text
stringlengths
3
7.38M
source_data
stringclasses
5 values
info
stringlengths
83
12.5k
Adler, Martin Adler, Martin Volove (Czechoslovakia), Sekeritze, Auschwitz, Bergen-Belsen, Buchenwald, Dora Adler was born in 1930 in Ruthenia, south of the Carpathian Mountains. He, his three siblings and his parents moved to Volove, Czechoslovakia, ten years after Adler’s birth. He characterizes Volove as a mostly Orthodox community with eminent anti-semitism. He attended both a Jewish school and a Russian public school, where he was victimized by name calling and stone throwing. As a consequence of such anti-semitism, the Jews kept to themselves. In 1939 the Hungarians invaded and annexed Volove. They began to impose restrictions upon the Jews by enacting laws forbidding Jews from owning stores and exempting tenants of Jewish landlords from paying rent. Hungarian also became a mandatory school subject. Even so, Adler notes, that anti-semitism in Hungary paled in comparison to how the Jews were mistreated in places like Poland until 1944. Consequently, an underground route stretching from Poland to Hungary developed. The Jews fleeing from Poland to Hungary told horrific stories of being forced to dig their own graves. Adler was unable to grasp the acceleration of events because he was too young. He was not privy to discussions concerning the worsening situation and his elders did not speak of the rampant anti-semitism in his company. Adler recalls that in 1939 Jews were mobilized and became part of the Czech army. As Adler reached his twelfth birthday his father was taken away and conscripted into the Russian army. In 1942 Adler’s father was released from the army and told stories of how hospitals were being burned down. At this point Adler went to study for two years. He returned in 1944 to chaos. The Germans had invaded and within a week the Hungarians had begun to round up the Jews. They were forced to relinquish all valuables and were subjected to body searches. Then they were deported to Sekeritze where they were forced to live in cramped conditions. In April 1944 Adler was again deported, this time to Auschwitz. He describes how he was forced to run to the train station and how many people started praying, sure that they were soon to die. The trip from Sekeritze to Auschwitz took two to three days by train. Each cattle care was given one pail of water. Upon arrival the Jews were informed that anyone found with gold or valuables would immediately be shot. Two lines were formed, and, unbeknownst to Adler at the time, the line that formed on the left (of which his mother and sister were a part) was composed of those “unfit for work” who were led to their deaths. Adler managed to convince Dr. Mengele that he was actually 16 instead of 14 while his father passed himself off as age 38 instead of 44. As Adler and his father had been selected for work, they progressed to the next stage which consisted of having their heads shaved and a shower that was alternatively scalding hot and freezing cold. After having been registered and assigned to barracks, they attempted to rest. Because the spaces between the planks in the bunks were so wide, Adler remembers that he and his father wedged a blanket between the planks to avoid being cut by the sharp edges. Adler describes the overwhelming role played by food and hunger. In Auschwitz-Birkenau one bowl of soup was divided among five people in which each person under the scrutiny of the others was allowed three meager gulps. Agonizing hunger led to the development of elaborate theories about when one should eat his insufficient portion of bread. Should one eat it all at once to ensure that the remaining half would not be stolen from him? Or should one save half for later in an attempt to subdue one’s pangs of hunger? The crust of the bread was the most valuable part, even if its actual size was smaller, because it could be kept better–one did not lose valuable crumbs from both sides. The precision of cutting bread involved filing down the end of a spoon. The cutter was then carefully observed to ensure that he did not cut a larger piece for himself. Adler also describes the emotional numbing he experienced in the camps. Day after day encounters of gruesome sights consisting of hangings, shootings, and corpses resulted in the atrophy of pity. He remembers one incident in Dora-Nordhausen in which the entire camp was forced to witness the group hanging of thirty to forty people. As he tells his story he expresses disbelief. “How did it happen?” Adler also tells of the Nazi strategy used to dehumanize the Jews. The kapos, inmate overseers who were prisoners themselves, often displayed great brutality. Adler saw one kapo beat a prisoner to death with a shovel because he had taken a second bowl of soup. From Dora-Nordhausen he was shipped to Bergen-Belsen where he remained until liberation. He spent a great deal of time traveling through chaotic Europe in search of those of his family who might have survived. He found no one, though, and eventually came to the United States. Still grappling with his experiences, he is most disturbed by those who contend that the Holocaust never occurred. Interview Information: Date: September 16, 1982 Interviewer: Sidney Bolkosky Format: Audio recording Date: March 8, 1985 Interviewer: Sidney Bolkosky Length: 1 hour, 10 minutes Format: Video recording Date: July 13, 1989 Format: Video recording
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9887515306472778}", 'metadata': "{'Content-Length': '46489', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CUXLIVZ4BGCXFQIEBKZJCR66WVNGT6PX', 'WARC-Concurrent-To': '<urn:uuid:836bae9a-faf6-4058-8476-95d897a14ac4>', 'WARC-Date': datetime.datetime(2021, 4, 12, 20, 8, 28), 'WARC-IP-Address': '40.84.33.106', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FGWWYZSOJPX3YPCAI2P76KUDMX3ZB4HR', 'WARC-Record-ID': '<urn:uuid:88b5424c-e937-446b-badb-98b030197002>', 'WARC-Target-URI': 'https://www.holocaustcenter.org/visit/library-archive/oral-history-department/index-summaries/adler-martin/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:57db6051-809f-49e4-b8e2-1c1b2ce042a7>', 'WARC-Truncated': None}", 'previous_word_count': '900', 'url': 'https://www.holocaustcenter.org/visit/library-archive/oral-history-department/index-summaries/adler-martin/', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-207.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17272871732711792', 'original_id': '5458f7311995c8b5d4f49fb3793dc8f2a70a480f4b736b8f17c1618c146cc0da'}
Last year, Tesla announced plans for a new battery swap technology that would give Model S owners the ability to replace their depleted battery with a fully charged one in less time than it takes to fill a gas tank. Tesla is now ready to launch a pilot version of that technology, and it’ll kick off in Harris Ranch, CA. Tesla, Tesla Model S, Tesla Supercharger network, Tesla battery swap, battery swap, electric motor, lithium-ion battery, green car, green transportation The battery swap pilot program is intended to test the technology and see how much demand there actually is for it. Tesla says that initially, the swap will only be available by appointment and “will cost slightly less than a full tank of gasoline for a premium sedan.” The battery swap will take about three minutes to complete, since more time is needed to remove the titanium and hardened aluminum ballistic plates that now shield the battery pack. Related: Tesla Unveils the D: An All-Wheel-Drive Model S Tesla predicts that in the future, the battery swap will take less than a minute as the program becomes more automated. During the pilot program, Tesla says that it will evaluate relative demand from customers for the paid battery pack swap, versus free charging via the Supercharger network. + Tesla Motors All images © Tesla Motors
