .multiselect__input, .multiselect--above.multiselect--active .multiselect__tags { border-top-left-radius: 0; border-top-right-radius: 0 } .multiselect__input, .multiselect__single { position: relative; display: inline-block; min-height: 20px; line-height: 20px; border: none; border-radius: 5px; background: #fff; padding: 0 0 0 5px; width: 100%; transition: border .1s ease; box-sizing: border-box; margin-bottom: 8px; vertical-align: top } .multiselect__input:-ms-input-placeholder { color: #35495e } .multiselect__input::placeholder { color: #35495e } .multiselect__tag~.multiselect__input, .multiselect__tag~.multiselect__single { width: auto } .multiselect__input:hover, .multiselect__single:hover { border-color: #cfcfcf } .multiselect__input:focus, .multiselect__single:focus { border-color: #a8a8a8; outline: none } .multiselect__single { padding-left: 5px; margin-bottom: 8px } .multiselect__tags-wrap { display: inline } .multiselect__tags { min-height: 40px; display: block; padding: 8px 40px 0 8px; border-radius: 5px; border: 1px solid #e8e8e8; background: #fff; font-size: 14px } .multiselect__tag { position: relative; display: inline-block; padding: 4px 26px 4px 10px; border-radius: 5px; margin-right: 10px; color: #fff; line-height: 1; background: #41b883; margin-bottom: 5px; white-space: nowrap; overflow: hidden; max-width: 100%; text-overflow: ellipsis } .multiselect__tag-icon { cursor: pointer; margin-left: 7px; position: absolute; right: 0; top: 0; bottom: 0; font-weight: 700; font-style: normal; width: 22px; text-align: center; line-height: 22px; transition: all .2s ease; border-radius: 5px } .multiselect__tag-icon:after { content: "\D7"; color: #266d4d; font-size: 14px } .multiselect__tag-icon:focus, .multiselect__tag-icon:hover { background: #369a6e } .multiselect__tag-icon:focus:after, .multiselect__tag-icon:hover:after { color: #fff } .multiselect__current { min-height: 40px; overflow: hidden; padding: 8px 30px 0 12px; white-space: nowrap; border-radius: 5px; border: 1px solid #e8e8e8 } .multiselect__current, .multiselect__select { line-height: 16px; box-sizing: border-box; display: block; margin: 0; text-decoration: none; cursor: pointer } .multiselect__select { position: absolute; width: 40px; height: 38px; right: 1px; top: 1px; padding: 4px 8px; text-align: center; transition: transform .2s ease } .multiselect__select:before { position: relative; right: 0; top: 65%; color: #999; margin-top: 4px; border-color: #999 transparent transparent; border-style: solid; border-width: 5px 5px 0; content: "" } .multiselect__placeholder { color: #adadad; display: inline-block; margin-bottom: 10px; padding-top: 2px } .multiselect--active .multiselect__placeholder { display: none } .multiselect__content-wrapper { position: absolute; display: block; background: #fff; width: 100%; max-height: 240px; overflow: auto; border: 1px solid #e8e8e8; border-top: none; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; z-index: 50; -webkit-overflow-scrolling: touch } .multiselect__content { list-style: none; display: inline-block; padding: 0; margin: 0; min-width: 100%; vertical-align: top } .multiselect--above .multiselect__content-wrapper { bottom: 100%; border-bottom-left-radius: 0; border-bottom-right-radius: 0; border-top-left-radius: 5px; border-top-right-radius: 5px; border-bottom: none; border-top: 1px solid #e8e8e8 } .multiselect__content::webkit-scrollbar { display: none } .multiselect__element { display: block } .multiselect__option { display: block; padding: 12px; min-height: 40px; line-height: 16px; text-decoration: none; text-transform: none; vertical-align: middle; position: relative; cursor: pointer; white-space: nowrap } .multiselect__option:after { top: 0; right: 0; position: absolute; line-height: 40px; padding-right: 12px; padding-left: 20px; font-size: 13px } .multiselect__option--highlight { background: #41b883; outline: none; color: #fff } .multiselect__option--highlight:after { content: attr(data-select); background: #41b883; color: #fff } .multiselect__option--selected { background: #f3f3f3; color: #35495e; font-weight: 700 } .multiselect__option--selected:after { content: attr(data-selected); color: silver } .multiselect__option--selected.multiselect__option--highlight { background: #ff6a6a; color: #fff } .multiselect__option--selected.multiselect__option--highlight:after { background: #ff6a6a; content: attr(data-deselect); color: #fff } .multiselect--disabled .multiselect__current, .multiselect--disabled .multiselect__select { background: #ededed; color: #a6a6a6 } .multiselect__option--disabled { background: #ededed!important; color: #a6a6a6!important; cursor: text; pointer-events: none } .multiselect__option--group { background: #ededed; color: #35495e } .multiselect__option--group.multiselect__option--highlight { background: #35495e; color: #fff } .multiselect__option--group.multiselect__option--highlight:after { background: #35495e } .multiselect__option--disabled.multiselect__option--highlight { background: #dedede } .multiselect__option--group-selected.multiselect__option--highlight { background: #ff6a6a; color: #fff } .multiselect__option--group-selected.multiselect__option--highlight:after { background: #ff6a6a; content: attr(data-deselect); color: #fff } .multiselect-enter-active, .multiselect-leave-active { transition: all .15s ease } .multiselect-enter, .multiselect-leave-active { opacity: 0 } .multiselect__strong { margin-bottom: 8px; line-height: 20px; display: inline-block; vertical-align: top } [dir=rtl] .multiselect { text-align: right } [dir=rtl] .multiselect__select { right: auto; left: 1px } [dir=rtl] .multiselect__tags { padding: 8px 8px 0 40px } [dir=rtl] .multiselect__content { text-align: right } [dir=rtl] .multiselect__option:after { right: auto; left: 0 } [dir=rtl] .multiselect__clear { right: auto; left: 12px } [dir=rtl] .multiselect__spinner { right: auto; left: 1px } @keyframes spinning { 0% { transform: rotate(0) } to { transform: rotate(2turn) } } </style> </head> <body> <div id="app"></div> </body> </html>
the_stack
{'hexsha': '6e51052a3dddf84bef32c6dd56ce7a3eba0bbfc3', 'size': '16018', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'src/index.html', 'max_stars_repo_name': 'sumn2u/result-system-exam', 'max_stars_repo_head_hexsha': 'abc46276d9b30f411e3d4350ddb842db8ba5f3e4', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'src/index.html', 'max_issues_repo_name': 'sumn2u/result-system-exam', 'max_issues_repo_head_hexsha': 'abc46276d9b30f411e3d4350ddb842db8ba5f3e4', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'src/index.html', 'max_forks_repo_name': 'sumn2u/result-system-exam', 'max_forks_repo_head_hexsha': 'abc46276d9b30f411e3d4350ddb842db8ba5f3e4', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '26.4760330579', 'max_line_length': '100', 'alphanum_fraction': '0.4638531652', 'original_id': '57fad4949e3cbdde3821f854c46dcbcf63096b6dcb840931b36d9cfaa6f82950'}
One compromise too far Key Verse: When I saw that they were not acting in line with the truth of the gospel, I said to Cephas in front of them all, “You are a Jew, yet you live like a Gentile and not like a Jew. How is it, then, that you force Gentiles to follow Jewish customs? – Galatians 2:14 There is a Russian parable that goes like this… “A hunter raised his rifle and took careful aim at a large bear. When about to pull the trigger, the bear spoke in a soft, soothing voice, “Isn’t it better to talk than shoot? What do you want? Let us negotiate the matter.” Lowering his rifle, the hunter replied, “I want a fur coat.” “Good,” said the bear, “that is a negotiable question. I only want a full stomach, so let us negotiate a compromise.” They sat down to negotiate, and after a time the bear walked away alone. The negotiations had been successful. The bear had a full stomach, and the hunter had his fur coat.” I am sure that if you had been the hunter, you would not have ultimately been satisfied with the results of that compromise. It seems that compromises do not always give the satisfaction that they promise. Compromise often calls for a sacrifice of truth and we need wisdom to discern when this is happening. We are never to give up on truth. This is exactly what is happening as Paul writes in Galatians 2. Paul is catching someone else compromising, and he refuses to let it continue. His refusal is all the more startling, be use the confrontation is with another apostle, Peter himself. You see, Peter had a large circle of influence. So when Peter went one direction, a lot of people went with him. Paul was aware that Peter’s actions would do serious damage to the church and his behaviour was out of sync with the gospel and inconsistent with Peter’s own life commitments. Instead of staying true to truth, he began adding to it by giving in to the Judaizers. Paul was not going to give in. Here is the warning for us. You cannot think that just because you had success in the past, or you had it right in the past, you are always going to be right in the future. Peter proves that past experiences are no guarantees of future obedience. We must not be afraid of the consequences of applying the truth For the Spirit God gave us does not make us timid, but gives us power, love and self-discipline. – 2 Timothy 1:7 Do you want to study the Old Testament with me in 2018? If so, why not to sign up to receive future devotions directly by email. It's totally free, just enter your detail below and starting tomorrow you will receive a devotional each day directly by email. Thank you so much for joining with me to read the New Testament in 2019. I pray that God will speak to you afresh each day.
mini_pile
{'original_id': '0b36f9f0b6491eccffd353d4c1d86a8e1018106283f5aa9f33fda8462a6a9ed2'}
הלן אמה מדיסון (באנגלית: Helene Emma Madison; 19 ביוני 1913 – 27 בנובמבר 1970) הייתה שחיינית אמריקאית. אלופה אולימפית בעלת 3 מדליות זהב (לוס אנג'לס 1932) ושיאנית עולם בכל משחי החופשי (100 מטר, 200 מטר, 400 מטר, 800 מטר ו-1500 מטר). היא האישה הראשונה בהיסטוריה ששחתה 100 יארד חופשי בדקה. ביוגרפיה מדיסון נולדה במדיסון, ויסקונסין. בילדותה עברה עם משפחתה לסיאטל, וושינגטון. בשנים 1930, 1931 ו-1932 זכתה מדיסון באליפות ארצות הברית בשחייה בכל משחי החופשי. שיא עולם ראשון בתחרות שחייה שנערכה במרץ 1930 קבעה מדיסון במשחה ל-200 מטר חופשי שיא עולם חדש של 2:34.6 דקות. שבוע לאחר מכן, היא שיפרה במשחה ל-100 מטר חופשי שיא עולם חדש של 1:08.0 דקות. אירוע השיא באולימפיאדת לוס אנג'לס (1932) זכתה מדיסון ב-3 מדליות זהב, במשחה היוקרתי ל-100 מטר חופשי בשיא אולימפי חדש של 1:06.8 דקות, לפני וילי דן אודן מהולנד (1:07.8 דקות) ובת ארצה אלינור גרטי-סביל (1:08.2 דקות), במשחה ל-400 מטר חופשי שיפור לשיאה העולמי 5:28.5 דקות, לפני בת ארצה לינור נייט-וינגרד (5:28.6 דקות) וג'ני מאקל מדרום אפריקה (5:47.3 דקות) ובמשחה שליחות 4x100 מטר חופשי בשיא עולם חדש של 4:38.0 דקות, לפני הולנד (4:47.5 דקות) ובריטניה (4:52.4 דקות). לאחר המשחקים האולימפיים שיחקה מדיסון בתפקידים קטנים בסרטים הוליוודיים "איש הדג" ו"הלוחם של הבעל". בגלל שהייתה מקצוענית מדיסון לא הורשתה להשתתף באולימפיאדת ברלין (1936). לאחר שפרשה משחייה תחרותית, עבדה מדיסון בעבודות מזדמנות כמדריכת שחייה, הייתה פקידה בחנות כלבו ועבדה כאחות. היא התגרשה שלוש פעמים. היא סבלה מסוכרת ונפטרה בשנת 1970 מסרטן בגרון בסיאטל עיר מגוריה. תארים מדיסון קבעה 26 שיאי עולם חדשים. בשנת 1932 היא החזיקה בו זמנית בכל משחי החופשי הרשמיים, 17 במספר, הישג שאף שחיינית לא קבעה מאז. שיאיה האמריקאים החזיקו מעמד שנים רבות. ב-100 מטר חופשי 15 שנים, 220 יארד 6 שנים, 500 יארד 23 שנים ו-800 מטר חופשי 6 שנים. בשנת 1966 זכתה מדיסון להכלל בהיכל התהילה הבינלאומי של השחייה. ראו גם התפתחות שיא העולם במשחה ל-100 מטר חופשי התפתחות שיא העולם במשחה ל-200 מטר חופשי התפתחות שיא העולם במשחה ל-400 מטר חופשי התפתחות שיא העולם במשחה ל-800 מטר חופשי התפתחות שיא העולם במשחה ל-1500 מטר חופשי קישורים חיצוניים הלן מדיסון , באתר Sports123 שחייניות באולימפיאדת לוס אנג'לס (1932) אלופות אולימפיות אמריקאיות: שחייה שיאניות עולם אמריקאיות: שחייה שחייניות חופשי אמריקאיות אמריקאיות שנולדו ב-1913 אמריקאים שנולדו ב-1913 אמריקאיות שנפטרו ב-1970 אמריקאים שנפטרו ב-1970
common_corpus
{'identifier': 'https://he.wikipedia.org/wiki/%D7%94%D7%9C%D7%9F%20%D7%9E%D7%93%D7%99%D7%A1%D7%95%D7%9F', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'הלן מדיסון', 'creator': 'https://he.wikipedia.org/w/index.php?title=הלן מדיסון&action=history', 'language': 'Hebrew', 'language_type': 'Spoken', 'word_count': '370', 'token_count': '1308', '__index_level_0__': '24045', 'original_id': '6748acefcb9b22fcbeb2ff86eaab056e6c52c5696616f86763acc440b6bce49a'}
package main import ( "fmt" "github.com/magarcia/intel8080/io" ) func hexdump(rom []byte) { for i, element := range rom { if (i % 16) == 0 { fmt.Printf("\n%08x ", i) } fmt.Printf("%02x", element) if (i % 16) != 15 { fmt.Printf(" ") } } fmt.Printf("\n") } func main() { rom, err := io.LoadROM("invaders/invaders.h") if err != nil { panic(err) } hexdump(rom) }
common_corpus
{'identifier': 'https://github.com/magarcia/8080/blob/master/cmd/hexdump.go', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Unlicense', 'date': '2021.0', 'title': '8080', 'creator': 'magarcia', 'language': 'Go', 'language_type': 'Code', 'word_count': '60', 'token_count': '191', '__index_level_0__': '37074', 'original_id': 'a46dcb768d1a6ce407da84b76afb1bc88d0b01063f697522d6562e9008b89b3e'}
Introduction: The food systems origins of pandemics {#Sec1} =================================================== According to the Global Health Estimates produced by the World Health Organization (WHO), 20% of all global deaths could be attributed to infectious communicable diseases. Of these, 50% of the top 5 killers were zoonotic in origin (Fig. [1](#Fig1){ref-type="fig"}, green bar).[1](#Fn1){ref-type="fn"} The last two decades has seen a rise in the number of pandemics that have had their origins in zoonotic diseases. The PREDICT project at USAID has documented at least 900 new strains of pandemic causing infectious diseases in this time.[2](#Fn2){ref-type="fn"} Some of these diseases that have escalated into pandemics such as the SARS (2003), Nipah (2009), Ebola (2014) and now the Covid19, have emerged from animal-human interactions in the food-system (Gebreyes et al. [@CR12]; Kelly et al. [@CR25]; Lu et al. [@CR35]; Marty and Jones [@CR38]). These pandemics have caused losses to economic wellbeing and food security across the world (Smith et al. [@CR50]).Fig. 1As of May 31st^,^ 2020, Covid19 was among the top 3 zoonotic disease killers across the globe Zoonotic diseases, transmitted to humans from animal hosts, have emerged due to the lack of monitoring and enforcement of food-safety standards in the food systems. Improper storage of animals, unsanitary conditions and poor handling of livestock products in managed production systems and wildlife trade have been identified as the channels for mutation of viral strains and for cross-species transmissions (Cutler et al. [@CR8]; Destoumieux-Garzón et al. [@CR9]; Han et al. [@CR16]; Hassell et al. [@CR18]; Kruse et al. [@CR27]; Parrish et al. [@CR42]). Supported by human to human transmission due to urbanization, growing ease of local and global transport and growing anti-microbial resistance, viruses such as novel coronavirus have found opportunity to escalate into pandemics (Holmes et al. [@CR22]; Morse et al. [@CR40]). Much of the global response to zoonotic disease emergence continues to be reactionary. The political community is currently focused on containment and economic reconstruction. The food security community is focused on ensuring continued food access. Human-health experts are focused on treating the disease and identifying a vaccine. Economic experts focus on alleviating negative impacts associated with loss of GDP and livelihoods. While these responses are vital in this post-covid era, we urge that designing, promoting and enforcing food-safety measures is an *urgent and proactive* measure to protect against such unintentional biosecurity threats. One-health experts have long recognized that active and engaged zoonotic disease surveillance is crucial to stop infectious disease outbreaks (Destoumieux-Garzón et al. [@CR9]; Kelly et al. [@CR25]; Zinsstag et al. [@CR54]).[3](#Fn3){ref-type="fn"} In this paper we highlight evidence that a proactive-response strategy is imperative to prevent pandemics like Covid19. Taking proactive steps to incorporating one-health expertise along with food-safety interventions will reduce the risks of emergence of new diseases. Global interest in containment of this disease should be directed towards changing behaviors and policies in favor of proactive efforts. Enhancing local government capacity will be essential to ensure that programs are properly implemented and monitored. These inputs can simultaneously reduce threats from infectious diseases and bolster food and economic security. Zoonotic disease risks in managed production systems {#Sec2} ---------------------------------------------------- Westernization of diets and increased demand for dietary diversity in many developing countries (Pingali [@CR43]) has driven up prices of livestock products (Fig. [2](#Fig2){ref-type="fig"} Panel A).[4](#Fn4){ref-type="fn"} Facilitated by economies of scale in agricultural production, livestock production has intensified (Chavas [@CR5]; Duffy [@CR10]). In Asia, land constraints for production have been overcome with technological innovations to boost livestock productivity (Steinfeld et al. [@CR51]). Currently, more than half of the world's livestock is produced in Asia with Chinese producers dominating most of the global markets (Fig. [2](#Fig2){ref-type="fig"}, Panel B).[5](#Fn5){ref-type="fn"}Fig. 2Panel A - We see the demand effect of westernization of diets. Prices of meat and milk have been increasing in the developing world but have remained somewhat constant in developed countries (orange lines). Panel B - we show that majority of the livestock produce comes from developing countries with Asian producers dominating production and exports Diseases - such as the swine flu, avian flu and hoof and mouth disease which affect pigs, chicken and cows respectively - have emerged due to the lack of adequate sanitation and hygiene practices in the livestock industry (Leibler et al. [@CR29]; Steinfeld et al. [@CR51]). For example, the highly contagious strain of avian flu virus has been found in overcrowded chicken farms (Gauthier-Clerc et al. [@CR11]).[6](#Fn6){ref-type="fn"} Containing the pandemic cost Vietnam and Thailand around USD 45 million and USD 135 million. The disease destroyed food supplies. Nearly 18% of Vietnam's total poultry livestock and 15% of Thailand's livestock was culled to contain the outbreak in 2004 (Burgos and Burgos [@CR2]). Exposures and deaths among humans were traced to unsafe hygiene practices with disposing infected poultry and carcasses (Gauthier-Clerc et al. [@CR11]).[7](#Fn7){ref-type="fn"} Productivity enhancements to maintain competitiveness in managed-livestock production systems have reduced genetic diversity in livestock breeds. Overuse of antibiotics in production to stimulate growth and protect herd health has been found to increase anti-microbial resistance among humans. The channels include direct consumption of livestock products or indirect contact during livestock processing (Landers et al. [@CR28]; Levy et al. [@CR31]; Marshall and Levy [@CR37]; Price et al. [@CR46]). The rise in anti-microbial resistance poses significant challenges for fighting new bacterial threats that will emerge. Lack of proper sanitation and hygiene while handling animals and their products has been identified as a mechanism for cross-species transmission. The emergence of the Nipah virus in Malaysia has been linked with the contamination of swine feed with saliva and feces of bats (Chua [@CR6]). Direct exposure through improperly stored date-palm water and indirect contamination through exposure to sick livestock enabled transmission to humans in Bangladesh (Hughes et al. [@CR23]; Luby et al. [@CR36]). Costs to contain Nipah in Malaysia included USD 97 million from culling affected swine populations, USD 136 million in health system responses, and around USD 229 million in tax revenues due to losses in industries such as tourism (Smith et al. [@CR50]). Zoonotic disease risks arising from human-animal interactions in wet markets {#Sec3} ---------------------------------------------------------------------------- Improper storage of animals, overcrowding, inadequate hygiene and improper disposal of feces, and improper disposal of carcasses in wet markets has been linked to cross-species transmission of infectious diseases. The lack of enforcement of food-safety standards has allowed such wet markets, that trade livestock products locally, to become infectious disease hot spots. In subsistence-based production systems livestock trade supplements incomes and provides meat and nutrition for the poor. Markets for meat are mostly unregulated and are locally oriented. Direct contact with infected wildlife carcasses, without safety equipment, led to emergence of Ebola (Leroy et al. [@CR30]). To date, nearly 30,000 individuals have been infected with a case death-rate of around 50%.[8](#Fn8){ref-type="fn"} The estimated cost of containing the pandemic was around USD 1 billion by the end of 2014 (Butler and Morello [@CR3]). GDP growth in Sierra Leone, Liberia and Guinea fell to less than 1% after the outbreak (Smith et al. [@CR50]). The SARS-Cov and novel coronavirus have their origins in illegal wildlife trade. The SARS-Cov, with a case death rate of 10%, emerged from viral transmission of a strain of coronavirus from bats to humans, through an intermediary host, civet cats (Li et al. [@CR32]; Lu et al. [@CR35]; Shi and Hu [@CR49]). The SARS-Cov pandemic is thought to have cost Asia-pacific air carriers USD 6 billion. Hong Kong's tourism industry reduced by more than 60% and its GDP fell by 2.6% in 2003. The estimated costs of containment of the SARS ranges between USD 10--50 billion (Smith et al. [@CR50]). The novel coronavirus, the architect of the Covid19 pandemic, has been linked to wildlife trade in Wuhan. Lack of adequate sanitation and improper storage of animals alongside wildlife is thought have created the conditions for its transmission to humans.[9](#Fn9){ref-type="fn"} In addition to 11.8 million individuals who have been affected this far, and with a case-death rate of 5%, controlling the spread of the virus and restarting the economy is expected to cost the world at least 1% of its GDP in 2020.[10](#Fn10){ref-type="fn"} This calculation does not include the indirect losses from reduction in trade and aggregate demand. Other risks for zoonotic disease -- Impacts of biodiversity loss and climate change {#Sec4} ----------------------------------------------------------------------------------- New threats of such diseases emerging have been augmented by biodiversity loss and climate change. Deforestation, for example, forces humans to come in contact with new types of animals that carry disease vectors that are otherwise harmful for human health (Jones et al. [@CR24]; Morse et al. [@CR40]; Parrish et al. [@CR42]). Long term climate change also poses challenges for the re-emergence of previously eliminated communicable diseases from changing ecological environments (Gould and Higgs [@CR13]). The virulence of Eschiera Coli, a bacteria that causes gastroenteritis, is positively correlated with temperature and precipitation. The e-coli pandemic has been transmitted via the food value chain across the developed world and through poor sanitation and hygiene practices in the developing world (Liu et al. [@CR33]). Food systems characteristics that enable outbreaks snowballing into pandemics {#Sec5} ============================================================================= Covid19 has brought to our attention that local outbreaks can morph into global pandemics within a short period of time. More than half the world is now living in urban areas (Pingali and Aiyar [@CR44]) with high population density (Hassell et al. [@CR18]). This, along with poor sanitation and hygiene practices, has enabled faster transmission of disease from animal hosts to humans and between individuals (Clasen et al. [@CR7]). Ease of travel, by land and air, has facilitated the rapid transmission of diseases within a country and across countries. The food-safety blind spot of food systems {#Sec6} ------------------------------------------ There has been interest in enforcing internationally compatible food safety standards to ensure continued global food trade (Brown et al. [@CR1]; Kirezieva et al. [@CR26]; Nguyen-Viet et al. [@CR41]). At the local level, private sellers determine compliance with standards (Hammoudi et al. [@CR15]; Henson and Humphrey [@CR19]; Henson and Reardon [@CR20]). Richer consumers who can pay higher prices for quality purchase produce from formal retailers. These retailers are more likely to enforce government-regulated safety standards. Consumers who buy from the wet markets tend to be poor and rely on their social relationships with sellers to ensure food-safety standards are enforced (Grace et al. [@CR14]; Roesel and Grace [@CR47]). This creates variability in how standards are enforced in local produce markets. Additionally, demand for illegally poached wildlife pose problems for enforcement of food-safety. In the absence of a legitimate market, enforcement of food safety standards in storage and handling of animals is not possible. This oversight creates a convenient blind spot in local food systems where viruses, such as the coronavirus, can thrive. A food safety approach for pre-emptive action against future pandemics {#Sec7} ====================================================================== The emergence of Covid19 re-emphasizes that enforcing food-safety standards in local food systems should be a global priority. Our experience shows us that poorly enforced standards have cross-industry and cross-country ramifications. Pre-emptive action requires a recognition that food-safety is a *global* public good. In the absence of external interest in implementing food-safety as a precautionary measure, countries may continue to underinvest in this aspect of food systems (Henson and Traill [@CR21]; Unnevehr [@CR52]). Market based approaches for aligning one-health goals with food-safety directives {#Sec8} --------------------------------------------------------------------------------- Increasing demand for food-safety as a product attribute will increase adoption of such practices at the farm and in markets (Pouliot and Sumner [@CR45]; Wang et al. [@CR53]). Willingness to pay for on-farm diversification, lower antibiotic-use and sanitary handling of food will incentivize local producers to adopt such food-safety directives. Demand push can be facilitated by education and through the enforcement of reliable and consistent food-safety measures which are monitored by the government (Caswell and Mojduszka [@CR4]; Loureiro and Umberger [@CR34]). This will not only reinforce consumer willingness to pay for food-safety, it will ensure greater traceability of disease in the value chain. Enforcing penalties for violation of food-safety measures by large food processing firms could speed up adoption of such practices. Extension and training on food safety standard and practices targeted towards small firms can help them become competitive relative to larger firms. Wet markets play an important role in enhancing incomes and livelihoods of poor smallholder farmers. It is important to ensure that the introduction of new food safety standards does not disrupt their access to wet markets. Governments can play a proactive role by investing in clean water and sanitation infrastructure for wet markets. Training market suppliers and sellers in basic food safety and food handling practices and frequent monitoring of their use would also be a crucial role for local government agencies. Early identification of disease outbreaks requires cooperation of livestock owners and sellers. Data from monitoring of animal health needs to be integrated with epidemiological studies on health risks. Providing financial instruments such as insurance against zoonotic diseases will incentivize food-safety adoption for risk management (Meuwissen et al. [@CR39]). Understanding the socio-economic factors that characterize current infectious hotspots can help identify effective market instruments for adoption of disease surveillance efforts both on the farm and in the wet markets. Sanitation and hygiene for greater food safety and one-health {#Sec9} ------------------------------------------------------------- Enforcing sanitation and hygiene standards at the farm and in markets is an important step for greater food-safety as well as for the reduction of infectious disease. This involves incentivizing investment in water and sanitation (WASH) infrastructure at production houses and markets. Ensuring that animals and meat are stored appropriately requires investment strategies to bolster storage infrastructure and cold chains (Grace et al. [@CR14]; Rosegrant and Cline [@CR48]; Steinfeld et al. [@CR51]). Behavioral changes among producers should be a focus of food-safety interventions as well. Information and education programs should encourage better hygiene practices. Identifying if the key constraint is infrastructure, resource or knowledge would be important for ensuring such hygiene improving interventions are cost-effective. Incorporating food-safety information into behavior change communication programs around WASH behavior for households can stimulate local demand for food-safety practices and facilitate disease prevention efforts. Integrating traceability technologies at local disease hotspots {#Sec10} --------------------------------------------------------------- From our experience of recent pandemics, a major goal for containment is reducing the time delays in identification of diseases at its source. Thus, some funds allocated for reconstruction efforts should be directed towards the development of technology to track, trace and eliminate zoonotic diseases. Real time health data, collected through smart phones and watches, can be leveraged to identify emerging outbreaks in both humans and animals. Utilizing internet search histories based on frequency of health queries in disease hotspots can be utilized as well. Historical data on zoonotic diseases along with socio-economic information on livestock production and consumption patterns at the disaggregated level can be integrated into data analytics software. These databases can be used for health monitoring and disease surveillance. Local food labs that test food quality should be equipped with surveillance technology and given access to data repositories to identify threats coming from food value chains. One-health researchers and food-safety experts need to work alongside epidemiologists and local food-systems stakeholders to bolster surveillance efforts. De-politicizing zoonotic disease emergence by focusing on local food safety as a key reconstruction goal {#Sec11} -------------------------------------------------------------------------------------------------------- At the country level, integrating food-safety goals for disease prevention along with food safety directives in trade will help enhance trade and maintain competitiveness while simultaneously incentivizing locally driven containment efforts. The Codex Alimentarius, an international food safety standard protocol is one such directive that can be used to help countries meet the twin goals of equitable trade and better health through food-safety investments.[11](#Fn11){ref-type="fn"} To be successful in containment, local stakeholders need to be actively engaged in both implementation of the standards as well as in active surveillance (Häsler et al. [@CR17]). Disease spread can be controlled only if there is transparency in sharing information and if local actors are empowered with resources to act on disease threats. Strengthening inter-departmental coordination between the one-health, health and food systems groups can reduce time lags in disease identification and in implementing containment policies (Kelly et al. [@CR25]; Morse et al. [@CR40]). In areas where research capacity is the major constraint, global actors can play a role in supplementing the local knowledge base. Conservation as a long-term food safety measure {#Sec12} ----------------------------------------------- Food-safety experts should encourage research in maintaining genetic diversity of livestock. Investments in vaccine development and development of veterinary services for livestock are also important inputs into animal health. These interventions can reduce livestock susceptibility to zoonotic diseases and reduce threats of rising anti-microbial resistance (Holmes et al. [@CR22]; Marshall and Levy [@CR37]). Increasing efforts towards conservation either through demand reduction of wildlife and/or promotion of afforestation will reduce exposure to species that carry dangerous disease vectors (Hassell et al. [@CR18]). Such efforts will be important to reduce transmission of high-risk but low-probability zoonotic diseases. Discussion & Conclusion {#Sec13} ======================= A major take away from the emergence and spread of the Covid19 is that food systems have become more vulnerable to disruptions due to the emergence of infectious zoonotic diseases. Managing human-animal interactions at their source is at the heart of containment of such disruptions. On the production side, improving livestock health requires attention from one-health experts and more research in veterinary services. Vaccinations of livestock and reduction in the use of antibiotics will be effective in both improving animal as well as improving human health. In order to overcome the problem that social benefits & costs of food-safety outweigh private benefits and costs of implementing such practices, economic incentives need to be bolstered by efforts to facilitate behavior change. Encouraging WASH practices through social and behavioral interventions and social mobilization will be important to incentivize farmers to internalize social costs of underinvesting in food-safety practices on the farm. Proper handling of food, improving storage quality for livestock and food products and enhanced packaging standards will reduce cross-species transmission. The food value chains in developing countries need to be carefully monitored. Introducing food-safety labels and educating consumers on the importance of safe food will increase demand and hence willingness to pay for food safety as a product attribute. This will speed up adoption of food safety measures in the supply chain. Between SARS-Cov, Ebola and Covid19, the threats to human life and economic losses have increased multi fold. Increase in speed of local and global trade is the main catalyst in this risk. Thus, going forward, integrating traceability technology in monitoring disease emergence especially in places where animals and humans interact is a major requirement. This will help overcome the time risks that global trade presents to pandemic spread. Technology can be used to collate and distribute information quickly, both locally and globally, and can be effective in tracking when used appropriately. However, for technology to be effective there needs to be greater data sharing between local and global research units that are focused on studying such issues. Investing in the development of local government capacity to track, trace, contain and prevent such diseases will help reduce global transmission. Pandemic control also requires coordination between the farming community, epidemiologists, animal science researchers, wet market traders, exporters, local businesses and consumers. To prevent underinvestment at the national levels, such efforts must be coordinated by global actors. However, it is also safe to assume that without simultaneous investments in bio-diversity conservation, many of these initiatives may fall short in the long term. Hence a glocal-long term approach to food safety is imperative in preventing future pandemics and food systems disruptions. Food-safety investments today will be extremely cost-effective reconstruction-related investments. Based on authors calculations from the Global Health Estimates 2016. A database collated by the world health organization. The database was downloaded in April 2020. Covid19 deaths estimates reflect deaths as of 30th April 2020. To make the data on deaths comparable between covid19 and annual figures in the GHE, we have presented approximate numbers of deaths that took place in 4 months in the year. <https://ohi.vetmed.ucdavis.edu/programs-projects/predict-project> "One Health is a collaborative, multisectoral, and transdisciplinary approach --- working at the local, regional, national, and global levels --- with the goal of achieving optimal health outcomes recognizing the interconnection between people, animals, plants, and their shared environment." -- Center for Disease Control & Prevention, <https://www.cdc.gov/onehealth/basics/index.html>, Accessed June 2020 <http://www.fao.org/faostat/en/#data/PI> - Producer Price Indices collated from the food and agricultural organization in April 2020. <http://www.fao.org/faostat/en/#data/QL> - Livestock Primary indicators collated from the food and agricultural organization in April 2020. Low pathogenic strains of the virus can be found in wild birds and trace their pattern of migration. The high pathogenic strains are commonly found in domesticated birds and the disease can be traced using information on domestic and international trade patterns. The main reason the human impact of this disease was not as large as Covid19 was that the virus's spread was limited by a lower R0. However, even today, the WHO continues to track this disease and regularly issues warning on local outbreaks. [https://www.who.int/news-room/fact-sheets/detail/influenza-(avian-and-other-zoonotic](https://www.who.int/news-room/fact-sheets/detail/influenza-(avian-and-other-zoonotic))) <https://www.who.int/news-room/fact-sheets/detail/ebola-virus-disease> At the time of writing this article, the WHO has been maintaining its stand that the disease has zoonotic origins. [Accessed 8th July 2020 - https://coronavirus.jhu.edu/map.html](https://coronavirus.jhu.edu/map.html) The Codex Alimentarius was developed jointly by the FAO and the WHO. <http://www.fao.org/fao-who-codexalimentarius/en/> Authors share seniority equally. The authors declare that they did not raise funds for this research. Appropriate data sources have been cited. Authors agree to make this available on publication of the piece. The authors declare that they have no conflict of interest. Authors will make this available on publication of the piece.