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '15', 'language_id_whole_page_fasttext': "{'en': 0.9278294444084167}", 'metadata': "{'Content-Length': '137576', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:C6S62ZYTLMJCVMEX5PMZ7POCKQ7FEW6D', 'WARC-Concurrent-To': '<urn:uuid:d662d0ab-cca0-4fd1-9344-857680e9a7f9>', 'WARC-Date': datetime.datetime(2018, 11, 15, 2, 51, 9), 'WARC-IP-Address': '104.18.41.248', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:MLQRMDGTFDAUCUBLCDTVHGD42ST7AIKY', 'WARC-Record-ID': '<urn:uuid:9e212f7f-25a5-4fd9-9a1d-8eee61e9ccfd>', 'WARC-Target-URI': 'https://inhabitat.com/tesla-launches-battery-swap-program-that-only-needs-3-minutes-for-a-full-charge/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5cb25dad-07a6-46b7-bcdf-3f26927e2e3d>', 'WARC-Truncated': None}", 'previous_word_count': '220', 'url': 'https://inhabitat.com/tesla-launches-battery-swap-program-that-only-needs-3-minutes-for-a-full-charge/', 'warcinfo': 'isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-5-198-138.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03716254234313965', 'original_id': '32674e2558e5832d869a433eb0242d3785ea2911e33b0a8988f83d27ca2462b8'}
\section{Inclusion Mapping is Restriction of Identity} Tags: Inclusion Mappings, Mapping Theory, Identity Mappings \begin{theorem} Let $T$ be a set. Let $S \subseteq T$ be a subset of $T$. Let $i_S: S \to T$ be the inclusion mapping on $S$. Then $i_S$ is the restriction of the identity mapping $I_T: T \to T$ on $T$. \end{theorem} \begin{proof} By definition of inclusion mapping: :$i_S: S \to T: \forall x \in S: \map {i_S} x = x$ By definition of identity mapping: :$I_T: T \to T: \forall x \in T: \map {I_T} x = x$ The result follows by definition of restriction of mapping. {{qed}} \end{proof}
math_pile
{'subset': 'ProofWiki', 'meta': "{'type': 'Theorem_Proof'}", 'original_id': '3e742b9ae220c63ee11b0bf600e867ca8d864743654ceaff0fb93f6677f1615e'}
One thing at a time. This will be filled with something at a later time. A widget of some sort. IPOT bitchute channel --> IPOT1776 Greg Hunters' --> USA Watchdog Santa Surfing --> BeachBroadcast Dark Journalist --> Dark Journalist.com DJ YouTube Channel --> DJ YouTube Welcome to the first page of the CometGold Blog. As I witness the censorship and cancel culture out there I have had to ask myself "What can I do about it?" Over the past few days alone thousands of voices have been shown the door, so I decided to create a space to post a collection of information I have found useful to keeping my sanity during this time. While this is only one site with a very small following, for me this is prefereable to doing nothing at all. I am learing to write the code as I go in order to maintain a running knowledge of it. This is to avoid the 10 billion lines of code that is Wordpress, which is far too big a haystack to search for needles. Therefor, if you do come across a 'feature' while making use of this site, please remember that I am learning code as I write, so please just let it slide - unless you are willing to help. There's a lot more to it than you might think.. So without further adoo, here is a beginning salvo of videos pertinent to our current situation, and always remember, if you don't agree or don't like, you are welcome to leave. Jan 13, 2021 Jan 12, 2020 Gab, Rumble, Bitchute, YouTube, etc.. What an education in video embedding! Anyways, here's Santa Surfing... as excitable as ever. GESARA - Constitutional Everything! Here is her --> Rumble Channel and YouTube Channel (for as long as that lasts). Another from Simon. 12th January Update Whether you believe it or not (I'm on the fence) this is a general description of what it is supposedly all about. Trump speaks at the border wall in Texas. Get it HERE. Sort of a nothing-burger, some talk about the senate mob on Wednesday, but mostly words regarding the border wall. Also, a fantastic job by Veritas busting PBS. That jackass is now fired. They say the fish always rots from the head, so how much rot is left? Here is a favorite, IPOT1776, whom I like simiply for his tongue in cheek way of looking at our world. He's not always right, but he's always entertaining. Here is his bitchute channel --> IPOT1776 Here are a few from Simon Parkes and his bitchute channel --> Simon Parkes Simon Parkes Jan 11th - First Update Simon Parkes Jan 11th - Second Update Simon Parkes Jan 11th - Third Update Here, in case you forgot what winter used to be like... Note the date. It's really no different from today, given the amount of garbage we have to shovel through.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.943379819393158}", 'metadata': "{'Content-Length': '8754', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Z7WMMI43Y5R3FTDL2MKLSSCKYI6EEMQE', 'WARC-Concurrent-To': '<urn:uuid:7f99da19-1058-4d48-b24d-f7f185283827>', 'WARC-Date': datetime.datetime(2021, 4, 20, 22, 28, 47), 'WARC-IP-Address': '82.221.129.16', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BAOLGFBVP6QF7P7NB33G3YA6KNOKKMZL', 'WARC-Record-ID': '<urn:uuid:0b4a767d-42c8-4590-9a40-01597d720701>', 'WARC-Target-URI': 'http://blog.cometgold.com/2021/01/01_12.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:fc357eca-6144-4b91-8f8f-a7a0e1e2a35d>', 'WARC-Truncated': None}", 'previous_word_count': '479', 'url': 'http://blog.cometgold.com/2021/01/01_12.html', 'warcinfo': 'isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-55.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018153905868530273', 'original_id': 'd82871b89c9e6f7ba102ff199bd7b5e94249e6c4327cf160488ec1deec4bef61'}
--- abstract: 'Building on previous papers by Anantharaman-Delaroche we introduce and study the notion of AD-amenability for partial actions and Fell bundles over discrete groups. If the Fell bundle is AD-amenable, the full and reduced crossed products coincide. We prove that the cross-sectional C\*-algebra of the Fell bundle is nuclear if and only if the underlying unit fibre is nuclear and the Fell bundle is AD-amenable. If a partial action is globalisable, then it is AD-amenable if and only if its globalisation is AD-amenable. Moreover, we prove that AD-amenabity is invariant under (weak) equivalence of Fell bundles and show that AD-amenabity is equivalent to a weak form of the approximation property introduced by Exel. For Fell bundles whose unit fibre is (Morita equivalent to) a commutative C\*-algebra we prove that AD-amenability is equivalent to the approximation property.' author: - Fernando Abadie - Alcides Buss - Damián Ferraro title: Amenability and approximation properties for partial actions and Fell bundles --- Introduction ============ In her seminal paper [@Anantharaman-Delaroche:Systemes] Anantharaman-Delaroche introduced a notion of amenability (that we here call AD-amenability) for actions of discrete groups on C\*-algebras. Her definition is based on previous papers [@Anantharaman-Delaroche:ActionI; @Anantharaman-Delaroche:ActionII] where she studies amenability for group actions on W\*-algebras (i.e von Neumann algebras). More precisely, an action $\gamma$ of a discrete group $G$ on a W\*-algebra $N$ is said to be amenable in the sense of Anantharaman-Delaroche (or just W\*AD-amenable for short) if there exists a $G$-equivariant conditional expectation $P\colon \ell^\infty(G,N){\twoheadrightarrow}N$ with respect to the diagonal $G$-action $\tilde\gamma$ on $\ell^\infty(G,N)=\ell^\infty(G)\bar\otimes N$ where $G$ acts on $\ell^\infty(G)$ by (left) translations; the map $P$ should be interpreted as a $G$-invariant mean for the action. An action $\alpha$ of $G$ on a [C\*-]{}algebra $A$ is then said to be AD-amenable if the induced action $\alpha''$ on the enveloping (bidual) W\*-algebra $A''$ is W\*AD-amenable. One of the main results in [@Anantharaman-Delaroche:Systemes] (namely Theorem 3.3) shows that an invariant mean $P\colon \ell^\infty(G,N)\to N$ can be always approximated with respect to the pointwise weak\* (i.e. ultraweak) topology by using certain nets of functions from $G$ to $Z(N)$. One precise form of such approximation that will be specially important to us in this paper is given by a net of functions of finite support $\{a_i\colon G\to Z(N)\}_{i\in I}$ which is bounded when viewed as a net of the Hilbert $N$-module $\ell^2(G,N)$ and satisfies $$\label{eq:def-W*AD-amenable} {\langlea_i\!\mid\!