mini_pile
{'original_id': '4099c8d31aaa6b0ec6c27e4ffd72e1fa4c3a94ecfe32145dc5ceed01c377ecf4'}
6oz Plaid Cloth and Faux Leather Hip Flask Brand: Top Shelf Flasks Model Number: F6FTOP35 Availability: In Stock Price: $20.95 2 or more $19.95 5 or more $16.95 100 or more $10.48 - Bulk Pricing Add On Gift Options *Custom Engraving Instructions: 6oz Plaid Cloth and Faux Leather Hip Flask This 6oz plaid hip flask is made from 100% plaid cloth in the background and trimmed on the top and bottom with faux leather.  Faux leather is a PU (Polyurethane) that is made to look, feel and even small like real leather without the hefty real leather price tag.    The compact size make it great for traveling.  This flask also has an attached engraving area in the shape of an oval that is perfect for a short personalized message, 3 letter initials or a 3 or 1 letter monogram.  The flask is made from 304 stainless steel that is a full .5mm thick making it top quality and puncture resistant. Write a review Note: HTML is not translated! Bad            Good
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8530994653701782}", 'metadata': "{'Content-Length': '71419', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3MRFJK3AJMRW56CDJAOTMCWND3IZXF6A', 'WARC-Concurrent-To': '<urn:uuid:f196cb79-5ba2-4720-9dd5-787e286a43b3>', 'WARC-Date': datetime.datetime(2019, 8, 25, 20, 20, 45), 'WARC-IP-Address': '199.167.253.234', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:P42X3QNCXXROGAC3IW3T6XMGVLQKKLCN', 'WARC-Record-ID': '<urn:uuid:a7c30c12-8825-4765-911d-29175b346fd9>', 'WARC-Target-URI': 'https://www.flasks.com/6oz-plaid-flask-faux-leather-trim?tag=engraved', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7fb5ffbb-7bad-42a5-9780-a17f4f19cfae>', 'WARC-Truncated': None}", 'previous_word_count': '160', 'url': 'https://www.flasks.com/6oz-plaid-flask-faux-leather-trim?tag=engraved', 'warcinfo': 'isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-85.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030479848384857178', 'original_id': '9037229b2d6c98499b2844315b629dd41e88931f91e894a4dba0d7aab9bc97ca'}
Many years ago, I worked in a vegetarian restaurant. In total, 40 people staffed the place, disciples of a certain famous Indian guru who shall remain nameless, working different shifts mostly on a volunteer basis. The restaurant was their "home away from home" and most of them ate there regularly, took food home, or styled their own eating habits after the food that was prepared there. It was typical vegetarian fare, lots of cheese, bread in different forms, grains, pasta, tomatoes, tamari-based sauces, lots of vegetables, raw and cooked. And generous amounts of sugar in various forms. I didn't know much about vegetarianism when I started working there and after about a year began to feel very tired, had headaches almost every day and was noticing that I was becoming quite spaced out. The spacing out alarmed me because when I first started working there I thought they were the most spaced-out group of people I had ever met and here I was becoming one of them. So I went to see a doctor, had some blood tests done and they indicated that my blood sugar levels were very erratic. After doing some reading about this, I realized that I wasn't getting enough protein in my diet, way too much carbohydrate and a fair amount of sugar. And I was very surprised to discover that cheese is not a particularly good source of protein. So I made some changes and within a couple of months felt much better. I suggested that others I was working with get blood tests done and over the next few months they did so with similar results, some of them with higher readings than my own. After that we changed the menu to ensure a balance of protein along with people's favourite comfort foods. When you get a group of 40 people with the same condition, all eating the same diet, it makes it pretty clear what's going on. Completing protein within a vegetarian diet is not that difficult. It's a matter of knowing what ingredients are high protein or which to combine to make a complete protein. Meinjin (wheat gluten) is a good source of protein, as is soy but not as high as meinjin. Nuts are good, but most people can't tolerate huge quantities of nuts. The best thing to do is eat a varied diet and combine certain ingredients to complete or increase the amount of protein. A good example of this is miso shiru served with rice, gomasio and pickles. Or vegetarian kedgeree which uses a combination of legumes and grain providing a complete protein even without the eggs. So, when you're making a bean dish, think about adding rice or corn or wheat to complete the protein. Or if making a grain, add nuts or beans. Or if serving tofu, throw some sesame seeds on top of it. Use cheese for flavour instead of protein.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.981373131275177}", 'metadata': "{'Content-Length': '22187', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DNTBVEMIX6ZJUTBKKOCJW7MZMQDR2BM7', 'WARC-Concurrent-To': '<urn:uuid:00c3ef0f-03c4-4287-bd41-af2229599f19>', 'WARC-Date': datetime.datetime(2017, 8, 17, 14, 53, 57), 'WARC-IP-Address': '54.212.251.95', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:LOBO65F4KOKSPDPCAPCO6A7U3XACKJPM', 'WARC-Record-ID': '<urn:uuid:e1533d2b-fa87-465a-b658-0fae8ca865a7>', 'WARC-Target-URI': 'https://everything2.com/title/40+disciples%252C+40+blood+tests', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b6e4aced-24c4-4af9-a2c8-42a65cccfef3>', 'WARC-Truncated': None}", 'previous_word_count': '495', 'url': 'https://everything2.com/title/40+disciples%252C+40+blood+tests', 'warcinfo': 'robots: classic\r\nhostname: ip-10-138-121-75.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.41080015897750854', 'original_id': 'c84369802e471db2b880451bbb9746a38d920b040a1ef493bf7dacbadaaee5c7'}
6 Ways to Deal With People Who Are Distant Six tips to break the ice. Courtesy of Ivan Bajic/Getty Images Courtesy of Ivan Bajic/Getty Images Some people keep feelings and emotions close to the vest. They aren’t bad people, but it can be frustrating when we’re only treated to occasional glimmers of their sparkling personality. Their slow message response times (leaving you “on read”) and unaccepted invitations make you feel unwanted, or that you’re the only person putting in any effort. Having a heart-to-heart with a cheerful, friendly person, however, rarely feels like a struggle. But if everyone was cheerful and friendly, we’d already have world peace. Dealing with people who are distant seems to present a bigger challenge. Chances are they’re not trying to make you feel bad. And luckily, continuing the effort can reward you with a wonderful new friend, or a closer relationship with a familiar face. Whether this distant person is part of a burgeoning relationship, a family member you’ve always admired, or a newly reclusive sibling or spouse, here is how to show them you value their presence. Have Empathy A number of traits and mental illnesses lead to a distant personality. Insecure attachment styles, like reactive attachment disorder and disinhibited social engagement disorder, can make people hesitant to start up conversations, seek comfort in the company of others, or ask for what they want directly. However, just because someone is distant doesn’t mean they qualify for these disorders. In fact, the DSM says these behaviors must be present before age five to count as a “disorder.” Anxiety and depression can also easily manifest as distance. Pushing away loved ones is a common symptom of depression. Even lesser stressors, like buying a home, going through finals, or helping a sick relative can lead a person to someone retreating and acting distant. You may not know specifically what causes a person to distance themselves. They may not want you to know, and that’s okay. Don’t push for an explanation. But have empathy when reaching out: Refusing to easily share feelings doesn’t mean they’re rude or dislike you. Open Yourself Up Some distant people struggle to share their feelings. They may be embarrassed by their emotions, or scared of being vulnerable. When dealing with a distant person, consider taking a few leaps of vulnerability yourself. Don’t reveal your whole life story — that can scare off even the friendliest stranger! — but show them that you’re not scared of serious conversation. By taking that first frightening step, you provide an opening for them, too. Give Them Time Demonstrating vulnerability is a fantastic way to engage a distant person. Just keep in mind: distance is not changed in one conversation. It may take time for your friend to fully open up. For example, if a person is distant because socializing increases their anxiety, they may only have the energy for one conversation per week. Consider their emotional resources like a battery: every interaction decreases the charge. Refueling time is mandatory, so texts may be slow or they may decline your next invitation out. Relationship progress can be exciting, but don’t be disheartened when a distant person moves more slowly than you. Be Frank When you talk to your friend, make sure to used I-focused language: “I feel like you don’t respect me when you ignore my text messages” instead of “You are being disrespectful when you ignore my texts.” Accusations may make them more distant. Quick caveat: be frank, not cruel. Since distance may be driven by depression and anxiety, avoiding harsh criticism is best. But many people don’t recognize their own distancing behavior, and a heads-up might do them a favor. Pay attention to what works Whenever you interact, keep close tabs on what works — and what makes them shy away. Did sharing your own struggles encourage them, or did you find them more distant after that chat? Did they make an effort to reach out more often after you told them how their distance makes you feel? You don’t want to smother someone who prefers less interaction. Respect Your Differences Remember, every person is different. Depending on the reasons for their distance, they may respond better to different approaches. Get to know them and you’ll be better able to predict what makes them tick. Making friends is important — as is getting to know old friends and family better. But if the distance grates on your mental health, take a time-out break for your own sake. And if their unresponsiveness leaves you sad, talking with your therapist can help you set expectations or barriers. Originally published on Talkspace. More from Talkspace: How Financial Issues Impact Your Mental Health Reframing is Therapy’s Most Effective Tool, Here’s Why You might also like... Tsvi Braverman / EyeEm/ Getty Images 6 Ways to Deal With People Who Are Distant by Jamie Wiebe If Your Relationship Feels Stressful, There Could Be a Psychological Reason Behind It by Talkspace How To Instantly show up More Friendly and Sociable by Malik Shahmeer Sign up for the Thrive Global newsletter Will be used in accordance with our privacy policy. Thrive Global
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '106', 'language_id_whole_page_fasttext': "{'en': 0.9167885780334472}", 'metadata': "{'Content-Length': '196227', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2QRGAZMHCGN7Z372HKHFK7XUXKHEQMT7', 'WARC-Concurrent-To': '<urn:uuid:f79d2103-1327-4ee5-8126-8e213591998f>', 'WARC-Date': datetime.datetime(2019, 10, 21, 11, 40, 41), 'WARC-IP-Address': '104.20.9.182', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CZ4EX3MA2P4W6Q2L7PEU6DZMNPW2RBYK', 'WARC-Record-ID': '<urn:uuid:8b82e655-36f1-46d3-8dec-9e685cf9eebc>', 'WARC-Target-URI': 'https://thriveglobal.com/stories/ways-deal-people-distant-friendship/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2547d3d4-105c-42e9-98ef-b9aebe78f9db>', 'WARC-Truncated': None}", 'previous_word_count': '969', 'url': 'https://thriveglobal.com/stories/ways-deal-people-distant-friendship/', 'warcinfo': 'isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-129.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018120944499969482', 'original_id': '0f04783de40286fbb881ae7a71855aa60747ae3404c0ec7291b1de536a275000'}
Obama’s Foreign Policy: Incompetence on Parade From apologizing to Kandahar for his policy leading to the green-on-blue murder of US troops, to the turmoil surrounding Benghazi, Barack Obama’s incompetence regarding  foreign policy is deadly. This may sound like a hyperbolic indictment, but consider the facts: Under the reign of President Obama, US casualties in Afghanistan are up to approximately 1350 in just 3 ½ years. From October 7, 2001 to January 20th 2009, the death toll of U.S. troop in Afghanistan was 630. In less than half the time, this supposed Commander in Chief has more than doubled the body count of Marines, Sailors, Soldiers, and Airmen. The same could be said about the debt, but that’s another article. Why so many? Three words: Rules Of Engagement (ROE). It is the policy of the Obama administration that if a combatant temporarily puts down his weapon, US troops may not engage & must cease fire. So, after unloading a 30 round magazine at our soldiers, the terrorist can put down his weapon, reload another magazine and if our military fires in the interim, our soldiers can go to Leavenworth for the rest of their lives. One might be left in awe at this shockingly incompetent Obama policy. Major General Robert Scales has been an outspoken critic of this inept administration & its policies for warfare, which has only led to more dead US troops. 1 Mursi & Gaddafi Thumb Furthermore, our soldiers cannot hold captured terrorist for interrogation past 96 hours and must turn them over to Afghanistan police. This is not a joke. Consider the ‘green on blue’ attacks to decide if this incompetent Obama policy is wise. Finally, Barack Obama has tied the hands of the US military with his rule that no US soldier is allowed to kill the enemy without prior approval from an Afghan-national. Again, consider the ‘green on blue’ murders, and one can only conclude that this ROE is—not only incompetent—but also the way to lose a war. The rules for prosecuting and governing ‘Obama’s War’ are the rules of political correctness & appeasement. This next part will absolutely infuriate you, especially if you are serving or have served in the United States Military. Lance Corporal Greg Buckley Jr. was serving honorably in the Helmand Province.  The 21 year old Marine was training local security forces (“green soldiers”) as part of Obama’s planned 2014 draw-down. Routinely facing the threat of mortar shelling, gunfire, and IEDs by terrorist—LCpl Buckley did his job and did his job well in the face of enormous adversity. One of the 7th Century barbarians who LCpl Buckley was valiantly attempting to train routinely told the Marine, “We don’t want you here. We don’t need you here.” Finally, after confronting the thinly veiled terrorist for his comments, LCpl Buckley was, of course, made to apologize. But the trainee refused to shake the Marine’s hand. Much like Sean Smith, LCpl Buckley predicted his death, informing his family that he would be murdered by the trainee. Prophetically, the Marine was right. The barbarian crept into his room, and gunned down the Marine in his sleep—shooting LCpl Buckley multiple times in the chest with an AK-47, killing him. This happened two days before he was scheduled to leave Afghanistan. Greg Buckley Sr. and his wife Marina—the parents of the slain Marine—were sent a form-letter from the Commander in Chief. The families of the SeAL Team 6 members who died in a widely publicized helicopter crash got the same sort of shabby treatment. This is the same SeAL Team 6 that operated in secret for more than 30 years, until the buffoon Vice President, Joe Biden, admitted their existence. The same SeAL Team which Obama now uses to prop-up his political campaign, when declaring “I killed bin Laden. I ended the war in Iraq. I am ending the war in Afghanistan.” For one who never served, Barack sure likes to take credit for US MILITARY accomplishment & achievement.  As a side note, Barack Obama did send the family of Heavy D a personalized, hand written letter when the rapper passed away. The sheer sacrifice it must have taken Obama to write that letter must leave so many in shock & awe. It should be clear to all that Obama only likes to use the military as stage props, and certainly does not have their safety at heart. When Obama speaks at West Point or Annapolis, he often takes credit of operations he had little to do with. Other than that, he and his wife have very little use for the military, or the institutions they represent. See: “All this for a damn flag?” (Article continues after the video) There is no plan for victory under this President. In fact, Obama is trying to redefine “victory.” Under Obama, Afghanistan has degenerated into a losing exercise in humiliation. Like Obama’s plan to homosexualize the military, this 1960s-style-radical is trying to snatch defeat from the jaws of victory, as the radical left did 40 years ago when protesting America in favor of Communist North Vietnam. Benghazi is an equally troubling recent development. Or is it that recent? We now know through the House Oversight Committee chaired by Rep. Darrell Issa (R-CA) that over 100 documents from Ambassador Chris Stevens expressing concern over the growing Al Qaeda presence in the area were submitted to the administration in the months leading up to the attack. Nothing was done. Why? In fact, during the Vice Presidential debate, Joe Biden said, “the administration wasn’t even told.” The Consulate didn’t have even the standard Marine security detail, much less any reinforcements. Why? For over two weeks the administration blamed a YouTube video made by an Egyptian born Coptic Christian, that no one ever saw. The Obama Administration kept saying it was a spontaneous protest that got out of hand. Why? Obama most likely blames youtube on behalf of the Muslim Brotherhood, who used to be a on terrorist watch list and have now been welcomed into power by Obama. In the recent Presidential debate, Obama tried to ham-handedly claim that he labeled it a terrorist attack from the beginning. Let’s accept that premise momentarily. Why then, did his Ambassador to the U.N. go on no less than 5 Sunday talk shows and blame the video? From Barack Obama to Hillary Clinton to Joe Biden to Susan Rice to Jay Carney, they all claimed the video was behind this attack. Why? Why was it that Barack Obama after hearing about the attack, went directly to….sleep? He then got on a plane the next morning for a Las Vegas fundraiser. Parents reading this article, if your child was missing and under attack, would you consider it “not optimal,” shrug it off and  just go to sleep? Why are there so many provable lies about an obvious terrorist attack? Could this have been a kidnapping gone wrong? Recently, Pat Smith appeared on Fox News & stated that her son was a target. Unlike the others, Sean Smith was “thrown into a pick-up truck and taken from the site.” It might explain why Barack Obama didn’t feel it necessary to ask any questions before going nighty-night on 9/11—he may have already known the answers. There’s only one problem, two former Navy SeALs were there and they weren’t part of the plan. They fought back; they did their job. They were allowed to be armed, unlike our US guards at the Embassy in Benghazi.  And this would be when things went sideways and 4 Americans lost their lives. If you believe the multitude of the reports out there, the Obama Administration is in secret talks with the Muslim Brotherhood to release The Blind Sheik (NY Times): Omar Abdel-Rahman, the mastermind of the 1993 World Trade Center bombing. Knowing he would go down in history with Ford for pardoning Richard Nixon, and Clinton for pardoning Marc Rich, Barack Obama might want political cover for pardoning a terrorist that we have in hand. What better way selling the American people on the release of a World Trade Center terrorist, than a trade for our Ambassador? Of course, all of this is conjecture, but how many things has this lawless-administration done against the will of the people? At some point, conjecture and speculation have to give way to common sense and reason. Only the disinfectant of daylight and investigation will tell the tale. %d bloggers like this:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '21', 'language_id_whole_page_fasttext': "{'en': 0.9569881558418274}", 'metadata': "{'Content-Length': '120612', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5M2IEQL4PVGS3PMVBOGOOPKOLK4GXRBD', 'WARC-Concurrent-To': '<urn:uuid:ccfe3638-e7b8-4bb7-84b2-784c9f8abe0b>', 'WARC-Date': datetime.datetime(2015, 5, 6, 9, 32, 17), 'WARC-IP-Address': '162.144.7.10', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:S2BO6G6YTOKNNYIAILRP5JII6K7EV7YQ', 'WARC-Record-ID': '<urn:uuid:c8648fd8-fb25-4e98-afab-980485f6ef67>', 'WARC-Target-URI': 'http://conservativereport.org/foreign-policy-indictment-of-barack-obama-incompetence-on-parade/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d444ad5a-6ffd-418b-a4b0-58557b841410>', 'WARC-Truncated': None}", 'previous_word_count': '1379', 'url': 'http://conservativereport.org/foreign-policy-indictment-of-barack-obama-incompetence-on-parade/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-235-10-82.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03396046161651611', 'original_id': '6f159357998fd409899e9c68a35df048d93acdfd50f318322f6af6e43a5ab140'}
Why You Should Start Pounding The Drums       Comments Off on Why You Should Start Pounding The Drums It was almost every kid’s dream to play the piano or the guitar growing up. Drums rarely came up because they were loud, or they just were not ideal for the parents at all. Asian parents, especially. However, here are four reasons as to why you should switch to drums. Number 3 will shock you. 1. It’s more fun than Piano Rather than banging on a bunch of keys and getting more depressed the moment you realize you will never be able to play a single note, you should pour your heart out with the drums. It can make the sickest beats even when you just pound away. You can get away with playing smooth or strong beats, and you can also make up your rhythm and still sound good! It doesn’t take rocket science genius levels. 2. Stress-reliever Music, in general, is already a great way to relieve stress. Studies have also shown that drumming, in particular, can reduce the production of cortisol- the hormone that induces stress. “Drum circle” or a group of people who plays ‘hand drums’ have been found to have a de-stressing effect on those who partake in in it. It has something to do with the vibrations and that there seems to be “a feeling of community and closeness” when you play it together. Music therapists themselves can attest to it, research or no. Technicalities aside, drumming gives you energy, you have more control of the music you produce or would want to hear, and would help in blowing off the unwanted negative vibes. 3. It can make you SMARTER Who doesn’t want to be just a tad smarter? Research posits that drummers are better at problem-solving than those who do not play. Studies by the Karolinska Institute found out that those who can play a series of beats, “scored better on a 60-question intelligence test”. It is said that maintaining one steady beat is a form of expressing capabilities in problem-solving. Other studies have also shown that “rhythmic music can make other people smarter” after professors in the University of Washington made his students undergo a “light and sound therapy.” If those studies from prominent universities can’t convince you, I don’t know what else can. 4. Great workout “Poundfit” claims to make their enrollees healthier by using movements likened to drumming. They’re all about the “pounding” work-outs at home and just about any space you can find. I mean, in a generation congested with Instagrammable food, salivating dessert shops, and just about everything else you can put inside your mouth, drumming to stay in shape does not sound bad, at all. You get to have fun, look cool, lose weight, relieve stress, and you just might find drumming to be a life-long passion! Hooray for the heavy and the lazy!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.961395800113678}", 'metadata': "{'Content-Length': '28143', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KHMKYXPQIZZT6W4NWMWM54VCXR5G2QFQ', 'WARC-Concurrent-To': '<urn:uuid:f021b420-c856-4bf1-9137-18c5f56db2af>', 'WARC-Date': datetime.datetime(2017, 3, 25, 7, 37, 3), 'WARC-IP-Address': '45.32.193.160', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:UZAQ2AG456JLSHTL6JT4GPOWNDD7NRNK', 'WARC-Record-ID': '<urn:uuid:e4c7d446-f161-4378-97ce-f685c9b30cc1>', 'WARC-Target-URI': 'http://www.morbidboard.com/why-you-should-start-pounding-the-drums/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:71c846fe-459a-41b1-94e9-ecba0d07a32e>', 'WARC-Truncated': None}", 'previous_word_count': '478', 'url': 'http://www.morbidboard.com/why-you-should-start-pounding-the-drums/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-233-31-227.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-13\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for March 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11775350570678711', 'original_id': 'd3b4bc57ed07b5ae2171643a1260889f3af0b507128fa485a178b68f917a49db'}
IFUP-TH 2012/10 1.4truecm [**Master Functional And Proper Formalism**]{} .5truecm [**For Quantum Gauge Field Theory**]{} 1truecm *Damiano Anselmi* .2truecm *Dipartimento di Fisica “Enrico Fermi”, Università di Pisa,* *Largo B. Pontecorvo 3, I-56127 Pisa, Italy,* .2truecm damiano.anselmi@df.unipi.it 1.5truecm **Abstract** [We develop a general field-covariant approach to quantum gauge theories. Extending the usual set of integrated fields and external sources to “proper” fields and sources, which include partners of the composite fields, we define the master functional ]{}$\Omega $[, which collects one-particle irreducible diagrams and upgrades the usual ]{}$\Gamma $[-functional in several respects. The functional ]{}$\Omega $[ is determined from its classical limit applying the usual diagrammatic rules to the proper fields. Moreover, it behaves as a scalar under the most general perturbative field redefinitions, which can be expressed as linear transformations of the proper fields. We extend the Batalin-Vilkovisky formalism and the master equation. The master functional satisfies the extended master equation and behaves as a scalar under canonical transformations. The most general perturbative field redefinitions and changes of gauge-fixing can be encoded in proper canonical transformations, which are linear and do not mix integrated fields and external sources. Therefore, they can be applied as true changes of variables in the functional integral, instead of mere replacements of integrands. This property overcomes a major difficulty of the functional ]{}$\Gamma $[. Finally, the new approach allows us to prove the renormalizability of gauge theories in a general field-covariant setting. We generalize known cohomological theorems to the master functional and show that when there are no gauge anomalies all divergences can be subtracted by means of parameter redefinitions and proper canonical transformations. ]{} 1truecm Introduction ============ The renormalization of gauge theories is efficiently studied using the Batalin-Vilkovisky formalism [@bata] and the dimensional-regularization technique. First, sources $K_{A}$ are coupled to the gauge transformations $R^{A}(\Phi )$ of the fields $\Phi ^{A}$. Then the pairs $\Phi ^{A}$-$K_{A}$ are viewed as conjugate variables, and a notion of antiparentheses $(X,Y)$ for local and non-local functionals $X$ and $Y$ is introduced. The master equations $(S,S)=0$ and $(\Gamma ,\Gamma )=0$ satisfied by the action $S$ and the generating functional $\Gamma $ of one-particle irreducible diagrams keep track of gauge invariance through radiative corrections and counterterms. Divergences proportional to the field equations or of gauge-fixing type are removed by means of canonical transformations, while divergences of all other types are removed by means of parameter redefinitions. The canonical transformations are the redefinitions of $\Phi $ and $K$ that preserve the antiparentheses. In simple power-counting renormalizable theories, such as ordinary Yang-Mills theory, the renormalization of fields and sources is multiplicative. However, in more complicated, renormalizable or non-renormalizable, theories, such as Yang-Mills theory with an unusual action, or with composite fields turned on, as well as effective field theories and gravity, the canonical transformations that subtract divergences can be non-linear [@thooftveltman] and mix $\Phi $ and $K$ in non-trivial ways. It is legitimate to replace the integrated fields $\Phi $ with (perturbatively local) functions of $\Phi $ and $K$, because this operation is just a change of variables in the functional integral. Nevertheless, it is not legitimate to replace an external source $K$ with a function that depends on the integrated fields $\Phi $. Therefore, the formalism we are accustomed to is not completely satisfactory. It works only if canonical transformations are meant as mere replacements of integrands, not true changes of field variables in the functional integral. This means that they are understood as changes of variables only at the level of the action $S$. However, the term $\int \Phi ^{A}J_{A}$ that appears in the exponent of the $Z$-integrand is not transformed, but just replaced by brute force with the one of the new variables, $\int \Phi ^{\prime \hspace{0.01in}A}J_{A}^{\prime }$. When the entire $J$-dependence is encoded in the term $\int \Phi ^{A}J_{A}$ we say that the functional integral is written in the *conventional form*. A non-linear change of variables destroys the conventional form. Replacements bypass this fact restoring that form by brute force. Thus, replacements allow us to “jump” from the generating functional associated with the action $S$ to the one associated with the transformed action $S^{\prime }$, but cannot be straightforwardly used to write identities relating the generating functionals before and after the transformation. A general field-covariant approach to quantum field theory has been developed in ref.s [@fieldcov; @masterf]. Due to the intimate relation between composite fields and changes of field variables, sources $L_{I}$ for the composite fields $\mathcal{O}^{I}(\varphi )$ are introduced, besides the usual sources $J$ for the elementary fields $\varphi $. Then, suitably improved $Z$- and $W$-functionals are defined, so that the Legendre transform of $W$ with respect to both $J$ and $L$ exists, and defines the so-called master functional $\Omega (\Phi ,N)$. The master functional is a generating functional of one-particle irreducible diagrams and behaves as a scalar under general changes of field variables. Moreover, every field redefinition is encoded in a linear transformation of $\Phi $ and $N$. In a particularly convenient “proper” approach, where the integrated fields $\varphi $ are extended to a set of proper fields $\varphi $ and $N_{S}$, such that $\Phi =\langle \varphi \rangle $ and $N=\langle N_{S}\rangle $, the radiative corrections to $\Omega$ can be derived from its classical limit following rules analogous to the ones we are accustomed to. Moreover, the conventional form of the functional integral is manifestly preserved during a general change of field variables, so replacements and true changes of field variables are practically the same thing. If we want a truly variable-independent approach to gauge field theory we must generalize the ideas of ref. [@masterf] and define the master functional $\Omega $ in a way that is compatible with gauge invariance. In particular, $\Omega $ must satisfy it own master equation. In this paper we show how this is done. We first extend the notion of antiparentheses and the Batalin-Vilkovisky formalism to the composite-field sector, and prove that $\Omega $ satisfies a master equation in this extended sense. We also extend the proper formulation of $\Omega $. In particular, there exist *proper* canonical transformations, which are linear redefinitions of the proper fields and the proper sources that encode the most general field redefinitions and changes of gauge-fixing. The external sources transform without mixing with the integrated fields. Thus, proper canonical transformations can be safely implemented as changes of field variables in the functional integral. The proper formalism allows us to study the renormalizability of gauge theories in a general setting. We assume that there are no gauge anomalies and the gauge algebra closes off shell. We show that when known cohomological theorems [@coho] apply they can be generalized to the master functional with a relatively small effort. Then the classical and bare actions can be extended till they include enough independent parameters so that all divergences proportional to the field equations and of gauge-fixing type are subtracted by means of proper canonical transformations and all other divergences are subtracted by means of parameter redefinitions. Clearly, the master equation is preserved at every step of the subtraction. For definiteness, we work using the Euclidean notation, but no results depend on this choice. The paper is organized as follows. In section 2 we define the master functional for gauge theories and extend the antiparentheses and the master equation to the composite-field sector. In section 3 we develop the proper formalism, and in section 4 we study the proper canonical transformations. In sections 5, 6 and 7 we study the renormalization of gauge theories in the general field-covariant approach. In section 5, we prove some preliminary results, subtracting divergences as they appear, without checking if they can be reabsorbed inside canonical transformations and parameter redefinitions. Then, in section 6, we generalize known cohomological theorems to the master functional and prove that $\Omega $ can be renormalized by means of parameter redefinitions and generic canonical transformations. At this stage we do not know whether those canonical transformations are proper or not, so we can only use them as replacements. In section 7 we extend the classical and bare actions so that they still satisfy their master equations and contain enough independent parameters to subtract all divergences by means of parameter redefinitions and proper canonical transformations. Section 8 contains the conclusions and in the appendix we prove a cohomological theorem used in the paper. Master functional ================= In this section we generalize the master functional introduced in ref. [@masterf] to gauge field theories, and extend the Batalin-Vilkovisky formalism. First we briefly recall the usual formalism. The set of fields $\{\Phi ^{A}\} $ includes the classical fields $\phi $, plus ghosts $C$, antighosts $\bar{C} $ and Lagrange multipliers $B$ for the gauge-fixings. An external source $K_{A}$ is associated with each $\Phi ^{A}$, with statistics opposite to the one of $\Phi ^{A}$. If $X$ and $Y$ are functionals of $\Phi $ and $K$ their antiparentheses are defined as $$(X,Y)\equiv \int \left( \frac{\delta _{r}X}{\delta \Phi ^{A}}\frac{\delta _{l}Y}{\delta K_{A}}-\frac{\delta _{r}X}{\delta K_{A}}\frac{\delta _{l}Y}{\delta \Phi ^{A}}\right) , \label{usa}$$ where the summation over $A$ is understood. The integral is made over spacetime points associated with repeated indices. The master equation is $(S,S)=0$. Solving it with the “boundary condition” $S(\Phi ,K)=S_{c}(\phi ) $ at $C=\bar{C}=B=K=0$, where $S_{c}(\phi )$ is the classical action, we get the solution $S(\Phi ,K)$ we start with to quantize the theory. We assume that the gauge algebra closes off shell, so there exists a variable frame where $S(\Phi ,K)$ is linear in $K$. Then we can define functions $\mathcal{S}(\Phi )$ and $R^{A}(\Phi )$, such that $$S(\Phi ,K)=\mathcal{S}(\Phi )-\int R^{A}(\Phi )K_{A}. \label{buh}$$ We assume that the source-independent action $\mathcal{S}(\Phi )$ is already gauge-fixed. The generating functional $Z$ reads $$Z(J,K)=\int [\mathrm{d}\Phi ]\exp \left( -S(\Phi ,K)+\int \Phi ^{A}J_{A}\right) =\exp W(J,K).$$ Finally, the generating functional $\Gamma (\Phi ,K)$ of one-particle irreducible diagrams is the Legendre transform of $W(J,K)$ with respect to $J $, the sources $K$ being spectators. For example, in pure non-Abelian Yang-Mills theory we have $\Phi ^{A}=(A_{\mu }^{a},C^{a},\bar{C}^{a},B^{a})$, $K_{A}=(K_{a}^{\mu },K_{C}^{a},K_{\bar{C}}^{a},K_{B}^{a})$ and $$\begin{aligned} S(\Phi ,K) &=&\int \left( \frac{1}{4}F_{\mu \nu }^{a\ 2}-\frac{\lambda }{2}(B^{a})^{2}+B^{a}\partial \cdot A^{a}-\bar{C}^{a}\partial _{\mu }D_{\mu }C^{a}\right) \\ &&-\int D_{\mu }C^{a}K_{\mu }^{a}+\frac{g}{2}\int f^{abc}C^{b}C^{c}K_{C}^{a}-\int B^{a}K_{\bar{C}}^{a}{,}\end{aligned}$$ where $F_{\mu \nu }^{a}=\partial _{\mu }A_{\nu }^{a}-\partial _{\nu }A_{\mu }^{a}+gf^{abc}A_{\mu }^{b}A_{\nu }^{c}$ is the field strength, $D_{\mu }C^{a}=\partial _{\mu }C^{a}+gf^{abc}A_{\mu }^{b}C^{c}$ is the covariant derivative of the ghosts and $f^{abc}$ are the structure constants of the Lie algebra. Starting from a variable frame where the structure (\[buh\]) holds is not a restrictive assumption, because the form (\[buh\]) is preserved by all canonical transformations whose generating functions $F(\Phi ,K^{\prime })$ are linear in the sources, $$F(\Phi ,K^{\prime })=\int (\Phi ^{A}+U^{A}(\Phi ))K_{A}^{\prime }+\Psi (\Phi ),$$ which contain the most general $\Phi $-redefinitions and changes of gauge-fixings. Note, however, that these canonical transformations turn the sources into functions of the fields, so they cannot be used as changes of variables in the functional integral, but must be treated as replacements of integrands. The master functional allows us to solve this and other problems, and formulate quantum field theory in a general field-covariant way. A non-linear change of field variables is intimately related to composite fields. We need to consider all sorts of composite fields, not only gauge-invariant ones, because a field redefinition is in no way restricted by gauge invariance. However, gauge-non-invariant composite fields make the action violate the master equation, so they must be introduced in a clever way. We are going to include composite fields with arbitrary ghost number, and both bosonic and fermionic statistics, made with the fields $\Phi $ and their derivatives. Thus, the first thing to do it to add a term $\int \mathcal{O}^{I}(\Phi )L_{I}$ to the exponent of the $Z$-integrand, where $\{\mathcal{O}^{I}\}$ is a basis of composite fields and $L_{I}$ denotes the external source coupled to $\mathcal{O}^{I}$. Since this extension violates the master equation, we need to further modify the exponent, so that it also incorporates the gauge transformations $$R_{\mathcal{O}}^{I}(\Phi )\equiv \int R^{A}(\Phi )\frac{\delta _{l}\mathcal{O}^{I}}{\delta \Phi ^{A}}$$ of the composite fields $\mathcal{O}^{I}(\Phi )$. We couple such functions with new sources $H_{I}$. We must pay attention to the statistics of composite fields and sources. By convention, we always place the sources to the right, so the new exponent of the $Z$-integrand becomes $$-\mathcal{S}(\Phi )+\int \left( \Phi ^{A}J_{A}+R^{A}(\Phi )K_{A}+\mathcal{O}^{I}(\Phi )L_{I}+R_{\mathcal{O}}^{I}(\Phi )H_{I}\right) , \label{stutto}$$ up to further extensions that we describe later, where summations over $I$ are also understood. Note that the composite fields $R_{\mathcal{O}}^{I}$s appear twice: once together with the source $H_{I}$, and once together with some sources $L_{\bar{I}}$. This redundancy is harmless, actually useful for some purposes explained below. Moreover, the sources $L_{I}$ and $H_{I}$ play different roles in the Legendre transform that defines $\Omega $. It is useful to rewrite expression (\[stutto\]) as $$-S_{H}(\Phi ,K,H)+\int \left( \Phi ^{A}J_{A}+\mathcal{O}^{I}L_{I}\right) , \label{newa}$$ where we have defined a new extended action $$S_{H}(\Phi ,K,H)=\mathcal{S}(\Phi )-\int \left( R^{A}(\Phi )K_{A}+R_{\mathcal{O}}^{I}(\Phi )H_{I}\right) \label{newext}$$ that obviously satisfies the usual master equation $(S,S)=0$. The last two terms of (\[newa\]), instead, both violate the master equation, which is why we treat them on the same footing. Observe that equating the sources $H$ to constants we can parametrize the most general gauge-fixing, since the last term of (\[newext\]) is of the form $(S_{H},\Psi )$ with $\Psi =-\int \mathcal{O}^{I}H_{I}$. Moreover, if we set the sources $L_{I}$ of gauge-invariant composite fields equal to constants we can add interactions, thereby modifying the classical action at will. Indeed, the techniques we are developing allow us to treat the most general theory, express it using arbitrary field variables and gauge-fix it with the most general gauge-fixing. In ref.s [@fieldcov; @masterf] a linear approach was defined, where the action is extended to include higher-powers of the sources, so that divergences are subtracted by means of field redefinitions, parameter redefinitions and linear source redefinitions. Here similar results are less straightforward to achieve, and we must proceed gradually. For the moment a sufficiently general extended solution of the master equation is $$S_{H}(\Phi ,K,L,H)=\mathcal{S}(\Phi )-\int \left( R^{A}(\Phi )K_{A}+R_{\mathcal{O}}^{I}(\Phi )H_{I}\right) -\int \tau _{vI}\mathcal{N}^{v}(L)\mathcal{O}_{\text{inv}}^{I}(\Phi ), \label{gullo}$$ where $\mathcal{O}_{\text{inv}}^{I}$ are the gauge-invariant composite fields (namely they satisfy $(S,\mathcal{O}_{\text{inv}}^{I})=(S_{H},\mathcal{O}_{\text{inv}}^{I})=0$), the $\tau _{vI}$s are constants and $\mathcal{N}^{v}(L)=\mathcal{O}(L^{2})$ are a basis of independent local monomials, at least quadratic in $L_{I}$, that can be constructed with the sources $L$ and their derivatives. Clearly, (\[gullo\]) satisfies the master equation $(S_{H},S_{H})=0$. At this stage we cannot guarantee that all divergences can be subtracted redefining the fields, sources and parameters appearing in (\[gullo\]), and that the sources redefinitions are linear. These problems are treated in sections 6 and \[RGren\], where further extensions are developed. The important fact is that (\[gullo\]) is general enough to make room for the improvement term met in ref. [@masterf], which for later convenience we write here as $$T(L)=\frac{1}{2}\int L_{I}(\tilde{A}^{-1})^{IJ}L_{J}, \label{improfin}$$ where $A_{IJ}$ are constants ($c$-numbers) and $\tilde{A}$ is the $A$-transpose. These constants must be restricted according to the statistics of the sources $L$, their ghost numbers and the other global symmetries satisfied by the theory. The term (\[improfin\]) is just a contribution to $\int \tau _{v0}\mathcal{N}^{v}$, which multiplies the identity operator, and allows us to define the Legendre transform of $W$ with respect to $L$. As usual, we shift $\int \tau _{v0}\mathcal{N}^{v}(L)$ by $T(L)$ and assume that the new $\int \tau _{vI}\mathcal{N}^{v}\mathcal{O}_{\text{inv}}^{I}$ is perturbative with respect to $T(L)$. The action becomes $$S_{H}(\Phi ,K,L,H)=\mathcal{S}(\Phi )-\int \left( R^{A}(\Phi )K_{A}+R_{\mathcal{O}}^{I}(\Phi )H_{I}\right) -\frac{1}{2}\int L_{I}(\tilde{A}^{-1})^{IJ}L_{J}-\int \tau _{vI}\mathcal{N}^{v}(L)\mathcal{O}_{\text{inv}}^{I}(\Phi ). \label{gullo2}$$ Again, $(S_{H},S_{H})=0$. The generating functionals $Z$ and $W$ are defined as $$Z(J,K,L,H)=\mathrm{e}^{W(J,K,L,H)}=\int [\mathrm{d}\Phi ]\ \mathrm{\exp }\left( -S_{H}(\Phi ,K,L,H)+\int \left( \Phi ^{A}J_{A}+\mathcal{O}^{I}L_{I}\right) \right) \label{zjkhlv}$$ and are invariant under the transformation $$\tau J_{A}=0,\qquad \tau K_{A}=(-1)^{\varepsilon _{A}}J_{A},\qquad \tau L_{I}=0,\qquad \tau H_{I}=(-1)^{\varepsilon _{I}}L_{I},$$ where $\varepsilon _{A}$ and $\varepsilon _{I}$ are the statistics of $\Phi ^{A}$ and $\mathcal{O}^{I}$, respectively. The proof of this invariance is as follows. Apply the operator $\delta _{\tau }=\xi \tau $ to the $Z$-functional (\[zjkhlv\]), where $\xi $ is a constant anticommuting parameter. Using (\[gullo2\]) we see that $$\delta _{\tau }W=-\xi \int \langle R^{A}J_{A}+R_{\mathcal{O}}^{I}L_{I}\rangle . \label{bugi}$$ These contributions can be canceled making the change of variables $$\Phi ^{A}\rightarrow \Phi ^{A}+\xi R^{A}=\Phi ^{A}+\xi (S_{H},\Phi ^{A}) \label{chv2}$$ in (\[zjkhlv\]). Indeed, (\[chv2\]) affects only $\int \left( \Phi ^{A}J_{A}+\mathcal{O}^{I}L_{I}\right) $ by an amount opposite to (\[bugi\]). Thus, $$\tau Z(J,K,L,H)=0,\qquad \tau W(J,K,L,H)=0. \label{usta}$$ We define the master functional $\Omega $ as the Legendre transform of $W$ with respect to $J$ and $L$, where $K$ and $H$ remain inert. We have $$\Omega (\Phi ,K,N,H)=-W(J,K,L,H)+\int \left( \Phi ^{A}J_{A}+N^{I}L_{I}\right) , \label{hug}$$ where $$\begin{aligned} \Phi ^{A} &=&\frac{\delta _{r}W}{\delta J_{A}},\qquad N^{I}=\frac{\delta _{r}W}{\delta L_{I}},\qquad \frac{\delta _{r}W}{\delta K_{A}}=-\frac{\delta _{r}\Omega }{\delta K_{A}}, \nonumber \\ J_{A} &=&\frac{\delta _{l}\Omega }{\delta \Phi ^{A}},\qquad L_{I}=\frac{\delta _{l}\Omega }{\delta N^{I}},\qquad \frac{\delta _{r}W}{\delta H_{I}}=-\frac{\delta _{r}\Omega }{\delta H_{I}}. \label{assur}\end{aligned}$$ Setting $K_{A}=H_{I}=L_{I}=0$ we switch off the composite-field sector and the sector of gauge transformations. Instead, setting $H_{I}=L_{I}=0$ the master functional $\Omega $ reduces to the $\Gamma $-functional $\Gamma (\Phi ,K)$. In particular, the solutions of the conditions $L_{I}=\delta _{l}\Omega /\delta N^{I}=0$ express $N^{I}$ as functions of the fields $\Phi $ and the sources $K$, $H$. Using $N^{I}=\delta _{r}W/\delta L_{I}$ and formula (\[zjkhlv\]) at $L=0$ we have $N^{I}=\langle \mathcal{O}^{I}\rangle _{L=0}$, therefore $$\Gamma (\Phi ,K)=\Omega (\Phi ,K,\langle \mathcal{O}^{I}\rangle _{L=H=0},0).$$ Now we extend the Batalin-Vilkovisky formalism. Given two functionals $X$ and $Y$ of $\Phi $, $K$, $N$ and $H$, we define their *squared antiparentheses* $\left\lfloor X,Y\right\rfloor $ as $$\left\lfloor X,Y\right\rfloor \equiv \int \left( \frac{\delta _{r}X}{\delta \Phi ^{A}}\frac{\delta _{l}Y}{\delta K_{A}}+\frac{\delta _{r}X}{\delta N^{I}}\frac{\delta _{l}Y}{\delta H_{I}}-\frac{\delta _{r}X}{\delta K_{A}}\frac{\delta _{l}Y}{\delta \Phi ^{A}}-\frac{\delta _{r}X}{\delta H_{I}}\frac{\delta _{l}Y}{\delta N^{I}}\right) .$$ In practice, the squared antiparentheses are made of the usual antiparentheses plus similar ones for the pair of conjugate variables $N^{I}$-$H_{I}$. Because of this, the squared antiparentheses satisfy the usual properties $$\begin{aligned} &&\qquad \lfloor Y,X\rfloor =-(-1)^{(\varepsilon _{X}+1)(\varepsilon _{Y}+1)}\lfloor X,Y\rfloor , \nonumber \\ &&(-1)^{(\varepsilon _{X}+1)(\varepsilon _{Z}+1)}\lfloor X,\lfloor Y,Z\rfloor \rfloor +\text{cyclic permutations}=0, \label{Jid}\end{aligned}$$ and $\varepsilon _{\lfloor X,Y\rfloor }=\varepsilon _{X}+\varepsilon _{Y}+1$, where $\varepsilon _{X}$ denotes the statistics of the functional $X$. Moreover, $$\lfloor F,F\rfloor =0,\qquad \lfloor B,B\rfloor =-2\int \left( \frac{\delta _{r}B}{\delta K_{A}}\frac{\delta _{l}B}{\delta \Phi ^{A}}+\frac{\delta _{r}B}{\delta H_{I}}\frac{\delta _{l}B}{\delta N^{I}}\right) , \label{bubu}$$ if $F$ is a fermionic functional and $B$ is a bosonic one. Finally, the Jacobi identity (\[Jid\]) ensures that $$\lfloor X,\lfloor X,X\rfloor \rfloor =0 \label{wezum}$$ for every functional $X$. Now, using (\[assur\]) and the second of (\[bubu\]) we can rewrite $$\tau W=-\int \frac{\delta _{r}W}{\delta K_{A}}J_{A}-\int \frac{\delta _{r}W}{\delta H_{I}}L_{I}=0$$ as $$\tau W=\int \frac{\delta _{r}\Omega }{\delta K_{A}}\frac{\delta _{l}\Omega }{\delta \Phi ^{A}}+\int \frac{\delta _{r}\Omega }{\delta H_{I}}\frac{\delta _{l}\Omega }{\delta N^{I}}=-\frac{1}{2}\lfloor \Omega ,\Omega \rfloor =0. \label{milpot}$$ We have thus proved that the master functional $\Omega $ satisfies the master equation $\lfloor \Omega ,\Omega \rfloor =0$. Canonical transformations can be extended defining them as the redefinitions of $\Phi $, $K$, $N$ and $H$ that preserve the squared antiparentheses. They can be encoded in generating functions $F(\Phi ,K^{\prime },N,H^{\prime })$ such that $$\Phi ^{A\hspace{0.01in}\prime }=\frac{\delta F}{\delta K_{A}^{\prime }},\qquad K_{A}=\frac{\delta F}{\delta \Phi ^{A}},\qquad N^{I\hspace{0.01in}\prime }=\frac{\delta F}{\delta H_{I}^{\prime }},\qquad H_{I}=\frac{\delta F}{\delta N^{I}}.$$ Proper formulation ================== In this section we extend the proper formalism of ref. [@masterf] to gauge theories, which allows us to derive several properties in more economic and more general ways. For example, several results derived so far rely on the particular form (\[gullo2\]) of the action $S_{H}$. Now we can drop that assumption. We still assume that the $L$-dependence of $S_{H}$ is made of $-T(L)$ plus corrections that must be treated perturbatively with respect to the improvement term. Moreover, the generating functionals are still defined by (\[zjkhlv\]) and (\[hug\]). Next, define the $S_{L}$-action $$S_{L}(\Phi ,K,N,H,L)=S_{H}(\Phi ,K,L,H)+\int \tilde{N}^{I}L_{I}, \label{sln0}$$ where $\tilde{N}^{I}=N^{I}-\mathcal{O}^{I}(\Phi )$, and assume that it satisfies the master equation $$\lfloor S_{L},S_{L}\rfloor =0. \label{slnprop}$$ In this equation the sources $L$ are mere spectators. It is easy to show that if $S_{H}$ is given by (\[gullo2\]) the action $S_{L}$ does satisfies this identity. Define the *proper action* $S_{N}(\Phi ,K,N,H)$ by means of the formula $$\exp \left( -S_{N}(\Phi ,K,N,H)\right) \equiv \int [\mathrm{d}L]\exp \left( -S_{L}(\Phi ,K,N,H,L)\right) . \label{expsn}$$ The generating functionals can be expressed using the proper action. For example, we have $$Z(J,K,L,H)=\int [\mathrm{d}\Phi \hspace{0.01in}\mathrm{d}N]\exp \left( -S_{N}(\Phi ,K,N,H)+\int \Phi ^{A}J_{A}+\int N^{I}L_{I}\right) =\exp W(J,K,L,H), \label{ibll}$$ because, using (\[sln0\]) and (\[expsn\]), this formula immediately returns (\[zjkhlv\]). Then the master functional can be calculated using (\[hug\])-(\[assur\]). Observe that in this section $\Phi $ and $N$ denote the integrated proper fields, arguments of the proper action $S_{N}$, while in the previous section the same notation $\Phi $ and $N$ was used for the arguments of the master functional $\Omega $. When we want to distinguish the ones from the others, we call $\Phi _{\Omega }$, $N_{\Omega }$ the arguments of $\Omega $ and $\Phi _{S}$, $N_{S}$ the arguments of $S_{N}$. Thus, strictly speaking we have $\Phi _{\Omega }=\langle \Phi _{S}\rangle $ and $N_{\Omega }=\langle N_{S}\rangle $. In the functional integral (\[expsn\]) the $L$-propagators are those determined by the improvement term (\[improfin\]), therefore they are proportional to the identity, and every other term of (\[expsn\]) must be treated perturbatively. It is easy to see, using the dimensional regularization, that the integral of (\[expsn\]) receives contributions only from tree diagrams and can be calculated exactly using the saddle-point approximation. Let $L_{I}=L_{I}^{*}(\Phi ,K,N,H)$ denote the solution of $\delta _{r}S_{L}/\delta L=0$, or $$\tilde{N}^{I}=-\frac{\delta _{r}}{\delta L_{I}}S_{H}(\Phi ,K,L,H). \label{arrepo}$$ Then $$S_{N}(\Phi ,K,N,H)=S_{H}(\Phi ,K,L^{*},H)+\int \tilde{N}^{I}L_{I}^{*}.