\tilde\gamma_g(a_i)\rangle}_2=\sum_{h\in G}a_i(h)^*\gamma_g(a_i(g^{-1}h))\to 1$$ with respect to the weak\*-topology for all $g\in G$. This condition indeed characterises amenability and shows, among other things, that $\gamma$ is W\*AD-amenable if and only if so is its restriction to the centre $Z(N)$. Moreover, W\*AD-amenability behaves well with respect to injectivity of W\*-algebras and nuclearity of C\*-algebras: if $N$ is injective then $\gamma$ is W\*AD-amenable if and only if the W\*-crossed product $N\bar\rtimes_\gamma G$ is injective. And similarly, if $A$ is a nuclear C\*-algebra, then the (reduced) C\*-crossed product $A\rtimes_{\alpha,{\mathrm{r}}}G$ is nuclear if and only if $\alpha$ is AD-amenable. Notice that the AD-amenability of an action on a C\*-algebra $A$ requires (and is equivalent to) the existence of a net as above with values in $Z(A'')$. While this is a huge commutative algebra in general, finding explicitly such an approximate invariant mean might be a very difficult task – if not impossible. Hoping for more concrete realisations of such approximate means one might wonder whether it is not always possible to find a net with values in $Z(A)$ or at least in $Z{\mathcal{M}}(A)$ (the central multiplier algebra). This is indeed possible for commutative $A$ (by [@Anantharaman-Delaroche:Systemes]\*[Theorem 4.9]{}) and hence more generally for $A$ admitting (nondegenerate) $G$-equivariant [$^*$-]{}homomorphism ${{C}_0}(X)\to Z{\mathcal{M}}(A)$ for some amenable $G$-space $X$. Unfortunately this is not possible in general: striking recent results by Suzuki in [@MR3589332] show that every exact group admits an AD-amenable action on a unital simple nuclear C\*-algebra $A$ (and one can even choose such algebra for which the crossed product is in the same class). For such an $A$ we have $Z(A)=Z{\mathcal{M}}(A)={\mathbb{C}}\cdot 1$ so that the existence of an approximate mean as above with values in $Z(A)$ forces $G$ to be amenable. On the other hand, dropping the commutativity completely and asking only for a net $\{a_i\}_{i\in I}\subset \ell^2(G,N)$ satisfying  is also not a good idea because then one adds undesirable actions. For instance the adjoint action $\gamma={\textup{Ad}}_\lambda$ of the left regular representation on $N={\mathcal{L}}(\ell^2G)={\mathcal{K}}(\ell^2G)''$ has this weaker property because $\ell^\infty(G){\hookrightarrow}{\mathcal{L}}(\ell^2G)$ equivariantly. But this action is AD-amenable only if $G$ is amenable. Fortunately there is an alternative out of this: we only need to change  slightly, requiring instead the existence of a bounded net of finitely supported functions $\{a_i\}_{i\in I}\subset \ell^2(G,N)$ satisfying $$\label{eq:def-W*AD-amenable1} {\langlea_i\!\mid\!b\tilde\gamma_g(a_i)\rangle}_2=\sum_{h\in G}a_i(h)^*b\gamma_g(a_i(g^{-1}h))\to b$$ for the weak\*-topology for all $g\in G$ and $b\in N$. It turns out that this is equivalent to the W\*AD-amenability of $\gamma$ (and hence to the existence of a central net satisfying ). Moreover, we prove that if $A$ is a weak\*-dense $G$-invariant C\*-subalgebra of $N$, then the above condition (hence the W\*AD-amenability of $N$) is equivalent to the existence of a bounded net of finitely supported functions $\{a_i\}_{i\in I}\subset \ell^2(G,A)$ satisfying . In particular an action $\alpha$ on a C\*-algebra $A$ is AD-amenable if and only if there exists a bounded net $\{a_i\}_{i\in I}\subset \ell^2(G,A)$ of functions with finite supports satisfying $$\label{eq:def-W*AD-amenable2} {\langlea_i\!\mid\!b\tilde\alpha_g(a_i)\rangle}_2=\sum_{h\in G}a_i(h)^*b\alpha_g(a_i(g^{-1}h))\to b$$ with respect to the weak topology on $A$ for all $g\in G$ and $b\in A$. This now brings us to a close connection with the *approximation property* (AP) as defined by Exel in [@Exel:Amenability] for Fell bundles over discrete groups. If ${\mathcal{B}}_\alpha=A\times G$ is the semidirect-product Fell bundle over $G$ associated with $\alpha$, then the AP for ${\mathcal{B}}_\alpha$ is equivalent to the existence of a bounded net of finitely supported functions $\{a_i\}_{i\in I}\subset \ell^2(G,A)$ satisfying exactly the same condition  except that the weak convergence is replaced by the convergence with respect to the norm on $A$. In particular the AP of an action (in the sense that its associated Fell bundle has the AP) always implies its AD-amenability. It seems that this simple fact has not been recognised before except for the case of actions on nuclear [C\*-]{}algebras, where ones uses the fact that the AP implies nuclearity of the crossed product and that this is equivalent to AD-amenability, see for instance [@ExelNg:ApproximationProperty]\*[Corollary 4.5]{}. Since the AP makes sense for general Fell bundles (in particular for partial actions) and since it is so close to the AD-amenability of actions, it is a natural task trying to extend the notion of AD-amenability also to Fell bundles. This is one of our main goals in this paper. It is indeed not difficult to give a possible definition of AD-amenability for a general Fell bundle ${\mathcal{B}}$. One can use for instance the C\*-algebra of kernels ${\mathbb{k}}({\mathcal{B}})$ of ${\mathcal{B}}$. This carries a canonical global action whose associated Fell bundle is (weakly) equivalent to ${\mathcal{B}}$, see [@Abadie-Buss-Ferraro:Morita_Fell]. One can then say that ${\mathcal{B}}$ is AD-amenable if the action on ${\mathbb{k}}({\mathcal{B}})$ is AD-amenable. Of course, in practice one does not want to go to an equivalent Fell bundle in order to check its AD-amenability. In order to have a direct description of AD-amenability for Fell bundles we proceed as in the case of ordinary actions ‘transporting’ everything to a von Neumann algebraic context. For this we introduce the notion of W\*-Fell bundles and prove that every Fell bundle ${\mathcal{B}}$ has an enveloping W\*-Fell bundle ${\mathcal{B}}''$; indeed, the fibres $B''_t$ of ${\mathcal{B}}''$ are just the bidual Banach spaces of the original fibres $B_t$ of ${\mathcal{B}}$. We then define a W\*-version of the approximation property of Exel: we say that a W\*-Fell bundle ${\mathcal{M}}=(M_t)_{t\in G}$ has the W\*AP if there is a bounded net $\{a_i\}_{i\in I}\subset \ell^2(G,M_e)$ of finitely supported functions satisfying an approximation condition very similar ; it is indeed the same condition as in the original definition of Exel in [@Exel:Amenability] except that we replace the convergence in norm by the weak\*-convergence, see our Definition \[def:WAP for W-Fell bundles\] for details. We then say that a (C\*-algebraic) Fell bundle ${\mathcal{B}}$ has the WAP if ${\mathcal{B}}''$ has the W\*AP. Our main results show that all these notions behave nicely and have the expected properties. We prove that the W\*AP of ${\mathcal{M}}$ is equivalent to its W\*AD-amenability in the sense that the canonical action on its W\*-algebra of kernels ${\mathbb{k}}_{{{\operatorname{w}^*}}}({\mathcal{M}})$ (a certain W\*-completion of its C\*-algebra of kernels) is W\*AD-amenable. Moreover, we prove that the WAP of a Fell bundle ${\mathcal{B}}$ is equivalent to a weak form of Exel’s approximation property – the only difference, again, is with respect to the convergence: for the WAP we have weak convergence while for the AP we have norm convergence. This weak form of the AP is still enough to prove some of the main desirable properties: for instance, we prove the coincidence of full and reduced cross-sectional C\*-algebras $C^*({\mathcal{B}})=C^*_{\mathrm{r}}({\mathcal{B}})$ whenever ${\mathcal{B}}$ has the WAP. The advantage of the WAP is that it corresponds exactly to nuclearity of cross-sectional C\*-algebras for Fell bundles with nuclear unit fibre: we prove that $C^*_{\mathrm{r}}({\mathcal{B}})$ is nuclear if and only if ${\mathcal{B}}_e$ is nuclear and ${\mathcal{B}}$ has the WAP. This equivalence is unclear for the AP of Exel. Indeed, we know that the AP always implies the WAP but the converse is not clear in general. In particular it is unclear whether the nuclearity of $C^*_{\mathrm{r}}({\mathcal{B}})$ implies the AP of ${\mathcal{B}}$. This is an open question already raised by Exel. Our methods and results can be viewed as a partial answer to this question. The only remaining question is then to see whether the weak convergence appearing in the WAP can be always replaced by norm convergence, hence showing that the WAP and the AP are equivalent. We prove that this is indeed true for a huge class of Fell bundles, namely all Fell bundles whose unit fibres are C\*-algebras Morita equivalent to a commutative C\*-algebra. In particular this applies to the important case of partial actions on commutative C\*-algebras and shows that a partial crossed product ${{C}_0}(X)\rtimes_{\mathrm{r}}G$ is nuclear if and only if the underlying partial