$$ In practice, $S_{N}$ coincides with the Legendre transform of $-S_{H}+\int \mathcal{O}^{I}L_{I}$ with respect to $L$. Because of this, we have the relation $$\frac{\delta _{l}S_{N}}{\delta N^{I}}=L_{I}^{*}(\Phi ,K,N,H), \label{bigo}$$ so (\[arrepo\]) is equivalent to $$L_{I}=\frac{\delta _{l}S_{N}}{\delta N^{I}}. \label{fe}$$ If $S_{L}$ satisfies (\[slnprop\]) the proper action satisfies the *proper master equation* $$\lfloor S_{N},S_{N}\rfloor =0. \label{snprop}$$ Indeed, observe that $S_{N}$ is just $S_{L}$ with $L$ equal to the solution $L^{*}$ of $\delta _{r}S_{L}/\delta L=0$. Every time we differentiate $S_{N}$ with respect to $\vartheta =\Phi ,K,N$ or $H$, we must pay attention to the fact that now $L$ is no longer fixed, but depends on $\vartheta $. However, the operation of setting $L=L^{*}$ and the differentiation with respect to $\vartheta $ can be freely interchanged on $S_{L}$, because $$\frac{\delta _{r}S_{N}}{\delta \vartheta }=\frac{\delta _{r}}{\delta \vartheta }\left( \left. S_{L}\right| _{L=L^{*}}\right) =\left. \frac{\delta _{r}S_{L}}{\delta \vartheta }\right| _{L=L^{*}}+\left. \frac{\delta _{r}S_{L}}{\delta L_{I}}\right| _{L=L^{*}}\frac{\delta _{r}L_{I}^{*}}{\delta \vartheta }=\left. \frac{\delta _{r}S_{L}}{\delta \vartheta }\right| _{L=L^{*}}.$$ Here the integrations over spacetime points associated with repeated indices are understood. Thus, (\[slnprop\]) implies (\[snprop\]). Moreover, differentiating $\lfloor S_{L},S_{L}\rfloor =0$ with respect to $L_{I}$ we have $\lfloor S_{L},\delta _{r}S_{L}/\delta L_{I}\rfloor =0$. Setting $L=L^{*}$ in this equation and using $$0=\frac{\delta _{l}}{\delta \vartheta }\left( \left. \frac{\delta _{r}S_{L}}{\delta L_{I}}\right| _{L=L^{*}}\right) =\left. \frac{\delta _{l}\delta _{r}S_{L}}{\delta \vartheta \delta L_{I}}\right| _{L=L^{*}}+\frac{\delta _{l}L_{J}^{*}}{\delta \vartheta }\left. \frac{\delta _{l}\delta _{r}S_{L}}{\delta L_{J}\delta L_{I}}\right| _{L=L^{*}},$$ we get $$\lfloor S_{N},L_{J}^{*}\rfloor \left. \frac{\delta _{l}\delta _{r}S_{L}}{\delta L_{J}\delta L_{I}}\right| _{L=L^{*}}=0.$$ Now, $\delta _{l}\delta _{r}S_{L}/\delta L_{J}\delta L_{I}$ is a perturbatively invertible matrix, because the improvement term is dominant with respect to all other terms belonging to the $L$-sector. Therefore, we can drop that matrix and conclude $$\lfloor S_{N},L_{I}^{*}\rfloor =0. \label{cucu}$$ This result was expected, because $L$ is gauge-invariant ($\lfloor S_{L},L_{I}\rfloor =0$) and $L^{*}$ is determined by the gauge-invariant equation $\delta _{r}S_{L}/\delta L=0$. Then the solution $L=L^{*}(\Phi ,K,N,H)$ must be gauge-invariant. Before proceeding, we apply the construction just outlined to the case where $S_{H}$ is given by (\[gullo2\]). Using (\[arrepo\]) we find $$L_{I}^{*}=A_{IJ}\tilde{N}^{J}+\mathcal{O}(\tilde{N})\text{-perturbative corrections}, \label{arrarrarra}$$ thus the proper action has the form $$S_{N}(\Phi ,K,N,H)=\mathcal{S}(\Phi )-\int \left( R^{A}(\Phi )K_{A}+R_{\mathcal{O}}^{I}(\Phi )H_{I}\right) +\frac{1}{2}\int \tilde{N}^{I}A_{IJ}\tilde{N}^{J}+\int \rho _{vI}\mathcal{N}^{v}(\tilde{N})\mathcal{O}_{\text{inv}}^{I}(\Phi ), \label{gullo3}$$ for suitable parameters $\rho _{vI}$ equal to $\tau _{vI}$ plus perturbative corrections. Observe that the combinations $\tilde{N}$ are gauge invariant, namely $\lfloor S_{N},\tilde{N}^{I}\rfloor =0$. It is also instructive to prove (\[snprop\]) more directly in this case. We do it using (\[expsn\]). Observe that $$\frac{\delta _{r}S_{N}}{\delta K_{A}}=-R^{A}(\Phi ),\qquad \frac{\delta _{l}S_{N}}{\delta \Phi ^{A}}=\left\langle \frac{\delta _{l}S_{H}}{\delta \Phi ^{A}}\right\rangle _{L}-\frac{\delta _{l}\mathcal{O}^{I}}{\delta \Phi ^{A}}\langle L_{I}\rangle _{L},\qquad \frac{\delta _{l}S_{N}}{\delta N^{I}}=\langle L_{I}\rangle _{L},\qquad \frac{\delta _{r}S_{N}}{\delta H_{I}}=-R_{\mathcal{O}}^{I},$$ where $\langle \cdots \rangle _{L}$ denotes the expectation value in the sense of the $L$-integral of (\[expsn\]). Using (\[bubu\]) we have $$\lfloor S_{N},S_{N}\rfloor =2\int \left\langle R^{A}\frac{\delta _{l}S_{H}}{\delta \Phi ^{A}}\right\rangle _{L}=\langle (S_{H},S_{H})\rangle _{L}=0.$$ The perturbative expansion can be organized assuming [@masterf] $$\begin{aligned} \lambda _{n_{l}} &=&\mathcal{O}(\delta ^{n_{l}-2}),\qquad L_{I}=\mathcal{O}(\delta ^{n_{I}-2}),\qquad A_{IJ}=\mathcal{O}(\delta ^{n_{I}+n_{J}-2}),\qquad \rho _{vI}=\mathcal{O}(\delta ^{n_{I}-n_{v}-1}), \nonumber \\ K^{A} &=&\mathcal{O}(\delta ^{n_{A}-2}),\qquad H_{I}=\mathcal{O}(\delta ^{n_{I}^{\prime }-2}),\qquad \tilde{N}_{S}^{I}=\mathcal{O}(\delta ^{-n_{I}}), \label{assigne1}\end{aligned}$$ where $\delta $ is some reference parameter $\ll 1$, $\lambda _{n_{l}}$ is the coupling, or product of couplings, multiplying a monomial with $n_{l}$ $\Phi $-legs in $\mathcal{S}(\Phi )$, $n_{I}$ is such that $\mathcal{O}^{I}(\Phi \delta ^{-1},\lambda _{l}\delta ^{n_{l}-2})=\delta ^{-n_{I}}\mathcal{O}^{I}(\Phi ,\lambda )$, $n_{v}$ is the $\delta $-degree of $\mathcal{N}^{v}(L)$, while $n_{A}$ and $n_{I}^{\prime }$ are such $R^{A}(\Phi \delta ^{-1},\lambda _{l}\delta ^{n_{l}-2})=\delta ^{-n_{A}}R^{A}(\Phi ,\lambda _{l})$ and $R_{\mathcal{O}}^{I}(\Phi \delta ^{-1},\lambda _{l}\delta ^{n_{l}-2})=\delta ^{-n_{I}^{\prime }}R_{\mathcal{O}}^{I}(\Phi ,\lambda _{l})$. If we rescale every object by a factor $\delta ^{n}$, where $n$ it its $\delta $-degree, and in addition rescale $\Phi $ by $1/\delta $, then the proper action rescales as $$S_{N}(\Phi ,K,N,H)\rightarrow \frac{1}{\delta ^{2}}\bar{S}_{N}(\Phi ,K,N,H), \label{jubi}$$ where $\bar{S}_{N}$ has a factor $\delta $ for each $\rho $ and a factor $\delta ^{2}$ for each loop, but is $\delta $-independent everywhere else. Formula (\[jubi\]) ensures that radiative corrections are perturbative in $\delta $. Summarizing, assumption (\[gullo2\]) for $S_{H}$ is equivalent to assumption (\[gullo3\]) for $S_{N}$. Now we drop such assumptions again and go back to the general case. We can take any classical proper action $S_{cN}$ that satisfies the following requirements: 1\) the perturbative expansion is defined around the usual $\Phi $-kinetic terms and the $N$-quadratic terms $$\frac{1}{2}\int N^{I}A_{IJ}N^{J}, \label{impric}$$ 2) differentiating $S_{cN}$ with respect to the sources $N^{I}$ and setting $\delta _{l}S_{cN}/\delta N^{I}$ to zero, the solutions $N^{I}(\Phi )$ at $K=H=0$ are a basis of local composite fields $\mathcal{O}_{c}^{I}(\Phi )$. As usual, the renormalized action is denoted with $S_{N}$. The solutions $\tilde{N}^{I}\equiv N^{I}-\mathcal{O}_{\mathrm{R}}^{I}(\Phi )=0$ of $\delta _{l}S_{N}/\delta N^{I}=0$ at $K=H=0$ define the renormalized composite fields $\mathcal{O}_{\mathrm{R}}^{I}(\Phi )$. The composite-field sector and the sector of gauge transformations can be switched off setting $\tilde{N}^{I}=K=H=0$. It is often convenient to write $S_{N}$ as a functional of $\Phi $, $K$, $\tilde{N}$ and $H$. For the moment, the action $S_{N}$ may or may not satisfy the master equation $\lfloor S_{N},S_{N}\rfloor =0$. Indeed, as we will see later in some derivations it is useful to admit temporary violations of the master equation. If the proper action $S_{N}$ satisfies the master equation $\lfloor S_{N},S_{N}\rfloor =0$, then the master functional $\Omega $ satisfies the master equation $\lfloor \Omega ,\Omega \rfloor =0$. *Proof*. We just need to recall that once we enlarge the set of integrated fields from $\Phi $ to the proper fields $\Phi ,N$ and the set of conjugate sources from $K$ to the proper sources $K,H$, then the master functional $\Omega $ is the $\Gamma $-functional of the proper variables, the squared antiparentheses are the usual antiparentheses, and the proper master equation is the usual master equation. Thus the theorem follows from the analogous statement that holds for usual $\Gamma $-functionals. The theorem just proved can also be seen as a corollary of the following more general theorem, concerning proper actions $S_{N}$ that do not necessarily satisfy the master equation. The master functional $\Omega $ satisfies the identity $$\lfloor \Omega ,\Omega \rfloor =\langle \lfloor S_{N},S_{N}\rfloor \rangle . \label{aididin}$$ *Proof*. Make the change of variables $$\Phi \rightarrow \Phi +\xi \lfloor S_{N},\Phi \rfloor ,\qquad N\rightarrow N+\xi \lfloor S_{N},N\rfloor ,$$ in the functional integral (\[ibll\]) that defines $Z$. Setting the variation of $Z$ to zero we find the identity $$0=-\frac{\xi }{2}\langle \lfloor S_{N},S_{N}\rfloor \rangle -\xi \left\langle \int \frac{\delta _{r}S_{N}}{\delta K_{A}}J_{A}+\int \frac{\delta _{r}S_{N}}{\delta H_{I}}L_{I}\right\rangle .$$ Taking $J_{A}$ and $L_{I}$ out of the average and using $$\left\langle \frac{\delta _{r}S_{N}}{\delta K_{A}}\right\rangle =-\frac{\delta _{r}W}{\delta K_{A}}=\frac{\delta _{r}\Omega }{\delta K_{A}},$$ and similar identities for the $H$-derivatives, we obtain (\[aididin\]). We have given a set of operations to construct $S_{N}$ from $S_{L}$. To conclude this section we show that, despite the fact that $S_{L}$ depends on more variables than $S_{N}$, we can invert those operations and go back to $S_{L}$. Given $S_{N}(\Phi ,K,N,H)$, solution of the master equation $\lfloor S_{N},S_{N}\rfloor =0$, define $\tilde{S}_{L}$ as (minus) the Legendre transform of $S_{N}$ with respect to $N$, namely $$\tilde{S}_{L}(\Phi ,K,H,L)=S_{N}(\Phi ,K,N^{*},H)-\int N^{*I}L_{I},$$ where $N^{I}=N^{*I}(\Phi ,K,H,L)$ are the solutions of (\[fe\]). Then define $$S_{L}(\Phi ,K,N,H,L)=\tilde{S}_{L}(\Phi ,K,H,L)+\int N^{I}L_{I}=\left. S_{N}\right| _{N=N^{*}}+\int (N^{I}-N^{*I})L_{I}. \label{slll}$$ Inverting (\[sln0\]) we can also work out $S_{H}(\Phi ,K,L,H)$, but we do not need it right now. Clearly, the solution $L=L^{*}$ of $\delta _{r}S_{L}/\delta L=0$ coincides with the solution $N=N^{*}$ of (\[fe\]), and we have $\left. S_{L}\right| _{L=L^{*}}=S_{N}$. It is easy to prove that $S_{L}$ satisfies $\lfloor S_{L},S_{L}\rfloor =0$, because for $\vartheta =\Phi ,K$ or $H$ we have $$\frac{\delta _{l}S_{L}}{\delta \vartheta }=\left. \frac{\delta _{l}S_{N}}{\delta \vartheta }\right| _{N=N^{*}}+\frac{\delta _{l}N^{*I}}{\delta \vartheta }\left( \left. \frac{\delta _{l}S_{N}}{\delta N^{I}}\right| _{N=N^{*}}-L_{I}\right) =\left. \frac{\delta _{l}S_{N}}{\delta \vartheta }\right| _{N=N^{*}}, \label{buno}$$ while for $\vartheta =N$ (\[fe\]) gives $$\frac{\delta _{l}S_{L}}{\delta N^{I}}=L_{I}=\left. \frac{\delta _{l}S_{N}}{\delta N^{I}}\right| _{N=N^{*}}. \label{bdue}$$ Thus, $\left. \lfloor S_{N},S_{N}\rfloor \right| _{N=N^{*}}=\lfloor S_{L},S_{L}\rfloor =0$. Moreover, $$\lfloor N^{I}-N^{*I},S_{L}\rfloor =0. \label{billo}$$ Indeed, differentiating $\lfloor S_{N},S_{N}\rfloor =0$ with respect to $N^{I}$ we get $\lfloor \delta _{l}S_{N}/\delta N^{I},S_{N}\rfloor =0$. Setting $N=N^{*}$ in this equation and using $$0=\frac{\delta _{r}L_{I}}{\delta \vartheta }=\frac{\delta _{r}}{\delta \vartheta }\left( \left. \frac{\delta _{l}S_{N}}{\delta N^{I}}\right| _{N=N^{*}}\right) =\left. \frac{\delta _{r}\delta _{l}S_{N}}{\delta \vartheta \delta N^{I}}\right| _{N=N^{*}}+\left. \frac{\delta _{r}\delta _{l}S_{N}}{\delta N^{J}\delta N^{I}}\right| _{N=N^{*}}\frac{\delta _{r}(N^{*J}-N^{J})}{\delta \vartheta },$$ where $\vartheta =\Phi ,K,N$ or $H$, we get $$\left. \frac{\delta _{r}\delta _{l}S_{N}}{\delta N^{J}\delta N^{I}}\right| _{N=N^{*}}\lfloor N^{J}-N^{*J},S_{L}\rfloor =0.$$ Removing the matrix of second derivatives we obtain (\[billo\]). For example, applying the inverse procedure just described to (\[gullo3\]) we reconstruct (\[sln0\]) and find that $S_{H}$ is given by (\[gullo2\]). Proper canonical transformations ================================ In this section we study the most general canonical transformations we need to work with. In ref. [@masterf] it was shown that the master functional allows us to describe the most general changes of field variables as linear redefinitions of the form $$\Phi ^{A\hspace{0.01in}\prime }=\Phi ^{A}+N^{I}b_{I}^{A},\qquad N^{I\hspace{0.01in}\prime }=N^{J}z_{J}^{I}, \label{buah}$$ where $b_{I}^{A}$ and $z_{J}^{I}$ are constants. We understand that these constants can be both $c$-numbers and Grassmann variables, so from now on we pay attention to their position. By convention, we place them to the right of the proper fields and to the left of their sources. Basically, the redefinitions (\[buah\]) work as follows. Writing $$\Phi ^{A\hspace{0.01in}\prime }=\Phi ^{A}+\mathcal{O}_{\mathrm{R}}^{I}(\Phi )b_{I}^{A}+\tilde{N}^{I}b_{I}^{A}, \label{bisu}$$ we see that when we set $\tilde{N}^{I}=K=H=0$, which is supposed to switch off the sectors of composite fields and gauge transformations, the change of variables is practically $\Phi ^{A\hspace{0.01in}\prime }=\Phi ^{A}+\mathcal{O}_{\mathrm{R}}^{I}(\Phi )b_{I}^{A}$, which is the most general perturbative field redefinition. However, the conditions $\tilde{N}^{I}=0$ switch off the composite-field sector before the transformation, not after. Indeed, due to the term $\tilde{N}^{I}b_{I}^{A}$ in (\[bisu\]) after the transformation the solutions of $L_{I}^{\prime }=\delta _{l}S_{N}^{\prime }/\delta N^{I\prime \hspace{0.01in}}=0$ at $K=H=0$ are no longer $\tilde{N}^{I}=0$, but some new $\tilde{N}^{I\hspace{0.01in}\prime }=0 $. Working out $\tilde{N}^{I\hspace{0.01in}\prime }$ it is found that at $\tilde{N}^{I\hspace{0.01in}\prime }=K=H=0$ the effective change of variables is corrected by $\mathcal{O}(b^{2})$-terms and finally reads $$\Phi ^{A\hspace{0.01in}\prime }=\Phi ^{A}+\mathcal{O}_{\mathrm{R}}^{I}(\Phi )\tilde{b}_{I}^{A},$$ where $\tilde{b}_{I}^{A}=b_{I}^{A}+\mathcal{O}(b^{2})$ is some calculable series in powers of $b$. More details can be found in ref. [@masterf]. Now, recall that the most general change of gauge-fixing can be obtained shifting the sources $H_{I}$ by constants. We can embed (\[buah\]) and the change of gauge-fixing into the canonical transformation generated by $$F(\Phi ,K^{\prime },N,H^{\prime })=\int (\Phi ^{A}+N^{I}b_{I}^{A})K_{A}^{\prime }+\int N^{I}z_{I}^{J}(H_{J}^{\prime }-\xi _{J}), \label{fcann}$$ which we call proper canonical transformation, where the $\xi _{I}$s are the gauge-fixing parameters. More explicitly, we have $$\begin{aligned} \Phi ^{A\hspace{0.01in}\prime } &=&\frac{\delta F}{\delta K_{A}^{\prime }}=\Phi ^{A}+N^{I}b_{I}^{A},\qquad K_{A}=\frac{\delta F}{\delta \Phi ^{A}}=K_{A}^{\prime }, \nonumber \\ N^{I\hspace{0.01in}\prime } &=&\frac{\delta F}{\delta H_{I}^{\prime }}=N^{J}z_{J}^{I},\qquad H_{I}=\frac{\delta F}{\delta N^{I}}=z_{I}^{J}(H_{J}^{\prime }-\xi _{J})+b_{I}^{A}K_{A}^{\prime }. \label{buah2}\end{aligned}$$ The proper action behaves as a scalar: $$S_{N}^{\prime }(\Phi ^{\prime },K^{\prime },N^{\prime },H^{\prime })=S_{N}(\Phi ,K,N,H). \label{transfop}$$ Clearly, composing two proper canonical transformations we obtain a proper canonical transformation. Proper canonical transformations encode all transformations we need, because they incorporate the most general field redefinitions and the most general changes of gauge-fixing. Moreover, they can be used as true changes of field variables, instead of mere replacements, because the external sources $K$ and $H$ transform without involving integrated fields. Finally, the transformations are linear in $\Phi $ and $N$. This is important because the Legendre transform is covariant only with respect to linear field redefinitions. The transformation (\[buah\]) acts on the proper action and inside the functional integral. It is easy to derive how it reflects on the generating functionals. Inside $Z$ and $W$ it corresponds to the $J$-$L$-redefinitions $$J_{A}^{\prime }=J_{A},\qquad L_{I}^{\prime }=(z^{-1})_{I}^{J}(L_{J}-b_{J}^{A}J_{A}^{\prime }). \label{buaa}$$ Indeed, we obtain $$\int \left( \Phi ^{A\hspace{0.01in}\prime }J_{A}^{\prime }+N^{I\hspace{0.01in}\prime }L_{I}^{\prime }\right) =\int \left( \Phi ^{A}J_{A}+N^{I}L_{I}\right) , \label{buana}$$ so, because of (\[transfop\]), the $Z$- and $W$-functionals behave as scalars: $$Z^{\prime }(J^{\prime },K^{\prime },L^{\prime },H^{\prime })=Z(J,K,L,H),\qquad W^{\prime }(J^{\prime },K^{\prime },L^{\prime },H^{\prime })=W(J,K,L,H). \label{agua}$$ Formula (\[buana\]), together with (\[transfop\]), proves that a proper canonical transformation manifestly preserves the conventional form of the functional integral, which ensures that replacements and true changes of field variables are practically the same thing. It is also simple to see how (\[buah2\]) reflects on $\Omega $. If we use (\[buaa\]) inside (\[agua\]) and the definition of master functional, we find that the transformation (\[buah2\]) looks exactly the same inside $\Omega $, as expected from its linearity. Moreover, $\Omega $ also behaves as a scalar: $\Omega ^{\prime }(\Phi ^{\prime },K^{\prime },N^{\prime },H^{\prime })=\Omega (\Phi ,K,N,H)$. Basic renormalization algorithm {#basiccan} =============================== The master functional $\Omega $ allows us to work in a manifestly field-covariant framework and, among the other things, describe renormalization as a combination of parameter redefinitions and proper canonical transformations, which are both operations that manifestly preserve the master equation. To prove these statements, we proceed gradually. In this section we a give a basic subtraction algorithm. In the next section we generalize known cohomological theorems to the master functional and use them to subtract divergences by means of generic (namely not necessarily proper) canonical transformations and parameter redefinitions. In section 7 we reach our final goal, namely show how to extend the action so that all divergences can be subtracted by means of parameter redefinitions and proper canonical transformations. When it is necessary to specify a regularization technique, we use the dimensional one. We assume that the proper classical action $S_{cN}$ satisfies the master equation $\lfloor S_{cN},S_{cN}\rfloor =0$ at the regularized level, which ensures that no gauge anomalies are generated. Then the renormalized master functional satisfies the proper master equation. In this section we give the basic proof of renormalizability, where divergences are subtracted just “as they come”, using the minimal subtraction scheme and the dimensional-regularization technique. We proceed by replacements of actions, rathen than changes of variables. More precisely, we replace the action with the action plus its counterterms, and do not care to check if the counterterms can be incorporated inside the action by means of parameter-redefinitions and canonical transformations. This subtraction procedure does not even preserve the master equation at each step. Nevertheless, it does preserve the master equation up to higher orders, which is enough to ensure that the renormalized action obtained at the end satisfies the master equation exactly. Call $S_{N\hspace{0.01in}n}$ and $\Omega _{n}$ the proper action and the master functional renormalized up to $n$ loops. Since we use the minimal subtraction scheme, $S_{N\hspace{0.01in}n}=S_{cN}+$poles in $\varepsilon =4-D $, where $D$ is the continued dimension. Moreover, we inductively assume that $S_{N\hspace{0.01in}n}$ satisfies the proper master equation up to higher orders, namely $$\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor =\mathcal{O}(\hbar ^{n+1}). \label{ostro}$$ Formula (\[aididin\]) implies $\lfloor \Omega _{n},\Omega _{n}\rfloor =\langle \lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor \rangle =\mathcal{O}(\hbar ^{n+1})$. Now, $\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor $ is a local functional, and $\langle \lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor \rangle $ is the functional that collects the one-particle irreducible correlations functions containing one insertion of $\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor $. Because of (\[ostro\]), the $\mathcal{O}(\hbar ^{n+1})$-contributions to $\langle \lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor \rangle $ coincide with the $\mathcal{O}(\hbar ^{n+1})$-contributions to $\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor $. Moreover, since $S_{N\hspace{0.01in}n}=S_{cN}+$poles and $\lfloor S_{cN},S_{cN}\rfloor =0$, we have $\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor =$poles. Call $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}$ the order-$(n+1)$ divergent part of $\Omega _{n}$. By the theorem of locality of counterterms, it is a local functional, since all subdivergences have been subtracted away. By the observations just made, and recalling that the classical limit of $\Omega _{n}$ is $S_{cN}$, if we take the order-$(n+1)$ divergent part of $\lfloor \Omega _{n},\Omega _{n}\rfloor =\langle \lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor \rangle $, we get $$\lfloor S_{cN},\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\rfloor =\frac{1}{2}\lfloor S_{N\hspace{0.01in}n},S_{N\hspace{0.01in}n}\rfloor +\mathcal{O}(\hbar ^{n+2}). \label{cohoold}$$ Now, if we define $$S_{N\hspace{0.01in}n+1}=S_{N\hspace{0.01in}n}-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}, \label{buo}$$ we still have $S_{N\hspace{0.01in}n+1}=S_{cN}+$poles, and, thanks to (\[cohoold\]), $$\lfloor S_{N\hspace{0.01in}n+1},S_{N\hspace{0.01in}n+1}\rfloor =\mathcal{O}(\hbar ^{n+2}),$$ which promotes the inductive assumption to $n+1$ loops. Iterating the argument, we are able to construct the renormalized proper action $S_{N\hspace{0.01in}}\equiv S_{N\hspace{0.01in}\infty }$ and the renormalized master functional $\Omega _{\infty }$, and prove that both satisfy their master equations exactly. Proper cohomology ================= The proof of renormalizability given in the previous section is straightforward, but not completely satisfactory, because it does not take advantage of the new formalism. The master equation is not preserved exactly at each step, but only up to higher orders. Going through the proof it is easy to convince oneself that it does not admit an immediate generalization to arbitrary subtraction schemes. Moreover, since divergences are subtracted as they come by the plain subtraction (\[buo\]), we cannot even guarantee that they can be reabsorbed into redefinitions of parameters and fields. We are not even sure that the classical action $S_{cN}$ does contain enough parameters to reabsorb divergences that way. When we want to preserve the master equation exactly at every step of the subtraction algorithm, the right-hand side of (\[ostro\]) is zero, so $\lfloor \Omega _{n},\Omega _{n}\rfloor =0$. In the minimal subtraction scheme, the $(n+1)$-loop divergent part of this equation gives the cohomological problem $$\lfloor S_{cN},\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\rfloor =0, \label{chopr}$$ instead of (\[cohoold\]). In this section we characterize the solutions of (\[chopr\]) in a variety of theories and use the results to upgrade the renormalization algorithm. Let us first recall how we proceed in the usual formalism, by which we mean the formalism where the antiparentheses are (\[usa\]), we take (\[buh\]) as the classical action $S(\Phi ,K)$, solution of the master equation $(S,S)=0$, we work with the generating functional $\Gamma (\Phi ,K)$ and in all non-trivial cases describe renormalization as a replacement instead of a true change of variables, plus redefinitions of parameters. In this context the cohomological problem (\[chopr\]) becomes $$(S,\Gamma _{n\hspace{0.01in}\text{div}}^{(n+1)})=0, \label{cohopr2}$$ where $\Gamma _{n\hspace{0.01in}\text{div}}^{(n+1)}$ is the $(n+1)$-loop divergent part of the $n$-loop renormalized $\Gamma $-functional $\Gamma _{n} $. Let us assume that the most general solution of $(S,\chi )=0$, where $\chi $ is a local functional of zero ghost number and bosonic statistics, has the form $$\chi (\Phi ,K)=\mathcal{G}(\Phi )+(S,\chi ^{\prime }), \label{autoassu}$$ where $\mathcal{G}$ and $\chi ^{\prime }$ are local functionals. The key content of (\[autoassu\]) is that the cohomologically non-trivial part $\mathcal{G}$ depends only on the fields $\Phi $. In a variety of common cases, we can characterize $\mathcal{G}(\Phi )$ even more precisely. Assuming that the set of fields $\Phi ^{A}$ is made of the classical fields $\phi $, the ghosts $C$, plus the gauge-trivial subsystem $\bar{C}$-$B$, then using the theorem \[cohotheo\] recalled in the appendix $\mathcal{G}(\Phi ) $ can be further decomposed as $$\mathcal{G}(\Phi )=\mathcal{G}^{\prime }(\phi )+(S,\chi ^{\prime \prime }), \label{galassu}$$ where $\mathcal{G}^{\prime }$ and $\chi ^{\prime \prime }$ are also local functionals. This formula shows that the cohomologically non-trivial solutions $\mathcal{G}^{\prime }(\phi )$ are the gauge-invariant terms constructed with the classical fields $\phi $ and their covariant derivatives. For the arguments that follow we do not strictly need (\[galassu\]), since assumption (\[autoassu\]) is sufficient. Once we have (\[autoassu\]), the renormalization of the $\Gamma $-functional proceeds as follows. Let $\{\mathcal{G}_{i}(\Phi )\}$ denote a basis for the non-trivial solutions $\mathcal{G}(\Phi )$ appearing in (\[autoassu\]). Assume that the action $\mathcal{S}(\Phi )$ is a linear combination of all $\mathcal{G}_{i}(\Phi )$s, multiplied by independent parameters $\lambda _{i}$$$\mathcal{S}(\Phi )=\sum_{i}\lambda _{i}\mathcal{G}_{i}(\Phi ). \label{exto}$$ The action $S(\Phi ,K)$ still solves the master equation $(S,S)=0$, because $(S,\mathcal{G}_{i})=0$ and $(\mathcal{G}_{i},\mathcal{G}_{j})=0$. Note that the identity $(\mathcal{G}_{i},\mathcal{G}_{j})=0$ is guaranteed by the fact that the solutions $\mathcal{G}_{i}$ of the cohomological problem depend only on the fields, and not on the sources $K$. If $\mathcal{G}_{i}$ depended on $K$, we would not be able to extend the classical action in such a simple way, preserving the master equation. This is a key content of the cohomological assumption (\[autoassu\]). Since $\Gamma _{n\hspace{0.01in}\text{div}}^{(n+1)}$ satisfies (\[cohopr2\]), by the assumption (\[autoassu\]) we can decompose it as $$\Gamma _{n\hspace{0.01in}\text{div}}^{(n+1)}=\sum_{i}(\Delta _{n+1}\lambda _{i})\mathcal{G}_{i}(\Phi )+(S,\chi _{n+1}^{\prime }),$$ where $\Delta _{n+1}\lambda _{i}$ are constants and $\chi _{n+1}^{\prime }$ is a local functional. The cohomologically trivial divergences $(S,\chi _{n+1}^{\prime })$ can be subtracted by means of the canonical transformation generated by $$F_{n+1}(\Phi ,K^{\prime })=\int \Phi ^{A}K_{A}^{\prime }-\chi _{n+1}^{\prime }(\Phi ,K^{\prime }),$$ while the divergences $\mathcal{G}_{i}(\Phi )$ are subtracted redefining the parameters $\lambda _{i}$ as $\lambda _{i}^{\prime }=\lambda _{i}-\Delta _{n+1}\lambda _{i}$. Indeed, if $S_{n}$ denotes the action renormalized up to $n$ loops, we have $$\Phi ^{\prime }=\Phi ^{A}-\frac{\delta \chi _{n+1}^{\prime }}{\delta K_{A}},\qquad K^{\prime }=K+\frac{\delta \chi _{n+1}^{\prime }}{\delta \Phi },\qquad S_{n}(\Phi ^{\prime },K^{\prime })=S_{n}(\Phi ,K)-(S,\chi _{n+1}^{\prime }),$$ plus higher orders. Then we can define the $(n+1)$-loop renormalized action as $$S_{n+1}(\Phi ,K,\lambda )=S_{n}(\Phi ^{\prime },K^{\prime },\lambda ^{\prime })$$ and obtain $$S_{n+1}(\Phi ,K,\lambda )=S_{n}(\Phi ,K,\lambda )-\sum_{i}(\Delta _{n+1}\lambda _{i})\mathcal{G}_{i}(\Phi )-(S,\chi _{n+1}^{\prime })=S_{n}(\Phi ,K,\lambda )-\Gamma _{n\hspace{0.01in}\text{div}}^{(n+1)}$$ plus higher orders. In this procedure we started from the most general action (\[exto\]), containing all gauge invariant couplings $\lambda _{i}$. This option is the safest one, from the point of view of renormalization, but then the theory may contain more parameters than we actually need. For example, it may be problematic to recognize finite theories and theories that are renormalizable with a finite number of physical parameters. A possible shortcut is to start from a lucky solution $\mathcal{S}(\Phi )$ and prove that it does not get extended (as in the case of power-counting renormalizable theories). If this is not possible, we can extend the action step-by-step adding the missing $\lambda _{i}$s only when necessary. Theorems that ensure (\[autoassu\]) have been proved both for Yang-Mills theory and gravity, for local composite fields and local functionals of arbitrary ghost numbers [@coho]. In the rest of this section we prove that once (\[autoassu\]) holds in the usual formalism, it can be straightforwardly promoted to the proper formalism. Then we show how to use its generalized version in the proof of renormalizability. We can start with the proper action (\[gullo3\]), because we will show that it just needs straightforward extensions, thanks to assumption (\[autoassu\]). If assumption (\[autoassu\]) holds, the most general solution of the cohomological problem $\lfloor S_{N\hspace{0.01in}},\chi \rfloor =0$, where $\chi (\Phi ,K,N,H)$ is a local functional, is $$\chi =\omega (\Phi )+\lfloor S_{N\hspace{0.01in}},\chi ^{\prime }\rfloor , \label{altra}$$ where $\omega (\Phi )$ and $\chi ^{\prime }(\Phi ,K,N,H)$ are local functionals. *Proof*. It is convenient to apply the procedures explained in section 3 that allow us to switch back and forth between $S_{N}$ and $S_{L}$. Indeed, the subsystem $H$-$N$-$L$ has cohomological properties similar to those of the common subsystem$\ \bar{C}$-$K_{\bar{C}}$-$B$ made of antighosts, their sources and Lagrange multipliers, the sources associated with $B$ and $L$ being missing. Integrating $L$ away, as we did in (\[expsn\]), is very much like integrating the Lagrange multipliers $B$ away. Referring to the definitions given in the appendix, the subsystem $H$-$L$ is gauge-semitrivial, because $\lfloor S_{L\hspace{0.01in}},H_{I}\rfloor =(-1)^{\varepsilon _{I}}L_{I}$ and $\lfloor S_{L\hspace{0.01in}},L_{I}\rfloor =0$, while the subsystem $\bar{C}$-$B$ is usually gauge-trivial. In the appendix we prove a theorem about the cohomological properties of gauge-semitrivial subsystems, which we need to use here. Define $\chi _{L}(\Phi ,K,H,L)=\left. \chi \right| _{N=N^{*}}$, where $N=N^{*}$ is the solution of (\[fe\]). We have $$\frac{\delta _{l}\chi _{L}}{\delta \vartheta }=\frac{\delta _{l}}{\delta \vartheta }\left( \left. \chi \right| _{N=N^{*}}\right) =\left. \frac{\delta _{l}\chi }{\delta \vartheta }\right| _{N=N^{*}}+\frac{\delta _{l}(N^{*I}-N^{I})}{\delta \vartheta }\left. \frac{\delta _{l}\chi }{\delta N^{I}}\right| _{N=N^{*}},$$ where $\vartheta =\Phi ,K,N$ or $H$. Using (\[slll\]) and (\[buno\]-\[billo\]) we find $$\lfloor S_{L\hspace{0.01in}},\chi _{L}\rfloor =\left. \lfloor S_{N\hspace{0.01in}},\chi \rfloor \right| _{N=N^{*}}-\lfloor S_{L},N^{I}-N^{*I}\rfloor \left. \frac{\delta _{l}\chi }{\delta N^{I}}\right| _{N=N^{*}}=0.$$ Now, write $$\chi _{L}(\Phi ,K,H,L)=f(\Phi ,K)+\mathcal{O}(L\text{-}H).$$ Using (\[gullo2\]) and (\[sln0\]) it is easy to check that $$\lfloor S_{L\hspace{0.01in}},\chi _{L}\rfloor =(S,f)+\mathcal{O}(L\text{-}H),$$ where $S(\Phi ,K)$ is the solution (\[buh\]) of the master equation $(S,S)=0$ when composite fields are switched off. Thus, $\lfloor S_{L\hspace{0.01in}},\chi _{L}\rfloor =0$ implies $(S,f)=0$. By assumption (\[autoassu\]) we know that the most general solution of this cohomological condition is $$f(\Phi ,K)=\omega (\Phi )+(S,\eta (\Phi ,K)),$$ where $\omega $ and $\eta $ are local functionals and $(S,\omega )=0$. It is also easy to verify that we can write $$f(\Phi ,K)=\omega (\Phi )+\lfloor S_{L\hspace{0.01in}},\eta \rfloor +\mathcal{O}(L\text{-}H)$$ and $\lfloor S_{L\hspace{0.01in}},\omega \rfloor =0$. Now, write $$\chi _{L}(\Phi ,K,H,L)=\omega (\Phi )+\lfloor S_{L\hspace{0.01in}},\eta \rfloor +\Delta \chi (\Phi ,K,H,L),$$ where $\lfloor S_{L},\Delta \chi \rfloor =0$ and $\Delta \chi =\mathcal{O}(L$-$H)$. Applying theorem \[theo9\] we can conclude that there exists a local functional $\chi _{L}^{\prime }(\Phi ,K,H,L)$ such that $$\chi _{L}=\omega (\Phi )+\lfloor S_{L\hspace{0.01in}},\chi _{L}^{\prime }\rfloor . \label{cohocoho}$$ Finally, setting $L=L^{*}$ to switch back to $\chi $ and using (\[cucu\]), we obtain $$\begin{aligned} \chi (\Phi ,K,N,H) &=&\left. \chi _{L}\right| _{L=L^{*}}=\omega (\Phi )+\left. \lfloor S_{L\hspace{0.01in}},\chi _{L}^{\prime }\rfloor \right| _{L=L^{*}}= \\ &=&\omega (\Phi )+\lfloor S_{N\hspace{0.01in}},\left. \chi _{L}^{\prime }\right| _{L=L^{*}}\rfloor -\lfloor S_{N},L_{I}^{*}\rfloor \left. \frac{\delta _{l}\chi _{L}^{\prime }}{\delta L_{I}}\right| _{L=L^{*}}=\omega (\Phi )+\lfloor S_{N\hspace{0.01in}},\left. \chi _{L}^{\prime }\right| _{L=L^{*}}\rfloor ,\end{aligned}$$ which is (\[altra\]) with $\chi ^{\prime }=\left. \chi _{L}^{\prime }\right| _{L=L^{*}}$. Now renormalization can proceed as in the usual formalism. Assume that the classical action $S_{N}$ is (\[gullo3\]) with $\mathcal{S}(\Phi )$ given by (\[exto\]) and that the divergences are removed up to $n$ loops by means of $\lambda $-redefinitions and canonical transformations. Denote the $n$-loop renormalized action and master functional with $S_{Nn}$ and $\Omega _{n}$, respectively. Clearly, $\lfloor S_{Nn},S_{Nn}\rfloor =\lfloor \Omega _{n},\Omega _{n}\rfloor =0$. We want to show that the $(n+1)$-loop divergences can be removed in the same way. Call $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}$ the $(n+1)$-loop divergent part of $\Omega _{n}$. By the theorem of locality of counterterms, $\Omega _{n\text{div}}^{(n+1)}$ is a local functional and, by the usual argument, $\lfloor \Omega _{n},\Omega _{n}\rfloor =0$ implies $$\lfloor S_{N},\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\rfloor =0.$$ Applying the theorem proved above, write $$\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}=\sum_{i}(\Delta _{n+1}\lambda _{i})\mathcal{G}_{i}(\Phi )+\lfloor S_{N},\chi _{n+1}^{\prime }\rfloor , \label{altra2}$$ where $\chi _{n+1}^{\prime }$ is a local functional. We subtract the divergent terms of type $\mathcal{G}_{i}$ redefining the parameters $\lambda _{i}$ as $\lambda _{i}-\Delta _{n+1}\lambda _{i}$. The other divergent terms $\lfloor S_{N},\chi _{n+1}^{\prime }\rfloor $ are subtracted by means of a canonical transformation generated by $$F_{n+1}(\Phi ,K^{\prime },N,H^{\prime })=\int \Phi ^{A}K_{A}^{\prime }+\int N^{I}H_{I}^{\prime }-\chi _{n+1}^{\prime }(\Phi ,K^{\prime },N,H^{\prime }), \label{fn+1}$$ up to higher-orders, which, as usual, are dealt with at the subsequent steps of the subtraction procedure. This proves that when (\[autoassu\]) holds and $\mathcal{S}(\Phi )$ is general enough, renormalization can be achieved preserving the action (\[gullo3\]), up to canonical transformations. Yet, this procedure is still not what we want. It is just the usual procedure generalized to the proper formalism for the master functional, but it does not take advantage of the new formalism. The canonical transformations (\[fn+1\]) are not guaranteed to be proper ones, so they are not covariant under the Legendre transform and cannot be used as changes of variables inside the functional integral, but just as replacements. In the next section we reorganize the subtraction so as to achieve our goals. Renormalization of the master functional {#RGren} ======================================== In this section we show how to extend the action (\[gullo3\]) so that all divergences proportional to the field equations and of gauge-fixing type are subtracted making proper canonical transformations and all other divergences are subtracted redefining parameters. These operations are fully covariant, preserve the master equation and allow us to interpret the BR map, namely the relation between bare and renormalized quantities, as a true change of variables in the functional integral, instead of a mere replacement. The results of this section apply to the most general gauge field theory whose gauge algebra closes off shell and satisfies the cohomological assumption (\[autoassu\]), therefore also (\[altra\]) in the proper formalism for the master functional. We do not assume power-counting renormalizability, nor that the number of parameters necessary to renormalize divergences is finite. The search for new theories that are renormalizable with a finite number of independent physical parameters, and do not obey known criteria, is beyond the purposes of this paper. Nevertheless, we do believe that the formalism developed here will help organize that search in a more effective way. For simplicity, we assume that the actions $S(\Phi ,K)$ and $S_{N}$ satisfy their master equations at the regularized level, which guarantees that there are no gauge anomalies. We can use any subtraction scheme that is compatible with gauge invariance. When the master equation is not manifestly satisfied at the regularized level we must check whether gauge anomalies cancel at one loop or not. If they do, the Adler-Bardeen theorem [@adler] ensures that there exists a subclass of subtraction schemes where they cancel to all orders. Then our arguments work in that subclass of subtraction schemes. Divergences proportional to the field equations and of gauge-fixing type can actually be subtracted in two ways, which are good for different purposes: $i $) making (proper) canonical transformations; $ii$) redefining *ad-hoc* parameters, introduced just for that purpose. Option $i$) is preferable if we want to check if our theory belongs to some special class with respect to its renormalizability properties, for example it is finite or renormalizable with a finite number of physical parameters. Option $ii$) can be useful as a formal trick for intermediate purposes. It can be applied trading wave-function renormalization constants for renormalization constants of extra parameters put in front of kinetic and source terms. However, when we use option $ii$) we may not realize that some divergent terms can be subtracted by means of field redefinitions. This could lead us to introduce parameters that may turn a finite or renormalizable theory into a non-renormalizable one. We describe how renormalization works with both options, beginning with option $ii$) because it is a good introduction to option $i$). #### Renormalization by redefinitions of parameters For the moment it is convenient to view renormalization as a redefinition of parameters only, with no field redefinition, in the spirit of option $ii$). We extend the classical action (\[gullo3\]) so that it still satisfies the master equation and contains enough independent parameters to subtract all divergences by means of parameter redefinitions. Later we explain how to implement option $i$). The idea is as follows. The action (\[gullo3\]) is not sufficiently general to subtract all divergences by means of parameter redefinitions. To say one thing, it is linear in $K$ and $H$, but it is easy to construct divergent Feynman diagrams with more $K$- and $H$-external legs, in general. As before, we can include all physical couplings $\lambda _{i}$ inside the action $\mathcal{S}(\Phi )$, choosing the most general linear combination (\[exto\]). Thus, the divergences of type $\mathcal{G}_{i}$ are subtracted redefining the $\lambda _{i}$s and what remains are just cohomologically trivial divergences $\lfloor S_{N\hspace{0.01in}},\chi _{n+1}^{\prime }\rfloor $. Instead of subtracting them by means of canonical transformations, we introduce *ad-hoc* parameters and redefine those. We extend the action $S_{N}$ of (\[gullo3\]) by means of the most general perturbative (not necessarily proper) canonical transformation. Write its generating function as $$F_{\subset }(\Phi ,K^{\prime },N,H^{\prime })=\int \Phi ^{A}K_{A}^{\prime }+\int N^{I}H_{I}^{\prime }+\Delta F_{\subset }(\Phi ,K^{\prime },N,H^{\prime }), \label{finfty}$$ where $\Delta F_{\subset }$ is the sum of all monomials we can construct using the proper fields $\Phi $-$N$, the primed sources $K^{\prime }$-$H^{\prime }$ and their derivatives, multiplied by arbitrary independent couplings $\zeta $. The transformation $F_{\subset }$ introduces many more parameters than we actually need. For example, it includes enough parameters to encode all field redefinitions. This happens just because we are applying option $ii$). Clearly, this method is not the cleverest way to build a covariant approach, and certainly it is not very practical. However, for the moment we do so, and later explain how to economize on such redundancies switching to option $i$). With no loss of generality, we still use the minimal subtraction scheme for the divergent parts. Once we have enough independent parameters $\lambda $, $\zeta $ to subtract all divergences by means of $\lambda $- and $\zeta $-redefinitions, it is straightforward to change to an arbitrary scheme making finite $\lambda $- and $\zeta $-redefinitions. We construct the extended classical action $S_{N\subset }$ composing the action $S_{N}$ of (\[gullo3\]) with the canonical transformation (\[finfty\]). We denote this operation as $$S_{N\subset }(\lambda ,\zeta )=S_{N}(\lambda )\circ F_{\subset }(\zeta ). \label{snc}$$ Clearly, $S_{N\subset }$ satisfies the proper master equation $\lfloor S_{N\subset },S_{N\subset }\rfloor =0$. If we use $S_{N\subset }$ as our starting classical action, renormalization proceeds as follows. Assume, by induction, that the theory is renormalized up to $n$ loops by means of $\lambda $- and $\zeta $-redefinitions. Call $S_{Nn\subset }(\lambda ,\zeta )$ and $\Omega _{n}$ the $n$-loop renormalized proper action and master functional. Then the $(n+1)$-loop divergent part $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}$ of the master functional is local and satisfies the cohomological problem $$\lfloor S_{N\subset },\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\rfloor =0.$$ Applying the inverse $F_{\subset }^{-1}$ of (\[finfty\]) we obtain $$\lfloor S_{N},\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\circ F_{\subset }^{-1}\rfloor =0,$$ therefore, using (\[altra\]) and applying $F_{\subset }$ again, we get $$\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}=\sum_{i}(\Delta \lambda _{i})\mathcal{G}_{i}(\Phi )\circ F_{\subset }+\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime }\rfloor , \label{ibsu}$$ where $\chi _{n+1\subset }^{\prime }$ is a local functional. The divergences of type $\mathcal{G}$ can still be removed redefining the $\lambda $s. Indeed, we have $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta )=S_{N\subset }(\lambda ,\zeta )-\sum_{i}(\Delta \lambda _{i})\mathcal{G}_{i}(\Phi )\circ F_{\subset }\hspace{0.01in}.$$ Since $S_{Nn\subset }(\lambda ,\zeta )=S_{N\subset }(\lambda ,\zeta )+\mathcal{O}(\hbar )$, we also have $$S_{Nn\subset }(\lambda -\Delta \lambda ,\zeta )=S_{Nn\subset }(\lambda ,\zeta )-\sum_{i}(\Delta \lambda _{i})\mathcal{G}_{i}(\Phi )\circ F_{\subset }+\mathcal{O}(\hbar ^{n+2})\ .$$ Now, consider the cohomologically trivial divergences $\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime }\rfloor $. They can be subtracted by means of the canonical transformation generated by $$F_{-}(\Phi ,K^{\prime },N,H^{\prime })=\int \Phi ^{A}K_{A}^{\prime }+\int N^{I}H_{I}^{\prime }-\chi _{n+1\subset }^{\prime }(\Phi ,K^{\prime },N,H^{\prime }),$$ up to higher orders. Indeed, $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta )\circ F_{-}=S_{N\subset }(\lambda ,\zeta )-\sum_{i}(\Delta \lambda _{i})\mathcal{G}_{i}(\Phi )\circ F_{\subset }-\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime }\rfloor =S_{N\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)},$$ up to higher orders. Now, $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta )\circ F_{-}=S_{N}(\lambda -\Delta \lambda )\circ F_{\subset }(\zeta )\circ F_{-}.$$ Certainly, $F_{\subset }(\zeta )\circ F_{-}$ is a canonical transformation equal to $F_{\subset }$ plus $(n+1)$-loop corrections. Since $F_{\subset }(\zeta )$ contains all allowed perturbative terms multiplied by independent parameters, there must exist redefinitions $\zeta \rightarrow \zeta -\Delta \zeta $ such that $F_{\subset }(\zeta )\circ F_{-}=F_{\subset }(\zeta -\Delta \zeta )$ up to higher orders. Thus, $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )=S_{N\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}+\mathcal{O}(\hbar ^{n+2}).$$ Finally, the $(n+1)$-loop renormalized action $$S_{Nn+1\subset }(\lambda ,\zeta )=S_{Nn\subset }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )$$ is equal to $S_{Nn\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}+\mathcal{O}(\hbar ^{n+2})$, which proves that we can subtract all divergences redefining the parameters $\lambda $ and $\zeta $. #### Renormalization by redefinitions of parameters and proper canonical transformations We have just shown how the proper action $S_{N}$ can be extended so that it contains enough independent parameters to subtract all divergences by means of parameter redefinitions. Now we explain how to proceed when we want, instead, to subtract the divergences proportional to the field equations and those of gauge-fixing type by means of proper canonical transformations. We just need to restrict $F_{\subset }(\zeta )$ dropping all contributions that are unnecessary. Since $\Delta F_{\subset }(\Phi ,K^{\prime },N,H^{\prime })$ is linear in the parameters $\zeta $, we first analyze it to the first order in $\zeta $. Observe that $\chi _{n+1\subset }^{\prime }$ in (\[ibsu\]) is equivalent to $\chi _{n+1\subset }^{\prime }+\lfloor S_{N\subset },\eta _{n+1\subset }\rfloor $, where $\eta _{n+1\subset }$ is an arbitrary local functional. Correspondingly, the redefinitions of certain parameters $\zeta $ contained in $F_{\subset }$ have no effect on $\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime }\rfloor $ and $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}$. We can use this freedom to simplify $\Delta F_{\subset }$. Another freedom is of course to compose $F_{\subset }$ with proper canonical transformations. Using (\[fe\]) and (\[arrarrarra\]) recall that $$(-1)^{\varepsilon _{I}}\lfloor S_{N},H_{I}\rfloor =\frac{\delta _{l}S_{N}}{\delta N^{I}}=L_{I}=A_{IJ}\tilde{N}_{S}^{J}+\mathcal{O}(\tilde{N}_{S})\text{-perturbative corrections}. \label{para}$$ It is convenient to express the combinations $\tilde{N}_{S}$ as functions of $L_{I}$ and organize $\Delta F_{\subset }(\Phi ,K^{\prime },N,H^{\prime })$ as an expansion in powers of $K^{\prime },H^{\prime }$ and $L$. Clearly, $\lfloor S_{N},L_{I}\rfloor =0$. Write $$\Delta F_{\subset }(\Phi ,K^{\prime },N,H^{\prime })=f_{\subset }(\Phi ,K^{\prime },L,H^{\prime }). \label{hus}$$ The source-independent sector $f_{\subset }(\Phi ,0,L,0)$ collects the most general changes of gauge-fixing. Write $$f_{\subset }(\Phi ,0,L,0)=\Psi _{\subset }(\Phi )+\mathcal{O}(L).$$ The functional $\Psi _{\subset }(\Phi )$ can be dropped, because its effects, which are the usual changes of gauge-fixing, can also be produced by the constants $\xi _{I}$ contained in the proper canonical transformation (\[fcann\]). The $\mathcal{O}(L)$-corrections, which are also $\mathcal{O}(\tilde{N}_{S})$-corrections, are more general changes of gauge-fixing that depend on the sources of composite fields. Using (\[para\]) the $\mathcal{O}(L)$-terms can be written as $$\int L_{I}U^{I}(\Phi ,L)=\int (-1)^{\varepsilon _{I}}\lfloor S_{N},H_{I}\rfloor U^{I}=\lfloor S_{N},\int (-1)^{\varepsilon _{I}}H_{I}U^{I}\rfloor +\int H_{I}\lfloor S_{N},U^{I}\rfloor , \label{bua}$$ where $U^{I}$ are local functions. Working to the first order in $\zeta $, $f_{\subset }$ and $U^{I}$ must be considered $\mathcal{O}(\zeta )$, so the first term after the equals sign can be also written as $$\lfloor S_{N\subset },\int (-1)^{\varepsilon _{I}}H_{I}U^{I}\rfloor .$$ For the reasons explained above, we drop it, and therefore remain with the last term of (\[bua\]), which is proportional to $H$. We conclude that we can take $f_{\subset }(\Phi ,0,L,0)=0$. Next, consider the terms of $f_{\subset }$ that are linear in $K^{\prime }$ and $H^{\prime }$. Expanding in the basis of composite fields, we can write them as $$\int \mathcal{O}^{I}(\Phi )u_{I}^{A}K_{A}^{\prime }+\int \mathcal{O}^{I}(\Phi )v_{I}^{J}H_{J}^{\prime }, \label{bul}$$ where $u_{I}^{A}$ and $v_{J}^{I}$ are constants. Composing $F_{\subset }$ with an infinitesimal proper canonical transformation (\[fcann\]) with $b_{I}^{A}=-u_{I}^{A}$, $z_{I}^{J}=-v_{I}^{J}$ and $\xi _{I}=0$, the total can be cast in the form $$-\int \tilde{N}_{S}^{I}u_{I}^{A}K_{A}^{\prime }-\int \tilde{N}_{S}^{I}v_{I}^{J}H_{J}^{\prime }, \label{bil}$$ to the first order in $\zeta $. Since $\tilde{N}_{S}=\mathcal{O}(L)$, we have been able to convert the terms (\[bul\]), which are $\mathcal{O}(K^{\prime })$ and $\mathcal{O}(H^{\prime })$, into terms that are $\mathcal{O}(K^{\prime }L)$ and $\mathcal{O}(H^{\prime }L)$. This means that we can drop all terms of type (\[bul\]) from $f_{\subset }$. Recapitulating, we take $f_{\subset }$ to be the most general sum of terms $\mathcal{O}(\tilde{K}^{\prime })\mathcal{O}(L)+\mathcal{O}(\tilde{K}^{\prime \hspace{0.01in}2})$, each monomial being multiplied by an independent parameter $\zeta $. Here $\tilde{K}^{\prime }$ is a symbolic notation that collects both $K^{\prime }$ and $H^{\prime }$. Similarly, let $\tilde{\Phi}$ collect $\Phi $ and $N$. Define $F_{\subset }$ from (\[finfty\]) and (\[hus\]), where now $f_{\subset }$ is of restricted type. From now on we stop focusing on the first order in $\zeta $, and our results apply to all orders in $\zeta $. The canonical transformation $F_{\subset }$ produces a field/source redefinition of the form $$\tilde{\Phi}^{\prime }=\tilde{\Phi}+\mathcal{O}(L)+\mathcal{O}(\tilde{K}^{\prime }),\qquad \tilde{K}=\tilde{K}^{\prime }+\mathcal{O}(\tilde{K}^{\prime }). \label{bullo}$$ Obviously, composing two canonical transformations of restricted type, we get a canonical transformation of restricted type. Moreover, every canonical transformation (\[bullo\]) is generated by an $F_{\subset }$ of restricted type. Define the extended classical action $S_{N\subset }$ as in (\[snc\]), where now $F_{\subset }(\zeta )$ is of restricted type. Assume, by induction, that the theory is renormalized by $\lambda $- and $\zeta $-redefinitions, plus proper canonical transformations, up to $n$ loops. Let $S_{Nn\subset }$ and $\Omega _{n}$ denote the $n$-loop renormalized proper action and master functional. Consider the $(n+1)$-loop divergent terms $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}$ of $\Omega _{n}$. Clearly, they are still decomposed as in (\[ibsu\]) and the divergences of type $\mathcal{G}_{i}(\Phi )\circ F_{\subset }$ can still be subtracted away redefining the parameters $\lambda $ contained in $\mathcal{S}(\Phi )$. We want to show that the divergences of type $\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime }\rfloor $ can be subtracted redefining the parameters $\zeta $ of the restricted generating function $F_{\subset }$ and making a proper canonical transformation. Define $L_{I\subset }=L_{I}\circ F_{\subset }$ and $H_{I\subset }=H_{I}\circ F_{\subset }$. Using (\[para\]) and (\[bullo\]) we have $$L_{I\subset }=(-1)^{\varepsilon _{I}}\lfloor S_{N\subset },H_{I\subset }\rfloor =L_{I}+\mathcal{O}(L)+\mathcal{O}(\tilde{K}). \label{gu}$$ Consider $\chi _{n+1\subset }^{\prime }$ as a functional of $\Phi $, $L_{\subset }$, $K$ and $H$, and expand it in powers of $L_{\subset }$, $K$ and $H$. Expanding the contribution at $L_{\subset }=K=H=0$ in the basis of composite fields, write $$\chi _{n+1\subset }^{\prime }=\int \mathcal{O}^{I}(\Phi )q_{I}+\int L_{I\subset }U^{I}(\Phi ,L_{\subset })+\mathcal{O}(\tilde{K}),$$ where $q_{I}$ are $\mathcal{O}(\hbar ^{n+1})$-constants and $U^{I}$ are local functions. With a proper canonical transformation generated by $$F_{q}(\Phi ,K^{\prime },N,H^{\prime })=\int \Phi ^{A}K_{A}^{\prime }+\int N^{I}(H_{I}^{\prime }-q_{I}),$$ we can add a term $-\int N^{I}q_{I}$ to $\chi _{n+1\subset }^{\prime }$ and then remain with $$\chi _{n+1\subset }^{\prime \prime }=-\int \tilde{N}_{S}^{I}q_{I}+\int L_{I\subset }U^{I}(\Phi ,L_{\subset })+\mathcal{O}(\tilde{K}).$$ Using (\[para\]) and (\[gu\]) we can write this formula as $$\chi _{n+1\subset }^{\prime \prime }=\int L_{I\subset }V^{I}(\Phi ,L_{\subset })+\mathcal{O}(\tilde{K}),$$ for some new local functions $V^{I}$. Now, use (\[gu\]) again to write $$\chi _{n+1\subset }^{\prime \prime }=\int (-1)^{\varepsilon _{I}}\lfloor S_{N\subset },H_{I\subset }\rfloor V^{I}+\mathcal{O}(\tilde{K})=\lfloor S_{N\subset },\int (-1)^{\varepsilon _{I}}H_{I\subset }V^{I}\rfloor +\int H_{I\subset }\lfloor S_{N\subset },V^{I}\rfloor +\mathcal{O}(\tilde{K}).