action has the AP. The structure of the paper is organised as follows. In Section \[sec:partial-actions-vN\] we introduce and study the notion of partial actions of groups on W\*-algebras. It seems this has not been studied before, but it will be important to us here as it opens a canonical general link between the C\*- and W\*-theory of partial actions. In particular we show that every partial action $\alpha$ on a C\*-algebra $A$ extends to a canonical enveloping W\*-partial action $\alpha''$ on $A''$. One of the main results of this section states that every W\*-partial action admits an enveloping W\*-global action. This in particular allows us to canonically extend Anantharaman-Delaroche’s notion of amenability to partial actions on C\*- and W\*-algebras. This is done in Section \[sec:ADA-partial\]. We give some basic examples and prove that amenability in this sense behaves well with respect to taking restrictions and enveloping actions. In Section \[sec:Morita-ADA-partial\] we prove that AD-amenability is invariant under equivalences of partial actions, both for C\*- and W\*-algebras. In Section \[sec:ADA-Fell-bundles\] we start to extend the theory of AD-amenability to Fell bundles. We introduce the notion of W\*-Fell bundles and prove that every Fell bundle admits a canonical enveloping W\*-Fell bundle. We also introduce the W\*-algebra of kernels in this section. This algebra always carries a global W\*-action and allows us to extend AD-amenability to W\*-Fell bundles and hence also to C\*-algebraic Fell bundles by taking W\*-envelopings. In Section \[sec:AP-ADA\] we study Exel’s approximation property and translate it to the context of W\*-Fell bundles. We prove that this new notion, the W\*AP, gives an alternative description of the W\*AD-amenability. We also define the WAP for C\*-algebraic Fell bundles and give alternative characterisations, proving that it is equivalent to AD-amenability and to a weak form of Exel’s AP. Moreover, in the final part of Section \[sec:AP-ADA\] we show that the WAP behaves well with respect to (weak) equivalences of Fell bundles. In Section \[sec:Cross-sec-WAP\] we give some elementary properties for AD-amenability and the approximation property. In particular we prove that the WAP is enough to conclude $C^*({\mathcal{B}})=C^*_{\mathrm{r}}({\mathcal{B}})$ and that nuclearity of this algebra is equivalent to the WAP in case ${\mathcal{B}}_e$ is already nuclear. We also prove an analogous property for W\*-Fell bundles using injectivity in place of nuclearity. Finally, we add an appendix at the end of the paper where we review some basic theory of Hilbert W\*-modules and W\*-equivalences. This makes the paper more self-contained – with the disadvantage of making it longer – and probably easier to follow to people not used to these aspects of von Neumann algebra theory. In principle all the stuff added in our appendix is already known, at least to specialists from the W\*-community. But it is probably not very common to people working with C\*-algebras and it is certainly not easy to grasp all things we need from the literature. We shall only consider discrete groups in this paper although probably many of the things we do here also extend to locally compact groups. The approximation property of Fell bundles has been extended to locally compact groups by Exel and Ng in [@ExelNg:ApproximationProperty]. The notions of equivalences of Fell bundles are also available to locally compact groups [@Abadie-Ferraro:Equivalence_of_Fell_Bundles; @Abadie-Buss-Ferraro:Morita_Fell]. On the other hand, the theory of amenable actions of locally compact groups on C\*-algebras has not been touched yet. Anantharaman-Delaroche only defines it for discrete groups in [@Anantharaman-Delaroche:Systemes] although she actually considers locally compact groups when acting on von Neumann algebras [@Anantharaman-Delaroche:ActionI; @Anantharaman-Delaroche:ActionII]. Partial actions on von Neumann algebras {#sec:partial-actions-vN} ======================================= A lot is already known about partial actions of groups on [C\*-]{}algebras but it seems that partial actions on [W\*-]{}algebras (i.e. von Neumann algebras) have never been studied. Probably the main reason is that every [W\*-]{}algebra is unital, so that every partial action in this setting automatically has an enveloping action, that is, they are always restrictions of a global action on a [W\*-]{}algebra (see Proposition \[pro:enveloping-vn-partial\]). This means that [W\*-]{}partial actions are not as interesting as their [C\*-]{}companions. However, starting with a partial action $\alpha$ on a [C\*-]{}algebra $A$, its bidual $A''$ von Neumann algebra carries a natural partial action $\alpha''$ that will serve as one of our main tools in this paper. This is the reason why we develop the basic theory of partial actions on von Neumann algebras here. We start by recalling some basic facts about partial actions and their globalisations. \[def:set theoretic partial action\] A partial action of a group $G$ on a set $X$ is a family of functions $\sigma=\{\sigma_t\colon X_{t^{-1}}\to X_t\}_{t\in G}$ such that: (i) For every $t\in G$, $X_t$ is a subset of $X$. (ii) $X_e=X$ and $\alpha_e$ is the identity of $X$. (iii) Given $s,t\in G$ and $x\in X_{t^{-1}}$ such that $\sigma_t(x)\in X_{s^{-1}}$, it follows that $x\in X_{(st)^{-1}}$ and $\sigma_{st}(x)=\sigma_s(\sigma_t(x))$. An action is just a partial action $\sigma$ such that $X_t=X$ for every $t\in G$. In this case we also say that $\sigma$ is a global action. Given two partial actions $\sigma$ and $\tau$ of $G$ on sets $X$ and $Y$ respectively, a morphism $f\colon \sigma\to \tau $ is a function $f\colon X\to Y$ such that $f(X_t){\subseteq}Y_t$ and $f(\sigma_t(x))=\tau_t(f(x))$ for all $t\in G$ and $x\in X_{t^{-1}}$. The composition of morphisms is just the composition of functions. The restriction of $\sigma$ to a subset $Y{\subseteq}X$ is $\sigma|_Y:=\{ \sigma|_{Y,t}\colon Y_{t^{-1}}\to Y_t \}$, where $Y_t:=Y\cap \sigma_t(X_{t^{-1}}\cap Y)$ and $\sigma|_{Y,t}(y)=\sigma_t(y)$. It follows that $\sigma|_Y$ is a partial action of $G$ on the set $Y$ and, if $Z{\subseteq}Y$, then $\sigma|_Y|_Z=\sigma|_Z$. When a partial action $\tau$ can be expressed as a restriction $\tau=\sigma|_Y$ of a global action $\sigma$, we say that $\tau$ is globalisable, and that $\sigma$ is a globalisation of $\tau$. In this article we work with discrete groups exclusively, so here “group” actually means “discrete group”. A partial action $\sigma$ of a group $G$ on a $C^*$-algebra $A$ is a partial action of $G$ on the set $A$ for which each $A_t$ is a closed two-sided ideal of $A$, and each $\sigma_t:A_{t^{-1}}\to A_t$ is an isomorphism of $C^*$-algebras. If $\beta$ is a global action of $G$ on a $C^*$-algebra $B$ and $A$ is a closed two-sided ideal of $B$, then the restriction $\alpha:=\beta|_A$ is a partial action on the $C^*$-algebra. We then say that $\beta$ is a globalisation of $\alpha$, and that $\alpha$ is globalisable. A *[W\*-]{}partial action* of a group $G$ on a [W\*-]{}algebra $M$ is a set theoretic partial action of $G$ on $M$, $\gamma {\mathrel{\vcentcolon=}}\{\gamma_t\colon M_{t^{-1}}\to M_t \}_{t\in G}$, where each $M_t$ is a [W\*-]{}ideal of $M$ (possibly $\{0\}$) and each $\gamma_t$ is a [W\*-]{}isomorphism. A morphism of [W\*-]{}partial actions is just a morphism of set theoretic partial actions which is also a morphism of [W\*-]{}algebras (a ${{\operatorname{w}^*}}$-continuous morphism of \*-algebras). Here we always view [W\*-]{}algebras as Banach space duals, $M\cong (M_*)'$, endowed with the ${{\operatorname{w}^*}}$-topology. A [W\*-]{}ideal is then just a [$^*$-]{}ideal of $M$ that is closed for the ${{\operatorname{w}^*}}$-topology. And a [W\*-]{}isomorphism between two [W\*-]{}algebras is a [$^*$-]{}isomorphism that is ${{\operatorname{w}^*}}$-continuous. Actually, every [$^*$-]{}isomorphism between [W\*-]{}algebras is normal (preserves suprema of increasing bounded nets) and it is therefore automatically a [W\*-]{}isomorphism, see [@MR2188261]\*[Proposition III.2.2.2]{}. As in the case of actions on sets or on C\*-algebras, we have suitable notions of restriction and globalisation of partial actions in the category of $W^*$-algebras: \[exa:restriction\] Given an ordinary (global) [W\*-]{}action $\gamma$ of $G$ on a [W\*-]{}algebra $N$ and a [W\*-]{}ideal $M\unlhd N$, the restriction $\gamma|_M$ is a [W\*-]{}partial action. When a given [W\*-]{}partial action $\alpha$ on a [W\*-]{}algebra $M$ can be written as $\alpha:=\gamma|_M$, where $\gamma$ is a global [W\*-]{}action on a [W\*-]{}algebra that contains $M$ as a [W\*-]{}ideal, then we say that $\alpha$ is globalisable, and that $\gamma$ is a globalisation of $\alpha$. More generally, the restriction of a [W\*-]{}partial action to a [W\*-]{}ideal is again a [W\*-]{}partial action. We will see below in Proposition \[pro:enveloping-vn-partial\] that, unlike the case of partial actions on $C^*$-algebras, any [W\*-]{}partial action has a globalisation, the so called [W\*-]{}enveloping action, which is essentially unique when a certain natural minimality condition is required to hold. Given a [C\*-]{}partial action $\alpha=\{\alpha_t\colon A_{t^{-1}}\to A_t\}_{t\in G}$ of $G$ on a [C\*-]{}algebra $A$, the double dual (enveloping) [W\*-]{}algebra $A''$ of $A$ carries a canonical [W\*-]{}partial action $\alpha'':=\{\alpha_t''\colon A_{t^{-1}}''\to A_t''\}_{t\in G}$ which is the unique [W\*-]{}partial action such that $\alpha''|_A=\alpha$. Here we view the bidual algebra $A_t''$ as a [W\*-]{}ideal of $A''$ and $\alpha_t''$ as the unique ${{\operatorname{w}^*}}$-continuous extension of $\alpha_t$. One of our goals is to show that every [W\*-]{}partial action is (isomorphic to) a restriction of a global [W\*-]{}action as in Example \[exa:restriction\], that is, every [W\*-]{}partial action will automatically have an enveloping action. One may think that this is trivial since every von Neumann algebra has a unit, so that all the ideals of a partial action are unital (possibly zero). It is well known from the [C\*-]{}algebra theory of partial actions that in this situation the partial action has an enveloping action in the [C\*-]{}algebra category (see for instance [@MR3795739]). However the following example shows that the [C\*-]{}enveloping action might be not a [W\*-]{}algebra. \[exa:’trivial’-partial-action\] Consider the “trivial” partial action of $G$ on the [W\*-]{}algebra $M{\mathrel{\vcentcolon=}}{\mathbb{C}}$ in which all the ideals are zero except for $M_e{\mathrel{\vcentcolon=}}M$. This can also be viewed as the restriction of the global action of $G$ by (left) translations on the [C\*-]{}algebra ${{C}_0}(G)$ to the ideal ${\mathbb{C}}\cong {\mathbb{C}}\delta_e{\subseteq}{{C}_0}(G)$. Moreover, since the linear orbit of this ideal is dense in the entire algebra ${{C}_0}(G)$, this action is (up to isomorphism) the enveloping action of the original partial action on ${\mathbb{C}}$. But if $G$ is infinite, ${{C}_0}(G)$ is not a [W\*-]{}algebra. On the other hand, we may also view ${\mathbb{C}}\cong {\mathbb{C}}\delta_e$ as a [W\*-]{}ideal of the [W\*-]{}algebra $\ell^\infty(G)$. And since the linear orbit of this ideal is ${{\operatorname{w}^*}}$-dense, this is a [W\*-]{}enveloping action in the following sense. A [W\*-]{}enveloping action of a [W\*-]{}partial action $\gamma$ of a group $G$ on a [W\*-]{}algebra $M$ is a [W\*-]{}global action $\sigma$ of $G$ on a [W\*-]{}algebra $N$ together with a [W\*-]{}ideal $\tilde{M}$ of $N$ and an isomorphism of [W\*-]{}partial actions $\iota\colon \gamma \to \sigma|_{\tilde{M}}$, such that the linear $\sigma$-orbit of $\tilde{M}$ is ${{\operatorname{w}^*}}$-dense in $N$. We summarise this situation by saying that $(N,\sigma)$ is a [W\*-]{}enveloping action of $(M,\gamma)$. Note that a [W\*-]{}enveloping action of $(M,\gamma)$ is essentially a minimal [W\*-]{}globalisation of $\gamma$ (see Example \[exa:restriction\]). The reader should not confuse the [W\*-]{}enveloping actions we defined above with the enveloping actions or the Morita enveloping actions defined in [@Abadie:Enveloping]. \[pro:enveloping-vn-partial\] Every [W\*-]{}partial action $\gamma$ of $G$ on a [W\*-]{}algebra $M$ has a [W\*-]{}enveloping action that is unique up to isomorphism. We define $\iota\colon M\to \ell^\infty(G,M)$ by $\iota(x)(t){\mathrel{\vcentcolon=}}\gamma_{t^{-1}}(x\cdot 1_t)$, where $1_t$ denotes the unit of the [W\*-]{}algebra $M_t$ ($1_t=0$ if $M_t=\{0\}$). This unit is a central projection of $M$ because $M_t$ is a [W\*-]{}ideal of $M$. The map $\iota$ is an injective ${{\operatorname{w}^*}}$-continuous [$^*$-]{}homomorphism whose image consists of functions $f\in \ell^\infty(G,M)$ with $f(t)=\gamma_{t^{-1}}(f(e)1_t)$. The image $\tilde M{\mathrel{\vcentcolon=}}\iota(M)$ is a ${{\operatorname{w}^*}}$-closed [W\*-]{}subalgebra of $\ell^\infty(G,M)$ which is therefore isomorphic to $M$ via $\iota$. We now endow $\ell^\infty(G,M)$ with the $G$-action $\tau$ by left translations: $\tau_t(f)(s){\mathrel{\vcentcolon=}}f(t^{-1}s)$. This is a [W\*-]{}global action and $\iota\colon \gamma\to \tau$ is a morphism. Let $N$ be the ${{\operatorname{w}^*}}$-closure of the linear $\tau$-orbit of $\tilde M$, that is, the ${{\operatorname{w}^*}}$-closure of $\operatorname{span}\{\tau_t(f): f\in \tilde M,\ t\in G\}$. Moreover, $N$ is $\tau$-invariant, so that $\tau$ restricts to a [W\*-]{}global action $\sigma$ of $G$ on $N$ and this is the desired [W\*-]{}enveloping action of $(M,\gamma),$ as we now show. It is important to note that it follows from Definition \[def:set theoretic partial action\] that $\gamma_t(1_{t^{-1}}1_s)=1_t1_{ts}$ for all $s,t\in G,$ because $1_{t^{-1}}1_s$ and $1_t1_{ts}$ are the units of $M_{t^{-1}}\cap M_s = M_{t^{-1}} M_s$ and $M_{t^{-1}}\cap M_s=M_{t^{-1}}M_s,$ respectively. This implies $\iota\colon \gamma\to \sigma$ is a morphism because, for all $s,t\in G$ and $x\in M_t$: $$\tau_t(\iota(x))(s)=\gamma_{s^{-1}t}(x1_{t^{-1}s})=\gamma_{s^{-1}}(\gamma_t(x1_{t^{-1}}1_{t^{-1}s}))=\gamma_{s^{-1}}(\gamma_t(x)1_{s})=\iota(\gamma_t(x))(s).$$ In order to prove that $\tilde M$ is a [W\*-]{}ideal of $N$ and that $\iota\colon \gamma\to \sigma|_{\tilde M}$ is an isomorphism it suffices to show that $\tau_t(\tilde M)\cap \tilde M = \iota(M_t),$ for all $t\in G.$ For all $x,y\in M:$ $$\begin{aligned} [\tau_t(\iota(a))\iota(b)](s) & = \gamma_{s^{-1}t}(a1_{t^{-1}s})\gamma_{s^{-1}}(b1_s) = \gamma_{s^{-1}t}(a1_{t^{-1}s})1_{s^{-1}t}1_{s^{-1}}\gamma_{s^{-1}}(b1_s)\\ & = \gamma_{s^{-1}t}(a1_{t^{-1}s})\gamma_{s^{-1}t}(1_{t^{-1}s}1_{t})\gamma_{s^{-1}}(b1_s) \\ & = \gamma_{s^{-1}t}(a1_{t^{-1}s}1_{t^{-1}})\gamma_{s^{-1}}(b1_s) = \gamma_{s^{-1}}(\gamma_t(a1_{t^{-1}})b1_{s^{-1}})\\ & = \iota(\gamma_t(a1_{t^{-1}})b)(s).\end{aligned}$$ We then conclude that $\tau_t(\tilde M)\cap \tilde M = \tau_t(\tilde M)\tilde M\subset \iota(M_t)\subset \tau_t(\tilde M)\cap \tilde M,$ where the last inclusion follows from the fact that $\iota\colon \gamma\to \sigma$ is a morphism. At this point we know $(N,\sigma)$ is a [W\*-]{}enveloping action for $(M,\gamma).$ For uniqueness, assume that $M$ is a [W\*-]{}ideal of a [W\*-]{}algebra $\tilde N$ carrying a [W\*-]{}global action $\tilde\sigma$ whose restriction to $M$ is $\gamma$ and such that the linear $\tilde\sigma$-orbit of $M$ is ${{\operatorname{w}^*}}$-dense in $\tilde N$ (for simplicity, we omit the inclusion map $M{\hookrightarrow}\tilde N$ here, that is, we already assume $M{\subseteq}\tilde N$). Then we extend $\iota$ to $\tilde\iota\colon \tilde N\to \ell^\infty(G,M)$ by $\tilde\iota(x)(t){\mathrel{\vcentcolon=}}\tilde\sigma_{t^{-1}}(x)1_e$. First we show that $\tilde \iota$ is in fact an extension of $\iota$. For $x\in M$: $$\tilde\iota(x)(t) = \tilde\sigma_{t^{-1}}(x)1_e=\tilde\sigma_{t^{-1}}(x)1_{t^{-1}}=\tilde\sigma_{t^{-1}}(x1_t)=\sigma_{t^{-1}}(x1_t) = \iota(x)(t)$$ because $\tilde\sigma_{t^{-1}}(x)1_e\in \tilde\sigma_{t^{-1}}(M)M=M1_t$. A similar computation shows that $\tilde\iota$ is equivariant. Observe that $\tilde\iota$ is injective (hence isometric) because, if $\tilde\iota(x)=0$, then $x\tilde\sigma_t(1_e)=0$ for all $t\in G$. This is equivalent to $xy=0$ for all $y$ in the linear $\tilde\sigma$-orbit of $M$, which is ${{\operatorname{w}^*}}$-dense in $\tilde N$ by assumption. Since $\tilde \iota$ is an isometry and it is ${{\operatorname{w}^*}}$-continuous in $\{x\in \tilde N\colon \|x\|\leq 1\}$, its range is ${{\operatorname{w}^*}}$-closed (hence a [W\*-]{}subalgebra) and it is a [W\*-]{}isomorphism over its image. Finally, $\tilde\iota(\tilde N)$ is the ${{\operatorname{w}^*}}$-closure of the linear