$$ The first term after the equals sign can be dropped, since the divergences we have to remove are $\lfloor S_{N\subset },\chi _{n+1\subset }^{\prime \prime }\rfloor $. Thus we remain with $\chi _{n+1\subset }^{\prime \prime \prime }=\mathcal{O}(\tilde{K})$. Expanding in the basis of composite fields, write $$\chi _{n+1\subset }^{\prime \prime \prime }=\int \mathcal{O}^{I}(\Phi )m_{I}^{A}K_{A}+\int \mathcal{O}^{I}(\Phi )n_{I}^{J}H_{J}+\mathcal{O}(\tilde{K})\mathcal{O}(L_{\subset })+\mathcal{O}(\tilde{K}^{2}),$$ where $m_{I}^{A}$ and $n_{J}^{I}$ are $\mathcal{O}(\hbar ^{n+1})$-constants. With an infinitesimal proper canonical transformation generated by $$F_{mn}(\Phi ,K^{\prime },N,H^{\prime })=\int (\Phi ^{A}-N^{I}m_{I}^{A})K_{A}^{\prime }+\int N^{I}(H_{I}^{\prime }-n_{I}^{J}H_{J}^{\prime }),$$ we can arrive at $$\chi _{n+1\subset }^{\prime \prime \prime \prime }=-\int \tilde{N}_{S}^{I}m_{I}^{A}K_{A}-\int \tilde{N}_{S}^{I}n_{I}^{J}H_{J}+\mathcal{O}(\tilde{K})\mathcal{O}(L_{\subset })+\mathcal{O}(\tilde{K}^{2}).$$ Using (\[para\]) and (\[gu\]) we find $$\chi _{n+1\subset }^{\prime \prime \prime \prime }=\mathcal{O}(\tilde{K})\mathcal{O}(L_{\subset })+\mathcal{O}(\tilde{K}^{2})=\mathcal{O}(\tilde{K})\mathcal{O}(L)+\mathcal{O}(\tilde{K}^{2}).$$ These terms are precisely of the type that can be subtracted away with a restricted infinitesimal transformation. Let $F_{r}$ denote the generating function of such a transformation. Collecting all operations made so far, we have $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta )\circ F_{r}\circ F_{q}\circ F_{mn}=S_{N\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}+\mathcal{O}(\hbar ^{n+2}).$$ Now, write $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta )\circ F_{r}=S_{N}(\lambda -\Delta \lambda )\circ F_{\subset }(\zeta )\circ F_{r}\ .$$ Since $F_{\subset }(\zeta )\circ F_{r}$ is the composition of two canonical transformations of restricted type, it is of restricted type. Since $F_{\subset }$ is the most general transformation of restricted type, there must exist $\zeta $-redefinitions $\zeta -\Delta \zeta $ such that $F_{\subset }(\zeta )\circ F_{r}=F_{\subset }(\zeta -\Delta \zeta )$. Moreover, $F_{p}\equiv F_{q}\circ F_{mn}$ is the composition of two proper canonical transformations, so it is a proper canonical transformation. Thus, $$S_{N\subset }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )\circ F_{p}=S_{N\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}+\mathcal{O}(\hbar ^{n+2}).$$ Finally, define the $(n+1)$-loop renormalized action as $$S_{Nn+1\subset }(\lambda ,\zeta )=S_{Nn\subset }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )\circ F_{p}\hspace{0.01in}.$$ Since $S_{Nn\subset }(\lambda ,\zeta )=S_{N\subset }(\lambda ,\zeta )+\mathcal{O}(\hbar )$, we also have $$S_{Nn+1\subset }(\lambda ,\zeta )=S_{Nn\subset }(\lambda ,\zeta )-\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}+\mathcal{O}(\hbar ^{n+2}),$$ so the $(n+1)$-loop divergences are subtracted in the way we want. We have thus achieved our goals: 1) all divergences proportional to the field equations, as well as those of gauge-fixing type, are subtracted making proper canonical transformations; 2) all divergences of other types are subtracted by means of parameter redefinitions. Clearly, the master equation is preserved at each step of the subtraction. The form of the action (\[gullo3\]) is not invariant under proper canonical transformations, so it is worth to describe how to proceed when we do not start from a classical proper action $S_{N}$ equal to (\[gullo3\]), but we take an action $S_{N}^{\prime }=S_{N}\circ F_{P}$, equal to (\[gullo3\]) composed with a convergent proper canonical transformation $F_{P}$. Then, by the results of section 4 the master functional $\Omega $ is turned into $\Omega ^{\prime }=\Omega \circ F_{P}$. All arguments presented above are modified just replacing the canonical transformations $F_{X}$ with $F_{X}^{\prime }=F_{P}^{-1}\circ F_{X}\circ F_{P}$. If $F_{X}$ is proper, then $F_{X}^{\prime }$ is also proper. If $F_{X}$ is of restricted type, then $F_{X}^{\prime }$ defines the canonical transformations of restricted type for the starting action $S_{N}^{\prime }$. So, for example, we first extend the classical action $S_{N}^{\prime }$ to $S_{N\hspace{0.01in}\subset }^{\prime }=S_{N}^{\prime }\circ F_{\subset }^{\prime }=S_{N\hspace{0.01in}\subset }\circ F_{P}$. Then, we assume by induction that the $n$-loop renormalized action $S_{N\hspace{0.01in}n\subset }^{\prime }(\lambda ,\zeta )$ is obtained from $S_{N\hspace{0.01in}\subset }^{\prime }(\lambda ,\zeta )$ redefining the parameters $\lambda $, $\zeta $ and making proper canonical transformations $F_{X}^{\prime }$. This means that we can write $S_{N\hspace{0.01in}n\subset }^{\prime }(\lambda ,\zeta )=S_{N\hspace{0.01in}n\subset }(\lambda ,\zeta )\circ F_{P}$, where $S_{N\hspace{0.01in}n\subset }(\lambda ,\zeta )$ is obtained from $S_{N\hspace{0.01in}\subset }(\lambda ,\zeta )$ also making parameter redefinitions and proper canonical transformations $F_{X}$. Because of this assumption, we have $\Omega _{n}^{\prime }=\Omega _{n}\circ F_{P}$, so the $(n+1)$-loop divergent part of $\Omega _{n}^{\prime }$ is $\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)\prime }$ $=\Omega _{n\hspace{0.01in}\text{div}}^{(n+1)}\circ F_{P}$, and it can be subtracted defining $$S_{N\hspace{0.01in}n+1\subset }^{\prime }(\lambda ,\zeta )=S_{N\hspace{0.01in}n\subset }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )\circ F_{p}\circ F_{P}=S_{N\hspace{0.01in}n\subset }^{\prime }(\lambda -\Delta \lambda ,\zeta -\Delta \zeta )\circ F_{p}^{\prime }.$$ This result shows that divergences can still be subtracted redefining the parameters $\lambda $, $\zeta $ and making proper canonical transformations $F_{p}^{\prime }$. Thus, the inductive assumption is correctly promoted up to $n+1$ loops, so it is also promoted to $n=\infty $. The final renormalized master functional is just $\Omega _{\infty }^{\prime }=\Omega _{\infty }\circ F_{P}$, which is obviously convergent. Conclusions =========== In this paper we have formulated a general field-covariant approach to quantum gauge field theory, generalizing the ideas of ref.s [@fieldcov; @masterf]. Instead of working with the usual generating functional $\Gamma (\Phi ,K)$ of one-particle irreducible diagrams, we have introduced a master functional $\Omega (\Phi ,K,N,H)$ that depends on the usual pair of field/source conjugate variables $\Phi $ and $K$, plus a new pair $N$ and $H$, associated with the composite fields and their gauge transformations. The functional $\Omega $ is also a generating functional of one-particle irreducible diagrams and it is defined as the Legendre transform of the improved functional $W(J,K,L,H)$ with respect to both sources $J$ and $L$ of elementary and composite fields. We have extended the definitions of antiparentheses, canonical transformations and the master equation to the new formalism. The master functional satisfies the extended master equation. In the proper approach the classical action $S_{N}(\Phi ,K,N,H)$ coincides with the classical limit of $\Omega $. Moreover, both $\Phi $ and $N$ are integrated fields, while $K$ and $H$ are external sources. The functional $\Omega $ collects the set of one-particle irreducible diagrams determined by $S_{N}$ with the usual Feynman rules. The most general perturbative field redefinitions and changes of gauge-fixing can be expressed by means of proper canonical transformations, under which the action $S_{N}$ behaves as a scalar. Precisely, the proper canonical transformations are linear, and such that the proper fields $\Phi $ and $N$ transform independently of the sources $K$ and $H$, and viceversa. Thanks to this, we can implement the transformations as true changes of variables in the functional integral, instead of using them as mere replacements. This property overcomes an important difficulty of the old approach, where it impossible to use canonical transformations as changes of variables in the functional integral whenever the external sources $K$ are transformed into non-trivial functions of $\Phi $. Being linear, proper canonical transformations look identical inside the master functional $\Omega $, which also behaves as a scalar. The approach of this paper is covariant with respect to the most general perturbative field redefinitions and allows us to prove the renormalizability of gauge theories in a general field-covariant setting. When cohomological theorems hold, we have shown how to generalize them to the proper formalism. When there are no gauge anomalies, we have shown that the classical action $S_{N}$ can be extended so that it contains enough parameters to subtract all divergences that are proportional to the field equations and of gauge-fixing type by means of proper canonical transformations and all other divergences by means of parameter redefinitions. The master equation is exactly preserved at every step of the subtraction procedure. 25truept [**AppendixA cohomological theorem for gauge semitrivial subsystems**]{} 15truept In this appendix we prove cohomological properties that are useful to classify gauge-invariant terms. The first theorem is a known result, the second theorem is a new generalization, important for some applications contained in the paper. For definiteness, let $H$ and $U$ denote two fields of the set $\Phi $ and $S(\Phi ,K)$ denote the action, solution of the master equation $(S,S)=0$, where $(.,.)$ are the usual antiparentheses (\[usa\]). Write $\Phi =(\Phi _{r},H,U)$. With obvious modifications everything we are going to say also applies when the fields, the action and the antiparentheses are replaced by the proper fields, the proper action and the squared antiparentheses. We say that $H$ and $U$ form a *gauge-semitrivial* $\Phi $-subsystem if $(S,H)=U$, $(S,U)=0$. We say that $H$ and $U$ form a *gauge-trivial* $\Phi $-subsystem if it is gauge-semitrivial and $(S,\Phi _{r})$ is independent of $H$ and $U$. We call the $\Phi $-subset $\Phi _{r}$ *gauge-irreducible* if it does not contain gauge-semitrivial subsystems. For example, if $\Phi $ is made of the classical fields $\phi $, the ghosts $C$, the antighosts $\bar{C}$ and the Lagrange multipliers $B$, and the action has the usual form $$S(\Phi ,K)=\mathcal{S}(\Phi )-\int R_{\phi }(\phi ,C)K_{\phi }-\int R_{C}(C)K_{C}-\int B^{a}K_{\bar{C}}^{a}, \label{actr}$$ then the $\Phi $-subsystem $\bar{C}$-$B$ is gauge-trivial, because $(S,\bar{C})=B$ and $(S,B)=0$, while $(S,\phi )$ and $(S,C)$ depend only on $\phi $ and $C$. Let $H$-$U$ be a gauge-trivial $\Phi $-subsystem and $\chi (\Phi )$ a local functional such that $(S,\chi )=0$. Then there exist local functionals $f(\Phi _{r})$ and $\chi ^{\prime }(\Phi )$ such that $$\chi (\Phi )=f(\Phi _{r})+(S,\chi ^{\prime }). \label{tesi}$$ \[cohotheo\] *Proof*. Expand $\chi (\Phi )$ as $$\chi (\Phi )=f(\Phi _{r})+\sum_{m+n>0}F_{m,n},$$ where $$F_{m,n}=\int f_{t_{1}\cdots t_{m},s_{1}\cdots s_{n}}(\Phi _{r})U^{t_{1}}\cdots U^{t_{m}}H^{s_{1}}\cdots H^{s_{n}}$$ and $f_{t_{1}\cdots t_{m},s_{1}\cdots s_{n}}$ is a local operator-function, by which we mean that it can contain derivatives acting on the $U$s and the $H$s. To simplify the notation, write $$F_{m,n}^{\prime }\equiv \int (S,f_{t_{1}\cdots t_{m},s_{1}\cdots s_{n}})U^{t_{1}}\cdots U^{t_{m}}H^{s_{1}}\cdots H^{s_{n}}.$$ Imposing $(S,\chi )=0$ we get $(S,f)=0$ and $$F_{m,n}^{\prime }+\int U^{s}\frac{\delta _{l}}{\delta H^{s}}F_{m-1,n+1}=0. \label{acceu}$$ Observe that $$\int U^{t}\frac{\delta _{l}}{\delta U^{t}}F_{m,n}=mF_{m,n},\qquad \int H^{s}\frac{\delta _{l}}{\delta H^{s}}F_{m,n}=nF_{m,n}. \label{effo}$$ Applying the operation $$\int H^{t}\frac{\delta _{l}}{\delta U^{t}} \label{oppe}$$ to equation (\[acceu\]) and using (\[effo\]), we get the useful identity $$0=\int H^{t}\frac{\delta _{l}}{\delta U^{t}}F_{m,n}^{\prime }+(n+1)F_{m-1,n+1}+\int (-1)^{\varepsilon _{s}\varepsilon _{t}}H^{t}U^{s}\frac{\delta _{l}^{2}}{\delta U^{t}\delta H^{s}}F_{m-1,n+1}, \label{noval}$$ where $\varepsilon _{s}$, $\varepsilon _{t}$ denote the statistics of $U^{s}$, $H^{t}$. With the help of this identity and (\[effo\]) again we find $$(S,\int H^{t}\frac{\delta _{l}}{\delta U^{t}}F_{m,n})=(n+1)F_{m-1,n+1}+mF_{m,n}\hspace{0.01in}+\int (-1)^{\varepsilon _{s}\varepsilon _{t}}H^{t}U^{s}\frac{\delta _{l}^{2}}{\delta U^{t}\delta H^{s}}(F_{m-1,n+1}-F_{m,n}).$$ Dividing by $n+m$ and summing over $m$ and $n$, we obtain $$(S,\sum_{n+m>0}\frac{1}{n+m}\int H^{t}\frac{\delta _{l}}{\delta U^{t}}F_{m,n})=\sum_{n+m>0}F_{m,n}\hspace{0.01in},$$ therefore (\[tesi\]) holds with $$\chi ^{\prime }=\int H^{t}\frac{\delta _{l}}{\delta U^{t}}\sum_{n+m>0}\frac{F_{m,n}}{n+m}. \label{singu}$$ Clearly, if $\chi $ is local, so is $\chi ^{\prime }$. This concludes the proof. We can extend part of this theorem to gauge-semitrivial subsystems. First observe that the argument given in the proof separately applies to each “level” $m+n=\ell =$constant, because no operation we have made mixes different $\ell $s. This fact is due to the assumption that the system is gauge-trivial. In a gauge-semitrivial subsystem, instead, the expressions $(S,\Phi _{r})$ are allowed to depend on $H$ and $U$, therefore $F^{\prime }$ raises the level. Attention must be paid to corrections coming from higher and lower levels when attempting to extend the proof given above. Call $\chi _{\ell }(\Phi)$ a functional that does not contain levels smaller than $\ell >0$ and is such that $(S,\chi _{\ell })=0$. Let us repeat the proof of the previous theorem focusing on level $\ell $. Since no corrections can come from lower levels, the derivation works up to corrections of levels $\ell +1$ or higher. We obtain the result that there exist local functionals $\tilde{\chi}_{\ell }^{\prime }$ and $\chi _{\ell +1} $ such that $\chi _{\ell }=(S,\tilde{\chi}_{\ell }^{\prime })+\chi _{\ell +1} $. Clearly, $(S,\chi _{\ell +1})=0$, so we can repeat the argument for $\chi _{\ell +1}$. Proceeding inductively, we conclude that there exists a local functional $\chi _{\ell }^{\prime }$ such that $\chi _{\ell }=(S,\chi _{\ell }^{\prime }) $. This derivation works for every $\ell >0$, but cannot be extended to $\ell =0$, because formula (\[singu\]) is singular in that case. Therefore, If $H$-$U$ is a gauge-semitrivial $\Phi $-subsystem and $\chi (\Phi )$ is a local functional of the fields that vanishes at $H=U=0$, such that $(S,\chi )=0$, then there exists a local functional $\chi ^{\prime }(\Phi )$ such that $$\chi (\Phi )=(S,\chi ^{\prime }).$$ \[theo8\] When we want to generalize the arguments of this appendix to functionals $\chi$ of both fields and sources, we must pay attention to a caveat. Both theorems generalize if we can include the sources inside $\Phi _{r}$, because the proofs never use the fact that $\Phi _{r}$ contains only fields. The notion of gauge-semitriviality remains unchanged, so theorem \[theo8\] generalizes straightforwardly. Instead, the notion of gauge-triviality does change, since the requirement that $(S,\Phi _{r})$ are independent of $H$ and $U$ would imply the requirement that $(S,K_{A})$ satisfy the same property. In general, this is not even true for the subsystem $\bar{C}$-$B$ and the action (\[actr\]), because $(S,K_{A})$ can depend on $\bar{C}$ and $B$, which makes the subsystem $\bar{C}$-$B$ gauge-semitrivial. At any rate, for the needs of this paper it is sufficient to generalize theorem \[theo8\]: If $H$-$U$ is a gauge-semitrivial $\Phi $-subsystem and $\chi (\Phi ,K)$ is a local functional that vanishes at $H=U=0$, such that $(S,\chi )=0$, then there exists a local functional $\chi ^{\prime }(\Phi ,K)$ such that $$\chi (\Phi ,K)=(S,\chi ^{\prime }). \label{tesi9}$$ \[theo9\] [99]{} I.A. Batalin and G.A. Vilkovisky, Gauge algebra and quantization, Phys. Lett. B 102 (1981) 27-31; I.A. Batalin and G.A. Vilkovisky, Quantization of gauge theories with linearly dependent generators, Phys. Rev. D 28 (1983) 2567, Erratum-ibid. D 30 (1984) 508; see also S. Weinberg, *The quantum theory of fields*, vol. II, Cambridge University Press, Cambridge 1995. In the case of gravity, see for example G. ’t Hooft and M. Veltman, One-loop divergences in the theory of gravitation, Ann. Inst. Poincarè, 20 (1974) 69; M.H. Goroff and A. Sagnotti, The ultraviolet behavior of Einstein gravity, Nucl. Phys. B 266 (1986) 709; A.E.M. van de Ven, Two loop quantum gravity, Nucl. Phys. B 378 (1992) 309. D. Anselmi, A general field-covariant formulation of quantum field theory, Eur. Phys. J. C73 (2013) 2338 and arXiv:1205.3279 \[hep-th\]. D. Anselmi, A master functional for quantum field theory, Eur.Phys.J. C73 (2013) 2385 and arXiv:1205.3584 \[hep-th\]. G. Barnich, F. Brandt, M. Henneaux, Local BRST cohomology in the antifield formalism. I. General theorems, Commun. Math. Phys. 174 (1995) 57 and arXiv:hep-th/9405109; Local BRST cohomology in the antifield formalism. II. Application to Yang-Mills theory, Commun. Math. Phys. 174 (1995) 116 and arXiv:hep-th/9405194; General solution of the Wess-Zumino consistency condition for Einstein gravity, Phys. Rev. D 51 (1995) R1435 and arXiv:hep-th/9409104. S.L. Adler and W.A. Bardeen, Absence of higher order corrections in the anomalous axial vector divergence, Phys. Rev. 182 (1969) 1517. For a review of existing proofs and references on this subject, see for example S.L. Adler, Anomalies to all orders, in “*Fifty Years of Yang-Mills Theory*”, G. ’t Hooft ed., World Scientific, Singapore, 2005, p. 187-228, and arXiv:hep-th/0405040.
mini_pile
{'original_id': '363c2eaea7b2d1e7da097ece5e4a53ae35423ba0cd1227d1d3a29160afddb999'}
Adjustable Flexibility Sanders (AFS Sanders) are a high-quality solution for streetrod builders, custom car shops, and everyday bodymen. The unique combination of flexibility, adjustability, and durability makes these sanders ideal for professionals, but amateurs have done wonders with them as well. Use the navigation buttons to find more information about AFS sanders. If you have any questions, feel free to contact me. Deep Purple is the New Color for 2013 Sorry if you don't like it, but it was time for a change in more ways then one and this color is a marker of that. This new foam is more durable and will last longer, but more importantly it allows me to really dial in the density of the foam for each size sander. I can make it firmer without over packing the molds, but easily make it more flexible by tweaking the water level. To preview the new colorClick here.
mini_pile
{'original_id': 'b4ef3afd4f7f96eaeb1842acd8cbdde412cf26b70dbd281b3a9c06df1e772b20'}
Poultry Faring Well? Poultry Faring Well Poultry Faring Well? Some things work in reverse. An idea to improve outcomes, like poultry welfare, can lead to just the opposite. One of the issues I have noticed is the push for better poultry welfare by large shops, or more accurately, the perception of better poultry welfare. Better welfare is a noble aim and one we should all aim for, but when there are blunt rules, the unfortunate and real possibilities are that such rules can badly affect poultry welfare. Added into this are activist groups whose goals are more to do with ending animal ownership, than animal welfare and we have issues. Consider this: A large shop insists, based on its own version of poultry welfare, without consulting industry, that its suppliers must now supply more perch space for chooks. OK that sounds fine and reasonable. The prices they offer their supplier does not increase to cover the extra costs. Cost free improvements (for the large shop), “guilt” allayed, and a possible advertising moment explaining on how the large shop (not the supplier) is improving poultry welfare! Or has it? The large shop has not compensated the farmer for the extra costs involved, what can the farmer do? 1. Reduce flock size: Probable Result; slowly go out of business! 2. Drop out and supply someone else, not easy at all! See number 1 results 3. Provide decent perches and wear the cost, possibly see number 1 results 4. Find alternatives, basically low cost compliance to this new rule. One could suspect number 4 will be chosen, and why not! Adhere to this new rule, keep your flock size, and keep your customer. But what’s the cheap alternative? Salaries make DIY expensive and purpose made perches cost money! Number 4 lets the chickens perch on the nipple lines, which is opposite to the normal practice. Without much effort, or money spent, we have the perch space! What about welfare? • The Chooks now have more space to perch, rule followed…but those chooks on the nipple line have a narrow round, mostly metal pipe to perch and sleep on. Bumble Foot anybody? Disrupted sleep anybody? • An increased chance that poo goes into the splash cups, where chickens occasionally drink dribbles and drops from chicken drinker nipples, not great! One fact is true, welfare costs! If the large shop doesn’t pay, if the farmer doesn’t pay, and the consumer doesn’t pay, then the chicken pays! The same equations relate to backyard poultry keepers and the fancy. Faced with rules, and hopefully, a will to do the right thing, there are decisions to make and some compromise as well. Your time manually feeding chickens versus some automation; Automation allows some ease but may stop you observing your flock as much, perhaps! Making a great Chook pen versus buying one that will just do the job, if you’re lucky? Keeping poultry, and good stockmanship costs time and money, either upfront or over the long run. Doing things well can actually save both time and money in the long run and have better welfare outcomes, but blunt rules made up to satisfy an activist group, the media hounds or perceived guilt are unlikely to save money, or time or have good welfare outcomes for poultry. This article is also available on the Bellsouth News page, it’s downloadable there as well.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '75', 'language_id_whole_page_fasttext': "{'en': 0.933326542377472}", 'metadata': "{'Content-Length': '87644', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2OLASNLKDHZ24LXHPX22IXXCSYWCMN22', 'WARC-Concurrent-To': '<urn:uuid:60cce2b7-6a37-4c19-9cd9-2c45fa311a84>', 'WARC-Date': datetime.datetime(2020, 1, 18, 10, 0, 28), 'WARC-IP-Address': '203.19.75.29', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ER4I7WFVNYTCJYW7OQ7WOITAYFP3QDWR', 'WARC-Record-ID': '<urn:uuid:0a7c540a-1e55-4c68-b47b-bdec5b52f32d>', 'WARC-Target-URI': 'http://www.bellsouth.com.au/index.php/2018/10/31/poultry-faring-well/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:75330c92-26da-4c6a-a664-2279f7480d6f>', 'WARC-Truncated': None}", 'previous_word_count': '544', 'url': 'http://www.bellsouth.com.au/index.php/2018/10/31/poultry-faring-well/', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-163.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1759161353111267', 'original_id': '00e9febff6e4930059843e4ac5c196f5fdfd8c19cae119d4bcc2057780b20768'}
Nick’s GAS laces’em up with the NHL Nickelodeon's digital sports channel the Game and Sports Network (GAS) has inked a multiyear agreement with the National Hockey League that will see it develop kids content based on the NHL. Primarily, GAS will produce and air programming blocks around special... Nickelodeon’s digital sports channel the Game and Sports Network (GAS) has inked a multiyear agreement with the National Hockey League that will see it develop kids content based on the NHL. Primarily, GAS will produce and air programming blocks around special NHL events like the Stanley Cup finals. The content will be similar to the all-access GAS coverage the net provided for Major League Soccer’s all-star game last November, consisting of game highlights, behind-the-scenes game footage and player interviews, says Nick spokesperson Beth Hergenhan. As per the agreement, GAS will include regular features on the NHL on its Web site (www.gas.nick.com)and in its monthly magazine. The deal also calls for GAS and the NHL to collaborate on a weekly half-hour NHL show, although at press time, the show’s format and start date had yet to be finalized. GAS will kick off its coverage of the NHL later this month by broadcasting two hours of programming on the NHL’s All-Star game, which will be held in Toronto, Canada on February 6.
mini_pile
{'original_id': '2d3e221c3b1cb286125aa79007c22c5f3795fdbda73e7a6e3c503385cb35cf1a'}
{ "action": "opened", "number": 8, "pull_request": { "url": "https://api.github.com/repos/chdsbd/test_repo/pulls/8", "id": 274946885, "node_id": "MDExOlB1bGxSZXF1ZXN0Mjc0OTQ2ODg1", "html_url": "https://github.com/chdsbd/test_repo/pull/8", "diff_url": "https://github.com/chdsbd/test_repo/pull/8.diff", "patch_url": "https://github.com/chdsbd/test_repo/pull/8.patch", "issue_url": "https://api.github.com/repos/chdsbd/test_repo/issues/8", "number": 8, "state": "open", "locked": false, "title": "Create another_file.py", "user": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "body": "", "created_at": "2019-05-01T03:07:58Z", "updated_at": "2019-05-01T03:07:58Z", "closed_at": null, "merged_at": null, "merge_commit_sha": null, "assignee": null, "assignees": [ ], "requested_reviewers": [ ], "requested_teams": [ ], "labels": [ ], "milestone": null, "commits_url": "https://api.github.com/repos/chdsbd/test_repo/pulls/8/commits", "review_comments_url": "https://api.github.com/repos/chdsbd/test_repo/pulls/8/comments", "review_comment_url": "https://api.github.com/repos/chdsbd/test_repo/pulls/comments{/number}", "comments_url": "https://api.github.com/repos/chdsbd/test_repo/issues/8/comments", "statuses_url": "https://api.github.com/repos/chdsbd/test_repo/statuses/61e583350f834739f02c8411a9b6f190a1d02724", "head": { "label": "chdsbd:chdsbd-patch-5", "ref": "chdsbd-patch-5", "sha": "61e583350f834739f02c8411a9b6f190a1d02724", "user": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "repo": { "id": 183980723, "node_id": "MDEwOlJlcG9zaXRvcnkxODM5ODA3MjM=", "name": "test_repo", "full_name": "chdsbd/test_repo", "private": true, "owner": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "html_url": "https://github.com/chdsbd/test_repo", "description": "A repo for testing kodiak", "fork": false, "url": "https://api.github.com/repos/chdsbd/test_repo", "forks_url": "https://api.github.com/repos/chdsbd/test_repo/forks", "keys_url": "https://api.github.com/repos/chdsbd/test_repo/keys{/key_id}", "collaborators_url": "https://api.github.com/repos/chdsbd/test_repo/collaborators{/collaborator}", "teams_url": "https://api.github.com/repos/chdsbd/test_repo/teams", "hooks_url": "https://api.github.com/repos/chdsbd/test_repo/hooks", "issue_events_url": "https://api.github.com/repos/chdsbd/test_repo/issues/events{/number}", "events_url": "https://api.github.com/repos/chdsbd/test_repo/events", "assignees_url": "https://api.github.com/repos/chdsbd/test_repo/assignees{/user}", "branches_url": "https://api.github.com/repos/chdsbd/test_repo/branches{/branch}", "tags_url": "https://api.github.com/repos/chdsbd/test_repo/tags", "blobs_url": "https://api.github.com/repos/chdsbd/test_repo/git/blobs{/sha}", "git_tags_url": "https://api.github.com/repos/chdsbd/test_repo/git/tags{/sha}", "git_refs_url": "https://api.github.com/repos/chdsbd/test_repo/git/refs{/sha}", "trees_url": "https://api.github.com/repos/chdsbd/test_repo/git/trees{/sha}", "statuses_url": "https://api.github.com/repos/chdsbd/test_repo/statuses/{sha}", "languages_url": "https://api.github.com/repos/chdsbd/test_repo/languages", "stargazers_url": "https://api.github.com/repos/chdsbd/test_repo/stargazers", "contributors_url": "https://api.github.com/repos/chdsbd/test_repo/contributors", "subscribers_url": "https://api.github.com/repos/chdsbd/test_repo/subscribers", "subscription_url": "https://api.github.com/repos/chdsbd/test_repo/subscription", "commits_url": "https://api.github.com/repos/chdsbd/test_repo/commits{/sha}", "git_commits_url": "https://api.github.com/repos/chdsbd/test_repo/git/commits{/sha}", "comments_url": "https://api.github.com/repos/chdsbd/test_repo/comments{/number}", "issue_comment_url": "https://api.github.com/repos/chdsbd/test_repo/issues/comments{/number}", "contents_url": "https://api.github.com/repos/chdsbd/test_repo/contents/{+path}", "compare_url": "https://api.github.com/repos/chdsbd/test_repo/compare/{base}...{head}", "merges_url": "https://api.github.com/repos/chdsbd/test_repo/merges", "archive_url": "https://api.github.com/repos/chdsbd/test_repo/{archive_format}{/ref}", "downloads_url": "https://api.github.com/repos/chdsbd/test_repo/downloads", "issues_url": "https://api.github.com/repos/chdsbd/test_repo/issues{/number}", "pulls_url": "https://api.github.com/repos/chdsbd/test_repo/pulls{/number}", "milestones_url": "https://api.github.com/repos/chdsbd/test_repo/milestones{/number}", "notifications_url": "https://api.github.com/repos/chdsbd/test_repo/notifications{?since,all,participating}", "labels_url": "https://api.github.com/repos/chdsbd/test_repo/labels{/name}", "releases_url": "https://api.github.com/repos/chdsbd/test_repo/releases{/id}", "deployments_url": "https://api.github.com/repos/chdsbd/test_repo/deployments", "created_at": "2019-04-29T01:42:09Z", "updated_at": "2019-05-01T02:29:11Z", "pushed_at": "2019-05-01T02:51:25Z", "git_url": "git://github.com/chdsbd/test_repo.git", "ssh_url": "git@github.com:chdsbd/test_repo.git", "clone_url": "https://github.com/chdsbd/test_repo.git", "svn_url": "https://github.com/chdsbd/test_repo", "homepage": null, "size": 10, "stargazers_count": 0, "watchers_count": 0, "language": null, "has_issues": true, "has_projects": true, "has_downloads": true, "has_wiki": true, "has_pages": false, "forks_count": 0, "mirror_url": null, "archived": false, "disabled": false, "open_issues_count": 2, "license": null, "forks": 0, "open_issues": 2, "watchers": 0, "default_branch": "master" } }, "base": { "label": "chdsbd:master", "ref": "master", "sha": "95b0db4389bf575b7339f88deccf822e48b4bd48", "user": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "repo": { "id": 183980723, "node_id": "MDEwOlJlcG9zaXRvcnkxODM5ODA3MjM=", "name": "test_repo", "full_name": "chdsbd/test_repo", "private": true, "owner": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "html_url": "https://github.com/chdsbd/test_repo", "description": "A repo for testing kodiak", "fork": false, "url": "https://api.github.com/repos/chdsbd/test_repo", "forks_url": "https://api.github.com/repos/chdsbd/test_repo/forks", "keys_url": "https://api.github.com/repos/chdsbd/test_repo/keys{/key_id}", "collaborators_url": "https://api.github.com/repos/chdsbd/test_repo/collaborators{/collaborator}", "teams_url": "https://api.github.com/repos/chdsbd/test_repo/teams", "hooks_url": "https://api.github.com/repos/chdsbd/test_repo/hooks", "issue_events_url": "https://api.github.com/repos/chdsbd/test_repo/issues/events{/number}", "events_url": "https://api.github.com/repos/chdsbd/test_repo/events", "assignees_url": "https://api.github.com/repos/chdsbd/test_repo/assignees{/user}", "branches_url": "https://api.github.com/repos/chdsbd/test_repo/branches{/branch}", "tags_url": "https://api.github.com/repos/chdsbd/test_repo/tags", "blobs_url": "https://api.github.com/repos/chdsbd/test_repo/git/blobs{/sha}", "git_tags_url": "https://api.github.com/repos/chdsbd/test_repo/git/tags{/sha}", "git_refs_url": "https://api.github.com/repos/chdsbd/test_repo/git/refs{/sha}", "trees_url": "https://api.github.com/repos/chdsbd/test_repo/git/trees{/sha}", "statuses_url": "https://api.github.com/repos/chdsbd/test_repo/statuses/{sha}", "languages_url": "https://api.github.com/repos/chdsbd/test_repo/languages", "stargazers_url": "https://api.github.com/repos/chdsbd/test_repo/stargazers", "contributors_url": "https://api.github.com/repos/chdsbd/test_repo/contributors", "subscribers_url": "https://api.github.com/repos/chdsbd/test_repo/subscribers", "subscription_url": "https://api.github.com/repos/chdsbd/test_repo/subscription", "commits_url": "https://api.github.com/repos/chdsbd/test_repo/commits{/sha}", "git_commits_url": "https://api.github.com/repos/chdsbd/test_repo/git/commits{/sha}", "comments_url": "https://api.github.com/repos/chdsbd/test_repo/comments{/number}", "issue_comment_url": "https://api.github.com/repos/chdsbd/test_repo/issues/comments{/number}", "contents_url": "https://api.github.com/repos/chdsbd/test_repo/contents/{+path}", "compare_url": "https://api.github.com/repos/chdsbd/test_repo/compare/{base}...{head}", "merges_url": "https://api.github.com/repos/chdsbd/test_repo/merges", "archive_url": "https://api.github.com/repos/chdsbd/test_repo/{archive_format}{/ref}", "downloads_url": "https://api.github.com/repos/chdsbd/test_repo/downloads", "issues_url": "https://api.github.com/repos/chdsbd/test_repo/issues{/number}", "pulls_url": "https://api.github.com/repos/chdsbd/test_repo/pulls{/number}", "milestones_url": "https://api.github.com/repos/chdsbd/test_repo/milestones{/number}", "notifications_url": "https://api.github.com/repos/chdsbd/test_repo/notifications{?since,all,participating}", "labels_url": "https://api.github.com/repos/chdsbd/test_repo/labels{/name}", "releases_url": "https://api.github.com/repos/chdsbd/test_repo/releases{/id}", "deployments_url": "https://api.github.com/repos/chdsbd/test_repo/deployments", "created_at": "2019-04-29T01:42:09Z", "updated_at": "2019-05-01T02:29:11Z", "pushed_at": "2019-05-01T02:51:25Z", "git_url": "git://github.com/chdsbd/test_repo.git", "ssh_url": "git@github.com:chdsbd/test_repo.git", "clone_url": "https://github.com/chdsbd/test_repo.git", "svn_url": "https://github.com/chdsbd/test_repo", "homepage": null, "size": 10, "stargazers_count": 0, "watchers_count": 0, "language": null, "has_issues": true, "has_projects": true, "has_downloads": true, "has_wiki": true, "has_pages": false, "forks_count": 0, "mirror_url": null, "archived": false, "disabled": false, "open_issues_count": 2, "license": null, "forks": 0, "open_issues": 2, "watchers": 0, "default_branch": "master" } }, "_links": { "self": { "href": "https://api.github.com/repos/chdsbd/test_repo/pulls/8" }, "html": { "href": "https://github.com/chdsbd/test_repo/pull/8" }, "issue": { "href": "https://api.github.com/repos/chdsbd/test_repo/issues/8" }, "comments": { "href": "https://api.github.com/repos/chdsbd/test_repo/issues/8/comments" }, "review_comments": { "href": "https://api.github.com/repos/chdsbd/test_repo/pulls/8/comments" }, "review_comment": { "href": "https://api.github.com/repos/chdsbd/test_repo/pulls/comments{/number}" }, "commits": { "href": "https://api.github.com/repos/chdsbd/test_repo/pulls/8/commits" }, "statuses": { "href": "https://api.github.com/repos/chdsbd/test_repo/statuses/61e583350f834739f02c8411a9b6f190a1d02724" } }, "author_association": "OWNER", "draft": false, "merged": false, "mergeable": null, "rebaseable": null, "mergeable_state": "unknown", "merged_by": null, "comments": 0, "review_comments": 0, "maintainer_can_modify": false, "commits": 1, "additions": 1, "deletions": 0, "changed_files": 1 }, "repository": { "id": 183980723, "node_id": "MDEwOlJlcG9zaXRvcnkxODM5ODA3MjM=", "name": "test_repo", "full_name": "chdsbd/test_repo", "private": true, "owner": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "html_url": "https://github.com/chdsbd/test_repo", "description": "A repo for testing kodiak", "fork": false, "url": "https://api.github.com/repos/chdsbd/test_repo", "forks_url": "https://api.github.com/repos/chdsbd/test_repo/forks", "keys_url": "https://api.github.com/repos/chdsbd/test_repo/keys{/key_id}", "collaborators_url": "https://api.github.com/repos/chdsbd/test_repo/collaborators{/collaborator}", "teams_url": "https://api.github.com/repos/chdsbd/test_repo/teams", "hooks_url": "https://api.github.com/repos/chdsbd/test_repo/hooks", "issue_events_url": "https://api.github.com/repos/chdsbd/test_repo/issues/events{/number}", "events_url": "https://api.github.com/repos/chdsbd/test_repo/events", "assignees_url": "https://api.github.com/repos/chdsbd/test_repo/assignees{/user}", "branches_url": "https://api.github.com/repos/chdsbd/test_repo/branches{/branch}", "tags_url": "https://api.github.com/repos/chdsbd/test_repo/tags", "blobs_url": "https://api.github.com/repos/chdsbd/test_repo/git/blobs{/sha}", "git_tags_url": "https://api.github.com/repos/chdsbd/test_repo/git/tags{/sha}", "git_refs_url": "https://api.github.com/repos/chdsbd/test_repo/git/refs{/sha}", "trees_url": "https://api.github.com/repos/chdsbd/test_repo/git/trees{/sha}", "statuses_url": "https://api.github.com/repos/chdsbd/test_repo/statuses/{sha}", "languages_url": "https://api.github.com/repos/chdsbd/test_repo/languages", "stargazers_url": "https://api.github.com/repos/chdsbd/test_repo/stargazers", "contributors_url": "https://api.github.com/repos/chdsbd/test_repo/contributors", "subscribers_url": "https://api.github.com/repos/chdsbd/test_repo/subscribers", "subscription_url": "https://api.github.com/repos/chdsbd/test_repo/subscription", "commits_url": "https://api.github.com/repos/chdsbd/test_repo/commits{/sha}", "git_commits_url": "https://api.github.com/repos/chdsbd/test_repo/git/commits{/sha}", "comments_url": "https://api.github.com/repos/chdsbd/test_repo/comments{/number}", "issue_comment_url": "https://api.github.com/repos/chdsbd/test_repo/issues/comments{/number}", "contents_url": "https://api.github.com/repos/chdsbd/test_repo/contents/{+path}", "compare_url": "https://api.github.com/repos/chdsbd/test_repo/compare/{base}...{head}", "merges_url": "https://api.github.com/repos/chdsbd/test_repo/merges", "archive_url": "https://api.github.com/repos/chdsbd/test_repo/{archive_format}{/ref}", "downloads_url": "https://api.github.com/repos/chdsbd/test_repo/downloads", "issues_url": "https://api.github.com/repos/chdsbd/test_repo/issues{/number}", "pulls_url": "https://api.github.com/repos/chdsbd/test_repo/pulls{/number}", "milestones_url": "https://api.github.com/repos/chdsbd/test_repo/milestones{/number}", "notifications_url": "https://api.github.com/repos/chdsbd/test_repo/notifications{?since,all,participating}", "labels_url": "https://api.github.com/repos/chdsbd/test_repo/labels{/name}", "releases_url": "https://api.github.com/repos/chdsbd/test_repo/releases{/id}", "deployments_url": "https://api.github.com/repos/chdsbd/test_repo/deployments", "created_at": "2019-04-29T01:42:09Z", "updated_at": "2019-05-01T02:29:11Z", "pushed_at": "2019-05-01T02:51:25Z", "git_url": "git://github.com/chdsbd/test_repo.git", "ssh_url": "git@github.com:chdsbd/test_repo.git", "clone_url": "https://github.com/chdsbd/test_repo.git", "svn_url": "https://github.com/chdsbd/test_repo", "homepage": null, "size": 10, "stargazers_count": 0, "watchers_count": 0, "language": null, "has_issues": true, "has_projects": true, "has_downloads": true, "has_wiki": true, "has_pages": false, "forks_count": 0, "mirror_url": null, "archived": false, "disabled": false, "open_issues_count": 2, "license": null, "forks": 0, "open_issues": 2, "watchers": 0, "default_branch": "master" }, "sender": { "login": "chdsbd", "id": 1929960, "node_id": "MDQ6VXNlcjE5Mjk5NjA=", "avatar_url": "https://avatars2.githubusercontent.com/u/1929960?v=4", "gravatar_id": "", "url": "https://api.github.com/users/chdsbd", "html_url": "https://github.com/chdsbd", "followers_url": "https://api.github.com/users/chdsbd/followers", "following_url": "https://api.github.com/users/chdsbd/following{/other_user}", "gists_url": "https://api.github.com/users/chdsbd/gists{/gist_id}", "starred_url": "https://api.github.com/users/chdsbd/starred{/owner}{/repo}", "subscriptions_url": "https://api.github.com/users/chdsbd/subscriptions", "organizations_url": "https://api.github.com/users/chdsbd/orgs", "repos_url": "https://api.github.com/users/chdsbd/repos", "events_url": "https://api.github.com/users/chdsbd/events{/privacy}", "received_events_url": "https://api.github.com/users/chdsbd/received_events", "type": "User", "site_admin": false }, "installation": { "id": 848733, "node_id": "MDIzOkludGVncmF0aW9uSW5zdGFsbGF0aW9uODQ4NzMz" } }
mini_pile
{'original_id': 'f364fb9aa93044e37f9cff6414d9d5dc143a5bc31a980ab9af2213e28f01e9bb'}
The Paradox of Prevention: Successful Prevention Erases the Proof of its Success A Case for a New Ethic of Evaluation posted on this site on 30-12-2009 Populations tend to become increasingly more conservative and risk adverse when it concerns the usage of tax revenues. The level of acceptable risk premium may vary from society to society of course, but there is always a measure of “non rational” decision taking. A critical question is: “how risk adverse is the general population when it judges the performance of its government, of its administration and its civil servant?” And conversely, “how deep a risk aversion runs in the bureaucracy? In the Government?” Consequently “How much of a risk premium is Parliament and the Administration ready to charge the taxpayers to avoid any possibility of errors leading to political embarrassment?” Or “how irrational has its behaviour become?” The purpose of the following reflections is to attempt to decipher the specific “system of rationality” that has come to govern Foreign Affairs and Aid decisions in the recent past. Especially as they influence the decision taking for complex problems such as, for example, conflict prevention in Africa. I will first attempt to explain why prevention is difficult to undertake. I will show why managers refrain from taking high risk decisions after they have been subject to critical comments by evaluators and how they learn to cope in very specific manners: their selection of choices become increasingly more irrational. This is, of course, the contrary reaction expected by the evaluators whose primary intentions are to increase rationality in decision making. Among solutions that could be envisaged, one should spend some time assessing the impact and role that evaluation plays in the build-up of such increasing risk premiums. A new dimension must be added to the ethical code of evaluators which would take into consideration the direct effect of the evaluator’s own behaviour. This text was first published at Columbia University Press Online and can be found at: In time of war, the stakes are so high that populations generally are willing to give great discretionary powers to governments and armies, allowing thus for risk taking, leading to both successes and losses. But in times of peace, populations tend to become increasingly more conservative and risk adverse 1 when it concerns the usage of tax revenues. The level of acceptable risk premium may vary from society to society of course, but there is always a measure of “non rational” decision taking. This is not a moot point in conflict prevention or in any long term preventive activity, as it constrains the capacity of any government to deal with anticipated problems and crisis. In today’s context, decision taking in the Federal Government is increasingly biased in favour of risk adverse decisions, and the risk premium which is considered acceptable can be very high at times. In that sense, we cannot characterize the decision making process as “rational”. Fears of public criticism, when factored in, may lead to the search of “ultimate error and risk free” decisions as rare an entity as the Unicorn. Among solutions that could be envisaged, one should spend some time assessing the impact and role that evaluation plays in the build-up of such increasing risk premiums. Game analysts would suggest we move out of what is now a very bad “prisoner dilemma” toward the somewhat more efficient “rational pigs” 2 A new dimension must be added to the ethical code of evaluators which would take into consideration the direct effect of the evaluator’s own behaviour. It is generally believed that it is better to prevent than to cure. By extension, it is assumed that governments will apply such basic rules of conduct in managing State affairs. However many demands, concurrently imposed by the taxpayer, are perceived as more pressing and definite. The sum of those conflicting demands, makes it difficult to act in a preventive and efficient manner, to take the subtle decisions that are needed to prevent and to survive as a Government or as an Official. A) A typology of African conflicts Current Foreign Policy emphasizes the need for “Diplomatic Prevention of Conflicts”. This is a good case to analyse and demonstrate the very real difficulties of acting wisely in a complex situation. Conflict prevention is generally confused with “diplomatic prevention of conflicts”. An implicit assumption follows. It assumes therefore that managing conflicts is confined to the art of diplomacy. Conflict management will make use only of the tools designed for such functions. Such an approach leaves aid agencies (read development assistance institutions) boxed out of any attempt to prevent conflicts in the making. The financial resources of ODA thus becomes a mere convenience to provide increased resources and assets in the hands of diplomats and diplomatic institutions. It reduces the ability and the role of development assistance in the long term prevention of human disasters. To help clarify the roles played by the various institutions, we have charted 3 a theoretical sequence of events leading to a major catastrophe. Five phases or periods are identified and correspond to various evolutions from a “malaise” to a “war”. Put simply, a typical conflict will start with a “malaise” moment 1, progressively evolving toward a “crisis”, moment 2. The etymology of crisis comes from the Greek word for decision or, more specifically, “time for a decision”. If no decision is taken, we move toward moment 3, a “conflict”. As is often the case internal conflicts are denied. For obvious reasons related to the sovereignty of nations, diplomats can hardly intervene during such periods. In moment 4, however, the conflict degenerates into the open and usually moves across boundaries. It is then the moment when diplomatic activities may take place, in an attempt to prevent further aggravation toward a full civil war or a Genocide. Those diplomatic activities are generally complemented by Humanitarian Assistance and Peace Keeping Operations. In a symmetrical manner, when a conflict mutates into open military activities, development activities become increasingly irrelevant. Moment 5 will happen after truce and reconciliation have taken place, and time has come to reconstruct the country. ODA goes back then to its fundamental origins rooted in the Marshall and Colombo Plans. Those definitions, as simple as they are, help clarify the different fields for research and for policy making related to “conflict prevention”. Clearly Development Assistance’s role is in the long term actions, those most difficult to link to a distant outcome. What happened before a malaise grew into a war? What could have been done at that moment by each society? What, then, can Aid Agencies do to assist those groups in dealing with difficult situations? When is the time for them to act preventively? Should it be when a conflict is still localized and the separation of actors into enemy camp is not completed? When existing conflict resolving mechanisms are still at play? In the absence of models, those are fundamentally most difficult questions. Those are however, the only real and worthwhile questions for an Aid Agency, and for its staff. B) Ignorance is the first impediment for action During the first decades of African independence, Aid Agencies (Multilateral, Bilateral and NGO’s) undertook an extraordinary array of projects. Infrastructures were built, schools and universities were inaugurated, vaccination programs, as well as many other health and social activities, were launched etc. Some economic growth ensued, some benefits was shared, but it is generally accepted that the results are mixed when measured from an economic point of view. But what of the impact of all those actions from the perspective of the security of African Nations? What can be truthfully concluded today? What conclusions should be drawn from the absence of civil war in countries like Mali or Ghana? Should it be argued that aid reduced the probability of conflicts where Aid was significant? Could it be that, like Monsieur Jourdain who wrote prose unknowingly, ODA help prevent conflicts when attending to its ordinary business? Or, is it true, as many analysts and journalists believe, that Aid had a neutral effect at best, and some of the time it played into the nascent conflicts and augmented them? How? The first factor which impedes conflict-preventive action, is the general ignorance of its root causes and the subtle mechanism that have been at play for centuries. Many people hold opinions about such questions, but there is little solid evidence. The community interested in those matters has collected little data and undertaken too few researches to document the causalities at play. The first and almost only way to overcome this “knowledge gap” is to be found in the regular and dedicated attention to impact evaluations. Building up the knowledge base about what works and what doesn’t. agglomerating data and analysis until some causal relationships become clearer. The fascination for “input” evaluations, and for measuring compliance toward policies and procedures has created a single-mindedness. 4 This single-mindedness, reinforced by rewards and sanctions, has obscured for the managers the need to build a real knowledge base. For the time being, development doctrine remains overly dependent on ideologies and anecdotal wisdom as opposed to the rigorous, incremental pursuit of conclusions drawn from accumulated empirical evidence. The mass media prefers anecdotes to analysis as they are easier to use and can be charged with essential “entertainment value”. In due time, even the most hardy, scientifically-trained managers can’t resist the trend: they will start believing anecdotal evidence and disregard the search for facts. C) Reading into the past When dealing with new problems, an institution cannot apply existing procedures. Each crisis in Africa is “new”. It has been observed by the evaluating team which assessed the donors response to the Rwanda Genocide, 5 that actors saw the crisis through the lens of the earlier Somalia crisis. What obscured the UN response in the months preceding the eruption was the “shadow” of the Somalia crisis. It is feared by the author that the International Community is again repeating the same error, as it seems to be viewing the Burundi drama as a repeat of the Rwanda situation. This tendency to fight the last war is predominant; managers, conscious that they are being observed in their compliance to systems and procedures, will tend to ensure that whatever comes out of the previous evaluation will be replicated in the design for the following project. This is especially pronounced when moving between phases. The evaluation process should be extra-sensitive and underscore the inherent dangers of applying “lessons learned” mechanically. D) The Mikado strategy Generally, Government policy analysts search for standard responses, for systems and procedures to deal in advance with predictable events. It may be true that conflicts are going to happen in Africa over the next few years, and in that sense they are “predictable events”. However, their nature is very specific and their characteristics are highly fragmented. Each conflict has its system of roots, its own context and very specific rules of engagement. Various African societies respond differently to stimuli and conflict resolution mechanisms are very diversified in the way they function. In bridge, or in chess, analysts have studied various responses that can be planned in advance depending on the various moves of the adversary. But African conflict prevention has no similarity to such games. It is maybe analogous to the Mikado game, where one drops various colored sticks on the ground and picks up as many as one can without moving any other sticks. Points vary according to the color of each stick; the winner is the one who adds most points. In such case there is no precise action that can be preplanned. A priori, no activity is more commendable than any other. The player must assess the way the sticks interlock, start with the obvious moves, and proceed from one successful action to another. The only significant factor to consider in Mikado strategy is “relevance”. To remain relevant, one needs to look at the specific situation, use experience, know-how, knowledge, rigorous and disciplined analysis, and a real measure of intuition to design and tailor an adequate and appropriate course of action. However, over the years, domestic based policies have progressively reduced the area reserved for relevance. In some countries, the regulatory environment has been increased by the introduction of laws such as the environmental impact assessment, and by policies and priorities. However, nothing a priori suggests that the combination of such laws, policies and priorities constitute the mix that is required to prevent future conflicts in Africa. E) The ambiguous role of Policy accountability Policies deal with generalities and with generic situations. As such, policies can become the worst enemy of relevance: specific actions deal with specific problems, and compliance to policies and program priorities may not provide the answer. This raises a major problem within risk-adverse societies. Relevance, specificity, and intuition are all concepts fraught with risks. Errors may happen. Individuals may chose actions whose appropriateness is difficult to demonstrate unless one shares the same background of experience and the same body of knowledge. The need for trial and error is more often than not perceived as a luxury. A crisis of confidence may result from abandoning standard procedures and approved policies. Most analysts of government behavior, from the Auditor General to journalists and academics, wish to measure compliance to approved policies. They demand facts, figures and dollars figures, that will clearly demonstrate that the government acts precisely in line with its avowed policies. This propensity to tie governments to generic behavior and pre-set policy responses, compounded with the propensity to avoid risks, reduces the ability of aid agencies to deal early with potential conflicts. Clearly, political correctness, which is one particular form of policy compliance, further limits the capacity to analyze and to act appropriately. However, one can hardly miss seeing how much damage has been done to the Government machinery through the mediatization of the post facto search for “value for money”. The general public has been led to believe there exists, as in bridge, an “objective optimal game strategy leading to correct decisions”; this injects into the public service a risk-minimizer mentality and an acceptance of ever increasing risk premium. This adds to costs and reduces, rather than increases, the probability of success. Preventing conflicts or taking long-term action rests on a sophisticated and subtle analysis intertwined with risk appreciation. The Mikado analogy demonstrates the limit to the predictability of any single action or of any series of actions. As a corollary, it suggests the futility of trying to reconstruct single events and link them to any final outcome. Coaches review critically significant moments of past games to improve the technique of players. However such an evaluative learning process stops short of creating a winning scenario, as changing one single event changes the rest of the game, maybe for the better, maybe for the worse. Most significantly, the general public is never invited to those “locker room” evaluation cum training sessions. Proclaiming to an entainment conscious media, the existence of “value for money” may not be the best way to induce thriftiness and strategic behavior. F) The democratization of Foreign Affairs Until the late sixties, many analysts of International Affairs considered that Foreign Policy partially escaped the democratic process. Decisions were taken by an elite of Officials, in concert with a select group of interested parties (journalists, academics, interests groups and business). The issues were generally considered to be of little interest to the taxpayer or the electorate as the media did not dwell on those complex and generally uninteresting issues. Domestic affairs were the center of the democratic debate. The Seventies have opened up all our democracies to the World, and in the Eighties subjects that were ignored previously, attracted the attention of electronic media. What to do about conflicts in remote countries is currently discussed openly, forcing Governments to take public stands on all matters . In the context discussed previously, this obligation to take decisions in uncertain circumstances, and to be seen as pleasing the public, limits seriously the decision making. In the years that preceded the last election in South Africa, the Canadian Government (CIDA, External Affairs, in conjunction with Canadian interested parties, IDRC, NGO’s and many experts), created a committee to define the aid that could be extended to South Africans to foster the process of democratization and to enable the black majority to quickly acquire the knowledge and the skills associated with running a democratic state. The most common desire of the members of this group was to attract as little attention as possible from the press: they preferred to work efficiently, yet secretly, rather than reap the glory of the media attention. There is, therefore, an apparent conflict between democracy and quality decision. G) The NASA dilemma In 1986, the Challenger space shuttle, carrying six astronauts and commissions worth hundreds of millions of dollars, exploded. It was shown that the accident was predictable, therefore, avoidable. The cause of the tragedy was the O-ring, and the defect had been identified by NASA employees, but no preventive measures had been taken. The authorities decided that the launch should not be delayed. The dilemma seemed insoluble: If NASA delayed the launch to replace the defective joints, everyone would know exactly how much the delay cost, but it would be impossible to prove how much money would have been saved because the precaution would have destroyed the proof that there had been cause for worry. Considering the above, to anticipate and abort a conflict is a process which, to the extent that it is successful, will usually obscure that proof of its own success. It becomes extremely difficult to overcome this quandary in the recently introduced notion of “result based management”. Such an approach is most useful to measure “measurable activities”, pardon the tautology. One needs to prove that one action leads to one precise result. In long term crisis prevention, such a clear linkage is generally impossible to demonstrate. Furthermore, other incidents may happen as a direct and visible consequence of the preventive action, obscuring further the raison d’etre of the decision. One can view the export of management, decision-making and control systems as transplants: the body will either accept or reject them, often after a considerable amount of struggle and suffering. Every value system carries with it an intrinsic bias, a natural drifting force. When exported and integrated into another cultural milieu, it will interact with local values. Depending on the tendencies inherent in the two systems, the exported system may amplify and exacerbate the defects of the recipient system. One might be tempted to believe that what protected the long lasting excellence of the most famous Mayo Clinic is that for 140 years it has remained concerned with results. Follow-up practices mean that teams ask such questions as “Did our work help cure the patient?” At another level, the same team will ask: “Are current operating procedures the best available? How can they be improved?” And, thirdly, the team must analyze the tools used: “Should they be re-evaluated to produce better results, or simply to be more efficient and less costly?” This is the proper way to deal with results. The new principle called “results-based management,” however, has made its way to Canada from the major American schools. It consists, in part, of another fashionable technique aimed at providing technocrats with jobs and prestige. Jourdain has always written prose without knowing it. Those described by Pamela Pitcher 6 as craftsmen (and a fortiori, the visionaries) have always been extremely conscientious about attaining results. Posing the question again today may initiate a very intelligent and productive deliberation, but what we see in the end is merely the superficial and mechanical application of a new slogan. The time will come when this “transplant” is replaced by another. Measurement of results certainly constitutes an important criterion, but is not in itself sufficient to maintain excellence. An analysis of natural drift tendencies will show why. The American system has historically done everything possible to avoid any type of discretionary power. The “contract” that binds the government and its principals, or the State and a supplier, must be free of all subjective judgment. Accordingly, the target is to establish “honest contracts.” 7 However, this system will easily fall prey to procedural and legal drift, because the goal of objectivity will be pursued past the stage of realism; the result is a very specific manner of procrastinating. It is the American sense of risk that regularly helps correct the excesses of legalism and the exaggerated concern with short-term, measurable results. As market forces are allowed to operate fairly freely in the United States, bankruptcies, mergers and takeovers make it possible on a regular basis to eliminate the victims of “rampant proceduritis.” In the absence of this natural counterbalance—i.e., risk tolerance—we may see the agonizing spectacle of an institution goings round in circles, the prisoner of a logic it cannot understand, incapable of finding answers within its natural environment to the problems plaguing it. This is often what occurs in the Canadian Public Service, when consultants are used as intermediaries to directly import unadapted organizational models designed for private enterprise in the United States. The results-based doctrine thus provides an ideal alibi for avoiding any kind of risk-taking: results must be tangible, measurable and predictable. The theory makes it possible to divide any human activity into distinct little steps, and to preserve the privilege of recanting in the face of the slightest changes in policy. New approaches and long-term commitments are thus totally marginalized, leaving the way open for only that which is familiar and capable of providing immediate gratification. NASA’s dilemma is related to the difficulties involved in demonstrating a cause-and-effect link between preventive action and the absence of a disaster. The analysis tools provided by “results-based management”, in particular its emphasis on short term and clearly identifiable causal relationships are not well suited to this type of endeavour. Clearly, we are deeply into the dysfunctionalities of the prisoner’s dilemma. What is good for the community, or for the long run, is contradicted by what is good for the individual, or for the short term. Thus, over the years, layer after layer of well intentioned improvements have been introduced in the management of the Aid business in Canada and in most other OECD member countries. The net result is that it is now virtually impossible to attempt to prevent conflict. In sum, ideas intended to foster a rational and accountable system may lead to irrational behavior on the part of aid managers and Government officials. This may also contravene declared policy. The response to the NASA dilemma The lesson learned by the auditors from the NASA crisis is that three key strategic elements had been lost over the years, thus depriving this institution, of the needed elements to take good decisions in uncertain circumstances: hands on knowledge, excellence, and leadership. Over the years NASA, (and so it is for some aid agencies), abandoned progressively all its hands-on capacity to become instead “process managers”. The knowledge acquired was passed on and desegregated to various suppliers and consultants. But nothing can replace intuition, based on systematic usage of sound scientific traditions, and practical experience to take decisions in uncertain and untested circumstances. Furthermore, an institution needs a critical mass of people who share related and common experiences to arrive at a solid “intuitive” consensus of what is to be done. In the 70’s, following experts advice on sound management practices, NASA abandoned the recruitment of “excellent” people as it seemed to reduce its financial viability. All those “Nobel prizes” were relegated to universities and research centers. Their absence was cruelly felt, as their credibility and their acute sense of analysis was not available at the time of most critical decisions. Their high sense of self confidence and self esteem would have been essential to read through the many paradoxes and false savings typical in such complex problems. Deprived of their overpowering presence, how can NASA explain to a demanding, yet ignorant American public, the subtleties of risk assessments and of costly decisions in rocket launching? Lastly, for each industrial sector of industry there must exist a lighthouse industry. It sets the pace and the standards, it exercises leadership, and placates the general public. Without such leadership, doubts and fears arise. In the confidence gap thus created, anybody who claims expertise may attract the attention of the media and pretend they know the true way of doing things. Bombarded by these know-it-alls, inundated by their contradictions, the general public does not know whom to trust and is suspicious of any decisions. Having lost its leadership over the Industry, NASA could not take the right decision and hope to survive. What can evaluators do for their part? To renew the current code of ethics The following considerations are premised on the conviction that ethical behavior is measured not solely on its pure intentions, but also on the adaptation of one’s action to its consequences. Once known, remedial action must replace ineffective behavior. A new ethic of evaluation must be developed. It must define standards as well as clarify the limits and limitations of post facto judgments. It must then move outward and contribute, if not inspire, to the drafting of professional codes of ethics for all professions which deal with evaluations: I refer to auditors and evaluators, of course, but to academics and media as well when they play the role of evaluators. Some points for consideration for the confrontation between “real-evaluation” and evaluation theory: a) The difference between Audits and Evaluations is subtle but very real. It happens all too frequently that this border is blurred, intentionally or inadvertently, leading to disastrous effects. The more advanced views on “performance assessment” consider that all those activities form part of an integrated panoply of instruments useful to the managers. Endowed with a variety of good information, no doubt that the responsible manager will take rational decisions. This doctrine finds abundant use in small, privately owned and managed corporations. The eyes of the owner are omniscient, and its personnel interests generally correspond to those of his firm. Profits at year end are there to ensure integrity and lucidity in appraising business practices. Unfortunately, this does not deal adequately with the bureaucratic environment where a profound cleavage exists between individual interests and those of the Administration. Furthermore, a very different rapport exists between the obligation to comply to rules, and the bottom line. In the private sector, the bottom line generally comes first, while in the Public service, obedience is praised more highly than the free interpretation of rules and regulations. Audits verify compliance to rules and regulations. As such, individual accountability is at the center of auditors preoccupation. Managers know it and expect it: when signing a document with a clear audit trail, most managers will ensure respect for delegations of powers, compliance with Government regulations and laws. Those are the accepted rules of the game. On the other hand, evaluation deals with corporate accountability. As long as good faith is not challenged, evaluators deal with questions about the state of the art, the corporate behavior, the corporation choice of personnel, the training it provides its employees, the knowledge it renders accessible, the routine it encourages, etc. Ultimately, evaluation measures the practices and wisdom of a ministry, of the Government and of the Parliament. Any ambiguity between those two contexts of performance assessment breeds instant fear, and provokes recoil into managers. Evaluation conclusions will be doctored if individual blame may result from its publication (internal or external). In such circumstances, evaluations will be rigorously neutered. This will tend to compromise the evaluation process and substitute cynicism for probity. Faced with outside criticism, scapegoats are often sacrificed: eventually the “clever goats” build the necessary safeguard. It should come as no surprise to the sagacious observer that objectives are fuzzy, milestones as flexible as rubber bands, and budgets increased by the additions of redundant studies and padded with innumerable contingency funds. Years of adaptation on the part of managers as well as ample evidence that evaluation is still not truly part of the learning process suggests those two activities must be kept absolutely air tight from each other, contrary to theory and logic. b) Care must be taken to avoid giving the impression, to the media, to the general public and to managers, even inadvertently, that complex problems can be resolved simply and error free. The risk premium costs that ensues can tax resources and reduce quality decisions to the extreme. In some OECD countries, taxpayers have been led to expect unrealistic achievements. As a result, a wave of charlatans and “ambulance chasers” prospect for jobs as “Counsellors of the Impossible” and “Makers-of-rain”. Management gurus, who claim that the application of recipes such as “result base management” will resolve all uncertainties and eliminate risks in the decision process, are misleading the public and, in my view, acting unethically. Moreover, the gradual effect of those assaults on the credibility of Governments are reducing its’ leadership role. In many instances, today’s questioning does not only relate to the size of the State, but to the rationality of its existence. This breeds irrationality and poor decisions. c) Goals and Objectives form the basis of evaluations and project management…in theory. In practice, however, these goals and objectives are written under a cloud of ambiguity. Many things happen to them on their way to the market! First, the planning stages have increasingly become the responsibility of head offices. Away from the field reality, where a multitude of actors freely interact and conflicting interests are at play, projects are aseptic as they are almost test-tube generated. The process is increasingly lengthy, divorced from field reality but immersed in headquarters’ preoccupations and dictates. To secure project approval, managers must kowtow and blend into current policy agendas, fads, whims, imbedded with power struggles and restricted definitions of “political correctness”. At the end of this obstacle course, project objectives have acquired many meanings, some of them “unspoken”. When, eventually, the financial resources of the project become available to the implementers, the slant seldom fits with reality. It must be changed, most often without proper documentation. Does that constitute, as it is often argued, an obstacle to evaluation? How do we recreate, in the midst of layer after layer of confusing documentation, the true and authentic goals and objectives of a project or of a program? If for no other reason than that, it should be recognized that evaluation is first and foremost an art, of the most sophisticated form indeed. The first activity is to “reconstruct” reality, as Sherlock Holmes did. It shares very few attributes with scientific endeavor. As such, it should be practiced only by the very best individuals, endowed with rich professional experience, recognized for the quality of judgment, intuition, perspicacity and, most of all, for their love of the subject matter and for its practitioners. The pedagogical role of evaluators is such that it should be reserved for the very best of us. As a consequence, fewer evaluations may possibly be undertaken; however, the result should be increased quality and higher standards of the resulting evaluations. d) Increasingly the Aid recipient has been unempowered, first from the design, then from the implementation, and eventually from the evaluation processes. This is certainly more true in Africa and less so in Asia and in Latin America. It varies considerably as an outcome of administrative procedures, especially the obligation to report to the recipient as is the case in International Organisations. It may be explained by the desire to secure “objective assessors”. It may be the result from tied purchasing policies. Whichever; but it demonstrates a lack of confidence in the recipient’s capacity to deal with its own development needs. Moreover, it breeds apathy on its part in those crucial matters. e) To replace the current fascination surrounding base line studies with supporting countries data bases. Base line surveys have become the darling of evaluators. Nevertheless, aid donors agencies have given minimal support to the creation of indigenous data bases, and management information systems. Poor countries need more than any other a sound base upon which to make strategic decisions and choose investments strategies. The amount of money earmarked for base line evaluation may be put to better use. Collectively we should tried to bolster programs that support indigenous data bases and information systems. It would serve also as a mean to further empower aid recipients. Finally, by way of conclusion, some pertinent observations by former Nobel prize winner, François Jacob (medicine, 1965). “A première vue la science parait moins ambitieuse que le mythe par les questions qu’elle pose et les réponses qu’elle cherche. De fait les débuts de la science moderne datent du moment où aux questions générales se sont substituées des questions limitées; où, au lieu de se demander. “comment l’Univers a-t-il été créé? De quoi est faite la matière? Qu ’elle est l ’essence de la vie? On a commencé à se demander: “comment tombe une pierre? Comment l ’eau coule-t-elle dans un tube? Quel est le cours du sang dans un corps? Ce changement a eu un résultat surprenant. Alors que les questions générales ne recevaient que des réponses limitées, les questions limitées se trouvèrent à conduire à des réponses de plus en plus générales. 8 To foster development, experts and decision makers need answers to many simple and “limited” questions rather than large ideologically based statements and doctrines. For example we may start our quest for relevant information with questions like: “How does rural electrification affects fertility rates? Does it work the same way in urban slum areas? How is social peace related to infrastructure? Does a well structured and maintained communication system enhance or reduces inequalities? How and why does agrarian reform and the establishment of clear property ownership generally allows for sustained periods of economic growth? What are the social effects of irrigation schemes?” Nobel prize winne Note 1: Definition of risk adverse and risk premium: A group of people is offered two choices: choice one: each will receive $100 or, choice two, at the draw of a coin each will get $200 for head or nothing if its tail. Individual who choose the first alternative are defined as “risk adverse people”. Subsequently, we measure the depth of risk aversion by introducing a risk premium i.e. the cost each risk adverse individual is prepared to pay to avoid risk. Each will be offered $75. vs. a 50/50 chance of earning either $200 or $0.00. In this case the risk premium is valued at $25. Mathematically, the first test will yield equal results on the long term. In that sense it is equivalent; however, paying a risk premium is not an optimal choice. It is not then define as a “rational decision”; unrelated, emotional factors come to play in what should remain essentially a measurable dilemma. Back. Note 2: Game and strategy aficionados will find those models of decision making well described in: John McMillan, Games, strategies & managers, Oxford University Press. London, 1992. chapter 2. Back. Note 3: Jean-H. Guilmette, “Beyond emergency assistance: early warning, conflict prevention and decision taking”, in proceedings of International Francophone Meeting, conflict prevention: African perspective, Ottawa, 19 to 22 September 1995, Gov. of Canada, p.79 (reproduce in annex I ) Back. Note 4: The recent evaluation on the Rwanda Genocide was a first of its kind. The DAC members should be complimented on such an initiative and encouraged to increase efforts to gather intelligence from those collective endeavour. It should be noted however, that the Development Assistance in the years prior to 1990 is still to be assessed in term of its impact ($3,5 billions remains unnoticed…?!). It is commonly claimed that Agencies invested millions in helping along South Africa ease into democracy: did it really have such an impact as we all want to believe, or was it neutral? Rigorously speaking, the satisfaction derived from the electoral process remains unsubstantiated. Back. Note 5: Howard Adelman, “Early warning and conflict management”, in Joint evaluation of emergency assistance to Rwanda, study 2, p.70. Back. Note 6: See Artists, Craftsmen and Technocrats by Pamela Pitcher, HEC Press, Montreal, 1994. This remarkable study of the evolution of a great Canadian financial institution divides senior management into three groups: artists, who have a vision and build up the enterprise; craftsmen, who know how to make things, and technocrats, who deal with processes. Unfortunately, experience shows that the latter have a huge destructive capacity. More gregarious than the other two groups, they are efficient predators. They will hunt down the artists because they do not understand how they think, and enslave the craftsmen. In the end, having destroyed these two groups, they have no other choice but to destroy the company as well. Back. Note 7: See P. D’Iribarne, “L’enracinement culturel de la gestion des entreprises,” in L’Esprit d’entreprise, actes des journées scientifiques de l’UREF, Ottawa, Sept. 19–20, 1991. Paris: J. Libbey, 1993. Back. Note 8: François Jacob, Le jeu des possibles, Essai sur la diversité du vivant, Fayard 1981. Back. Laisser un commentaire amour | noire souris | loup22 | | Créer un blog | Annuaire | Signaler un abus | Histoire de verre et de feu | Musique en Montagne | comics-place
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '254', 'language_id_whole_page_fasttext': "{'en': 0.9419273734092712}", 'metadata': "{'Content-Length': '76528', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6OYIT6INC4A4TATYOQYDR4FWAR6AIJ7S', 'WARC-Concurrent-To': '<urn:uuid:2dbc1f49-8c58-4ce5-9c02-f9207ace7828>', 'WARC-Date': datetime.datetime(2019, 4, 20, 10, 33, 48), 'WARC-IP-Address': '91.121.50.177', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:ZKNDV6O2BNA3AXXQY4TS6YAWVMITF6U4', 'WARC-Record-ID': '<urn:uuid:c0a561e3-0b21-477e-b0bb-b11771429873>', 'WARC-Target-URI': 'http://jeanhg.unblog.fr/the-paradox-of-prevention-successful-prevention-erases-the-proof-of-its-success-a-case-for-a-new-ethic-of-evaluation/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:336f3ff4-ac29-431a-9f32-d4778c37245a>', 'WARC-Truncated': None}", 'previous_word_count': '6340', 'url': 'http://jeanhg.unblog.fr/the-paradox-of-prevention-successful-prevention-erases-the-proof-of-its-success-a-case-for-a-new-ethic-of-evaluation/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-63-222-147.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03204077482223511', 'original_id': '8da2d4c40851fdc21e83729b24776497cdab172483f9a3b272d98d4e69903454'}
Optimized membrane design for hydrogen fuel cells   Posting by Richard Jones on 14 Oct 2008 at 19:13:35. Dear All: Our plastic hydrogen battery design requires the containment of hydrogen as well as water. I really would appreciate a brief summary of how Plastic A can be a better Hydrogen barrier than plastic B, but plastic B is a better water barrier than Plastic A. Furthermore, I am interested in long term mechanical retention due to the influence of - I suppose in this case - water in the polymer combined with temperature en compressive stress effects.           follow up posts Compose your reply to Richard Jones on 14 Oct 2008 at 19:13:35 below.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '15', 'language_id_whole_page_fasttext': "{'en': 0.9058371782302856}", 'metadata': "{'Content-Length': '8494', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GXSTL47S5KWZLPF5E5BK33UT2FNLJS6Q', 'WARC-Concurrent-To': '<urn:uuid:42f38f03-3d02-49cc-887c-76a4b0ce749c>', 'WARC-Date': datetime.datetime(2020, 10, 21, 2, 9, 19), 'WARC-IP-Address': '213.124.83.27', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:6QFXFNOV7NG5FOSG3PEXRAEDW3I4S2WE', 'WARC-Record-ID': '<urn:uuid:fa00220e-8465-4486-ba2c-1d2e85d24023>', 'WARC-Target-URI': 'https://composite-analytica.com/messages/4658.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a84aaa6e-feea-484c-827f-046afc7d8fe8>', 'WARC-Truncated': None}", 'previous_word_count': '143', 'url': 'https://composite-analytica.com/messages/4658.html', 'warcinfo': 'isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-137.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021983027458190918', 'original_id': '96daa66b64d3499441c3b14fbb31d502cf1de730d998746f2c885814a2adc722'}
<template> <div> <el-card shadow="never" class="mt20"> <el-form :model="form" :rules="rules" ref="ruleForm" label-width="100px" > <el-form-item label="标题:" prop="title" style="max-width: 600px"> <el-input v-model="form.title" type="textarea" maxlength="200" placeholder="输入公告标题" readonly></el-input> </el-form-item> <el-form-item label="公告内容:" prop="content" style="max-width:900px;"> <div ref="editor" style="text-align:left" disabled></div> </el-form-item> <el-form-item label="是否启用:" prop="status" > <el-radio v-model="form.status" :label="0">禁用</el-radio> <el-radio v-model="form.status" :label="1">启用</el-radio> </el-form-item> <el-form-item> <el-button @click="$router.go(-1)">返回</el-button> </el-form-item> </el-form> </el-card> </div> </template> <script> import uploadImage from "@/components/upload/image" import { detailAnnouncement,editorAnnouncement } from '@/api/announcement' import E from "wangeditor" export default { name: 'editor', components: { "upload-image": uploadImage }, data() { return { form: { id:'', title: "", content: "", status: "" }, type:'', typeData: [], rules: { title: [{ required: true, message: "请填写公告标题", trigger: "blur" }], content: [ { required: true, message: "请输入公告内容", trigger: "blur" } ], status: [ { required: true, message: "请选择状态", trigger: "change" } ] }, editor:'' }; }, created() { this.type = this.$route.params.type this.form.id = this.$route.params.id; this.typeRequest(this.$route.params.id) }, mounted() { this.uploadImage() }, methods: { // 上传图片 uploadImage() { const that = this; this.editor = new E(this.$refs.editor); this.editor.customConfig.menus = [ 'head', // 标题 'bold', // 粗体 'fontSize', // 字号 'fontName', // 字体 'foreColor', // 文字颜色 'backColor', // 背景颜色 'list', // 列表 'justify', // 对齐方式 'image', // 插入图片 'undo', // 撤销 'redo' // 重复 ] this.editor.customConfig.uploadImgMaxSize = 1 * 1024 * 1024; this.editor.customConfig.uploadImgShowBase64 = true; this.editor.customConfig.onchange = html => { this.form.content = html } this.editor.create(); }, typeRequest(id) { detailAnnouncement({id}).then(res => { if (res.returnCode == "ERR_0000") { this.form = res.data this.editor.txt.html(res.data.content) } }) }, submitForm() { this.$refs["ruleForm"].validate(valid => { if (valid) { editorAnnouncement(this.form).then(res => { if (res.returnCode == "ERR_0000") { this.$message({ message: "修改公告成功", type: "success" }) this.$router.go(-1) } else { this.$message({ message: "修改公告失败", type: "error" }) } }) } }) }, } }; </script>
common_corpus
{'identifier': 'https://github.com/junkouhuang/xinquan-webapp/blob/master/src/views/announcement/detail.vue', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Apache-2.0', 'date': '', 'title': 'xinquan-webapp', 'creator': 'junkouhuang', 'language': 'Vue', 'language_type': 'Code', 'word_count': '273', 'token_count': '1155', '__index_level_0__': '43922', 'original_id': '3f4cca8421ca6319bb2717fbb1c4c3fd67ce76b8bfb19d5cf7d3c3636cfe0760'}
Monthly Archives: October 2017 How to Deploy a Ruby on Rails Application to Elastic Beanstalk Who This Tutorial Is For If you’ve never used AWS before and you don’t even know what Elastic Beanstalk is, that’s okay. What We’re Going To Do We’re going to get a Ruby on Rails application running on a staging environment on AWS Elastic Beanstalk. The Rails app will be connected to a PostgreSQL database instance. Here are the steps we’re going to carry out: 1. Create a Rails App to Deploy 2. Create an Application on Elastic Beanstalk 3. Install AWS CLI and EB CLI 4. Create an Environment on Elastic Beanstalk 5. Set Up an RDS Database 6. Observe Our Working App All you need in order to be able to follow this tutorial is to have an AWS account. We’re not going to perform any operations locally so it shouldn’t matter if your computer is Mac, Windows or Linux. Create a Rails App to Deploy We’re going to create a very simple Rails app to deploy. If this is your first time deploying to Elastic Beanstalk, I wouldn’t recommend trying to deploy an existing app. The reason is that if you try to deploy an existing app and something goes wrong, there’s so much stuff you’d have to dig through to try to find the problem. If you deploy a freshly-created app and it doesn’t work, there are a much smaller number of things that could be the culprit. Let’s create the Rails app now. I personally always use PostgreSQL so that’s why we have the -d postgresql flag. I also always use RSpec instead of Test::Unit so I always initialize my Rails apps with -T to exclude Test::Unit. This tutorial would probably work just fine for you without those flags, though. Now that we’ve created our Rails app, let’s set it aside for a moment and go get Elastic Beanstalk ready. Create an Application on Elastic Beanstalk I assume you’re familiar with the concepts of a development, staging and production environment. Let me explain how those things relate to Elastic Beanstalk. In Elastic Beanstalk, you can have any number of applications and each one of those applications can contain any number of environments. So if you want to deploy a particular Rails application, it would make sense to create a single Elastic Beanstalk application which contains within it a production environment and a staging environment. In our case, we might have an Elastic Beanstalk application called hello-world and inside it a hello-world-production-env environment and a hello-world-staging-env environment. (AWS seems to like environment names to be suffixed with -env and it seems to like kebab case for names of most stuff. In this tutorial, we’ll only create the hello-world-staging-env environment. The steps for creating a production environment would be the exact same. First, go to the Services menu and click Elastic Beanstalk. You’ll then want to click the Create New Application link in the upper right-hand corner. When prompted for an application name, choose hello-world. (This is arbitrary and could be anything you want.) You should see a screen that looks like this. You could create an environment through the GUI right now if you wanted to, but in my experience that path leads to problems. Instead we’ll create our environment using a certain command-line tool. Install AWS CLI and EB CLI Now we’re going to install the AWS CLI (Amazon Web Services Command-Line Interface) and the EB CLI (Elastic Beanstalk Command-Line Interface). These CLI tools will allow us to do the same stuff the AWS console lets us do (by “AWS console”, I mean the AWS website we’ve been using so far) except more quickly and efficiently. We’re actually going to take another step before we install AWS CLI and EB CLI. When you set up these tools, you’re going to have to hook them up to your particular AWS account. Part of this setup process involves providing something called your AWS Access Key ID and something called your AWS Secret Access Key. If those terms sound intimidating, don’t worry. For now you can think of those things as kind of a username and password that let you connect to a particular AWS account. You might wonder where you find your AWS access keys. That’s what we’ll walk through in the next steps. First, click on your name in the upper right-hand corner and click My Security Credentials. You’ll get a message about AWS wanting you to get set up with IAM. This is probably a good idea for a real production account, but discussing this part is probably outside the scope of this tutorial, so for now just say Continue to Security Credentials. Next you’ll want to click on the thing that says Access keys (access key ID and secret access key). Then click Create New Access Key. Lastly, click Show Access Key and store the values somewhere where you’ll be able to get at them in a minute when we need to use them. Now we’ll install the AWS CLI (CLI = command line interface) using Homebrew. Next we have to configure AWS by running aws configure. This is where you’ll be prompted for the access keys I showed you how to get earlier. Important: make sure you’re inside you’re Rails project directory. Now we’ll install the Elastic Beanstalk-specific CLI, again using Homebrew. The first step with the Elastic Beanstalk CLI is the init step. Let’s run eb init. Create an Environment on Elastic Beanstalk You’ll be asked about a region. I’m picking us-east-2. For the application, select the one you just created. Select Ruby as the platform. Select Ruby 2.3 (Puma) as the platform version. Why Puma? I just picked Puma since according to its documentation, it’s the default server for Rails. This will create a file called .elasticbeanstalk/config.yml which will look something like the following: Now we’ll create the Elastic Beanstalk environment. If we visit the URL for our new Elastic Beanstalk environment, we’ll see that it doesn’t work. If you want to, you can check the logs by going to Logs, then clicking Request Logs, then clicking Last 100 Lines. You’ll probably see something like this: 2017/09/25 11:45:57 [crit] 3023#0: *64427 connect() to unix:///var/run/puma/my_app.sock failed (2: No such file or directory) while connecting to upstream, client:, server: _, request: "HEAD /phpMyAdmin/ HTTP/1.1", upstream: "http://unix:///var/run/puma/my_app.sock:/phpMyAdmin/", host: "" You might notice a clue there. See the phpMyAdmin stuff? It’s trying to do MySQL stuff but we wanted to use PostgreSQL. We need to set up and configure a PostgreSQL database. Set Up an RDS Database Go to the Configuration area and scroll to the bottom. You’ll want to click create a new RDS database. (RDS stands for Relational Database Service.) For DB engine, choose postgres. I assigned mine a Master username of hwstaging. (AWS seems to be weird about certain names in certain ways. For some reason it seems to want your database name to be really short. I don’t really like that but whatever.) Put whatever you want for the password. The RDS database will probably take forever to spin up. If you’re looking for ways to kill time while you’re waiting, I might suggest preparing a full Thanksgiving dinner from scratch or watching every episode of Roseanne. In addition to creating the RDS database instance, there’s another housekeeping item we have to carry out that we might as well get out of the way now. We have to set up the Rails secret keys. Go to the Configuration area again and click the gear icon next to Software Configuration. There’s a value you’ll need to grab and paste somewhere. Run the following command: This will output a token. Copy that token to the clipboard. Under Environment Properties, create a SECRET_KEY_BASE property and paste in the token for the value. Click Apply. I’ve found that at this point our application probably still won’t work. For some reason, a redeployment is necessary. If you thought that after all this work things were finally going to work now, you’re in for a disappointment. If we pull up our environment’s URL, we’ll probably see this screen: We haven’t created any scaffolds yet so there’s nothing to actually be seen. Let’s create a scaffold so our app has something to show us. We’ll create a Person scaffold. Let’s make people#index the root route. Let’s commit what we did and redeploy. Yay! We should finally be able to see a working app. Observe Our Working App Just to be sure, let’s use the Person form to add a person. Now we see our person show up on the list. Note: It’s unlikely that I wrote this whole post without making a mistake or accidentally leaving something out. If my instructions don’t work for you, please do leave me a comment and let me know what kind of problem you’re having. I want to make sure this tutorial really works.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '36', 'language_id_whole_page_fasttext': "{'en': 0.8883665800094604}", 'metadata': "{'Content-Length': '80583', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:545ZZGDTFGWISYYYTBJIX6SPFBKHW5Z6', 'WARC-Concurrent-To': '<urn:uuid:8176b4f7-ba0e-49d2-97dd-6b8da94e9e8f>', 'WARC-Date': datetime.datetime(2019, 5, 19, 9, 33, 24), 'WARC-IP-Address': '104.198.110.160', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:F3QXANLK7Z5VNSLTIY3DC7YUPETQPITB', 'WARC-Record-ID': '<urn:uuid:f3800838-1f7d-4e60-9ac6-1303ddaefa79>', 'WARC-Target-URI': 'https://www.awsrails.com/2017/10/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:97d6654f-edf4-475f-b3ae-d1f70f488aa8>', 'WARC-Truncated': None}", 'previous_word_count': '1484', 'url': 'https://www.awsrails.com/2017/10/', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-233-105-41.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021180689334869385', 'original_id': 'd60214ba601a1bd43eb3ebceea3c65c65ec84c4ae6938d315aa668012db82249'}
<!DOCTYPE html> <html> <head> <title>Firebase Chat</title> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <!-- Firebase --> <script src="https://cdn.firebase.com/js/client/2.2.5/firebase.js"></script> <!-- jQuery --> <script src="https://code.jquery.com/jquery-2.1.4.min.js"></script> <!-- Custom JS --> <script src="js/script.js"></script> <!-- Bootstrap --> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css"> </head> <body> <div class="container"> <h1 style="text-align: center">Firebase Chat</h1> <div class="row"> <div class="col-xs-6 col-xs-offset-3"> <!-- New message panel --> <div class="panel panel-default"> <div class="panel-heading">New Message</div> <div class="panel-body"> <div class="input-group" style="width: 100%; text-align: center;"> <!-- Login button --> <button id="loginButton" style="width: 100%; margin-bottom: 10px">Login With Twitter</button> <!-- Logout button --> <button id="logoutButton" style="width: 100%; margin-bottom: 10px">Logout</button> <!-- Logged in text --> <p id="loggedInText" style="width: 100%; margin-bottom: 10px"></p> <!-- Username input --> <!-- <input id="username" type="text" placeholder="Username" style="width: 100%; margin-bottom: 10px" /> --> <!-- New message input --> <input id="newMessage" type="text" placeholder="Type a message..." style="width: 100%" /> </div> </div> </div> <!-- Message list panel --> <div class="panel panel-default"> <div class="panel-heading">Messages</div> <div class="panel-body"> <!-- Message list --> <div id="messageList" class="list-group" style="margin-bottom: 0"> </div> </div> </div> </div> </div> </div> </body> </html>
the_stack
{'hexsha': 'c33c7709acdaf0489b7abd9cfb666bea8a6451b9', 'size': '2163', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': '2015-11-30-general-assembly-intro-to-firebase/chat/index.html', 'max_stars_repo_name': 'jwngr/presentations', 'max_stars_repo_head_hexsha': 'f89d55ef05268f01649816d05756a4c356137d0f', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '8', 'max_stars_repo_stars_event_min_datetime': '2015-10-09T02:37:50.000Z', 'max_stars_repo_stars_event_max_datetime': '2019-03-11T02:44:59.000Z', 'max_issues_repo_path': '2015-05-27-gdg-global-summit/chat/index.html', 'max_issues_repo_name': 'jwngr/presentations', 'max_issues_repo_head_hexsha': 'f89d55ef05268f01649816d05756a4c356137d0f', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': '2015-05-27-gdg-global-summit/chat/index.html', 'max_forks_repo_name': 'jwngr/presentations', 'max_forks_repo_head_hexsha': 'f89d55ef05268f01649816d05756a4c356137d0f', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '2', 'max_forks_repo_forks_event_min_datetime': '2015-10-09T02:37:30.000Z', 'max_forks_repo_forks_event_max_datetime': '2015-10-09T20:22:49.000Z', 'avg_line_length': '33.2769230769', 'max_line_length': '124', 'alphanum_fraction': '0.516874711', 'original_id': '431a307d46308580c25f9f63561754f5a9fce0fde0e23a9860087bec98601dfa'}
Nancy Hanks (art historian) Nancy Hanks (1927–1983) was the second chairman of the National Endowment for the Arts (NEA). She was appointed by President Richard M. Nixon and served from 1969 to 1977, continuing her service under President Gerald R. Ford. During this period, Hanks was active in the fight to save the historic Old Post Office building in Washington, D.C. from demolition. In 1983, it was officially renamed the Nancy Hanks Center, in her honor. Early life Nancy Hanks was born in Miami Beach, Florida on December 31, 1927. She was a distant cousin of Nancy (Hanks) Lincoln, the mother of President Abraham Lincoln. She moved to Montclair, New Jersey, while she was in high school. Hanks attended Duke University where she majored in political science and was a member of Kappa Alpha Theta sorority. Career Hanks was the first woman to serve as the Chairman of the NEA and her political skills enabled her to increase NEA’s funding from US$8 million to US$114 million over her eight-year tenure. Hanks's early work, before becoming NEA chairman, on the Advisory Committee on Government Organization connected her with Nelson Rockefeller. Nelson's brother John provided resources from the Rockefeller Brothers Fund to the study of art. This resulted in The Performing Arts: Problems and Projects (1965) related to John Rockefeller's and Hanks's belief that the government should study, but not contribute to, the arts. Nancy Hanks was the most effective and most successful of all of the Arts Endowment chairmen because she understood politics as well as how to be a diplomat. Hanks was astute at flattering members of Congress and fearlessly took control of the National Council of the Arts: Hanks' relationship to the National Council on the Arts was very different from Roger Stevens', the former chair. Stevens and his first Council members were peers, equals—and their actions and decisions were a true collaboration. Hanks was not from the arts community; she was much more a political than an artistic force. She controlled the Council as Stevens had never tried to do. The Council, in Hanks's years, did little more than ratify the chair, who was very strong in her management of them. Michael Straight describes Hanks's "imposing her will on the issues that mattered most to her. According to Elaine A. King, who wrote her dissertation at Northwestern University on the National Endowment for the Arts and Pluralism in the U.S. Visual Arts, "Nancy Hanks perhaps was able to accomplish her mission because she functioned as a type of benevolent art dictator rather than mucking with multiple agendas and political red-tape. From 1969 through 1977, under Hanks' administration, the Arts Endowment functioned like a fine piece of oiled machinery. Hanks continuously obtained the requested essential appropriations from Congress because of her genius in implementing the power of the lobby system. Although she had not had direct administrative experience in the federal government, some people were skeptical at the beginning of her term. Those in doubt underestimated her bureaucratic astuteness and her ability to direct this complex cultural office. Richard Nixon's early endorsement of the arts benefited the Arts Endowment in several ways. The budget for the Arts Endowment not only increased but also more federal funding became available and numerous programs within the agency." The American Association of Museums established an award in her honor. The award recognizes a specific achievement that has benefited either the honoree’s home institution or the museum field in general. The cited achievement may be in any area of a museum’s operation: administration, exhibitions, education, public relations, registration, collections management, or development. Alternatively, the accomplishment may benefit the museum field generally (for instance, a development plan, membership plan, exhibition design, or collection policy that can serve as a model for other museums). Nominees for this award must have less than ten years in the museum field. An act of the United States Congress honored Hanks by designating the newly renovated Old Post Office in Washington, D.C. The Nancy Hanks Center, in recognition of her enduring contributions to the arts. Hanks was not reappointed under Jimmy Carter and lost support from leaders of state and local art groups. The groups grew irritated that she had neglected the working relationships between federal and state agencies, and thought that she gave herself too much power. In 1983, Nancy Hanks died of cancer at the age of 55. References Further reading Straight, Michael. Nancy Hanks: an intimate portrait: the creation of a national commitment to the arts. (1988) Nancy Hanks was NEA Chairman 1969-77. King,Elaine A. "Pluralism in the Visual Arts In the United States, 1965-1978: The National Endowment for the Arts, and Influential Force"' (Ph.D. Dissertation, Northwestern University, 1986). NEA. National Endowment for the Arts: a brief history, 1965-2006: an excerpt --the beginning through the Hanks era (1986) Online free External links Nancy Hanks Lecture Category:National Endowment for the Arts Category:American art historians Category:Duke University alumni Category:1927 births Category:1983 deaths Category:People from Miami Beach, Florida Category:Deaths from cancer Category:American women historians Category:20th-century American historians Category:Women art historians Category:20th-century American women writers
mini_pile
{'original_id': 'cd461dd0e7020dbaa51ef328769c26c84fa8914d1f4aab838515754a5f7f3b41'}