span of $\tilde\iota(M)=\iota(M)$. Thus $\tilde\iota(\tilde N)=N$ and $\tilde\sigma$ is isomorphic, as a [W\*-]{}partial action, to $\sigma$. \[pro:center-enveloping\] Let $\gamma=\{\gamma_t\colon M_{t^{-1}}\to M_t\}_{t\in G}$ be a [W\*-]{}partial action of $G$ on a [W\*-]{}algebra $M$ and let $(N,\sigma)$ be its enveloping [W\*-]{}action. Then the restriction $\gamma|_{Z(M)}=\{\gamma_t\colon Z(M_{t^{-1}})\to Z(M_t)\}$ of $\gamma$ to $Z(M)$ is a [W\*-]{}partial action whose enveloping [W\*-]{}action is the restriction of $\sigma$ to $Z(N)$. First notice that $Z(M_t)$ is indeed a [W\*-]{}ideal of $Z(M)$. In fact, if $M_t=1_tM$, where $1_t\in Z(M)$ is the central projection of $M$ representing the unit of $M_t$, then $Z(M_t)=1_tZ(M)$. It is then clear that the restriction of $\gamma$ to $Z(M)$ defines a [W\*-]{}partial action. For the same reason, viewing $M$ as a [W\*-]{}ideal of $N$, $M$ is then the ideal generated by the central projection $p=1_e$, and then $Z(M)=pZ(N)$ is the [W\*-]{}ideal of $Z(N)$ generated by the same projection. The restriction $\sigma|_{Z(N)}$ is clearly $\sigma|_{Z(N)}|_{Z(M)}= \sigma|_{Z(M)} = \sigma|_M|_{Z(M)} =\gamma|_{Z(M)}$. To see that $\sigma|_{Z(N)}$ is the enveloping action of $\gamma|_{Z(M)}$ it remains to show that the linear $\sigma$-orbit of $Z(M)$ is ${{\operatorname{w}^*}}$-dense in $Z(N)$. For each finite subset $F{\subseteq}G$, we define $M_F:=\sum_{t\in F} \sigma_t(M)$. This is a [W\*-]{}ideal of $N$ (being a finite sum of such) and the union of all these ideals is the linear $\sigma$-orbit of $M$, so it is ${{\operatorname{w}^*}}$-dense in $N$ since $(N,\sigma)$ is the enveloping action of $(M,\gamma)$. On the other hand the linear $\sigma$-orbit of $Z(M)$ is the ${{\operatorname{w}^*}}$-closure $P$ of the ideal $\cup_{F}Z(M)_F$, where $Z(M)_F=\sum_{t\in F}\sigma_t(Z(M))$. Note that $P$ is a [W\*-]{}ideal of $Z(N)$. To see that $P=Z(N)$ it is enough to show that the unit of $N$ is contained in $P$. For this notice that the unit $1_F$ of $M_F$ is a (finite) linear combination of $1_t$, and this is also the unit of $Z(M)_F$. The net $(1_F)_F$ is increasing and bounded and its ${{\operatorname{w}^*}}$-limit is the unit of $N$ because $\cup_F M_F$ is ${{\operatorname{w}^*}}$-dense in $N$. However this limit is also the unit of $P$. \[rem:abelian-injective\] If $(N,\sigma)$ is a [W\*-]{}enveloping action of $(M,\gamma)$, then $N$ is abelian if and only if $M$ is abelian. Indeed, clearly $M$ is abelian if $N$ is. For the converse observe that, by the proof of the Proposition \[pro:enveloping-vn-partial\], $N$ is isomorphic to a [W\*-]{}subalgebra of the abelian algebra $\ell^\infty(G,M)$. Another property that is preserved by taking enveloping actions is injectivity in the sense that if $N$ is the [W\*-]{}enveloping action of $M$, then $M$ is injective if and only if $N$ is injective. Indeed, since injectivity passes to ideals, the reverse direction is clear. For the converse one uses that injectivity passes to (finite) sums and directed unions of ideals and the description of $N$ as the ${{\operatorname{w}^*}}$-closure of $\cup_F M_F$ as in the proof of the previous proposition. Amenability of partial actions {#sec:ADA-partial} ============================== First let us recall the notion of amenability for (global) actions of groups on [C\*-]{}algebras and [W\*-]{}algebras introduced by Anantharaman-Delaroche, see [@Anantharaman-Delaroche:Systemes; @Anantharaman-Delaroche:ActionI; @Anantharaman-Delaroche:ActionII]. A (global) action of a group $G$ on a [W\*-]{}algebra $M$ is *Anantharaman-Delaroche amenable* (or just *W\*AD-amenable for short*) if there exists a linear positive contractive and $G$-equivariant map $P\colon\ell^\infty(G,M){\twoheadrightarrow}M$ whose composition with the canonical embedding (by constant functions) $M{\hookrightarrow}\ell^\infty(G,M)$ is the identity map $M\to M$. Here $\ell^\infty(G,M)$ is endowed with the diagonal $G$-action: $\tilde{\gamma}_t(f)(r)=\gamma_t(f(t^{-1}r))$, where $\gamma$ denotes the $G$-action on $M$. An action $\alpha$ of $G$ on a [C\*-]{}algebra $A$ is *AD-amenable* if the corresponding double dual [W\*-]{}action $\alpha''$ on $A''$ is W\*AD-amenable. Let us recall some basic examples of amenable actions. \[exa:traslation action\] The translation $G$-action on itself, viewed as a $G$-action on the [C\*-]{}algebra ${{C}_0}(G),$ is always AD-amenable (this action is even proper). By definition, this means that the translation action on ${{C}_0}(G)''\cong\ell^\infty(G)$ is always W\*AD-amenable as a [W\*-]{}action. However the translation action on $\ell^\infty(G)$ is AD-amenable as a [C\*-]{}action if and only if $G$ is exact, see [@Brown-Ozawa:Approximations]\*[Theorem 5.1.7]{}. More generally, if $M$ is a $G$-[W\*-]{}algebra, the $G$-[W\*-]{}algebra $\ell^\infty(G,M)$ endowed with the diagonal $G$-action is always W\*AD-amenable because we have a canonical $G$-equivariant unital embedding $\ell^\infty(G){\hookrightarrow}Z\ell^\infty(G,M)=\ell^\infty(G,Z(M))$ (see [@Anantharaman-Delaroche:ActionII]\*[Corollary 3.8]{}). As before, here $\ell^\infty(G)$ carries the translation $G$-action. Before we proceed, let us highlight some of the most important characterisations of AD-amenability obtained by Anantharaman-Delaroche in her papers [@Anantharaman-Delaroche:Systemes; @Anantharaman-Delaroche:ActionI; @Anantharaman-Delaroche:ActionII]. \[the:ADA-characterisations\] The following are equivalent for a global action $\gamma$ of a group $G$ on a [W\*-]{}algebra $M$: (i) $\gamma$ is W\*AD-amenable; (ii) the restriction of $\gamma$ to the center $Z(M)$ is W\*AD-amenable, that is, there is a $G$-equivariant norm-one projection $\ell^\infty(G,Z(M)){\twoheadrightarrow}Z(M)$; (iii) there is a net $\{a_i\colon G\to Z(M)\}_{i\in I}$ of finitely supported functions with ${\langlea_i\!\mid\!a_i\rangle}_2{\mathrel{\vcentcolon=}}\sum_{g\in G}a_i(g)^*a_i(g)\leq 1$ for all $i$ and ${\langlea_i\!\mid\!\tilde\gamma_g(a_i)\rangle}_2\to 1$ ultraweakly for all $g\in G$. Moreover, if $M$ is injective as a [W\*-]{}algebra, then the above are also equivalent to 1. the [W\*-]{}crossed product $M\bar\rtimes G$ is an injective [W\*-]{}algebra. If $\alpha$ is an AD-amenable action of $G$ on a [C\*-]{}algebra $A$, then the full and reduced [C\*-]{}crossed products coincide, that is, $A\rtimes_{\alpha}G=A\rtimes_{\alpha,{\mathrm{r}}}G$. And if $A$ is nuclear, then $\alpha$ is AD-amenable if and only if $A\rtimes_{\alpha,{\mathrm{r}}} G$ is a nuclear [C\*-]{}algebra. Let us also remark that for an action on a commutative [C\*-]{}algebra $A={{C}_0}(X)$, its AD-amenability is equivalent to amenability of the associated transformation groupoid $X\rtimes G$ in the sense of Anantharaman-Delaroche and Renault, see [@Renault_AnantharamanDelaroche:Amenable_groupoids]. Moreover, the AD-amenability in this case is equivalent to the existence of a net $\{a_i\colon G\to Z(A)=A\}_{i\in I}$ with the same properties as in (iii) above, except that the ultraweak convergence in (iii) can be strengthened to the convergence with respect to the strict topology on $A{\subseteq}M(A)$ (the multiplier algebra), see [@Anantharaman-Delaroche:Systemes]\*[Théoréme 4.9]{}. This cannot be expected – and indeed it is not true – for noncommutative algebras because simple unital [C\*-]{}algebras can carry AD-amenable actions of non-amenable groups, see Remark \[rem:Suzuki\]. We are now ready to introduce the notion of amenability for partial actions on [C\*-]{}algebras and [W\*-]{}algebras: We say that a partial action of a group $G$ on a [W\*-]{}algebra $M$ is *W\*AD-amenable* if its enveloping [W\*-]{}action (provided by Proposition \[pro:enveloping-vn-partial\]) is W\*AD-amenable. We say that a partial action of $G$ on a [C\*-]{}algebra $A$ is *AD-amenable* if the induced [W\*-]{}partial action on $A''$ is W\*AD-amenable. Of course, a global action is AD-amenable if and only if it is AD-amenable as a partial action. Before we give some proper examples of amenable partial actions, we observe the following general fact: \[prop:AD-amenable-center\] A [W\*-]{}partial action $(M,\gamma)$ is W\*AD-amenable if and only if its restriction to the center $Z(M)$ is W\*AD-amenable. This follows directly from the definition, Proposition \[pro:center-enveloping\] and Theorem \[the:ADA-characterisations\]. \[rem:Suzuki\] The