Republic Preview Also up at Computer & Video Games today is a preview of Republic - The Revolution, Elixer Studios' forthcoming regime sim. It appears they had mixed feelings about the game after seeing it: But there's also a problem with it. Demis' original ambitious concept has over the last five years been naturally tempered by the realities of gameplay mechanics. As it stands Republic comes across as one of the most impenetrable games of recent times, a game you're either going to 'get' right from the start or not be able to comprehend at all. It's more than just GUI design, something Demis is at pains to point out is still being worked on, although that will play a large part.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9693354964256288}", 'metadata': "{'Content-Length': '52531', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:OQZNRNJA7HQCPUJF3EJG3RSIOR2NUUAL', 'WARC-Concurrent-To': '<urn:uuid:cfcd695c-0fdf-453c-8223-71c8fc028f39>', 'WARC-Date': datetime.datetime(2017, 8, 19, 13, 42, 1), 'WARC-IP-Address': '192.33.31.80', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4IR73KPPNEZBFDYFLUVZFVFZBU2FTB5J', 'WARC-Record-ID': '<urn:uuid:ff3c8499-bdba-4148-8520-147a2054a229>', 'WARC-Target-URI': 'http://www.ign.com/articles/2003/06/10/republic-preview-3', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ae512651-72f6-4f27-8077-78cfcf958508>', 'WARC-Truncated': None}", 'previous_word_count': '120', 'url': 'http://www.ign.com/articles/2003/06/10/republic-preview-3', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-224-59.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.024335384368896484', 'original_id': '7a3359db52665f8788be4543d62066da5cafb30c3256b530be5afbad01b17b1b'}
#include<stdio.h> int main() { int a,b,c,d,e,f,i; for(i=0;i<=2999;i++) { printf("i love you 3000 times each day\n"); } printf("enter a number\n"); scanf("%d", &a); if(a==6) { printf("today is there date of june when we first talked tota item\n "); printf("tune zindagi mei aake mere zindagi sawar di\n"); } if(a==14) { printf("i wish i was there holding your hand while you cut your cake\n "); printf("bt koi na you know its gonna be the best birthday\n" ); printf("countdown begins"); } if(a==21) { printf("hamari ek saal hone ko bhi aa gya\n"); printf("abi bhi yaad h vo tera muskurna \n"); printf("dil kr rha tujy hug krke tere sare gum chura lo\n"); printf("aage zindagi mei hamesha tera sath dunga \n"); printf("always remember chache koi ho ya ni i will always be there for u\n"); } if(a==19) { printf("meri kasam h tujy tu khana khaa kaygi \n"); printf("dek tuny meri baat maan li na toh i promise kabi bhi teri baat ni manuga i promise baba\n"); printf("tujy dekkr himmat milti h mujy ..aise krgi toh kaise\n"); printf("vaise sun ek bar hair open kr na\n"); printf("jaldi se aa jaa vapis...someone is waiting for you\n"); printf(" i just love you bus ptni bus bht her zyda\n "); printf("hamesha tera sath dunga chahe kuch bhi ho n dono mil kr krge\n"); printf("tuj mein rab dikta h \n tumse khusi milti h tumse \n"); printf("teri bahooonn mein sona chata hu, i need you love i need you a lot\n"); printf("you hate me i know\n"); printf("dek i am requesting na khana khaaa le por favor\n"); } }
common_corpus
{'identifier': 'https://github.com/manishaverma1012/programs/blob/master/c&c++programs/meripyarimannu (1).c', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'programs', 'creator': 'manishaverma1012', 'language': 'C', 'language_type': 'Code', 'word_count': '254', 'token_count': '625', '__index_level_0__': '1841', 'original_id': 'f4bdb13aee98d1516ff5b7e190d8f001e8fc13f1c30e219334760a0a5dd73a57'}
To avoid a ban, this MMO troll was forced to write a 500-word essay When the mods of Black Desert Online caught Kimochi griefing a group of roleplayers, no one would've blamed them for banning him. But where most mods wouldn't think twice about kicking out someone who had violated the rules, the mods of Black Desert Online believe in rehabilitation. If Kimochi was going to continue playing Black Desert Online, he was going to have to become the very thing he hated. "I was killing everyone I saw," Kimochi confessed to me. "It's not something that people in Black Desert are really accustomed to because the penalties [for killing innocents] are really harsh." Black Desert Online allows players to kill one another wantonly but at a great cost to the attacker. A karma system heavily penalizes murdering innocent players, eventually marking the guilty as fair game for everyone else to kill without punishment. City guards will also chase you off, severely limiting the ways you can play without grinding your karma back up to a positive value. That system is meant to curb the murderous tendencies of trolls, but it didn't quell Kimochi's bloodlust. During his repeated killing sprees specifically targeting roleplayers, he would also spam the chat with "Death to RPers!" It only makes sense that eventually he drew the ire of Black Desert's moderators. "As deity responsible for protecting those who dwell [here], it is my duty to take action and ensure their peace and safety," wrote lead gamemaster Rhotaaz in a message to Kimochi. The email then went on to accuse Kimochi of griefing and spamming, stating that in 24 hours his account would be banned. That is unless he gave into his "heart's true desire" and participated in the roleplaying he so obviously detested. In order to skirt the ban, Kimochi would need to write a 501 word (yes, exactly 501 words) backstory of his female ranger on the roleplaying forums. So what does Kimochi do? Write some pretty uncomfortable erotic fanfic, of course. Kimochi's backstory was so explicit it was quickly deleted by the moderators, so Kimochi went to Reddit with his story in hopes that getting the public involved would at least guarantee some transparency from the mods. After reading the backstory on Reddit, I'm not surprised the forum thread was deleted. Here's a quick excerpt: "'Escape!' she thought to herself frantically. But it was too late. She counted them, seven, eight, nine... their numbers too many to determine at a glance. Her fear shifted to debilitating hopelessness in an instant upon realizing her fate was sealed. The largest of the cyclopes reached down gripping her waist with one giant, brutish hand. He lifted her off her feet. The cyclops accessed every inch of her naked body as if a beast preparing to devour her. Its gruesome eye lingered at her supple breasts, but then lowered. His insatiable gaze yielded for a moment, replaced with temporary confusion. Where Kimochi's womanhood should be, something additional was present. Tiny at this current moment due to her fear, but quite discernible nonetheless." You can read the rest of it here (and yes, it's exactly 501 words). I asked Kimochi where he could come up with such a warped story and he said "I'm not even sure—probably just excessive amounts of anime." As salacious as Kimochi's essay was, the mods were true to their word. "Despite the contentious nature, the Pantheon has acknowledged that the terms of the challenge have been met," Rhotaaz wrote on Reddit. Even this was all an elaborate joke, Kimochi wasn't about to take that risk. "I think I would've gotten banned," he said. "The Black Desert Online admins are protective of this kind of thing, they try to make sure Black Desert Online is a really safe environment for people to play in. I get that." I asked Kimochi if this experimental rehabilitation has had any impact on his behavior in game. "Am I going to keep spamming the chat? No," he said. "Am I going to keep killing RPers? Absolutely." It was a good effort, anyway.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9833537340164183}", 'metadata': "{'Content-Length': '136044', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LJCLS6TDVBSU7PK35XEDOGOKZWKPF6LH', 'WARC-Concurrent-To': '<urn:uuid:81c1611d-ab8b-4f0c-ae73-e2ae0c0bebe7>', 'WARC-Date': datetime.datetime(2019, 4, 22, 6, 33, 39), 'WARC-IP-Address': '185.113.25.55', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:MYAOBYTLUAAIF3Q64HRJKEOCCMQC755Q', 'WARC-Record-ID': '<urn:uuid:7a35e8be-a13f-478c-983b-f4c361cf00d0>', 'WARC-Target-URI': 'https://www.pcgamer.com/au/black-desert-online-fanfiction/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:79833451-e1f0-41d1-8f71-136d4315f3a0>', 'WARC-Truncated': None}", 'previous_word_count': '670', 'url': 'https://www.pcgamer.com/au/black-desert-online-fanfiction/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-144-182-216.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1463044285774231', 'original_id': '766f9ba73b428d0f6b9a01343ba2eb358132d86d50d1261b5e9eb2495b143095'}
using System; using System.Collections.Generic; namespace Data_structures { class Movie { public string Name; public int Year; public Movie(string Name, int Year) { this.Name = Name; this.Year = Year; } } }
common_corpus
{'identifier': 'https://github.com/IssiRe21/Datastructures/blob/master/Movie.cs', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'Datastructures', 'creator': 'IssiRe21', 'language': 'C#', 'language_type': 'Code', 'word_count': '31', 'token_count': '83', '__index_level_0__': '33216', 'original_id': '40a4448800fd7274c650bbb2f74bc338d13d2dd684f62351984fc41a2cda5b38'}
Fake bomb causes panic in Tel Aviv JERUSALEM (JTA) — A fake bomb planted at the Tel Aviv Port as part of a training exercise caused panic. Ynet reported that an alert citizen on Monday noticed a man placing a box under a car and called police. The area was roped off and the port was evacuated. An agent in training who was supposed to plant a fake bomb under the car caused the disruption, according to Ynet. The newspaper reported that three employees of one of Israel’s security agencies were suspended over the incident.
mini_pile
{'original_id': '96f713d0bff8df33e732e7e3a77a396766cc628d47eafcecffe1b7d38b728607'}
The Church is open every Tuesday 10am-12pm to give emergency food to local people in crisis. As part of our mission to be a church in the community, for the community, to serve the community we aim to help people when they need it most. This comes in the form of food, advice, prayer and a listening ear. How it works 1 Voucher = 3 days food How do I get a voucher? Care professionals such as housing charities, social workers, CAB, doctors, and health visitors, identify people in crisis and issue you with a foodbank voucher. What do I do with the voucher? Foodbank clients bring their voucher to a foodbank distribution point (St Hild and St Helen Christian Fellowship Dawdon) where it can be redeemed for three days emergency food. Volunteers meet clients over a cup of tea and can signpost them to agencies who are able to help solve longer-term problems.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '9', 'language_id_whole_page_fasttext': "{'en': 0.9465937614440918}", 'metadata': "{'Content-Length': '42633', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6SHPGJINYKXK5YOXXMT77SSPNPAW5O5Z', 'WARC-Concurrent-To': '<urn:uuid:96f38847-2cda-454b-87cb-634a7ab124f3>', 'WARC-Date': datetime.datetime(2019, 2, 16, 17, 21, 12), 'WARC-IP-Address': '198.185.159.145', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VWVOUGKT3KNJW4UTMQPJADEJGQNJPK32', 'WARC-Record-ID': '<urn:uuid:0334f158-7660-4c6f-ad80-183b95c37ab3>', 'WARC-Target-URI': 'https://sthildandsthelen.com/food-bank/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:074a9046-d079-4e34-9a55-f79f68f95307>', 'WARC-Truncated': None}", 'previous_word_count': '152', 'url': 'https://sthildandsthelen.com/food-bank/', 'warcinfo': 'isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-165-219-203.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10603976249694824', 'original_id': '6d95fea18879a3fc373fe9ab6ba67939b2f5260fd5e694165332e66f716561d7'}
Hreša är ett samhälle i Bosnien och Hercegovina. Det ligger i entiteten Republika Srpska, i den centrala delen av landet, km öster om huvudstaden Sarajevo. Hreša ligger meter över havet och antalet invånare är . Terrängen runt Hreša är kuperad. Den högsta punkten i närheten är Glog, meter över havet, km norr om Hreša. Runt Hreša är det ganska tätbefolkat, med invånare per kvadratkilometer.. Närmaste större samhälle är Sarajevo, km väster om Hreša. Omgivningarna runt Hreša är en mosaik av jordbruksmark och naturlig växtlighet. Trakten ingår i den hemiboreala klimatzonen. Årsmedeltemperaturen i trakten är  °C. Den varmaste månaden är juli, då medeltemperaturen är  °C, och den kallaste är december, med  °C. Genomsnittlig årsnederbörd är millimeter. Den regnigaste månaden är februari, med i genomsnitt mm nederbörd, och den torraste är augusti, med mm nederbörd. Kommentarer Källor Orter i Republika Srpska
common_corpus
{'identifier': 'https://sv.wikipedia.org/wiki/Hre%C5%A1a', 'collection': 'Wikipedia', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2023.0', 'title': 'Hreša', 'creator': 'https://sv.wikipedia.org/w/index.php?title=Hreša&action=history', 'language': 'Swedish', 'language_type': 'Spoken', 'word_count': '139', 'token_count': '317', '__index_level_0__': '25117', 'original_id': '2659c5ecef9009e7ffe33241eb8c3987e29f3f5ce42da798090f2758d2b49e13'}
Fixing before failure: inside smart military maintenance Todd Stiefler talks to Strategic Defence Intelligence Having aircraft and vehicles out of action costs the military dearly, both financially and in terms of availability, not to mention failing to identify a potential breakdown could lead to equipment breaking down mid-mission, risking the lives of personnel. Health and Usage Monitoring Systems (HUMS) are now a well-established method of adding intelligence to the maintenance process, using sensors to track the behaviour of different parts and raising an alert if it reaches a critical point –a threshold helicopter engine temperature, for example. However, once that critical point is reached, that helicopter has to be taken out of use immediately and repaired out of its normal service schedule. Ideally, a system could spot that the outage is likely to happen days or weeks in advance, so maintainers could focus their resources on preventative action during scheduled services rather than checking systems that are not broken or likely to break. General Electric (GE) believes its SmartSignal tool, which has already proven successful in the gas, energy, civil aviation and mining industries, could offer the military community just that ability. Read the full article here
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9519880414009094}", 'metadata': "{'Content-Length': '42977', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BYWPDSQIXTB4UZ7ZSDQVO2XUQHWPW6S6', 'WARC-Concurrent-To': '<urn:uuid:47559ffe-fff2-4f70-9cd8-578e65e98cbd>', 'WARC-Date': datetime.datetime(2019, 3, 19, 17, 22, 53), 'WARC-IP-Address': '54.235.223.86', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:OWLDYKQQCHZO2E3FKONXNYGMVJGXAIVG', 'WARC-Record-ID': '<urn:uuid:62075238-15f5-444a-9438-c678e72b6899>', 'WARC-Target-URI': 'http://www.geautomation.com/news/fixing-before-failure-inside-smart-military-maintenance/n3105', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0c92fcf9-31b1-4bcd-8572-9db4a9fec1b9>', 'WARC-Truncated': None}", 'previous_word_count': '194', 'url': 'http://www.geautomation.com/news/fixing-before-failure-inside-smart-military-maintenance/n3105', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-184-109-84.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05283123254776001', 'original_id': 'cb8bcca748763d4630fa9ef76ab066c4f578a91c13ba429986f23267b90e0aa9'}
[an error occurred while processing this directive] BBC News watch One-Minute World News Last Updated: Friday, 20 July 2007, 01:28 GMT 02:28 UK Bipolar disorder 'shrinks brain' Depressed man staring out of window Depression is one of the symptoms of bipolar disorder People with bipolar disorder suffer from an accelerated shrinking of their brain, UK researchers have found. Imaging studies carried out four years apart showed loss of brain tissue in the areas controlling memory, face recognition and co-ordination. The findings, published in Biological Psychiatry, back observations that people with the disorder lose brain function over time. Bipolar disorder, is characterised by periods of depression and mania. It affects half a million people in the UK. When people have mania they are typically elated, overactive and need less sleep. They may also suffer from delusions or hallucinations and are at significant risk of suicide. Nerve signals MRI scans of the brains of 20 patients with bipolar disorder and an equal number of volunteers without the condition showed that everyone loses a small amount of tissue over time. It supports the idea that cognitive function is impaired in bipolar patients in middle age Professor Guy Goodwin Oxford University But in those with bipolar disorder, the loss of grey matter - where nerve signals are processed - was greater than in the control group. The researchers at the University of Edinburgh also found that those who lost the most grey matter had the most episodes of mania and depression and the biggest decline in brain function. Study leader Dr Andrew McIntosh said the study could not show whether the loss of brain tissue was a cause or consequence of the disease. "It may be that repeated episodes of illness harm the brain and lead to the decline," he said. "No matter which way round it is, it emphasises in my mind the importance of maintaining people in remission and the importance of getting them the best treatment." 'Important question' Professor Guy Goodwin, head of the psychiatry department at Oxford University said the findings showed that bipolar disorder was a "brain disease". "It supports the idea that cognitive function is impaired in bipolar patients in middle age and this probably helps to account for problems in a full return to work and evidence that patients with bipolar disorder underachieve." Dr Philip Timms, honorary senior lecturer in psychiatry at King's College London, said the findings raised many questions. "The important one is are the brain changes causing the disorder or is the disorder - and its associated stress - causing the brain changes?" Marjorie Wallace, chief executive of mental health charity SANE, said: "Bipolar disorder is a cruel affliction carrying a high risk of suicide and this research appears to underline the importance of preventing relapse, which is already recognised as one of the most important goals in the long-term management of the condition." Call for mental disorder checks 26 Jul 06 |  Health Drug hope for manic depression 13 Sep 02 |  Health The BBC is not responsible for the content of external internet sites Has China's housing bubble burst? How the world's oldest clove tree defied an empire Why Royal Ballet principal Sergei Polunin quit Americas Africa Europe Middle East South Asia Asia Pacific
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '48', 'language_id_whole_page_fasttext': "{'en': 0.9361136555671692}", 'metadata': "{'Content-Length': '50655', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IC4YJDFAEADMANNZRT6R4L26DB2CEPK2', 'WARC-Concurrent-To': '<urn:uuid:510b7c28-c4f1-469d-bf23-b977469dc6fe>', 'WARC-Date': datetime.datetime(2013, 12, 19, 16, 30, 23), 'WARC-IP-Address': '212.58.244.58', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:SIHF3K2QH42K2DWP6O5INFPCYAF5PXQZ', 'WARC-Record-ID': '<urn:uuid:c78261f8-9d23-4ef2-aefc-2b782118c9dd>', 'WARC-Target-URI': 'http://news.bbc.co.uk/2/hi/health/6907050.stm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c108793b-c56c-4266-b8e1-34033068e45c>', 'WARC-Truncated': 'length'}", 'previous_word_count': '565', 'url': 'http://news.bbc.co.uk/2/hi/health/6907050.stm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03494912385940552', 'original_id': 'bf315642880747f6dda8bb0bde7d0c679f08777f9b55cfdc7f1614f2327c0cb2'}
Wednesday, November 30, 2011 Window into My Life I arrived home around 10:15 pm - visiting with a fellow mama over coffee, sharing life and lack of sleep moments. It  felt so good to get out of the house for just a  few hours and talk to an adult and drink Chai Tea without having to share or take anyone to the bathroom! I look around the living room, lights are all on, shoes shrewd about, then I trip over a toy and notice the nicely cleaned kitchen - my husband is so sweet. I glance to the right and see light under the bathroom door - then I remember I've had to go for 3 hours! I open the door, sit down on the toilet and smile. At my feet I spy two swords - dropped in haste during a war scene earlier that  day that abruptly ended when one of my little's was caught jumping up and down frantically. I see a hardened bread crumb left from Abby's "bread" incident from that afternoon. My sweet girl went into the pantry and opened an entire loaf of bread on the tile floor. She then carried it all into the dog bed and proceeded to eat little bites out of each piece. I caught her looking so guilty! All I could do was grab my camera and laugh hysterically. As I turned the light out in my quiet peaceful house, I went upstairs to check on my sleeping children. I tripped over a mummy corpse which turned out to be Drew wrapped tightly up in his comforter. How did he breath in there, his head wasn't visible or even obtainable and he didn't even have a pillow? His legs were completely fixed into his sisters emptied pink laundry basket which covered half of his body. So I kissed my sleeping children and pulled the covers back over their peaceful bodies, checked to make sure Drew had breathing room and turned off the boys closet light.  I smiled and prayed deep prayers of thankfulness, my heart overflowing with joy for my beautifully designed family. I delight in their messes and bloopers and silly stories filled with deep imagination. I am truly a blessed momma - messes and swords and tripped over shoes! These sweet blessings are growing too fast and I intend to rest and delight in all of their joy and smiles and fun. Wednesday, November 23, 2011 Williams Thanksgiving List 2011 —Psalm 78:2-4 The year of 2011 will go down as the year of rest and peace. We spent the year basking in the uneventful. Here are the blessings we celebrated before the Lord this year, as we gather to celebrate a day of Thanksgiving, I will rest and bring praises to the Lord for all that He has done and provided for us over the past year. Health & Wellness::  The past few years we spent a lot of time at the doctors office, on medication, recovering from colds, RSV, allergies, and ear infections. We worked through intestinal issues, constant vomiting, neck pain and many other issues. The year of 2011 will go down as the year we as a family started a holistic journey to becoming more healthy and aware of the foods that we consume. We discovered that most of Abby's health issues were related to an egg allergy, she is also allergic to homogenized milk. Most vaccines are made out of eggs so each time we had a new round of shots she would be sick for months. It took a long time to figure this out, now that we're aware of her allergies, she has flourished and grown in personality and vocabulary - because she is no longer perpetually sick. We also are singing praises for Abby & Gabe's asthma which has been prevented through diet and more natural methods of care. We're so excited to not have them inhaling steroid medication 3x per day! There are no words to express the joy in seeing the personality of my daughter take shape. Her constant sickness left her unable and unwilling to interact much with her environment, she rarely talked and learned to walk much later than I expected. Each time she was healthy, her personality and physical desires became evident, but quickly she would become sick again and retreat to her silent and sleepy self. We are now 7 months into a clean bill of health - she has learned to walk and talk! Abby's personality is flourishing and wildly happy. Her giggles and  high pitched voice always makes me smile! Family Time:: I'm so blessed to have the best family, my children and husband are the most blessed things to be around. Their presence brings me such joy! I find myself laughing or singing or smiling just being in their presence. My husband is a "glass is half full" type man who always challenges me to look at the world with thankfulness. He is a person who fills the cup of our family and invests a lot of time training and investing into our lives.  My husband diligently reads God's Word and then imparts the Word of God into our children's hearts each night before bed. I teach them too around the breakfast table many mornings a week - that is a huge blessing that many women's aren't home to be able to impart. I look at our family and feel so  blessed to be living out the Word of God each and every day - the great, the murky, and downright humiliating. It is all being messily lived out each day, which gives us a huge avenue for deep and meaningful discussions. I just love my  family so much and am thankful for the Lord for crafting these lives together. I'm thankful for my sweet boys Drew and Gabe who make being a mother so enriching. Their minds are active and excited about live and about learning about God. I just love these two sons of mine who I know will grow into fine men with great ideas and perseverance for God and His wild plans! Home Learning:: The precious job of teaching my  children is an enormous task and I don't know how anyone does it without the Lord's faithful hand to direct their path. I am a blessed woman to work from home and be able to teach my children. I never sought out on this path, in fact I never thought of a world outside of my business life before I was married. I loved my career and didn't think it needed to change. The lord then blessed me with a marriage and three blue eyed blessings. Along the way the goals of career and more money became so insignificant to me. I am so blessed because if I had lived out the life centered on a career I know it would have turned up empty. Instead the Lord radically changed my heart, gave me a deep and often torturous love for children and a vision to teach these fragile blessings at home. It is a challenge most days - I'm learning far more than my pupils. The constant chattering and questions and messes are sometimes more than I  can bare - but the Lord is so faithful to be using the tool of home learning to change me and mold me into His image. The process of home learning is one that brings me to the feet of the Lord daily - the perfectionist in me always turns up flawed - the amount of work we complete is never enough to satisfy. I often picture my son falling farther and farther behind, but then the Lord gently leads me to His Word and reminds that I am being faithful in what I am called to do for this moment. My burden is light. I am not to grow weary in doing good. I then  remember that the Lord is in all of this mess and is using me as a tool to shape and mold the very character of my children and the hearts that will exist for eternity. It is then that books and math and reading take a backseat to the overarching reward of being with my children in heaven. My goal in home schooling is to lead them to a relationship with the Lord. I am thankful for the opportunity and responsibility and take it seriously. Brotherly Love:: This year I'm so thankful for my husband's relationship with his family. Especially his father and brothers. The very essence of who I married is woven deep into the brotherly love John experiences as a child. These brothers were the ones who protected and loved him for who he was. They kept the bullies from kicking his crippled legs in school and blessed him with passionate ideas about manly things like guns and hand crafted skills. My husband is a hard worker and loves to get his hands dirty fixing or creating things. I love it that we sit at the table at night and I see the sweat and tears he poured into it - the memories of working on the benches with his dad the week our first son was born. I smell the workbench in the garage and still smell cigar smoke from his fathers pipe. These men in John's life taught him skills that are being used by God to bless widows and improve communities. Aunt Kessa & Uncle David from Oregon:: We are blessed with an aunt and uncle who flew all the way from Oregon over Thanksgiving to spend and invest time in our home. Our kids had a blast and many great memories were made - from riveting games of 5 Crowns to cold walks and a day long trip to the Dallas Arboretum. They even endured my children's poor bathroom etiquette with grace! Nana's: I am blessed to live  close to my mother. I get many perks like her watching the kids so John and I can go out on  a date. My mother is a woman of love who is a giver of time and smiles. She adores all her grand-kids and invest all her free time in their lives. She loves to have them over for sleepovers and reads them books at night. I am blessed to watch her care for my Nana with joy and honor. The process of caring for the parent who cared for you is a hard change that is unfamiliar. There are few books on how to  care for aging parents with grace and dignity and she models to my sister and I how to truly love  even when it hurts. I respect my mother and am so blessed to have a heritage of women (my mother and Nana) who are nurturers and creative and willing to live with little so they  can invest much. Vietnam:: I am so thankful for a church that impresses on the hearts of its congregation to serve and bless others. I am thankful that my husband was provided the opportunity by friends and family to spend 10 days in Vietnam, learning the culture, sharing with educators, and most importantly, living out his God given gift. I was humbled by my husbands willingness to commit to a presentation that he felt totally inadequate to share. In was in John's weakness that God's love for special needs children was revealed. My husband has a gift - this gift brings daily pain and agony, yet he still calls it a gift. Amazing - only the Lord could do that in John's life. Most people don't know the amount of pain John lives with because of his Cerebral Palsy because he so rarely talks about it. Instead he chooses to accept the pain as a reminder that he has been intrusted with a message to save souls. It was while in Vietnam that John grew a love for the lost. I've never seen my husband so passionate about inviting strangers and neighbors to church. I am thankful for Vietnam because this trip not only changed the hundreds of teachers and parents who attended but it changed my husband's heart towards servant hood and impressed a deep boldness to win the lost to Jesus. As we close out the 2011 year, I am in awe at how the Lord has shaped me and shaped my family. We have grown so much closer and more committed to service for the Kingdom. The year of 2011 will be remembered as a year of learning contentment, rest and peace. We began to look at stuff as distractions and giving as an investment for all eternity more so than ever before. We saw the Lord bless us beyond our wildest imaginations and discovered that  the gift of giving is far more meaningful than hoarding time and possessions for ourselves. This year the Lord also imposed on me a deep sense of needing to rest - rest in the Lord's provision, rest from activities and investment into our family. This was the year where we were enriched by just being together and not running from activity to activity. Thank you Lord for being active and penetrating in our lives - we are truly blessed to have a God who unites us all together and then draws us to Himself. Saturday, November 19, 2011 Inscriptions for Gabe ~ Your 4 Years Old! Dear Gabe, Today you are 4 years old, what a quick and fun 4 years it has been! I still look back on your birth with such sentimental longing. You were my "almost" Thanksgiving baby. I delivered two days before my favorite holiday and begged the doctor to let me go home. We were home  on Thanksgiving eve - a mere 24 hours after  you were born. I was able to rest and be pampered by all the family who was in town - like Grandma Patti and Nana. I look back with a huge grin when I think about taking you shopping in my little sling at a mere 3  days old. We went to Costco and Bed Bath and Beyond and Kohl's. Then when we got home I found you all bundled up in Nana's van fast asleep  - alone! Both grandparents had gone into the house and left you in the car. You were only out there about 20 minutes but it was a moment of laughter that I'll remember forever. The Grandma's were so  guilty!  Gabe I just love your smile and bright personality. You are always singing and making up silly songs. You love to compete with your big brother and keep up with all he is doing. I walked in on you playing with Drew the other day and was so proud of how you were sharing and playing with  your older brother.  You are often the peacemaker in the family,  you hate it when anyone isn't happy. You are also the most protective, if we're walking into pre-school or out at church and Drew or Abby lag behind you always stop and wait for them, often you scream "wait" in your concerned voice.  Gabe - you have such a great sense of  humor, I love it that you always want to get messy -- I was especially impressed with your latest sticker episode! Your imagination runs wild as you bark around the house as a puppy or  fly around like an eagle.  Your my little jokester who loves to smile and laugh and involve everyone in your skits of fun. I love all the giggles and laughter around our house!  My little man, you are growing into such a great man of God. You are a quick learner, quiet and thoughtful, contemplating deep things. You are a natural learner who catches on so quickly to concepts. You love to be just like your big brother and begged to "do school" with us this year. You were so dedicated to finishing the Kindergarten phonics, learning all the letter names and sounds with ease. I couldn't believe how often you asked to work on phonics - finishing in just 4 months! You love to work on math too, you begged to have your own math time like Drew, learning all your numbers and writing them in order (we're still working on fine motor skills). Gabe you are 1/3 of the way complete with Kindergarten Math. I'm so thrilled that you are devoted to learning, everything you do, you do with a smile on your face. Your mind is always focused on some task which makes you so easy to teach.I wish I were as eager and energetic as you - your "glass is always full" mentality is a breath of fresh air in our home!  Gabe, your favorite book is Bunny Bungalow, you have the book memorized and ask me to read it over and over again. After we read the book, you always ask for  "Sleepy Head" tea, just like the bunnies in the book. You also want to squish cherries between your toes because you think it looks so fun and messy. I find it ironic because you are my messy child, always covering your face in whatever you have recently eaten.  You also can destroy a room in less that 5 minutes and can take hours  to get it all put back together. Your bed making skills are quite funny and we are constantly working on your clothes making it into the laundry.  My precious son, you are madly in love with your sister, always protecting and comforting her. She sits next to you all the time and you indulge her in tea parties and race-car playing. You call your sister "little pip squeak" and "Abb's" all the time. Recently you  called her Abb's and she replied back to you saying "Abby," That was the first time I'd heard her say her name. I just love the bond you have with your siblings, being squished in the middle - seems to me the perfect fit for your personality - your a patient follower and a natural leader.  My son, you are a treasure! I am so blessed to call you my son. I delight in your personality which is so different than my own. You bring joy and smiles and song into our family. Your always working through some adventure or quietly sitting alone reading a book. I just love hugs and kisses from you!  This past month you received a big boy bike, you love to ride it all over the neighborhood. You obey the boundaries so well and have mastered turning around and weaving between Abby, Drew and the dogs without incident. My son, you are 4 years old. You were sent from God for a great purpose, I feel very inadequate in shepherding you towards a unadulterated love for God. As you grow and mature over the next 365 days, the verse which God has put on my heart for you us Proverbs 16:9 which says "The heart of man plans his way, but the Lord establishes his steps." As you grown a little more towards manhood I pray that you will grow in knowledge and love for our Father in heaven and that the Lord's quiet voice will begin to shape your will towards Jesus and holiness. I pray as you grow in knowledge you would develop a deep love for God's Word. Just this past week you memorized John 1:1 about how Jesus is the Word, may you never forget to invest time in prayer and study - pleading with the Lord to reveal Himself to you. God loves it when we seek after Him and His Son - never leave behind the Word of God and know  that it has great power! The word of God is living and active and needs to be written all over your heart! I love you my son, you are a blessing and a treasure. I thank the Lord for my beautiful son who lights up our home with songs of joy and laughter. May the next year bring you closer to the Lord! Wednesday, November 9, 2011 Catechizing Through John 1-5 When my kids grew old enough to have a conversation, I began teaching  them some basic catechism's of our Christian faith. We're not Catholic, but I found that asking my children the same questions and having them give me a memorized answer, produced hidden truths into my children's hearts. These hidden truths would come out later on in random conversations we would have. I would see their memorized answers ramble out of their mouth in response.  A few times I've seen a little "light bulb" come on as they discovered revealed truth in their lives. Now, at ages (almost) 4 & 7, they are able to articulate and logically put together their own responses to my questions - which is a a great way of teaching. So,  a few months back I began teaching them through the book of John over breakfast. Abby sits and listens and tries to chime in with the few words she knows - like pray and Jesus! Why did I pick John? I chose the book of John because it is written in story form, just like the epistles of Matthew, Mark and Luke. This form of writing is easy to read aloud and the adventures of Jesus are very exciting to little adventurous boys!  The book of John is all about Jesus and His 3 years of ministry. I also picked the book of John because we've had lots of questions lately about Jesus and who He is and why he came to die for our sins. One of our catechism questions is "How many God's are there" and the answer is "There is only 1 true God." This truth is very hard to comprehend once you introduce them to Jesus - even though they know the answer to "How many person's in the One True God" they still grapple, just as  do, with the whole understanding of 1 God in 3 persons. So John was a great book to introduce so they can see human attributes to this big God we pray to and talk to each day.  When children are small they equate Jesus as the answer to all Sunday questions. As my boys were "growing in wisdom and stature" I realized it was time to reveal Jesus and his role in the trinity. I  wanted them to see that God the Father and Jesus are one God but perform different roles. It is a complex subject, one that I don't fully comprehend, but I will say it makes more sense with a child like faith! I'm anticipating our next book to be Acts so they can fall in love with the Holy Spirit. When I was little we had a man come to our church who had memorized the entire book of John. For many years he would come and perform a 1 person skit using the entire book of John. I fell in love right then and there with the book of John and many years later also fell in love with a human, God created man named John. We then named our first born son John. Just a side note, my best childhood friend Bethany also married a John and named her first son John!I guess we're all just in love with the attributes of John which means "God is gracious." So our breakfast look a little like this - picture oatmeal or smoothies on the table with lots of moving and shuffling and silliness. Then add three kids all talking at the same time. Then you might get a close representation what our morning Bible time looks like most mornings. Normally we review for about 5 minutes and then I read the next paragraph in my bible and then ask the boys about what I just read. In total we spend between 10 & 15 minutes working on Bible in the mornings. It has become the boys favorite part of the day, mostly because they get to race to see who can answer the question first. Our ever quick Gabe is catching on very quickly despite his 3 year age difference .  Here are some of the questions I ask for the first few chapters of John. Question: Who wrote the book of John? Answer: The Apostle John   Question: How does the book of John begin? (Hint: it begins like in Genesis 1:1) Answer: "In the beginning, was the Word, and the Word was with God and the Word was God. " Question: What does John 1:1 mean? Answer: Jesus was in the beginning with God! Question: Who is John The Baptist? Answer: He is Jesus' cousin and the trumpet telling the people about Jesus. He also baptized Jesus and heaven broke free and the Holy Spirit descended onto Jesus. Question: How many men did Jesus pick to be His disciples? Answer: (1:35-51) Jesus picked 12 disciples. Question: Why did God send his Son Jesus? Answer: (3:17) God sent Jesus to save the world, not to judge the world, Jesus will come back at the second coming and bring judgement. Question: What does the term Messiah mean? Answer: (1:41) Messiah means Jesus. Question: What was Jesus first miracle? Answer: Turning the water into wine at the wedding Question: What other miracles did Jesus perform? Answer: He healed the officials son and healed the sick man at the pool of Bethesda. Jesus told the sick man to pick up his pallet and walk. Question: What day of the week did Jesus heal the sick man? Answer: He healed on the Sabbath. Question: What happened when Jesus healed on the Sabbath? Answer: The pharisees were angry and try to put him in prison. Question: What happened when Jesus went to the temple? Answer: He got angry because the people were making His house a place of business.  Question: What did Jesus say he would do to the temple? Answer: He said he would tear if down and raise it back up in 3 days. Question: Why is Jesus called the Lamb of God (1:29)? (normally the boys enjoy telling the passover story again and how Jesus saved the first born sons from the angel of death by killing a spotless lamb and putting the blood over the doorpost. Answer: Jesus is the lamb that was slain for our sins symbolizing the New covenant. Question: Who did Jesus meet at Jacob's well in Samaria and tell me what happened? (ch4) Answer: Jesus met a woman at the well and he offered her living water. She accepted the water and brought the whole town to hear from Jesus.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '67', 'language_id_whole_page_fasttext': "{'en': 0.9789788126945496}", 'metadata': "{'Content-Length': '155231', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:TEZAXNESTJ5MZ4O5CNZEVC4HNZBGMG6U', 'WARC-Concurrent-To': '<urn:uuid:83e45da7-918f-45c3-9c46-a75acf0da2c9>', 'WARC-Date': datetime.datetime(2014, 12, 22, 5, 33, 17), 'WARC-IP-Address': '173.194.121.43', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:PFL6UXT3W5C56EMDKWJJWXKWNLMUY7KJ', 'WARC-Record-ID': '<urn:uuid:5449ce64-6ce3-444a-aa94-29d6df384ca0>', 'WARC-Target-URI': 'http://www.williamsjourneyhome.blogspot.com/2011_11_01_archive.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a5e22c83-6ce5-441e-bbce-88c86da10919>', 'WARC-Truncated': 'length'}", 'previous_word_count': '4454', 'url': 'http://www.williamsjourneyhome.blogspot.com/2011_11_01_archive.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1292487382888794', 'original_id': 'a59c795c824d9850b1a738c3da2f07f00e73480f283b908144e582c9af55dc9a'}
Quality: Content: -2 "EXTREME CAUTION" (Ro, LL, VV, SS, NN, A, D, M) Romantic worldview of heroism through espionage & marital love; 6 obscenities & 5 profanities; images & threats of war, raid on house, suicide, man kicks & abuses man, man strikes child, man cuts hand, & references of rape; foreplay between married couple & implied marital sex; upper male & female nudity; alcohol use; smoking; and, betrayal & deception themes MOTHER NIGHT is about Howard Campbell, an American playwright living in Germany, who acts as a spy for the US government during World War II. When the war is over, Campbell moves to New York City but is eventually hunted down by both neo-Nazi groups and the nation of Israel. Though thought-provoking and well photographed, it has some offensive humor and odd characterizations. Combining humor, romance and black comedy into an eager but uneven adaptation of Kurt Vonnegut’s novel, MOTHER NIGHT focuses on American Howard Campbell, who lives in National Socialist Germany and serves as a spy for the U.S. government. In the late 1930’s, Campbell becomes very well known around Germany as a skilled playwright, which places him in the company of many military leaders. One day, he is approached by an American agent who presents him with an offer he can’t refuse. His mission is to assume the role of National Socialist sympathizer and produce a weekly radio show espousing National Socialist ideals, which would serve as a front for sending secret information to the Allies. With his true purpose known only to a few, Campbell becomes a hero in Germany and a villain in the United States. This movie has a fascinating premise and is told with skillful direction, photography and acting. However, this movie fails on three points: cuts, characterization and comedy. There are some transitions in the movie which happen too quickly without explanation that they seem to cheapen the integrity of the story. Anti-Semitism and National Socialist aren’t laughing matters. This movie also contains some violence, marital sex and obscenities.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9539180994033812}", 'metadata': "{'Content-Length': '70627', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6WTNYRN5F4ND4RK3AU4347VEFESLMAVS', 'WARC-Concurrent-To': '<urn:uuid:d6a9810b-f845-4ebd-9397-a0fde1948406>', 'WARC-Date': datetime.datetime(2017, 9, 19, 15, 29, 5), 'WARC-IP-Address': '104.198.254.231', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DL4MUZ3DDZG3B3HMBEI7YH7HKAMIJMPM', 'WARC-Record-ID': '<urn:uuid:af1f77b1-b956-4041-bae5-3e37ec49d1ba>', 'WARC-Target-URI': 'https://www.movieguide.org/reviews/mother-night.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cf95f5ef-6f28-4e32-acae-16f76ffad589>', 'WARC-Truncated': 'length'}", 'previous_word_count': '337', 'url': 'https://www.movieguide.org/reviews/mother-night.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-182-87-105.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.16847991943359375', 'original_id': '3147f08dbb3de99da81ca66ff1388f417714618038d8e4160bb6b9e97299ac5a'}
In graduate school at Fresno State (GO DOGS!!) a group of friends and some faculty embraced the idea of being a lovecat. A lovecat is someone that is an energy giver, not an energy sucker. This means helping others, before they ask. It means bringing energy to others in all that you do. It means doing the right thing. An unofficial mascot of lovecat has been a lion. Upon helping fellow lovecats, RAWR was used by Jeremy as a joke but also constant reminder to be a lovecat. The name RAWR was chosen because it is the voice of the lovecat. RAWR is about sharing knowledge through our voices. It also is not something modest. RAWR is not about being modest or quiet, rather seeing ones own potential, seeking that growth and making a difference. We want people to know about us. This is not a secret. We can and we will all get better by helping each other.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9751961827278136}", 'metadata': "{'Content-Length': '42478', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:SNNYZ2CAHOM4JWLNALR45SKQU7J62XWC', 'WARC-Concurrent-To': '<urn:uuid:091932fe-22b1-4f8e-8883-64c5524a9990>', 'WARC-Date': datetime.datetime(2020, 2, 21, 8, 34, 22), 'WARC-IP-Address': '192.0.78.24', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VC5U2XAUWGSMHHI3OXQVVZTJMKMPG3UR', 'WARC-Record-ID': '<urn:uuid:4a7e2384-19fb-46c5-b6cd-322b5929f2b8>', 'WARC-Target-URI': 'https://rawrlearning.com/our-origin/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:00ff293a-ee11-4a38-85bf-34b5f160fb2b>', 'WARC-Truncated': None}", 'previous_word_count': '158', 'url': 'https://rawrlearning.com/our-origin/', 'warcinfo': 'isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-228.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.4984985589981079', 'original_id': '8e76f68c5f91b07a020c7489475a0336e4a24280b94920b4d5ad200f428d1d05'}
I am After 10 years spent in the world of corporations, I decided to radically change my life and start over again. I became a yoga instructor and ever since I began to change my life for the better… and also to support others in their positive change process. During my first 5 years of teaching group classes, I started to gain new understandings and depths of yoga. I have explored neuroscience to understand how the brain works, the science of medical intuition, ayurveda, the psychology of the unconscious, the akashic field, numerology, working with crystals. Following internationally yoga and mindfulness trainings (India, US, France, Germany, Italy and Spain) I learned how to work, not only with my body, but also with my mind in order to be more every day, maximising my emotional, physical and mental potential. I write about my personal journey as a yogi and yoga teacher in the Urban Yoga Book section of the site. May we all be more in Love, Peace and Power! Urban Yoga a life style that embraces in equal proportions the human and spiritual side of life Namaste the light within you is the same divine light within me Meditation a state of being not an action Shiva truth, the divine masculine energy Shakti compassion, the divine feminine energy
mini_pile
{'original_id': 'd828bf776e83b0fdc0ba68ebe8c997aac4cbe70fccdfe2be858145e816e0b225'}
Distribution of blood flow in the dog kidney. I. Saturation rates for inert diffusible tracers, 125I-iodoantipyrine and tritiated water, versus uptake of microspheres under control conditions. Disparate reports on intrarenal blood flow distribution prompted a direct comparison between microspheres (Ms) and inert diffusible tracers (DT). The "tissue sampling technique" for estimating local flow with DT (Kety) was adapted for the dog kidney, using 125I-iodoantipyrine (1-Ap) and tritiated water (THO). Ms (15 micron) were injected 2-3 min prior to 10-15 s DT infusion made during continuous 1 s arterial blood sampling. Tracers were measured in 7 to 20 samples from each of the following zones: Outer, middle and inner cortex (C1, C2, C3), outer and inner halves of outer medulla (OM1, OM2), and inner medulla (IM). I-Ap and THO gave closely similar flow distribution, and average total renal blood flow (RBF) of 3.90 and 3.78 as compared to 3.94 ml/min . g with Ms. Flow in C2 (ml/min . g) was similar with all tracers, and in per cent thereof average local flows were: C1 102, C3 70, OM1 34, OM2 12, and IM 2 with DT versus 117, 53, 12, 3, and 0 with Ms. Zonal flow fractions of total RBF obtained with DT were: C1 0.41, C2 0.33, and C3+medulla 0.26 versus 0.51, 0.33 and 0.16 with Ms. Thus, a Ms surplus in C1 relative to DT flow, representing 10% of total RBF, matched a Ms deficit in C3+medulla. This disparity might result from: (1) Failure of Ms to enter deep afferent arterioles in proportion to blood flow, (2) diffusion of DT from deep portions of the interlobular arteries, and/or (3) postglomerular inward flow of blood and DT.