above result does not hold for partial actions on [C\*-]{}algebras, not even for global actions. Indeed, the results of Suzuki in [@MR3589332] show that every exact group admits an AD-amenable action on a unital simple (and nuclear) [C\*-]{}algebra. Such an algebra has trivial center and a trivial global action can only be AD-amenable if the group is amenable. \[exa:trivial-partial\] The “trivial” partial action of $G$ on $A={\mathbb{C}}$ appearing in Example \[exa:’trivial’-partial-action\] is AD-amenable, both in [C\*-]{} and [W\*-]{}sense. This is because $A=A''$ has as its enveloping [W\*-]{}action the global translation $G$-action on $\ell^\infty(G)$ as explained in Example \[exa:’trivial’-partial-action\], and this [W\*-]{}action is W\*AD-amenable. In the same way, we can consider the partial action on a [W\*-]{}algebra $M$ as in Example \[exa:’trivial’-partial-action\] with all domain ideals $M_g=0$ except for $M_e=M$. This partial action is always W\*AD-amenable because its enveloping [W\*-]{}action is the translation action on $\ell^\infty(G,M)$, which is [W\*-]{}amenable by Example \[exa:traslation action\]. For the same reason, any [C\*-]{}algebra $A$ endowed with the “trivial” partial action (in which all the domain ideals are $A_g=0$ except for $A_e=A$) is always AD-amenable because then $A''$ carries the “trivial” partial $G$-action which is W\*AD-amenable. More generally, the following holds: take an amenable subgroup $H{\subseteq}G$ acting (globally) on a [C\*-]{}algebra $A$ (or on a [W\*-]{}algebra $M$) and “extend” this to a partial $G$-action on $A$ “by zero” in the sense that $A_h=A$ for $h\in H$, $A_g=0$ for $g\in G\backslash H$ and $\alpha_g\colon A_{g^{-1}}\to A_g$ acts via the original $H$-action for $g\in H$ and by zero otherwise. This partial action (which is global only if $H=G$) is always AD-amenable. Indeed, the canonical action of $G$ on $\ell^\infty(G/H)$, $\nu_t(f)(sH)=f(t^{-1}sH)$, plays an important role here. This [W\*-]{}action is W\*AD-amenable if (and only if) $H$ is amenable. Indeed, $\ell^\infty(G/H)={{C}_0}(G/H)''$ and the crossed product ${{C}_0}(G/H)\rtimes_{\mathrm{r}}G$ is Morita equivalent to $C^*_{\mathrm{r}}(H)$ by Green’s imprimitivity theorem. To see that the partial action of $G$ defined above is AD-amenable, it is enough to consider the von Neumann algebraic situation. For this, let us write $\gamma$ for the action of $H$ on a [W\*-]{}algebra $M$ and name $\bar\gamma$ its extension to $G$. To prove amenability of this partial $G$-action, we give an explicit description of its [W\*-]{}enveloping action. Consider the [W\*-]{}subalgebra of $\ell^\infty(G,M)$ $$N:=\{f\in \ell^\infty(G,M)\colon f(s)=\gamma_{s^{-1}t}(f(t))\mbox{ if }sH=tH \}.$$ This subalgebra is invariant under the action $\tau$ of $G$ on $\ell^\infty(G,M)$ given by $\tau_t(f)(s)=f(t^{-1}s)$. We name $\delta$ the restriction of $\tau$ to $N$. In order to view $M$ as a [W\*-]{}ideal of $N$ in such a way that $\delta$ is the [W\*-]{}globalisation of $\bar\gamma$, we consider the map $\iota\colon M\to N$ given by $$\iota(a)(s)=\begin{cases} \gamma_{s^{-1}}(a) \mbox{ if }s\in H\\ 0 \mbox{ if }s\notin H. \end{cases}$$ Note that in case $M={\mathbb{C}}$, we have $N=\ell^\infty(G/H)$ and $\tau=\nu$. In any case, we may view $\ell^\infty(G/H)$ as a unital $\delta$-invariant subalgebra of $Z(N)$ by considering the inclusion $\kappa\colon \ell^\infty(G/H)\to N$, $\kappa(f)(t)=f(tH)$. Moreover, the restriction of $\delta$ to $\ell^\infty(G/H)$ is $\nu$, from which it follows that $\delta$ is W\*AD-amenable, hence so is $\bar\gamma$. If $(M,\gamma)$ is an AD-amenable partial [W\*-]{}action of $G$ and $H{\subseteq}G$ is any subgroup, then the restriction of the partial $G$-action on $M$ to $H$, namely, $\gamma|_H=\{\gamma_h\colon M_{h^{-1}}\to M_h\}_{h\in H}$ is also AD-amenable. A similar assertion holds for [C\*-]{}partial actions. Indeed, it is clearly enough to check this for [W\*-]{}partial actions. This is known to hold for global [W\*-]{}actions (it follows trivially from (iii) in Theorem \[the:ADA-characterisations\]). Now for a general [W\*-]{}partial action $(M,\gamma)$ of $G$, take its globalisation [W\*-]{}action $(N,\sigma)$. For simplicity we identify $M$ as a [W\*-]{}ideal of $N$. Let $H\cdot M=\sum_{t\in H}\sigma_t(M)$ be the $H$-linear orbit of $M$ in $N$. Notice that this is an ideal of $N$ and its ${{\operatorname{w}^*}}$-closure $N_H:=\overline{H\cdot M}^{{{\operatorname{w}^*}}}$ is an $H$-invariant [W\*-]{}ideal of $N$ which can be viewed as an $H$-globalisation of $\gamma|_H$. If $(M,\gamma)$ is W\*AD-amenable, then by definition $(N,\sigma)$ is W\*AD-amenable, and then so is $(N,\sigma|_H)$ and hence also every $H$-invariant [W\*-]{}ideal, like $(N_H,\sigma|_H)$. Therefore $(M,\gamma|_H)$ is W\*AD-amenable. Next we look at restrictions of partial actions to ideals and prove that amenability behaves nicely also in this direction. \[prop:restriction of AD amenable are amenable\] The restriction of a W\*AD-amenable [W\*-]{}partial action of a group to a [W\*-]{}ideal is again W\*AD-amenable. Moreover, the analogous statement holds for AD-amenability on C\*-algebras, that is, AD-amenability is also preserved by restrictions. First we deal with [W\*-]{}partial actions. Let $\gamma$ be a W\*AD-amenable [W\*-]{}partial action of the group $G$ on $M$ and let $J$ be a [W\*-]{}ideal of $M$. We know that $M$ can be viewed as a [W\*-]{}ideal of a [W\*-]{}algebra $N$ carrying a W\*AD-amenable [W\*-]{}global action $\sigma$ of $G$ with $\sigma|_M=\gamma$. Then $J$ is a [W\*-]{}ideal of $N$ and the ${{\operatorname{w}^*}}$-closure of $\sum_{t\in G}\sigma_t(J)$, denoted by $[J]$, is a $\sigma$-invariant [W\*-]{}ideal of $N$. Moreover, $\sigma|_{[J]}$ is the [W\*-]{}enveloping action of $\gamma|_J$ because $\sigma|_{[J]}|_J=\sigma|_J=\sigma|_M|_J=\gamma|_J$ and it is also W\*AD-amenable because it is a restriction of a global W\*AD-amenable [W\*-]{}action to a $G$-invariant [W\*-]{}ideal. Now let $\beta$ be an AD-amenable [C\*-]{}partial action of $G$ on $B$ and let $A$ be a [C\*-]{}ideal of $B$. Then we may view $A''$ as the ${{\operatorname{w}^*}}$-closure of $A$ in $B''$. Note that $(\beta|_A)''$ is the unique [W\*-]{}partial action of $G$ on $A''$ extending $\beta|_A$. But $\beta''|_{A''}$ is a [W\*-]{}partial action such that $\beta''|_{A''}|_A = \beta''|_A = \beta''|_B|_A=\beta|_A$. Thus $\beta''|_{A''}=(\beta|_A)''$. By the previous paragraph, $\beta|_A$ is AD-amenable if $\beta$ is. \[prop:enveloping action of AD amenable is AD amenable\] Let $\beta$ be a [C\*-]{}global action of a group $G$ on $B$ and let $A$ be a [C\*-]{}ideal of $B$ such that the norm closure of $\sum_{t\in G}\beta_t(A)$ is $B$. In other words, $\beta$ is the [C\*-]{}enveloping action of $\alpha:=\beta|_A$. Then $\beta''$ is the [W\*-]{}enveloping action of $\alpha''$ and $\alpha$ is AD-amenable if and only if $\beta$ is AD-amenable. We view $A''$ as the ${{\operatorname{w}^*}}$-closure of $A$ in $B''$, thus $A''$ is a [W\*-]{}ideal of $B''$. In the proof of Proposition \[prop:restriction of AD amenable are amenable\] we showed that $\beta''|_{A''}=\alpha''$. Thus, to show that $\beta''$ is a [W\*-]{}enveloping action of $\alpha''$, it suffices to prove that $B''$ is the ${{\operatorname{w}^*}}$-closure of $J_0:=\sum_{t\in G}\beta_t''(A'');$ let us write $J$ for this closure. Note that $\sum_{t\in G}\beta_t(A){\subseteq}J_0{\subseteq}J$ and, taking norm closure, this implies $B{\subseteq}J$. Now taking ${{\operatorname{w}^*}}$-closure we get $J=B''$. The rest of the proof follows directly from the definition of AD-amenability for partial actions. Morita equivalence of partial actions {#sec:Morita-ADA-partial} ===================================== Many [C\*-]{}partial actions do not admit a [C\*-]{}enveloping action, but every [C\*-]{}partial action has a Morita enveloping action, as defined in [@Abadie:Enveloping], which is unique up to Morita equivalence of actions. It is therefore important to see how amenability behaves in terms of Morita equivalences. Equivalences of partial actions are defined in [@Abadie:Enveloping]. We shortly recall the definition: two partial actions $\alpha=\{\alpha_t\colon A_{t^{-1}}\to A_t\}$ and $\beta=\{\beta_t\colon B_{t^{-1}}\to B_t\}$ of $G$ on [C\*-]{}algebras $A$ and $B$ are equivalent if there exist an equivalence Hilbert $A$-$B$-bimodule $X$ carrying a (set theoretic) partial action $\gamma=\{\gamma_t\colon X_{t^{-1}}\to X_t\}$ of $G$ by linear maps on $X$ such that $X_t{\subseteq}X$ are Hilbert $A$-$B$-submodules implementing an equivalence between the domain ideals $A_t$ and $B_t$, that is, the images of $X_t$ by the left and right inner products are contained and generate $A_t$ and $B_t$ as [C\*-]{}algebras, and the usual compatibility between the actions holds: ${\langle\gamma_t(x)\!