mini_pile
{'original_id': 'acff2955f732c0858dc9276b79a7facb578ed74db291e6981d4e5c4597a36dc4'}
How do I edit the same UILabel in every row of a TableView I have TableView with a custom TableViewCell loaded from an external nib file. Each cell has a UILabel that needs to be hidden each time the edit button is pressed in the parent Navigation Controller. Is there a UITableViewDelegate or UITableViewDatasource protocol method that I can use that will let me change the alpha level or employ the setHidden property on each and every visible UILabel from each instance of the TableViewCell (e.g., for all indexPath.row)? Thanks! Is your custom cell a UITableViewCell subclass, or is it just custom in the sense that it has various subviews loaded from a xib file? The latter. It's not subclassed. [tableView visibleCells] returns an array of all the cells that are visible at the moment. In your tableViewController's setEditing method you can use this to configure the existing cells. You will also need to modify your cellForRowAtIndexPath method so that newly dequeued cells have the label set to visible / invisible as appropriate, depending on tableView.editing. If your cell was a custom subclass you could override setEditing: animated: and make the changes there . Thanks for the answer. I ended up employing two different methods. The first one used mutable arrays to store pointers to the specific label. The second one, which is cleaner, involved subclassing the UITableViewCell. I'm sticking to the latter method. Thanks for your help!
common_corpus
{'identifier': 'https://stackoverflow.com/questions/7473586', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2011.0', 'title': 'Stack Exchange', 'creator': 'ArtSabintsev, Blurwell, Nishant , https://stackoverflow.com/users/16510293, https://stackoverflow.com/users/16510294, https://stackoverflow.com/users/16510295, https://stackoverflow.com/users/16510707, https://stackoverflow.com/users/814861, https://stackoverflow.com/users/852828, jrturton, photoporium, sprawozdania kartkowki', 'language': 'English', 'language_type': 'Spoken', 'word_count': '238', 'token_count': '355', '__index_level_0__': '1723', 'original_id': '70723436245b54907b68670410c94f4d25858e55e7a102c80b8b4e310eed4487'}
Metropolitan Borough of Poplar Poplar was a local government district in the metropolitan area of London, England. It was formed as a district of the Metropolis in 1855 and became a metropolitan borough in the County of London in 1900. It comprised Poplar, Millwall, Bromley-by-Bow and Bow. Formation and boundaries The borough bordered the metropolitan boroughs of Hackney, Stepney, and Bethnal Green to the west and north, and the county of Essex to the east. To the south, the River Thames formed borders with the metropolitan boroughs of Bermondsey, Deptford and Greenwich. It was formed from three civil parishes: St Mary Stratford-le-Bow, St Leonard Bromley and All Saints Poplar. In 1907 these three were combined into a single civil parish called Poplar Borough, which was conterminous with the metropolitan borough. In 1965 the parish and borough were abolished, with their former area becoming part of the newly formed London Borough of Tower Hamlets. It included the districts of (from north to south): Bow Bromley St Leonard Poplar Blackwall Isle of Dogs History In 1921 the Borough Council, under George Lansbury and the Poor Law Union were engaged in a dispute with the London County Council and central government over poor law rates - it wished to pay out of work people more than usually permitted; and to get wealthier West End boroughs to contribute to its expenses. Several councillors were imprisoned briefly in 1921 in relation to this. See Poplar Rates Rebellion. In 1951 Poplar was chosen as the site of the Festival of Britain's 'Exhibition of Live Architecture'. The East End of London had been heavily bombed during the war and its reconstruction was showcased at the new Lansbury Estate. New building materials and planning concepts were demonstrated. The first example of 'live architecture' on the exhibition trail was the Trinity Congregational Church and Hall, just across from the main reception area with their Town Planning and Building Research Pavilions on East India Dock Road. The trail continued with the Lansbury Estate and Chrisp Street Market. The former town hall in Bow Road, designed by Culpin & Son (1937–38), is now a listed building, as is its predecessor (1870) in Poplar High Street. Population and area Poplar covered an area of . The population as given in the census from 1801 to 1961 was: Constituent parishes 1801-1899 Metropolitan Borough 1900-1961 {| class="wikitable" ! Year || 1901 || 1911 || 1921 || 1931 || 1941 || 1951 || 1961 |- ! Population|| 168,822 || 162,442 || 162,578 || 155,089 ||<ref>The census was suspended for World War II</ref> || 73,579 || 66,604 |} Borough seal The borough had no coat of arms, using instead a seal originally designed for the Poplar District Board of Works, its predecessor, created by the Metropolis Management Act 1855. The seal depicted the emblems of the three parish vestries merged into the board. The top shield was the seal of Poplar Vestry, and showed the 'Hibbert Gate' of the old West India Docks, with a sailing ship on top of the shield. A similar representation of the gate and ship formed the head of the vestry's civic mace, which was used by the board of works and borough council until 1965. The shield on the left was the seal of Bow Vestry, and showed a bridge between two bows. This represented the bow-shaped bridge over the River Lea. The shield on the right was the seal of Bromley St Leonard Vestry, and depicts the saint dressed as a bishop. There remain a number of street signs which have been preserved with the name of the former borough. Politics Under the Metropolis Management Act 1855 any parish that exceeded 2,000 ratepayers was to be divided into wards; however the parishes of Poplar District Board of Works did not exceed this number so were not divided into wards. In 1880 the population had increased enough for the parish of All Saints Poplar to be divided into three wards (electing vestrymen): South (27), East (27) and West (30). In 1885 the population had increased enough for the parish of Bromley St Leonard to also be divided into three wards (electing vestrymen): West (39), East (36) and South (33). In 1894 the population had increased enough for the parish of St Mary Stratford Bow to be divided into four wards (electing vestrymen): No. 1 (15), No. 2 (15), No. 3 (36) and No. 4 (18). In 1894 as its population had increased the parish of All Saints Poplar was re-divided into four wards (electing vestrymen): Cubitt Town (15), Millwall (15), Blackwall (24) and West India Dock (30). The metropolitan borough was divided into fourteen wards for elections: Bow Central, Bow North, Bow South, Bow West, Bromley Central, Bromley North East, Bromley North West, Bromley South East, Bromley South West, Cubitt Town, Millwall, Poplar East, Poplar North West and Poplar West.Ordnance Survey 'County Series 3rd Edition' Map of London (1912-14) at 1:2500 scale. Accessed at https://www.old-maps.co.uk/ Borough council Parliament constituency For elections to Parliament, the borough was divided into two constituencies: Tower Hamlets, Bow and Bromley division Tower Hamlets, Poplar division In 1918 the boundaries of the borough's two seats were adjusted, and one was renamed: Bow and Bromley Poplar South In 1950 the borough's representation was reduced to one seat: Poplar See also London Government Act 1899 Metropolis Management Act 1855 References Vision of Britain'' website: Population tables for Poplar Borough Call the Midwife Further reading External links Official Guide to the Metropolitan Borough of Poplar, 1927 Poplar Town Hall on the Port Cities website Category:Districts (Metropolis) Category:Metropolitan boroughs of the County of London Category:1855 establishments in England Category:1900 disestablishments in England Category:1900 establishments in England Category:1965 disestablishments in England Category:Districts abolished by the London Government Act 1963 Category:History of the London Borough of Tower Hamlets Category:Poplar, London
mini_pile
{'original_id': '10447aad76a74133c95e7e205b91c5a789391fcc4579ab20ff2017f1a1daad5d'}
The Life of a Radar Testing Facebook 02 Mar 2010 I would strongly, strongly, strongly encourage people to now use OmniAuth for all their Facebook needs. We're currently adding Facebook integration to an existing application that uses Authlogic. That means adding a button that any user can press on the login form that then takes them to Facebook, signs them in and then lets them log into our site. For this purpose and the time being "Facebook integration" means only that: letting the user login with their Facebook details. For the Facebook side of things we're using Facebooker which is not the well-documented library we all would hope it is. Oh, and you cannot use it as a gem with Rails. Also along with Facebooker we also use the Authlogic Facebook Connect plugin to provide us with a button we use on our login form. It also provides us with a file called xd\receiver.html in our public folder which's use is documented here. We created our application.html.erb using these key elements, as specified in the Authlogic Facebook Connect README: <%= javascript_include_tag :defaults %> <%= fb_connect_javascript_tag %> <%= fb_connect_javascript_tag %> <%= init_fb_connect "XFBML" %> Our login page is nothing out of the ordinary save for this tag placed where we want the button to connect to Facebook: <%= authlogic_facebook_login_button :length => "long" %> As stated in the Canonical Documentation because we've generated the button the Javascript included into the layout will be executed when the user visits the page. This Javascript then calls the FB.init("YOUR_API_KEY_HERE", "xd_receiver.htm"); which does some Facebook/Javascript magic I am still yet to comprehend. This voodoo eventually renders a button that your user can click. When your user clicks this button it opens a popup window that asks the user to log into Facebook if they aren't already, otherwise this will do a "seamless" login. We'll go with the first option here and assume the user hasn't logged in. But by the time you've read this, they have logged into Facebook and now the Javascript continues to execute, retrieving values from the popup window and stores them as cookies. After this is all "said and done" your form will be submitted and your app will carry on its merry way. Here's the beginning of our Authlogic-juiced User model: class User < ActiveRecord::Base acts_as_authentic do |c| c.session_class = UserSession c.login_field = :email c.validate_login_field = false c.validate_email_field = false c.validate_password_field = false c.ignore_blank_passwords = false # Validations for email based accounts with_options :unless => :facebook_uid do |u| u.validates_presence_of :email, :message => :missing_email u.validates_presence_of :password, :on => :update, :if => :require_password?, :message => "^You must enter a password." with_options :unless => {|u| } do |u| u.validates_format_of :email, :with =>, :message => "^The email given looks invalid, please check for typos." u.validates_uniqueness_of :email, :message => :email_in_use u.validates_confirmation_of :email, :message => "^The emails given did not match." As you can see here if facebook_uid is present we are not validating the presence of email or password for obvious reasons. When your form is submitted it'll go a create action in a controller (we called ours UserSessionsController) and looks like this: class UserSessionsController < ApplicationController before_filter :check_fb, :only => :create def create @user_session =[:user_session]) if && !@user_session.user.suspended? unless @user_session.user.facebook_uid.nil? = true flash[:notice] = t(:msg_welcome) if @user_session.user.login_count > 1 && @user_session.user.last_login_at? flash[:notice] << " " << t(:msg_last_login, @user_session.user.last_login_at.to_s(:mmddhhss)) redirect_back_or_default root_url def check_fb if params[:user_session].nil? We have specific code here to activate a user if they log in through Facebook; we assume that if a person is logging in through Facebook that they are not an automated robot (as opposed to a manual one?) and they do not need a confirmation email sent. What's most exciting about this code however is not the create action, but the before_filter we run... erm, before... it. As you can see, the before_filter calls ensure_authenticated_to_facebook which is a method from Facebooker, traditionally used itself as a before_filter but because we have the ability to log in with an email & password OR a facebook login, is called conditionally. That method looks like this: def ensure_authenticated_to_facebook set_facebook_session || create_new_facebook_session_and_redirect! This attempts the set_facebook_session method first: def set_facebook_session # first, see if we already have a session session_set = session_already_secured? # if not, see if we can load it from the environment unless session_set session_set = create_facebook_session session[:facebook_session] = @facebook_session if session_set if session_set Session.current = facebook_session return session_set We do not have a current session so it'll go and call create_facebook_session: def create_facebook_session secure_with_facebook_params! || secure_with_cookies! || secure_with_token! So this uses three methods: secure_with_facebook_params!, secure_with_cookies! or secure_with_token. Remember what I said earlier about what happens when the user presses the button? No? Here's a refresher: it sets cookies. Not the edible kind, sadly. So the method that'll be used here is secure_with_cookies!. I feel now is a good time to show you the test we wrote. describe UserSessionsController do describe "create" do describe "facebook user" do it "creates account based on facebook details" do Facebooker.use_curl = false FakeWeb.allow_net_connect = false FakeWeb.register_uri(:post, "", :body => Rails.root + "spec/fixtures/get_users_info.xml") post :create response.should redirect_to(root_url) @assigned_user = assigns[:user_session].user @assigned_user.new_record?.should be_false be_true The Facebooker.use_curl = false is only neccesary if you have the curb gem installed. Hat-tip to Balvig in the comments! We first disable internet connections using FakeWeb. We do this so we can stub out the response to Facebooker's internal call to getUsersInfo to Facebook and always return a valid user object. The fake XML can be viewed in this gist. After Fakeweb has done its thing we call the setup_fb_connect_cookies method which does exactly what it says on the box, it lives in the spec/support/facebook\helpers.rb_ file: def setup_fb_connect_cookies cookie_hash_for_auth.each {|k,v| request.cookies[ENV['FACEBOOK_API_KEY']+k] =['FACEBOOK_API_KEY']+k,v).first} def cookie_hash_for_auth hash = {"_ss" => "not_used", "_session_key"=> "whatever", "_user"=>"77777", "_expires"=>"#{}"} raw_string ={ |k,v| [k.gsub(/^_/, ''), v].join('=') }.sort.join actual_sig = Digest::MD5.hexdigest([raw_string, Facebooker::Session.secret_key].join) hash.merge("" => actual_sig) Why such complicated code? Well, this provides the cookies that Facebooker needs in order to log in. The final three lines in the cookie_hash_for_auth method is all about setting up a "signature" which Facebook parses in the parameters to ensure that they haven't been tampered with. The generation of this was ripped straight from the guts of Facebooker which uses (almost) the same code to generate an MD5 to verify the signature against. In short: We now have cookies that our post :create is going to use. So, when this is triggered secure_with_cookies! does its thing: def secure_with_cookies! parsed = {} fb_cookie_names.each { |key| parsed[key[fb_cookie_prefix.size,key.size]] = cookies[key] } #returning gracefully if the cookies aren't set or have expired return unless parsed['session_key'] && parsed['user'] && parsed['expires'] && parsed['ss'] return unless (['expires'].to_s.to_f) > || (parsed['expires'] == "0") #if we have the unexpired cookies, we'll throw an exception if the sig doesn't verify verify_signature(parsed,cookies[Facebooker.api_key], true) @facebook_session = new_facebook_session This has now generated a value for session[:facebook_session], a Facebooker::Session object. Great. The @user_session in our controller has a user method that returns a valid user and we ensure it's that way in the remainder of the controller test. Great, so that part works. Now about how doing something with the logged in user? Well for that purpose, Elad Meidar wrote a blog post covering how to do it in Cucumber. This consists of setting up your facebooker.yml to having a cucumber key share the configuration of the development key and a couple of steps: Given /^I am logged in as a Facebook user$/ do # Initializer facebooker session @integration_session = open_session @current_user = User.create! :facebook_id => 1 # User#facebook_user returns a Facebook::User instance, i decided to mock the session in here since i am not # sure what the behavior might be if it will be in the actual model. @current_user.facebook_user.session = Facebooker::MockSession.create(ENV['FACEBOOK_API_KEY'], ENV['FACEBOOK_SECRET_KEY']) @current_user.facebook_user.friends = [ => 2, :name => 'Bob'), => 3, :name => 'Sam')] @integration_session.default_request_params.merge!( :fb_sig_user => @current_user.facebook_id, :fb_sig_friends =>',') ) This code sets the parameters on the next request and Facebooker accepts these and uses them to create a new Facebooker::Session object, which it stores in session[:facebook_session]. The open_session method comes from Facebooker by placing this line in features/support/app.rb: require 'facebooker/rails/cucumber' The facebook_user method on our User object comes from defining it on the User model: Now with the steps and correct requires in place, we have our feature: Feature: Facebook In order to use the site as a facebook user As a user I want to have already logged in with Facebook and be roaming the wide brown lands Scenario: logging into facebook Given I am logged in as a Facebook user And I am on the homepage Then I should be on the homepage This is just a silly example that ensures that the user is not redirected back to the login page if they are logged in as a Facebook user. I hope you write better features than this. This feature will fail for the time being because our current_user method only queries current_user_session, so we'll modify it to be this instead: def current_user @current_user ||= (current_user_session && current_user_session.record) @current_user ||= User.find_by_facebook_uid(session[:facebook_session].user.uid) Now we can use current_user to reference current Facebook users too, meaning our feature will now pass. With a controller spec and feature passing, that's lunch! For After Lunch So how was lunch? I hope it was good. Since this is only a one-way kind of communication I can't accurately respond to whatever you're going to say. Sorry! Right then! So our application is tested well enough that we know that we can log in using faked-out Facebook cookies, but does the actual real-world side of things work? Does clicking the button actually prompt the user to log into Facebook if they haven't already or just go through that whole section transparently and present them with an already logged in screen? Chances are this is a big, gigantic, fat You'll more-than-likely run across an "Invalid parameter" issue as we had when we tried to use our application. The error code for this is 100. So what's up? Well, as it turns out, when you try to go to the login page for an application that hasn't yet been activated it just warns you that it hasn't been activated. I'm not quite clear on how Facebooker works in this particular section, but it is my understanding that the login page is supposed to take you to the application page. Let me explain in step-by-step kind of way. "application's page" means your site in this scenario. You've set this up by specifying the "Connect URL" in the "Connect" section of your Application Settings page to be the root-level of your site. So this is how Facebooker does its thing: 1. Facebooker grabs an auth_token using the facebook.Auth.createToken API method. This returns something like 72a910e1f24eb6034549d23cd2245f28 2. This auth_token is then passed to as a parameter, which is rendered in whichever fashion you wish. For all intents and purposes, our application renders it in another browser window. 3. The login.php page detects if you are logged out or in and does either: 4. If you're logged out of Facebook, prompts for an email and password. If you "get this right", Facebook sets up some cookies, links that auth_token to your Facebook user, and redirects you to the application. 5. If you're logged in to Facebook, Facebook sets up some cookies, links that auth_token to your Facebook user, and redirects you to the application. 6. The cookies are then used to call facebook.Auth.getSession which, because you're now most-definitely logged into Facebook, will return a session object. Something that looks like: 2.5KVyRHmZWBbOun8ZwDwQxg__.3600.1243290000-608966587\n 608966587\n 1268190000 7. Facebooker creates a Facebooker::Session object based on this return value which it stores in your application as session[:facebook_session] 8. What could possibly go wrong is that if you have your application in "Sandbox Mode" (under "Advanced" in "Application Settings"), when you go to the login page you'll be shown the "This application is under construction" and therefore Facebook will not link your user account with the auth_token so when facebook.Auth.getSession tries to do what its name implies: it'll fail with "Invalid Parameter". Just be careful about that! It had us caught up for a day and bit, we didn't know about that option. I hope you found this as informative as I found it interesting to investigate. blog comments powered by Disqus
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.8318320512771606}", 'metadata': "{'Content-Length': '21167', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HPXPRPUMUKAZPL3XDPKMRZRS2LSPRKWL', 'WARC-Concurrent-To': '<urn:uuid:ab1abcaf-532f-4ecc-ba83-2f7bb0da875e>', 'WARC-Date': datetime.datetime(2013, 12, 13, 11, 21, 43), 'WARC-IP-Address': '162.243.140.224', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:INOHIDESX62UCSRAQRSZI4Z4CHPFWJTY', 'WARC-Record-ID': '<urn:uuid:de7c6412-dcf5-4005-8cf7-534cfebbc4f7>', 'WARC-Target-URI': 'http://ryanbigg.com/2010/03/testing-facebook/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:169c7405-15a5-4b59-a4e3-24d7dba5b0e2>', 'WARC-Truncated': None}", 'previous_word_count': '1858', 'url': 'http://ryanbigg.com/2010/03/testing-facebook/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.20070958137512207', 'original_id': '3b7a753dc012bb243f409e996b657835c660da548ebb595ebe5c867a948fd88f'}
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is mozilla.org code. * * The Initial Developer of the Original Code is * Netscape Communications Corporation. * Portions created by the Initial Developer are Copyright (C) 1998 * the Initial Developer. All Rights Reserved. * * Contributor(s): * * Alternatively, the contents of this file may be used under the terms of * either of the GNU General Public License Version 2 or later (the "GPL"), * or the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ #ifndef nsCollationCID_h__ #define nsCollationCID_h__ #include "nscore.h" #include "nsISupports.h" // {AA13E4A0-A5AC-11d2-9119-006008A6EDF6} #define NS_COLLATION_CID \ { 0xaa13e4a0, 0xa5ac, 0x11d2, \ { 0x91, 0x19, 0x0, 0x60, 0x8, 0xa6, 0xed, 0xf6 } } #define NS_COLLATION_CONTRACTID "@mozilla.org/intl/collation;1" // {A1B72850-A999-11d2-9119-006008A6EDF6} #define NS_COLLATIONFACTORY_CID \ { 0xa1b72850, 0xa999, 0x11d2, \ { 0x91, 0x19, 0x0, 0x60, 0x8, 0xa6, 0xed, 0xf6 } } #define NS_COLLATIONFACTORY_CONTRACTID "@mozilla.org/intl/collation-factory;1" #endif // nsCollationCID_h__
mini_pile
{'original_id': '26b5a8783f2ffeaf8e8c25ade626b1235a81085a64bb764b0c261e10614faa66'}
Q: Can I get a virus from connecting to a WiFi network? Let's say I connect to a local WiFi hotspot with a particularly bad security. I am aware that a hacker may be able to perform the following: Man-in-the-middle attack Snoop on an unencrypted network traffic But my question is: can a hacker distribute a virus to my device via the WiFi network? And, if so, what can I do to protect myself? A: Depends on your OS and a lot of variables but in general yes. Because the attacker may perform a man in the middle attack on a poorly designed update mechanism (not windows update) and or (again depending on your setup) abuse windows' local features like printer sharing as an attack vector. As with everything there is no 100% solution but a very good start is using a VPN in order to fully encrypt all in/outgoing traffic and verify its integrity.
mini_pile
{'original_id': '955d2cb4c2b7880533da58e8c93cb1e276c1f36bc8701b9cfc704cb89cde2fb4'}
Effects of visfatin/PBEF/NAMPT on feeding behaviour and hypothalamic neuromodulators in the rat. Visfatin, also known as pre-B cell colony enhancing factor (PBEF) or nicotinamide phosphoribosyltransferase (NAMPT), is a cytokine that is produced by adipose tissue, skeletal muscle, liver and immune cells. We studied the effects of visfatin/PBEF/NAMPT on feeding behavior, hypothalamic steady state concentrations of aminergic neurotransmitters and hypothalamic mRNA levels of anorexigenic peptides, such as cocaine- and amphetamine-regulated transcript (CART) peptide, corticotropin-releasing hormone (CRH), proopiomelanocortin (POMC), and orexigenic peptides, such as agouti-related peptide (AgRP) and neuropeptide Y (NPY). Forty-eight rats were injected in the arcuate nucleus (ARC) of the hypothalamus with either saline or visfatin/PBEF/NAMPT (3 microg). Food intake was recorded 1, 2 and 24 h following injection, and either dopamine (DA), norepinephrine (NE), serotonin (5-hydroxytryptamine, 5-HT) or peptide gene expression were evaluated 2 and 24 h after visfatin/PBEF/NAMPT administration. Compared to vehicle, visfatin/PBEF/NAMPT significantly increased food intake, as evaluated 1, 2 and 24 h post-injection. Visfatin/PBEF/NAMPT treatment led to a significant decrease of DA steady state concentration, CART and CRH mRNA levels. Consequently, visfatin/PBEF/NAMPT could play an orexigenic role in the ARC, and the effect could be mediated by modulation of DA, CART and CRH activity in the hypothalamus.
mini_pile
{'original_id': '15f2704ca6f097973bf681405e5cfc4cbe11955b370aa6b338058c2abad6a397'}
================================================================= This opinion is uncorrected and subject to revision before publication in the New York Reports. ----------------------------------------------------------------- No. 52 The People &c., Appellant, v. Kharye Jarvis, Respondent. Geoffrey Kaeuper, for appellant. William G. Pixley, for respondent. MEMORANDUM: The order of the Appellate Division should be affirmed. Counsel's failure to invoke the court's prior preclusion order, coupled with his presentation of an alibi defense for the wrong day of the week, could have led to - 1 - - 2 - No. 52 defendant's conviction. In this case, where the evidence against defendant was particularly weak since credibility issues affected each of the prosecutor's major witnesses, the cumulative effect of counsel's lapses deprived defendant of meaningful representation (People v Oathout, 21 NY3d 127, 132 [2013]). - 2 - People v Kharye Jarvis No. 052 PIGOTT, J.(dissenting): In 1992, following a jury trial, defendant was convicted, on compelling evidence, of two counts of murder in the second degree for the fatal shooting of two men. Now, 23 years later, the majority holds that defense counsel was ineffective for not objecting at trial when the prosecutor elicited testimony from a prosecution witness, Charlotte Barnwell, that defendant threatened her prior to her testimony. County Court had earlier ruled that such testimony was inadmissible unless the issue of Barnwell's delay in coming forward was raised on cross examination. The majority further holds that defense counsel's presentation of an alibi defense through three alibi witnesses constitutes ineffective assistance. In my view, defendant failed to meet his burden of establishing the absence of a strategic or other legitimate explanation for defense counsel's alleged errors. Therefore, I dissent and would affirm the judgment of conviction. In People v Baldi, this Court held that in order for a defendant to succeed on his claim of ineffective assistance of counsel, defendant must prove that he was deprived of a fair - 1 - - 2 - No. 52 trial by less than "meaningful representation" determined by counsel's performance "viewed in totality" (People v Oathout, 21 NY3d 127, 128 [2013], citing Baldi, 54 NY2d 137, 147 [1981]). Further, we have said that in reviewing claims of ineffective assistance, we must take care "to avoid both confusing true ineffectiveness [of counsel] with mere losing tactics and according undue significance to retrospective analysis" (Baldi, 54 NY2d at 146). Defense counsel undoubtedly conducted a diligent defense throughout the trial. He capably argued motions including the mid-trial Molineux/Ventimiglia hearing, delivered a cogent opening statement, cross-examined the People's witnesses, lodged appropriate objections and offered an articulate closing argument that identified weaknesses in the People's proof. Defense counsel attacked the prosecution's proof as to identity, offering three witnesses in support of an alibi and, further, challenged the credibility of each of the People's witnesses throughout the trial. Moreover, defense counsel's effectiveness was demonstrated by the length of the jury's deliberations before it eventually convicted defendant. Given the breadth of defense counsel's representation, it could not reasonably be said, on this record, that defendant was denied meaningful representation. The majority bases its holding, in part, on a claimed "lapse" of defense counsel in failing to object to Barnwell's limited-use testimony. In People v Rivera, this Court held that - 2 - - 3 - No. 52 in order "[t]o prevail on a claim of ineffective assistance of counsel, it is incumbent on defendant to demonstrate the absence of strategic or other legitimate explanations for counsel's failure" to object (71 NY2d 705, 709 [1988]). "Absent such a showing, it will be presumed that [defense] counsel acted in a competent manner and exercised professional judgment" in choosing not to object (id.). We further noted that only "in the rare case, it might be possible from the trial record alone to reject all legitimate explanations for counsel's failure" (id.). In this case, the majority ignores the fact that the People offered a number of strategic reasons why defense counsel may not have objected to Barnwell's limited-use testimony. For instance, defense counsel may have decided not to object in order to avoid focusing the jury's attention to Barnwell's testimony altogether (see People v Taylor, 1 NY3d 174, 177 [2003]). Just prior to the line of questioning concerning the threat, Barnwell had provided damaging testimony that before the shootings she overheard defendant threaten to kill one of the victims. Alternatively, defense counsel may have sought to use Barnwell's testimony to defendant's advantage by calling attention to her difficulties in testifying. It is evident from the record that throughout the prosecution's case-in-chief Barnwell appeared uncooperative, hesitant and unreliable. In fact, the prosecution asked 11 questions -- with two objections by defense counsel -- before finally eliciting testimony from - 3 - - 4 - No. 52 Barnwell that she overheard defendant threaten that he was going to shoot the victim. Additionally, Barnwell was unable to recall the threat defendant directed at her without the use of her prior statement to the police. Defense counsel had good reason to believe that Barnwell would continue to undercut her own credibility with her continued reluctance and vacillations. Also evident from the record is defense counsel's execution of this strategy. On cross examination, defense counsel challenged Barnwell's inability to recall the threat without use of a prior recollection recorded. In summation, defense counsel argued at length about Barnwell's unreliable testimony, stressing her relationship to the victims and further urging the jurors to disregard her statements. In particular, he argued: "You cannot separate some of what she says from her manner in which she says it. This is a case where if you ask to have her testimony read back and then you listen to it, it might make a degree of sense. But you have to remember that when she was testifying, the judge had to instruct her at one point to answer the question. And the second thing is the most critical piece of evidence she claims she has, she tells the District Attorney she forgot. Well, I forgot that. She had to go off and read her statement, then says, oh, yea, now I remember." Towards the end of summation, defense counsel returned to Barnwell's credibility, urging the jury to find Barnwell's testimony unbelievable. What is more, the jury requested a read- back of Barnwell's testimony and nonetheless remained deadlocked. - 4 - - 5 - No. 52 Therefore, "[t]he decision not to object to prosecutorial actions . . . simply 'reflect[ed] a reasonable and legitimate strategy under the circumstances and evidence presented'" (Taylor, 1 NY3d at 177, quoting People v Tonge, 93 NY2d 838, 840 [1999]). Accordingly, while defense counsel's decision not to object may have been debatable, it is beyond me how the majority can possibly state, on this record, that "defendant met his burden of establishing the absence of strategic or legitimate reasons for counsel's failure to invoke the court's prior preclusion ruling" (maj mem, at 2). Furthermore, I disagree with the majority's conclusion that defendant, on this record, met his burden of establishing the absence of strategic or other legitimate explanations for the presentation of an alibi defense through the testimony of defendant's girlfriend and mother. Here, the subject murders occurred at approximately 1:20 a.m. on Tuesday, June 4, 1991. Two alibi witnesses, defendant's girlfriend and her mother, testified to defendant's whereabouts on the evening of June 3rd and the early morning hours of June 4th, but incorrectly identified the days of the week on which those dates fell. As the Appellate Division acknowledged, in reliance on People v Cabrera, 234 AD2d 557, 558 (1996), People v Long, 81 AD2d 521, 521–522 (1981), and Henry v Poole, 409 F3d 48, 65-66 (2005), cert denied 547 US 1040 (2006), presenting an alibi - 5 - - 6 - No. 52 defense for the wrong date or time has been found to constitute ineffective assistance of counsel (113 AD3d 1058, 1061 [4th Dept 2014]). However, in each of these cases, the defense counsel interjected the errors into the alibi witnesses' testimony. In Cabrera, the defense counsel's questions focused on a Friday evening when the robbery of which the defendant was convicted occurred early Friday morning (see 234 AD2d at 558). In Long, the defense counsel "direct[ed] [the witness's] attention to July 22, 1978 in the evening of that day" when the robbery actually occurred in the early morning hours of July 22 (81 AD2d at 521). Likewise, in Henry, the attorney specifically keyed the testimony in his question to the night of August 10, 24 hours after the robbery, thereby leading the witness to testify as to the incorrect night (see 409 F3d at 64). In this case, however, defense counsel never directed the alibi witnesses to the incorrect days of the week; he only questioned them with respect to their memory of June 3 and 4, the day before and the day of the murders. The alibi witnesses gratuitously and erroneously offered that they were providing alibis for a Friday morning even though defense counsel questioned them specifically about June 3 and 4. Defense counsel cannot possibly be faulted for the witnesses' failed memories or for their addition of details that were deleterious to defendant's alibi defense. To the extent the majority suggests that defense - 6 - - 7 - No. 52 counsel was in fact responsible for the discrepancies exposed in the alibi witnesses' testimony, it is suggesting that defense counsel suborned perjury and such a claim is predicated on facts not found in the record on appeal.1 In short, it is impossible on the record on appeal alone to reject all legitimate explanations for defense counsel's alleged errors and therefore determine defendant was denied effective assistance of counsel. The claims should be raised in a postconviction application under CPL article 440, where the basis of the claims may be fully developed (see People v Brown, 45 NY2d 852 [1978]). * * * * * * * * * * * * * * * * * Order affirmed, in a memorandum. Chief Judge Lippman and Judges Read, Rivera, Abdus-Salaam and Stein concur. Judge Pigott dissents in an opinion. Judge Fahey took no part. Decided April 7, 2015 1 See generally Manuel Berrélez et al., Note, Disappearing Dilemmas: Judicial Construction of Ethical Choice as Strategic Behavior in the Criminal Defense Context, 23 Yale L. & Pol'y Rev. 225 (2005). - 7 -
mini_pile
{'original_id': '43fcda8db8d050a01ec196bb270d1157e84d58a7a89e00ddf268d7a2284f2d43'}
The Geneva “interim” agreement reached in November between Iran and the so-called P5+1 (the United States, Britain, China, France, Germany, and Russia) freezes Tehran’s nuclear program in exchange for modest sanctions relief, with the goal of enabling further talks to comprehensively resolve one of the world's thorniest challenges. Yet despite the landmark accord, more than two dozen Senators introduced legislation on December 19 to impose new oil and financial sanctions on Iran. The Senate could vote on the measure soon after it returns from recess in January. Powerful lobby organizations are mobilized in support of the bill, and it could certainly pass. The legislation defies a request by the Obama administration and ten Senate committee chairs to stand down on sanctions while negotiations continue. It also flies in the face of an unclassified intelligence assessment that new sanctions “would undermine the prospects for a successful comprehensive nuclear agreement with Iran.” Proponents of the bill note that the proposed sanctions would only come into force if Iran violates the Geneva agreement or fails to move toward a final deal, and would not kick in for months. But the White House warns that enshrining new economic threats in law now runs counter to the spirit of the Geneva pledge of no new sanctions during negotiations, and risks empowering Iranian forces hoping to scuttle nuclear talks. The legislation also defines congressionally acceptable parameters for a final deal that Iran experts almost universally believe are unachievable, namely the requirement that Iran completely dismantle its uranium enrichment program. For these reasons, the administration believes the bill represents a poison pill that could kill diplomacy, making a nuclear-armed Iran or war more likely. Sanctions hawks disagree, arguing that the legislation will enable, not thwart, diplomatic progress. “Current sanctions brought Iran to the negotiating table,” Senator Robert Menendez, the bill’s leading champion, contends, “and a credible threat of future sanctions will require Iran to cooperate and act in good faith at the negotiating table.” But this logic badly misreads the historical effect of sanctions on Iranian behavior and under-appreciates the role played by Iran’s fractious domestic politics. A careful look at Iranian actions over the past decade suggests that economic pressure has sometimes been effective, but only when it aligns with particular Iranian political dynamics and policy preferences. And once domestic Iranian politics are factored in, the lesson for today’s sanctions debate is clear: the threat of additional sanctions, at this critical juncture, could derail negotiations toward a peaceful solution. In the fall of 2003, under Iran’s reformist president Mohammad Khatami and his lead nuclear negotiator, national-security adviser Hassan Rouhani, the so-called E-3 (Britain, France, and Germany) persuaded Tehran to voluntarily suspend its uranium enrichment activities. Iran also agreed to implement the Nuclear Non-Proliferation Treaty Additional Protocol, allowing International Atomic Energy Agency (IAEA) inspectors more expansive access to Iranian nuclear facilities. According to the 2007 U.S. National Intelligence Estimate and a November 2011 IAEA report, the Iranian regime previously halted its organized effort to design a nuclear warhead. François Nicoullaud, the French ambassador to Iran during this period, suggested that Rouhani may have played a key role in convincing Supreme Leader Ayatollah Ali Khamenei to order the halt to Iran’s weaponization work. These decisions came in the aftermath of the August 2002 revelations that Iran had constructed a secret uranium enrichment facility at Natanz and was building a heavy water reactor at Arak. Iranian leaders feared that the IAEA Board of Governors would refer Iran to the United Nations Security Council for violations of Iran’s nuclear safeguards agreement, raising the prospect of multilateral sanctions. (In the aftermath of the initial lopsided U.S. military victory over Saddam Hussein’s forces in Iraq, the Iranian regime may also have feared they would be targeted next for pursuing weapons of mass destruction.) A year later, the parties signed the Paris Agreement, which extended the temporary suspension of Iran’s nuclear activities, pending negotiation of a comprehensive framework. In March 2005, Iran presented a proposal to the E-3 offering to cap Iran’s level of enrichment at 5 percent, a level appropriate for civilian nuclear power plants but far from weapons-grade. Tehran also offered to limit the number of operating centrifuges to 3,000 and ratify the Additional Protocol. But negotiations broke down when the E-3, backed by the Bush administration, balked at allowing Iran to continue low-level enrichment. With the resurgence of hardline forces, many affiliated with the Islamic Revolutionary Guard Corps, in the 2004 Iranian parliamentary elections and the June 2005 presidential election of Mahmoud Ahmadinejad, it became impossible for Iranian moderates to sustain elite consensus for nuclear compromise. Moderates were accused of appeasement and retreat, and hardliners demanded a tougher stance. Rouhani was singled out for particular derision. Hardliners showed little concern about possible UN sanctions or U.S. military action, advocating for the abandonment of diplomacy in favor of “resistance” and the creation of irreversible technological facts on the ground. And that is exactly what happened during the Ahmadinejad period. Iran ended its temporary suspension of nuclear activities in the summer of 2005 and resumed enrichment at Natanz in early-2006. Tehran also stopped voluntarily implementing the Additional Protocol. Iran increasingly viewed its nuclear activities as inalienable rights, and uranium enrichment in particular became a central symbol of national pride. In late-2006, the UN Security Council passed the first of six resolutions imposing economic sanctions and calling on Iran to suspend its enrichment and reprocessing activities until such time that it restored the confidence of the international community in the peaceful nature of its program. The most recent and significant of these resolutions, negotiated by the Obama administration and passed in June 2010, set the stage for a series of crippling unilateral U.S. sanctions, including potent provisions aimed at preventing third parties from buying Iranian oil or engaging in transactions with Iranian banks. The European Union and other like-minded nations followed suit with similar punishing measures. Sanctions severed Iran’s links to the international financial system and cut the country’s oil exports by more than fifty percent, costing the Islamic Republic more than $80 billion in revenue since the beginning of 2012, according to White House estimates. The value of Iran’s currency plummeted, and inflation, government debt, and unemployment soared. In 2012 alone, Iran’s economy contracted by five percent, and the 2013 numbers are expected to be similar. Yet despite the escalation of sanctions during the Ahmadinejad period, Iran did not halt its nuclear activity. On the contrary, when Ahmadinejad entered office, Iran possessed several hundred centrifuges enriching to the 3.5 percent level, but by 2013, Iran had nearly nineteen thousand centrifuges, including almost one thousand at the deeply buried Fordow facility (another once-secret site constructed during the Ahmadinejad period) enriching to the much-closer-to-bomb-grade 20 percent level. In total, Iran accumulated enough low-enriched uranium during this time to produce, if further enriched, as many as half a dozen nuclear weapons. Iran also began installing much more advanced centrifuges at Natanz, and made substantial progress toward making the Arak reactor operational, opening up a potential plutonium pathway to nuclear weapons. None of this changed until the June 2013 presidential election. In a six-way race, Rouhani vanquished several more conservative candidates, including Ahmadinejad's chief nuclear negotiator Saeed Jalili, who campaigned on continued economic and nuclear resistance in the face of international pressure. Rouhani, in contrast, emphasized the dangers of Iran’s isolation and the economic damage from sanctions. He pledged to repair relations with the world and have a softer touch at home. Rouhani’s sweeping victory—which surprised internal and external observers alike—gave him a strong public mandate and, for the time being, implicit support from Ayatollah Khamenei to change course. Aware that he needed to act fast, Rouhani put together a largely technocratic unity government, including the Western-educated foreign minister Mohammad Javad Zarif, another member of the 2003 negotiating team, who was given the nuclear file. Rouhani and Zarif immediately set off on a “charm offensive” designed to signal a more moderate Iranian path, including a historic phone call between Rouhani and president Obama in September. The new approach culminated in Tehran’s willingness to accept the interim nuclear deal signed in Geneva—a deal very similar to one that Jalili had rejected in previous nuclear talks. Iran’s behavior over the last decade clearly shows that there is no inevitable or linear causal relationship between applying “more pressure” and obtaining “more concessions,” as many sanctions advocates claim. Sometimes, as was the case in the 2003-2005 period, the threat of sanctions motivated nuclear compromise; but at other times (2006 to mid-2013), the actual imposition of sanctions appeared to have the opposite effect. There is little doubt that the economic deprivations produced by crippling sanctions—worsened by profound mismanagement under Ahmadinejad—compounded popular dissatisfaction with the regime and played a role in Rouhani’s recent election. And sanctions certainly influenced the Iranian regime’s apparent willingness to move toward nuclear accommodation in Geneva. But there is also little doubt that had Jalili become president, as some Western analysts predicted, Tehran’s nuclear intransigence would have continued despite the same level of economic hardship.
mini_pile
{'original_id': '9d7a44b4f41aa4ad5f70046b1e43dc65b7790912ecc2b93c461b38bfee9c7d48'}
Vera Kurigina is the mother of Yolanda Yewbeam and the wife of Yorath Yewbeam. She was a hypnotist. Ad blocker interference detected!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '28', 'language_id_whole_page_fasttext': "{'en': 0.9478172063827516}", 'metadata': "{'Content-Length': '220189', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QGDSC3QCAZOODM633VXPZBA5NQM6YCME', 'WARC-Concurrent-To': '<urn:uuid:b57a7cbd-b981-47d6-8422-a3ffd6b70937>', 'WARC-Date': datetime.datetime(2017, 8, 21, 10, 6, 45), 'WARC-IP-Address': '151.101.0.194', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FNRFMIU3HEWIZ3BLZLEMZM4Y2VRCSUD2', 'WARC-Record-ID': '<urn:uuid:8b56ce0e-eefd-4e7c-a447-a03449fb0c5f>', 'WARC-Target-URI': 'http://charliebone.wikia.com/wiki/Vera_Kurigina', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:868c1e62-b1f3-4453-ba44-423e300276b3>', 'WARC-Truncated': None}", 'previous_word_count': '65', 'url': 'http://charliebone.wikia.com/wiki/Vera_Kurigina', 'warcinfo': 'robots: classic\r\nhostname: ip-10-166-25-153.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3880654573440552', 'original_id': '1b0c5d1b7759a5c9f05b46dad1948dc54a1dea835c10dc1c33a26e6408661d52'}
Marie Brosset Brosset, Marie Ivanovich Born Jan. 24, 1802, in Paris; died Sept. 3, 1880, in Châtellerault, France. French Orientalist, linguist, and historian. Brosset moved to Russia in the 1830’s, where he became an academician at the St. Petersburg Academy of Sciences (1838). He was the first in Russia to deliver lectures on the history of Georgia and Armenia, at St. Petersburg University in the 1840’s. In 1864 he became director of the numismatics office at the Hermitage. Brosset occupied a prominent position in Georgian and Armenian historiography as a commentator, editor, and translator of rare manuscripts written in the Georgian and Armenian languages, mainly from the Middle Ages. He published works on the history of Georgia and Armenia in the French language, such as Chronicle of Georgia (Kkarthlis Tshovreba), Geography of Georgia, and Accounts of an Archaeological Expedition in Georgia and Armenia. Brosset’s scholarly activity helped to popularize the history of Georgia and Armenia and to broaden the base of its source materials. Ruines d’ Ani aux X et XI siècles, vols. 1-2. St. Petersburg, 1860-61. Rapports sur un voyage archéologique dans la Géorgie et dans l’Arménie. St. Petersburg, 1849-51. Marr, N. “K stoletiiu so dnia rozhdeniia M. Brosse.” In the collection Zapiski vostochnogo otdeleniia imperatorskogo Russkogo arkheologicheskogo obshchestva, vol. 14, issue 4. St. Petersburg, 1902. Istoriia istoricheskoi nauki v SSSR: Dooktiabr’ skii period: Bibliografía. Moscow, 1965. Brosset, L. Bibliographie analytique des ouvrages de M. F. Brosset, 1824-1879. St. Petersburg, 1887.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '22', 'language_id_whole_page_fasttext': "{'en': 0.7717581987380981}", 'metadata': "{'Content-Length': '39794', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:63JWR45K3V7JTXDNX7SK2BW2AWNIHP3U', 'WARC-Concurrent-To': '<urn:uuid:31b778d1-eb61-456d-84e7-89cc109d60e4>', 'WARC-Date': datetime.datetime(2020, 10, 21, 2, 11, 46), 'WARC-IP-Address': '85.195.124.227', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ZQFZS3ZPZD4MBVZTXX5PKAHMOTQHGCIE', 'WARC-Record-ID': '<urn:uuid:2cd39027-3a72-474c-93a1-af1f8bcc7987>', 'WARC-Target-URI': 'https://encyclopedia2.thefreedictionary.com/Marie+Brosset', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:8034dd60-07fd-41a1-8cbb-9a111790fd5e>', 'WARC-Truncated': None}", 'previous_word_count': '274', 'url': 'https://encyclopedia2.thefreedictionary.com/Marie+Brosset', 'warcinfo': 'isPartOf: CC-MAIN-2020-45\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-32.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.027405619621276855', 'original_id': '9c7ef87f993ec4d97c585eb5fa0a6b119d48f1acf0240e10b7dbc1a837bda0fa'}
Basil (Ocimum basilicum) 10ml -Steam Distilled Essential Oil Rich, warm scent. Sore muscles, bronchitis, respiratory complaints due to colds, sinus congestion and flu. Boosts immune system. Anxiety, depression.Stimulates blood flow. Great in a massage oil. 10ml – Cold Pressed Essential Oil Rich, warm scent. Muscle aches. Bronchitis. Respiratory complaints due to cold and flu. Hair growth. Boosts immune system. Anxiety, depression. Sinus congestion. Stimulates blood flow.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.7670628428459167}", 'metadata': "{'Content-Length': '36199', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XZNLJED3UESCOLEPSBZPJFWABKFUMHUB', 'WARC-Concurrent-To': '<urn:uuid:aa7cbbee-9671-4e2d-8cc7-c954fe1f78a7>', 'WARC-Date': datetime.datetime(2020, 5, 26, 12, 22, 58), 'WARC-IP-Address': '74.208.236.57', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KANE357526IFIJCGGF5BTIGBNQHH76T7', 'WARC-Record-ID': '<urn:uuid:8afc9840-4920-4047-a9ba-8b7612f869c9>', 'WARC-Target-URI': 'https://celestialbody.com/product/basil-ocimum-basilicum?add-to-cart=138', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:19835616-c36d-447c-9e58-c86d828000ae>', 'WARC-Truncated': None}", 'previous_word_count': '65', 'url': 'https://celestialbody.com/product/basil-ocimum-basilicum?add-to-cart=138', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-190.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3322467803955078', 'original_id': 'dd6cb6d2753dfc6791c18a602919bd97a123303489e5bb41ce19d0f2e4a7fce4'}
The Vermont Statutes Online Subchapter 002 : VILLAGE OFFICIALS (Cite as: 24 App. V.S.A. ch. 213, § 23) § 213-23. Duty of Clerk The Clerk shall keep a record of all meetings and proceedings of the corporation and of the Board of Trustees; and give copies of the same when required upon payment of reasonable fees. The Clerk shall warn all meetings of the legal voters of the corporation, by posting notices thereof containing a statement of the business proposed to be transacted, in three or more public places within the limits of the corporation at least six days before the time of meeting.
mini_pile
{'original_id': '4561c352c05733035e53d0006b62fb5b4a28f3508592140b99089533bdf6f6f2'}
Two Legendary Cosmo Editors In Exclusive Q&A Two Legendary Cosmo Editors In Exclusive Q&A Legendary Cosmo editors Bonnie Fuller and Helen Gurley Brown with advice on sex, love and career. You may not realize this—but you and Carrie Bradshaw owe Helen Gurley Brown big time! If it wasn't for Helen, the fearless founder and longtime editor-in-chief of Cosmopolitan magazine, and author of the earth-shattering bestseller, Sex and the Single Girl, you might well be TRAPPED! Now, Helen and her enormous—and for the most part unrecognized—contributions to the sexually and mentally liberated lives that you, Carrie, and your friends enjoy, has finally been recognized for her feminism and more, in a recently published bio Bad Girls Go Everywhere: The Life of Helen Gurley Brown, by Jennifer Scanlon. It's a definite read, if you want some dramatic perspective on just how significantly women's lives have changed in just 60 years. If it wasn't for Helen, who grew up in the female-stifling 1940s and '50s, it's not only Sex and the City's Carrie Bradshaw who might not exist. There wouldn't be a Michelle Obama either. Helen, more than any other woman in the world, made it aspirationally OK to be a career woman who could be the equal of any man, including her husband. At a time when most women worked briefly, if at all, before getting hitched and retiring into narrow lives as traditional wives and moms, Helen believed that work in itself was liberating for women. Liberating because money gave women the financial independence to live their lives on their own terms. And Helen's experiences as a hardworking, ambitious career woman at a time when most working girls were relegated to low-level secretarial positions, and denied promotions and raises—think Mad Men—made her a relentless advocate for other working women throughout her time at Cosmo. Despite the many roadblocks in her own career path, Helen kept on persevering, breaking through sexist barriers and finally landing a job as one of the first female copywriters in the advertising industry, before becoming a book author and magazine editor-in-chief. Along the way, she discovered that "nothing is as much fun as achieving." A philosophy that Michelle Obama's been articulating to the female students she's been inviting to visit the White House since her husband's inauguration. That's not all. Before Helen got her delicate hands on the public consciousness every month with Cosmo, beginning in 1965, single women were truly considered inferior misfits to married women. "The reigning philosophy at the time was that if you were female and not married by the age of 30, you might as well go to the Grand Canyon and throw yourself in," she has said. "If you were having sex and not married, don't bother with the Grand Canyon, just go to the kitchen, put your head in the oven and turn on the gas." Helen knew "these ideas were cuckoo" and wholeheartedly believed that single women "were the least understood and most maligned minority group of all time." She decided to change that perception with Cosmo, which she used to celebrate the lives of fun, fearless females. Now you may not think of Cosmo as being a feminist magazine, but Helen made it an advocate for having a life that you're in charge of—career-wise, man-wise and looks-wise. I caught up with the still busy Helen Gurley Brown who, at 87, goes into her office every day and works diligently as editor-in-chief of Cosmopolitan International. She's still happy to dole out advice on how to make your life 100 percent happier, so I took your pressing questions to her. Here, the original Cosmo Girl gives YourTango users the answers! 1) QUESTION: I'm curious what advice Helen Gurley Brown would have given her 21-year-old self, career or otherwise, now that's she's older. - ANSWER: Good things will happen if you get up every day and work at it. It's a lot of trouble to do the best you can. It's the secret of my so-called success. A lot of concentration will bring results eventually. If you aren't getting any recognition after a while, then you probably aren't doing something you could be. Work harder. 2) QUESTION: What do you think of hooking up? - ANSWER: I think it's OK—do it! 3) QUESTION: In a world where marriages fall apart, how can I make mine stick? - ANSWER: Treat your husband like a friend. Be reasonably honest, considerate and do things with him that he enjoys doing. Be a good person to him—that's a good recipe. Be polite, kind and be careful of your husband's feelings. And you both need to be responsible for each others' health, well-being and money! 4) QUESTION: What's the best relationship advice you've ever received? - ANSWER: Don't put up with a jerky man for too long. You need to let go and find someone who is more worthwhile. Being unhappy with a man is about as unhappy as you can get. And I know because we've all been in a situation where we're crazy about someone who is treating us badly. If you're having trouble, break it off—see a shrink. A professional person can help you see your way out of it. 5) QUESTION: What do you think of an open marriage or relationship? - ANSWER: It doesn't work: When someone isn't faithful to you, it creates jealousy and insecurity. And if you're getting married, it means you're going to devote yourself to someone—that's the point. 6) QUESTION: Is it wrong that sleeping with married men turns me on? I had an affair with a married friend not long ago and it was hotter than hell. - ANSWER: It isn't wrong to be turned on by anybody—if that's how you feel, that's how you feel. You have to make up your own mind about what you're comfortable with. I don't think it's such a bad thing. I had friendships with men who were married. What's a bad girl? Having sex with lots of men you're not married to, doesn't make you a bad girl, just an experienced girl. 7) QUESTION: How often should I see a guy I'm dating during the week? I don't want to smother him. - ANSWER: It's different for each couple—you have to work at it. But if you like him a lot, see him. I assume if a guy feels smothered, he'll let you know. 8) QUESTION: I've come to the decision that my marriage is doomed and I want to end it. But I have no idea of how to break it to my husband. He'll be devastated. How should I do it? - ANSWER: You need to sit down with your husband and let him know that your relationship isn't that good and that you need to decide together what you should do. If you don't love or like your husband anymore, you can't stay in a bad relationship just because you feel guilty—you'll be too unhappy. You may need to go together to get some professional help—i.e. a marriage therapist—to help you through it. 9) QUESTION: Should I start a relationship with a guy at work? There is this guy at work that I have amazing chemistry with, but is it wrong to follow through on it? - ANSWER: You can have a serious relationship at work. I have done that, and I know many people who have done that successfully. Watch: Office Dating Rules You May Not Know 10) QUESTION: I'm 45 and my boyfriend is 21. We have a great relationship and we've been dating for over 8 months. Any advice on how I can get him to move in? - ANSWER: My personal opinion is that there is too much of a difference in your ages. I wouldn't recommend him moving in with you. I don't think it will end up working out well. You're a woman and he's a boy! 11) QUESTION: I'm 29, I'm sweet, caring and attractive. But why can't I find a nice guy who wants to become a family man? - ANSWER: You should be able to find one. But you may have to be a little pushy. If there's a guy you've seen who's a friend of a friend, you need to suggest that your friend fix you up by having a small dinner party so you can meet that man. That's what I did when I wanted to meet the man who is now my husband of almost 50 years. You may also have to call up a guy and be honest. Just say—I wanted to see if you wanted to have lunch one day. Give him a time and place and tell him that you think he SHOULD do it. 12) QUESTION: Can you be friends with benefits and not develop feelings for the guy? - ANSWER: Yes, I think that's possible for some women—we're all different—but I think it's hard to do because sex is so important, exciting and thrilling. Most women do get involved with a man they're having sex with and can't really maintain that type of relationship. Personally, I only had sex with men I cared deeply about. 13) QUESTION: What work advice would you give a woman who's just starting out today in this lousy economic environment? - ANSWER: Try to get a tolerable job at something you're good at—get in there and get paid to do it. You may not find the perfect job right now. But keep whatever job you have for as long as you can, for income and experience, while you look for something else. 14) QUESTION: Can you fall in love more than once? - anonymous ANSWER: You should have several relationships before you settle down. I started dating in junior high school. I personally believe that being in love with someone is so wonderful, you should do it more than once. You can fall out of love with people, too—you might as well have different experiences as you go along. I can tell you that I was in love when I was 16, and I'm in love now! 15) QUESTION: Why won't my wife tell me her fantasies? I have great sex fantasies and I'd like to be able to share them with her and have her tell me hers. But she says she doesn't have any. - ANSWER: You should keep encouraging her to be open with you. Tell her one or two of yours, and then maybe you can talk her into sharing one or two of hers. If she still refuses, you may need to encourage her to get professional help—I've found that has worked well. To learn more about Helen; her philosophy, her life and love experiences, try reading one of her books—like Having It All. Or pick up her bio, Bad Girls Go Everywhere, by Jennifer Scanlon. Follow Bonnie Fuller on Twitter: Image of Helen Gurley Brown at Woodbury College. Courtesy of: Helen Gurley Brown, Copyright Bad Girls Go Everywhere, Oxford University Press 2009. Must-see Videos Most Popular
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '69', 'language_id_whole_page_fasttext': "{'en': 0.9802663326263428}", 'metadata': "{'Content-Length': '97601', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EWJ6C4B5FGOOEBLR5VYMNEXVF2FCAMHG', 'WARC-Concurrent-To': '<urn:uuid:f3750403-fe3c-478e-87ae-b0b7010e11c0>', 'WARC-Date': datetime.datetime(2015, 3, 1, 11, 11), 'WARC-IP-Address': '66.230.130.232', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:6SOXAUHSPEX5BXTWRYYUCT2KSAZPYT3F', 'WARC-Record-ID': '<urn:uuid:2ae9b71a-c060-47db-94a3-52e30bad11c0>', 'WARC-Target-URI': 'http://www.yourtango.com/helen-gurley-brown-and-bonnie-fuller/page/3', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b71010b5-ddb5-4739-a570-9e4774d0b76b>', 'WARC-Truncated': None}", 'previous_word_count': '1898', 'url': 'http://www.yourtango.com/helen-gurley-brown-and-bonnie-fuller/page/3', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08522599935531616', 'original_id': '779e4bb407e7d9aa3818776efcb5b0975b57120b0e9fcde37be1e3c0fa7bf6b7'}
Grand Unified Theory United nature theory Theory of everything Static infinite Cosmos [Hyperunivers] Einstein Exist by continue endless Universes evolution. Infinite quanta, Universes-Hubbell born and dispersed [by Evolution] both right. Evolution infinite activity appears by continuum circular vicious of electro-magnetic forces, by phase transitions, of strings, quarks by quanta [gravitational waves] Tejman Chaim, Henry, Dr.  Jerusalem. Independed researches of United Nature-Wave theory    This paper is foot for though. United Nature-Wave theory –Tejman. The hyper universe is still wonder-mysterious-amazing for us, not border, no time, no space, void?   But void does not exist nothing is something and actually exist. United Nature –Wave theory claimed that every stabile creation must be quantum formation [two perpendicular forces], that means that all stabile Universe creations are stabile formations and according to A. Einstein idea that all quanta have the same behavior that means the huge Hyper Universe and the smallest quantum mechanics creations obey the same rules and behavior. General relativity theory is exactly quantum theory of everything, Einstein did that! But not imagined visually the quantum as appear in nature and United Nature theory by introduction two behavior [two force-semi bubbles and phase transition of every quantum formation [include living formations] explain the ingenious Einstein quanta equations as quanta really appears in nature. United Nature-Wave theory [Tejman] try explained the gravitational wave, quantum by NATURE observations together with all other scientific disciplines. Only NATURE explained alone this most “simple” creation that more ingenious and sophisticated can not be!  United nature theory is one of these theories that unify time, space and energy under a single media strong force created by strings, quarks. United Nature-Wave theory claimed that everything created by one Strong force, Composed by three sophisticated infinite constant active media Space, Energy and Time.   Waved together that create quantum formattion. . . According to wave theory, time, space, and energy, are the three media that are woven together, (quantum, wave formation). Wave theory shows how each has its own properties and behaviors, but one can not exist without the others,Theoretically, each of them has no beginning and no end, and they are all one entity but are changeable, depending on different phases of “energetic matter” in which they appear and decay together, They decays together to ??? And by different, unknown phase transitions of space fabrics, continues “energetic matter circulation in Hyperspace Universe quantum to appear by known to us phase transitions [circular vicious]. That all appears by stabile Hyperspace quanta rules [circular vicious].  A. Einstein call them Cosmic constant exactly as appear by quanta equations and by U.N.T. Every quantum is created by space [fabrics] which by space fabrics dismantling and disperse again to space [fabrics]. The dispersed space fabrics are allways equal, constant, in all phase transition. U.N.T calls the Cosmic constant as equilibrium of quanta space fabrics energetic force in all phase transition. This space one force creates second force that by phase transitions create everything. These two [one-see U.N.T.] perpendicular forces are the most ingenious creation of NATURE. This one pushing!!! force create second  force which only push to inside of quantum and sweep [pull] everything on way  U.N.T. explained that Cosmic constant was ingenious mathematically quantum theory. This force, electro-magnetic, keep strong quantum formation, where the pushing-“pulling” processes, constant, appears.  In the Hyper universe our universe is now of expanding and disperse phase, but all Hyper universe energy activity [space fabrics] remain constant. Our universe is only regional quantum and dispersion “space” fulfills immediately by these mystery space fabrics. The space fabrics create Hyper universe quanta”The Hyper universe regional spaces fabrics are constant active but its energetic matter capacity is always constant. In Hyper universe quantum the space fabrics are equal dispersed by equilibrium of quanta creations.  That is cosmological quantum constant  This paper may be subject to copy, but please cited the source. © Copyright:  Dr. Tejman Chaim, Henry.  April  2016 Theory of everything. http://www.grandunifiedtheory.org.il/ Wikipedia  http://avira.search.ask This paper was submit to journal NATURE
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8568490743637085}", 'metadata': "{'Content-Length': '15084', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XWKPBP3VSKPAEVQTF3ERUT3YLO3W7POE', 'WARC-Concurrent-To': '<urn:uuid:ae98719c-a041-4a17-98f4-867f77cd6ba3>', 'WARC-Date': datetime.datetime(2017, 4, 26, 6, 6, 44), 'WARC-IP-Address': '69.163.152.76', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:6N3SDT6OMWDPU7MXR7WNQEVGCDMFS7TR', 'WARC-Record-ID': '<urn:uuid:8fa31dd1-6eb3-4283-b40a-94b700651207>', 'WARC-Target-URI': 'http://www.grandunifiedtheory.org.il/Book12/staticuniverseeinstein.htm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6f271976-9082-427e-9bb6-edcfa4e3bef1>', 'WARC-Truncated': None}", 'previous_word_count': '620', 'url': 'http://www.grandunifiedtheory.org.il/Book12/staticuniverseeinstein.htm', 'warcinfo': 'robots: classic\r\nhostname: ip-10-145-167-34.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-17\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.40403759479522705', 'original_id': '173c27dc5f79a139abf7bf0137d7ee4818762d24555dbc001ede344211e8f193'}
Site Search The Truth About 9/11 Coming soon! Coming Soon Verse 9:29 Teaches Muslims to Make War on Christians Pin It Question/Criticism: Verse 9:29 in the Qur'an teaches Muslims to make war against Christians and others and have them paying a tax until they are subdued. The verse in the Qur'an regarding paying the Jizyah (tax) is as follows: 9.29. Fight those who believe not in God nor the Last Day, nor hold that forbidden which hath been forbidden by God and His Messenger, nor acknowledge the religion of Truth, (even if they are) of the People of the Book, until they pay the Jizya (TAX) with willing submission, and feel themselves subdued. This is where the Arabic and the historical context would help. But nevertheless let us examine this verse carefully just by using the English translation. The verse states directly to fight and it gives specific conditions on whom to fight. It tells Muslims that three conditions must be met in order to fight other people. It also states that these  people we are to fight do not forbid certain things by using the words, “nor hold that forbidden”. By stating “nor hold that forbidden” the Qur'an is referring to people who have the power to forbid; therefore it is talking about people in leadership. Let's look at the conditions specified in the verse carefully about who Muslims are supposed to fight. They are: (1). People who believe not in God and the last day AND (2), don't forbid what God and his messenger has forbidden AND (3), don't acknowledge the religion of truth. This applies even if they are Christians or Jews. Most Christians believe in God and the last day so they don't meet criteria (1). (2), don't forbid what God and his messenger has forbidden. The next question is to find out what is it that God forbids that these people who Muslims are to fight accept and find OK to do? You can check the Qur'an yourself but you would find that evil, wrong doing, murder, lies, rape, torture and all manner of wrongs against God and his creatures are forbidden. Changing the construct from a negative tense and viewing this from a positive tense, this is telling Muslims that they are to fight the leadership of people who are evil and who endorse evils. People who kill, steal, torture, conduct ethnic cleansing and perform all the evils that the Qur'an forbids and even if those people are among the Christians and the Jews. The Zionists are good examples. (3), don't acknowledge the religion of truth. I think if you read the Qur'an you would find that it refers to the oneness of the revelations from all Prophets from Abraham to Muhammad (peace be upon them). According to Islam all those prophets are of one brotherhood and they all taught the truth. So the religion of truth is not referring to what God revealed to Muhammad (saw) exclusively. It also refers to the truth of what other Prophets and messengers before him brought. So the truth of Jesus and Moses (peace be upon them) are also considered by Muslims to be the religion of truth. By the way Islam mentions that only some of the Prophets are named in the Qur'an. There are more than 125,000 that Islam states are not so named. In fact the Qur'an goes so far as to say ANY who believe in God and work righteousness will receive rewards from God as in the following verse: Those who believe (in the Qur’an) And those who follow the Jewish (Scriptures) And the Christians and the Sabians, - ANY who believe in G-d And the Last Day, And work righteousness, Shall have their reward With their Lord: on them Shall be no fear, nor shall they grieve. (2:62) So even by reading the English alone and carefully following what it is saying this is NOT a blanket order to go and fight non-Muslims. Instead it is an order to fight evil doers. By specifying “nor holds that forbidden”, the verse is addressing the leaders of evil doing. Simply put, it is telling Muslims to fight the leadership of people who are evil, commit murder, endorse ethnic cleansing, steal, torture, and all manner of sick and despicable acts condemned in the Qur’an that they refuse to forbid. These people could even be amongst the Christians and the Jews. We have a lot of good examples of people like that in history. On the Christian side we have Hitler, the Crusaders, the corrupt Popes and Christian leadership who instituted the Inquisition, KKK, the evil European conquerors and enslavers of Africans, Indians, Chinese, etc and I could go on and on. On the Jewish side we have the Zionists murderers, thieves and occupiers of Palestine, their leaders from Theodore Herzl to Benjamin Netanyahu, the ones who called for the murder of the noble Christ and every Prophet that God sent to them, Rabbi Kahane, Baruch Goldstein, the Jewish leaders of corruption in society including pornography, immoral influences spread through TV, movies, etc, Jewish Internationalist bankers putting a stranglehold on the economy of nations, Neocons responsible for pushing America into war to cause havoc, misery and death in the thousands for innocent Muslims around the world and I could go on and on. This is not addressing good Christians and other human beings that are not committing evil acts. It becomes even clearer when you take into consideration other verses of the Qur'an that refers to Christian and Jews and also to who Muslims should befriend and not befriend. Here are a few: "And there are, certainly, among the People of the Book, those who believe in God, in the revelation to you, and in the revelation to them, bowing in humility to God. They will not sell the Signs of God for a miserable gain! For them is a reward with their Lord, and God is swift in account." (3:199) "To those against whom war is made, permission is given (to fight), because they are wronged;--and verily God is Most Powerful For their aid;-- "And fight them on until there is no more Tumult or oppression, and there prevail justice and faith in God. But if they cease, Let there be no hostility except to those who practice oppression." (2:93) 85. Strongest among men in enmity to the Believers wilt thou find the Jews and Pagans;  And nearest among them in love to the Believers wilt thou find those who say, "We are Christians": Because amongst these are men devoted to learning and men who have renounced  the world, and they are not arrogant." Regarding the Jizya or tax that non-Muslims had to pay living under Muslim rule to enjoy the protections of a Muslim state, the enemies of Islam makes it sound like the jizya was some crippling tax that kept the dhimmis in the gutter. It was one dinar and one measure of wheat, taxed yearly. And it was not collected upon women, children, invalids, or the elderly. Even the most destitute could have afforded it. It was a tax collected because non-Muslim young men were not conscripted into the military like Muslim men were. But if non-Muslim young men volunteered to be conscripted, then they did not have to pay the jizya tax.  Rather than give you my words I want to quote the great Mathematician and Philosopher Bertrand Russell on this. Bertrand Russell (Eng. philosopher, mathematician, 1872-1970): "Reading History As It Is Never Written" [1959] So even according to Bertrand Russell this tax that non-Muslims had to pay was not an un-surmountable burden rather it served as an incitement for non-Muslims to become Muslims as a result of the fairness of Muslims in administering the tax. The other component with reading the Qur'an is knowing something about the life of Prophet Muhammad (saaw) and how he handled situations. That is also a great guide to help Muslims to know how to behave. A good example dealing with this subject is how Muhammad (saaw) behaved and treated the pagans when the pagans were defeated in Makkah. He allowed the pagans to live freely and treated them with fairness and kindness. If indeed he was following the misunderstanding of verse 9:29, as pushed by haters of Islam, he would have fought and killed the pagans. Instead he allowed them to live freely and after a period of time the whole Arabian Peninsula was converted to Islam as a result of the tolerant nature of Muslims following the example of Muhammad (saaw). Listen to an alternative radio station dedicated to exposing and broadcasting truths about Islam not heard on the mainstream media. +2 #11 Nashid 2011-04-11 09:32 Congratulations NWO for finally not mentioning David Duke in your post :-) . Now let's address the other delusions in your mind. No, Muslims do not worship the black stone nor is Islam originated from moon goddess worship or any of the fetishes you mentioned. We worship God and God only and these are verses of the Qur'an showing how the moon should be regarded: The Qur'an also states that the moon is subject to us as human beings: +2 #12 Nashid 2011-04-11 10:08 NWO your link, I took the time to go to it. I hope you are not afraid to go to the links that I suggest. A few things: 1. It is from Memri. They are the worst disinformation media about the Middle East and deliberate mistranslators of anything Islamic. 2. The Qur'an is very clear about what will happen to Christians who work righteousness. Instead of hellfire the Qur'an says: 3. Islam is against forcing religion on anyone. It teaches: "There is no compulsion in religion. The right direction is here forth distinct from error" Memri has lied again! +2 #13 Nashid 2011-04-11 10:14 @NWO, go to the following links on this website to learn something about Islamic tolerance and how we truthfully view world domination, democracy, etc. Stop using Memri's disinformation: I hope you will be brave as I was and check out these links. +2 #14 Nashid 2011-04-11 10:34 @Paul Muslims do not believe in the Trinity. We also don't believe in forcing Islam on others.The Qur'an says about Christians: "Strongest among men in enmity To the Believers wilt thou Find the Jews and Pagans; And nearest among them in love To the Believers wilt thou find those who say, “We are Christians”: Because amongst these are Men devoted to learning And men who have renounced The world, and they Are not arrogant." The Qur'an guarantees rewards from God for all who do right: Check this link for the attitude Islam has about Christians and war: +2 #15 Bilal 2012-02-20 00:26 NWO is a misinformed jerk that knows the truth but just won't accept it. Add comment Security code Related Articles Copyright � 2012 - ATT Media All Rights Reserved.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '612', 'language_id_whole_page_fasttext': "{'en': 0.9590153098106384}", 'metadata': "{'Content-Length': '73363', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KGRA35WX3NBH2QJ77RRAJG3HACC4Q5RF', 'WARC-Concurrent-To': '<urn:uuid:ff6d625b-6415-4b81-afe4-8efcdc389873>', 'WARC-Date': datetime.datetime(2021, 1, 21, 4, 50, 11), 'WARC-IP-Address': '23.229.136.224', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:GUQUDXUFDXGRQLFHYKCK4EPYLDK6JRK5', 'WARC-Record-ID': '<urn:uuid:8ff5c635-984c-4091-aab5-a54047e19636>', 'WARC-Target-URI': 'https://www.ascertainthetruth.com/att/index.php/al-islam/answering-the-critics/353-verse-929-teaches-muslims-to-make-war-on-christians', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c7d34d09-8382-47cb-9a7f-ad0dab89fe61>', 'WARC-Truncated': None}", 'previous_word_count': '2236', 'url': 'https://www.ascertainthetruth.com/att/index.php/al-islam/answering-the-critics/353-verse-929-teaches-muslims-to-make-war-on-christians', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-12.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.029839634895324707', 'original_id': 'b67c8f799d67c4f78810c32e1814f78504d13d3f567569ce6f98f1e1caa3d83f'}
VR Training Simulators Are Helping Law Enforcement Agencies Be More Efficient Police departments are turning to Apex Officer's training simulator to save time and resources. Law enforcement agencies are using virtual reality simulators to improve their efficiency when training. VR simulators allow officers to practice various scenarios in a safe and controlled environment, which can help them better understand how to handle real-life situations. Virtual reality training simulators allow officers to train in a safe environment and learn how to handle different scenarios. This is especially helpful for officers who are new to the job. The simulators also help officers learn how to deal with difficult people or situations. VR Training Simulators Help Law Enforcement Agencies Save Money Training law enforcement officers can be an expensive and time-consuming process. In the United States alone, the law enforcement agencies spend over $1 billion a year on training. Many of the costs boil down to travel and equipment, with agencies having to transport officers to training sites and equip them with relevant training tools. Police training has come a long way in recent years. Virtual reality (VR) training simulators are helping law enforcement agencies be more efficient and effective in their training. VR technology can provide a realistic experience that helps officers better prepare for real-life situations. Some VR training simulators allow officers to experience dangerous or life-threatening situations, such as a shootout or a car chase. This type of training can help officers learn how to react quickly and effectively in these types of situations. Other VR simulators allow officers to practice their skills in a safe environment, such as arrest techniques or crowd control. This type of simulator can help officers become more confident in their abilities and better prepared for real-world scenarios. The use of VR training simulators is becoming increasingly common among law enforcement agencies. VR Training Simulators Are Helping Law Enforcement Officers Prepare for the Unexpected Situations Police departments and law enforcement agencies across the country are increasingly using virtual reality (VR) training simulators to help law enforcement officers prepare for the unexpected. VR simulations can create realistic and dangerous scenarios that officers might encounter on the job, such as a hostage situation or a shootout. The use of VR technology can help officers better assess and react to difficult situations, improving their chances of success in real life. Although VR technology is still relatively new, it has already proven itself to be an invaluable tool for law enforcement training. Virtual Reality Simulators Provide Police Officers With An Immersive Training Experience Police departments are increasingly turning to virtual reality training simulators to provide more immersive training for officers. These systems can provide a wide range of scenarios, from routine traffic stops to high-pressure situations like hostage negotiations. Officers can also be placed in dangerous situations that would be too risky or impractical to recreate in the real world. Virtual reality training can also help officers develop better judgement and decision-making skills. The systems allow for trial and error, so officers can learn from their mistakes without putting anyone at risk. And since the simulations are realistic, officers can get a sense of what it's like to be in a particular situation before they have to face it for real. VR Simulators Save Police Departments Time When Training VR training simulators like Apex Officer are becoming a popular choice for law enforcement training. They offer a number of benefits that save departments time and resources. Apex Officer provides a safe environment for officers to train in. This is important, as officers need to be prepared for anything they may encounter on the job. In addition, VR training simulators allow departments to create custom scenarios that can be used for training purposes. This is beneficial, as it allows officers to practice in real-world situations that they may not have otherwise had the opportunity to do. They allow departments to train more officers at one time and do not require any additional equipment or facilities. Overall, VR simulators offer many advantages that make them an excellent choice for law enforcement training. How do virtual reality simulator save police departments time when training? Virtual reality simulators provide police departments with an efficient way to train officers in a variety of scenarios. The ability to immerse officers in realistic simulations allows them to gain experience and hone their skills without putting themselves or the public in danger. In addition, VR simulators can be used to train large groups of officers at once, which saves time and money coordinating all of the officer's training. In conclusion, it is evident that police departments are turning to Apex Officer's training simulator to save time and resources. This innovative technology provides a realistic and interactive experience that helps officers learn quickly and effectively. As a result, the simulator has been shown to improve officer safety and reduce liability. I encourage you to learn more about this valuable tool and how it can benefit your department. If you'd like to schedule a product demonstration you can do so by completing our Request a Demo form. If you'd like to speak to one of our procurement experts, you can get in contact with them today. About the Author John Carter Community and Engagement Manager Community and Engagement Manager at Apex Officer
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9487642645835876}", 'metadata': "{'Content-Length': '60956', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NZ3IQQ3ZDNIRTNFDURZ6ATNFSY3GHJLO', 'WARC-Concurrent-To': '<urn:uuid:f902d378-6175-4791-8552-feeb8b979171>', 'WARC-Date': datetime.datetime(2022, 12, 8, 8, 48, 53), 'WARC-IP-Address': '44.207.21.146', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:NK7UO7S4HX6WLFZ7TTRLIZ35UW6N6XN3', 'WARC-Record-ID': '<urn:uuid:a0e0d133-f76a-4e0b-9cba-134967f10c6f>', 'WARC-Target-URI': 'https://www.apexofficer.com/resources/vr-training-simulators-are-helping-law-enforcement-agencies-be-more-efficient', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:280a1aad-fd13-4a28-9d18-09e7a8c5821e>', 'WARC-Truncated': None}", 'previous_word_count': '879', 'url': 'https://www.apexofficer.com/resources/vr-training-simulators-are-helping-law-enforcement-agencies-be-more-efficient', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-71\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.06415462493896484', 'original_id': 'a83e70fc530976c9b8d6c1f33fc4152178fbb940fa5f5e30ccbe7e177b49633c'}
Earlier today, former Atlanta United left back Greg Garza posted a short and sweet farewell to the city of Atlanta. He was recently dealt to FC Cincinnati in exchange for $200,000 of General Allocation Money and $250,000 of Targeted Allocation Money. Although he is now with, FC Cincinnati, Garza made it clear in his parting message that he and his family will always have a soft spot in their hearts for the city of Atlanta, and the memories he made here, on and off the field. Garza thanked the city for embracing him and his family with open arms, and Atlanta can say the same of Greg. It was his first time playing stateside in many years, and he added to his family during his time in Atlanta. Despite missing chunks of the last two seasons with injuries, he was absolutely vital to the DNA of this team when healthy. Take care, Greg.
mini_pile
{'original_id': 'c098cea7f0a2bfb1b3b55e23a711a32a06ab46bf8ae207cc577fb432dd0eb575'}
Q: Can I use wait instead of sleep? I came across a question in which the poster tried to have a thread wait for a second. They were using wait, but outside a synchronized block, and therefore it crashed. Given a running thread, to pause the execution for a given time, one would do: Thread.sleep(1000); This should work as well, and have very similar result: synchronized(this) { this.wait(1000); } Using the wait timeout, the thread will unpause 1 second later. The question is this: if I don't have any monitoring and notifying issue, is there an actual reason to use one over the other? A: Both sleep() and wait() are used to put the current thread on hold, but they were designed for different use cases: sleep() is usually used when you know exactly how long you want your thread to be inactive. After the given timeout, it will wake up automatically, without interference from outside. There's still a chance that someone will decide to wake up your thread earlier if something urgent happens (in this case, the call to sleep() will end up with an InterruptedException). For instance, the user has decided to close the application when the thread was asleep, or something like this. So, sleep() is like setting an alarm clock to wake you up in an hour while going to doze. But someone can wake you up earlier to say that the building is on fire and it's better to get up and do something about it. wait(), on the other hand, is designed to put a thread on hold until something happens sometime in the future. You don't know how long it will take. There must be someone outside who will wake up the thread by calling notify() or notifyAll() on the monitor (on the same object that was used to call wait()). For instance, a thread has delegated some job to another thread and wants to sleep until the job is done. You also have an option to limit the waiting time, but the thread won't continue execution until it can reacquire the monitor. The waiting thread is still can be interrupted the same way as with the sleep(). So, wait() is like you have the only screwdriver in the workshop, lend it to your coworker for a while and decide to doze a bit until he or she has finished. You ask them to wake you up when your screwdriver is free again and you can continue your job. You can also set an alarm clock like in sleep(), but you won't be able to get back to work until you get your screwdriver back. Of course, those are just usual simple approaches to using the methods. You can devise your own usage scenarios based on their functionality.
mini_pile
{'original_id': '02dbc699b058c089133b78a287cbb6883e8d1d16336e451561cc5c93ee3c6f1f'}
Poison Ivy Coloring Page Free Printable Pages In Plant Science poison ivy coloring page free printable pages in plant science poison ivy coloring page free printable pages in plant science. plant coloring pictures colouring pages of rose printable for kids parts worksheet,plant coloring pages pdf what happens when you put food in a plants water hunker for preschoolers parts,tomato plant pictures coloring sheet for lovers live laugh cell key biology corner pages adults,plant cell coloring sheets pages pdf basil vase page download free structure worksheets,parts of a flower coloring page appealing easy pages plant for preschoolers free sheets colouring pictures,animal cell coloring page plant diagram sheet worksheet answers seed to sheets reproduction worksheets,plant colouring pages coloring worksheet answers cactus saguaro page,plant cell coloring worksheet answers sheet animal page pages answer key colouring pictures sheets,plant cycle coloring sheets colouring pages for preschoolers trees plants and flowers,plant coloring page pdf parts pages printable cell diagram sheet animal. coloring pages plants plant vs zombies sheets breadcrumbs . growing plant drawing at free for personal use cycle coloring sheets plants pages page parts of a . coloring sheet for plant lovers live laugh parts pages download succulent . what happens when you put food coloring in a plants water hunker plant parts sheets transpiration . poison ivy coloring page free printable pages in plant science . plant a seed coloring page twisty noodle cell pdf potted . animal pictures coloring pages convert to plant worksheet answers . plant life coloring pages print pdf . colouring pages of rose plant printable coloring for kids books garden cowboys . best of wall e coloring pages design printable sheet plant cell biology corner . arbor day tree coloring pages best for kids plant cell worksheet answer key . animal cell coloring diagram plant and draw worksheet pdf labeling page labeled sheet key color cells . animals and plants coloring page alliance plant vs zombie pictures thumbnail . printable rose coloring pages for kids plant colouring pictures roses . animal cell coloring page plant diagram sheet parts pages related post . plant coloring pages for preschoolers parts of a flower cell worksheet planting seeds printable sunflower fo . parts of a plant coloring page cell pages for kindergarten peanut piranha . animal cell coloring sheet plant cycle sheets . plant cell coloring pages membrane worksheet answer key parts of a sheet animal answers p . plants vs zombies coloring pages to print plant cell worksheet key zombie medium size of pag . cell coloring sheet animal page answers plant pages answer key vs zombies sheets cycle . cell diagram coloring sheet plant page animal biology corner . plant pictures for kids structure science titans cycle coloring sheets parts lesson study city pages . plant and animal cell worksheets vs zombies coloring sheets worksheet labeling page grade . Leave a Reply (*) Required, Your email will not be published
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.6818743348121643}", 'metadata': "{'Content-Length': '37988', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DZ64J5FBWBEVUXQ3ZOMVEUI7W6ZM2VMG', 'WARC-Concurrent-To': '<urn:uuid:7ae54701-2f09-4150-957e-615e8bf59133>', 'WARC-Date': datetime.datetime(2018, 10, 17, 1, 26, 32), 'WARC-IP-Address': '104.27.132.105', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4HXRZ7FKGH66FDQM2CEYW6UEJTLY2D7F', 'WARC-Record-ID': '<urn:uuid:7498b204-2891-49b5-9b2c-0dba042e3f8c>', 'WARC-Target-URI': 'http://wikipharm.info/plant-coloring/poison-ivy-coloring-page-free-printable-pages-in-plant-science/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b9d9648d-0f44-467c-9dc6-0dcd565a657f>', 'WARC-Truncated': None}", 'previous_word_count': '455', 'url': 'http://wikipharm.info/plant-coloring/poison-ivy-coloring-page-free-printable-pages-in-plant-science/', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-69-127-157.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.033570289611816406', 'original_id': '34347869e7c50c79cdd58fadbf5c1f2a3b0f93179a4e9cdd9d2234f36437b2cc'}
/ Christmas Ideas For Gifts For Improving Your General Health Family - ResearchMethodHCI Yes, it is a fact. People are claiming to be what they never is. IS it because everyone really wants to be another woman or light beer out create a fraud? I don't know. Some 'Social Media' started as a faiytale and is now a huge business, perhaps this 's Bret Michaels Tour 2019 Schedule no different completely it is often a scam. Will be sure? response is, you will be. If are generally wondering how this is possible, then the answer easy. Most likely, these people won Drake Concert Tickets from radio station contests. These types of radio stations usually give away free tickets to fortunate people having part of their on-air fights. You can win these contests by bringing in at correct times or by calling in and answering the DJs question properly. I concept what you're told the particular past but the above steps Blows All else Out With the Water when a presence on the world wide web and garnering Opt-ins. The first anniversary is actually definitely an exciting milestone in a couple's couples. Make a and out of it, and show husband or wife that you'll happily marry him or her finished again! Last-modified: 2019-03-28 (木) 18:06:30 (428d)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '201', 'language_id_whole_page_fasttext': "{'en': 0.9290562272071838}", 'metadata': "{'Content-Length': '12601', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:43NW2QWIBPC5NTBLQHHYOKTKQHCB5QNR', 'WARC-Concurrent-To': '<urn:uuid:faf7f398-3a37-41c7-9e5c-42a127b085ce>', 'WARC-Date': datetime.datetime(2020, 5, 29, 19, 1, 27), 'WARC-IP-Address': '13.114.124.245', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VA3GI55XCOJ7HOR4VOYPELNXT66EUYY3', 'WARC-Record-ID': '<urn:uuid:f43fd038-b720-415f-a6f8-3e92cb940c5e>', 'WARC-Target-URI': 'http://rm.wasede.jp/index.php?Christmas%20Ideas%20For%20Gifts%20For%20Improving%20Your%20General%20Health%20Family', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5ae167c9-c265-4653-8735-8a1e9811a789>', 'WARC-Truncated': None}", 'previous_word_count': '350', 'url': 'http://rm.wasede.jp/index.php?Christmas%20Ideas%20For%20Gifts%20For%20Improving%20Your%20General%20Health%20Family', 'warcinfo': 'isPartOf: CC-MAIN-2020-24\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-21.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.19584476947784424', 'original_id': 'bac716caa36a10a3e1f0cf3f1bb9ce10c687c8c2c668dcdd8e5948b1425134d1'}
Philippe’s 3 Rules of Software Craftsmanship Philippe Kahn is a technology innovator who’s main claim to fame is the founding of Borland Software. This business began with no venture capital and was worth over $500 million by the time Kahn left. Obviously, he knows a thing or two on building a successful software business. In his keynote address at the 2007 MEMS Executive Congress, Kahn outlined his three rules of software craftsmanship. Rule 1: “Start with a vision” This is the first step for success in any business or any other goal you are trying to achieve. You have to know what you want in order to be able to makes plans in attaining it. The vision does not have to be a business plan. Write down a paragraph on your software company’s goals and how you intend to solve your users needs with your application. Rule 2: “Throwing more bodies at software projects only makes things worse” Its been said that “too many cooks spoil the broth”. Many software companies hire programmers in third world countries because their salaries can be as low as $2/hr as opposed to hiring a local engineer for $25/hr. Is hiring twelve programmers better than hiring one? Not necessarily. Its better to hire one good engineer than 12 low cost mediocre ones. You should look at how much money an engineer can produce versus how much it costs to hire them. A local programmer will produce better code with fewer bugs than one from a third world country. Also, there won’t be a language barrier which can affect understanding and implementing software requirements. Rule 3: “There are three vectors that drive software craftsmanship: quality, schedule, and features. The challenge is that you only get to pick two” The reason why you can only pick two of these “vectors” is that each one requires a tremendous amount of resources to accomplish. I think the two that should be picked are quality and features. Software is almost always late because of these two things. “On budget, on time” comes at a penalty of diminished quality or features. Ultimately, the customer wants a product that works well and meets their needs, not a buggy application that was delivered on time. Leave a Reply
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '1', 'language_id_whole_page_fasttext': "{'en': 0.9664961695671082}", 'metadata': "{'Content-Length': '46034', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HNXECD6MUCYX732YNJO7UT62YAZAZEN4', 'WARC-Concurrent-To': '<urn:uuid:7dbfdc98-90be-4a57-b717-5049444a95c2>', 'WARC-Date': datetime.datetime(2021, 1, 23, 4, 6, 52), 'WARC-IP-Address': '74.208.236.153', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VIPFJVP2H5K6W3JZN66Z5SKBRGKM42MH', 'WARC-Record-ID': '<urn:uuid:998894d5-439a-4eae-a5b3-494df5c2f2cf>', 'WARC-Target-URI': 'http://www.cyprich.com/2008/05/31/philippes-3-rules-of-software-craftsmanship/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:601acdff-4ec4-4acf-9579-9bdbd6e10272>', 'WARC-Truncated': None}", 'previous_word_count': '379', 'url': 'http://www.cyprich.com/2008/05/31/philippes-3-rules-of-software-craftsmanship/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-52.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17572444677352905', 'original_id': 'af7babde72d0c66b89f854f81151b9f06ba02af468d188d9ab9c275578905df5'}
Friday, April 23, 2010 How Do The NFL Draftees Get Their Hats So Quickly? An interesting dilemma was posed to me by a couple of tweeters last night. How do players like Tim Tebow and Dez Bryant have draft parties at their house, yet STILL have the hat of the team that drafts them? Many specualted the NFL just sends a bucnh over, but according to NFL Spokesperson Brian McCarthy, that is not the case. "I really don't know (How they get the hats)," said McCarthy via email. "We don't have anything to do with players who are not with us in New York for the draft." So does anyone know how these hats show up at just the right time, and it just happens to be the official draft day hat of each team? Reebok PR has been contacted, so far no response. Eric - The Maine PC Doc said... It's all smoke and mirrors!!! mandb97 said... I got it. It's because nobody cares. CMSB Search
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '14', 'language_id_whole_page_fasttext': "{'en': 0.9602745175361632}", 'metadata': "{'Content-Length': '153027', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CCDKBZAENMN4DQPXQ6VTPY24MRCA2TRI', 'WARC-Concurrent-To': '<urn:uuid:85354bd7-c2b3-457f-9f43-495343ca8781>', 'WARC-Date': datetime.datetime(2017, 9, 19, 15, 21, 15), 'WARC-IP-Address': '216.58.217.83', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:V56HPFWSIWFBDRO7TZZK77RQCS7VVD2K', 'WARC-Record-ID': '<urn:uuid:70f1b717-93dd-47ba-b6e3-3f29db8e541d>', 'WARC-Target-URI': 'http://www.cmsbmedia.com/2010/04/how-do-nfl-draftees-get-their-hats-so.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cf95f5ef-6f28-4e32-acae-16f76ffad589>', 'WARC-Truncated': None}", 'previous_word_count': '190', 'url': 'http://www.cmsbmedia.com/2010/04/how-do-nfl-draftees-get-their-hats-so.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-182-87-105.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10343384742736816', 'original_id': '198e2a5f0b413f096a8786a9fc773337510296b3f8303db4fee381c7d9196235'}