\mid\!\gamma_t(y)\rangle}_B=\beta_t({\langlex\!\mid\!y\rangle}_B)$ and $_A{\langle\gamma_t(x)\!\mid\!\gamma_t(y)\rangle}=\alpha_t(_A{\langlex\!\mid\!y\rangle})$ for all $x,y\in X_{t^{-1}}$. Using [W\*-]{}equivalence bimodules (see the Appendix) one defines equivalences between [W\*-]{}partial actions in a similar way. Both notions of equivalences can be conveniently described in terms of linking algebras: given an equivalence bimodule $X$ as above, one considers its linking [C\*-]{}algebra $L$. This carries a partial action of $G$ where the domain ideal $L_t$ is (isomorphic to) the linking algebra of $X_t$. If $X$ is an equivalence between [W\*-]{}partial actions, then $L$ is a [W\*-]{}algebra carrying a [W\*-]{}action encoding the [W\*-]{}equivalence. \[pro:Morita=same-center\] Let $\mu$ and $\nu$ be W\*-Morita equivalent W\*-partial actions of a group $G$ on the algebras $M$ and $N$, respectively. Then the restrictions $\sigma:=\mu|_{Z(M)}$ and $\tau:=\nu|_{Z(N)}$ are isomorphic (as W\*-partial actions). Let $X$ be a W\*-Morita equivalence bimodule between $M$ and $N$ equipped with a W\*-partial action $\gamma$ of $G$ inducing $\mu$ and $\nu$. More precisely: - $\gamma = (\{X_t\}_{t\in G},\{\gamma_t\}_{t\in G})$ is a set theoretic partial action on W\*-ideals by linear isometries. - For every $t\in G$, $M_t$ ($N_t$, respectively) is the ${{\operatorname{w}^*}}$-closure of the space spanned by ${}_M\langle X_t,X_t\rangle$ ($\langle X_t,X_t\rangle_N$, respectively). - For every $t\in G$ and $x,y\in X_{t^{-1}}$, ${}_M\langle \gamma_t(x),\gamma_t(y)\rangle = \mu_t({}_M\langle x,y\rangle)$ and $\langle \gamma_t(x),\gamma_t(y)\rangle_{N} = \nu_t(\langle x,y\rangle_N)$ The conditions above imply that, for all $t\in G$, $x\in X_{t^{-1}}$ and $a\in M_{t^{-1}}$, $\gamma_t(ax)=\mu_t(a)\gamma_t(x)$. The same holds for $\gamma$ and $\nu$. Proposition \[prop:isomorphic centres\] yields a unique [W\*-]{}isomorphism $\pi\colon Z(N)\to Z(M)$ such that $xa=\pi(a)x$ for all $a\in Z(N)$ and $x\in X$. To finish the proof we check that the isomorphism $\pi\colon Z(N)\to Z(M)$ above intertwines the partial actions $\sigma$ and $\tau$. First of all, if $p_t$ and $q_t$ are the units of $M_t$ and $N_t$ (respectively), then for all $x\in X$: $p_tx = (p_tx)q_t=p_t(xq_t)=xq_t$. Hence $\pi(q_t)=p_t$ and $\pi(Z(N)_t)=Z(M)_t$. Now fix $t\in G$ and $a\in Z(N)_{t^{-1}}$. For every $x\in X$ we have $$\begin{aligned} \pi(\nu_t(a))x & = x \nu_t(a) = xq_t\nu_t(a) = \gamma_t(\gamma_{t^{-1}}(xq_t)a )\\ &=\gamma_t( \pi(a) \gamma_{t^{-1}}(p_tx)) = \mu_t(\pi(a))p_tx = \mu_t(\pi(a))x. \end{aligned}$$ This implies $\pi(\mu_t(a))=\nu_t(\pi(a))$ and the proof is complete. As a consequence we derive the following important result: \[prop:cornerstone\] AD-amenability is preserved by Morita equivalence of partial actions, both in [C\*-]{} and [W\*-]{}contexts. A [C\*-]{}equivalence $A$-$B$-bimodule $X$ induces a [W\*-]{}equivalence $A''$-$B''$-bimodule $X''$, so it is enough to deal with the [W\*-]{}case. But this follows directly as a combination of Propositions \[pro:Morita=same-center\] and \[prop:AD-amenable-center\]. The above result applies in particular to global actions and shows that AD-amenability is invariant under Morita equivalence of group actions. We believe that this is known for specialists but we could not find a reference. A [C\*-]{}partial action is AD-amenable if and only if one (hence all) of its Morita enveloping actions is AD-amenable. Let $\alpha$ be a [C\*-]{}partial action of a group and let $\beta$ be one of its Morita enveloping actions. This means that $\alpha$ is Morita equivalent to a restriction $\gamma$ of $\beta$ and $\beta$ is the [C\*-]{}enveloping action of $\gamma$. By Propositions \[prop:cornerstone\] and \[prop:enveloping action of AD amenable is AD amenable\], $\alpha$ is AD-amenable if and only if $\gamma$ is AD-amenable if and only if $\beta$ is AD-amenable. AD-amenability of Fell bundles {#sec:ADA-Fell-bundles} ============================== One of our goals in this paper is to extend Anantharaman-Delaroche’s notion of amenability to Fell bundles over discrete groups. For this we need some preparation because, as the case of partial actions already indicates, the definition of AD-amenability requires going to the [W\*-]{}setting. W\*-enveloping Fell bundles --------------------------- Given a Fell bundle ${\mathcal{B}}$ over a group $G$, we want to turn the bundle of biduals ${\mathcal{B}}'':=\{B_t''\}_{t\in G}$ into a Fell bundle in such a way that ${\mathcal{B}}$ becomes a Fell subbundle of ${\mathcal{B}}''$ and there is a certain continuity of the operations with respect to the ${{\operatorname{w}^*}}$-topology. This requires to equip every fibre $B_t''$ with a Hilbert bimodule structure over $B_e''$ (or a ternary [W\*-]{}ring structure) extending that of $B_t$. The machinery described here is not new: biduals of Hilbert modules are known to be Hilbert [W\*-]{}modules (see for instance [@Blecher-Merdy:Operator]), biduals of ternary [W\*-]{}rings are described in [@Zl83], and biduals of Fell bundles over inverse semigroups are already described in [@Buss-Exel-Meyer:Reduced]\*[Section 3]{}, although there only saturated Fell bundles are considered. For the convenience of the reader and to make this article as self-contained as possible, we provide the complete constructions here. Let ${\mathcal{B}}$ be a Fell bundle over a group $G$. For every nondegenerate representation $\pi\colon B_e\to {\mathcal{L}}(H)$ there exists a nondegenerate representation $\psi\colon {\mathcal{B}}\to {\mathcal{L}}(K)$ such that $\pi$ is a sub-representation of $\psi|_{B_e}$. Define $H_t:=B_t\otimes_\pi H$, where we view $B_t$ as a Hilbert $B_e$-module. We want to construct, for every $s,t\in G$ and $b\in B_s$, a linear bounded map $\psi_{b,t}\colon B_t\otimes_\pi H\to B_{st}\otimes_\pi H$ such that $\psi_{b,t}(a\otimes h)=ba\otimes h$. For this it suffices to show that, given $\sum_{j=1}^n a_j\otimes h_j\in B_t\otimes H$, we have $\|\sum_{j=1}^n ba_j\otimes h_j \|^2\leq \|b\|^2\|\sum_{j=1}^n a_j\otimes h_j\|^2$. Viewing $B_t$ as a left $B_e$-Hilbert module we get $$\begin{aligned} \|\sum_{j=1}^n ba_j\otimes h_j \|^2 & = \sum_{j,l=1}^n\langle h_j,a_j^*b^*ba_lh_l\rangle = \|\sum_{j=1}^n (b^*b)^{1/2}a_j\otimes h_j \|^2\\ & \leq \|b\|^2 \|\sum_{j=1}^n a_j\otimes h_j \|. \end{aligned}$$ The computations above show that $\psi_{t,b}$ is well defined and $\|\psi_{t,b}\|\leq \|b\|$. Define $K$ as the $\ell_2$-direct sum $\bigoplus_{t\in G}H_t$. We claim that there exists a representation $\psi\colon {\mathcal{B}}\to {\mathcal{L}}(K)$ such that, for all $s,t\in G$, $b\in B_s$ and $f\in K$, $\psi(b)(f)(t) = \psi_{b,s^{-1}t}f(s^{-1}t)$. First we show that $\psi$ is well defined. Take $f\in K$, $b\in B_s$ and a finite set $\lambda{\subseteq}G$. Then $\sum_{t\in \lambda}\| \psi_{b,s^{-1}t}f(s^{-1}t) \|^2\leq \|b\|^2\sum_{t\in \lambda}\| f(s^{-1}t) \|^2\leq \|b\|^2\|f\|^2$. This shows that $t\mapsto \psi_{b,s^{-1}t}f(s^{-1}t)$ is square summable in norm. The facts that $\psi(ab)=\psi(a)\psi(b)$ and $\psi(b)^*=\psi(b^*)$ follow from the facts that ${\psi_{b,t}}^*=\psi_{b^*,st}$ and $\psi_{a,st}\psi_{b,t}=\psi_{ab,t}$ for all $s,t\in G$, $a\in{\mathcal{B}}$ and $b\in B_t$. These last identities are straightforward to prove and are left to the reader. The natural identification of $H$ with $B_e\otimes_\pi H$ provides an inclusion $\iota\colon H\to K$. Under this inclusion we see that $\psi(B_e)H= H$ and, for all $a,b\in B_e$ and $h\in H$: $$\psi(b)(\iota(\pi(a)h))= ba\otimes h=\iota(\pi(b)\pi(a)h).$$ This clearly implies that $\pi$ is a sub-representation of $\psi$. Finally, $\psi$ is nondegenerate because for every approximate unit $(e_j)_{j\in J}$ of $B_e$ and $a\otimes h\in H_t$ we have $\lim_j \psi(e_j)a\otimes h=e_ja\otimes h=a\otimes h$. \[the:defining-B”\] Let ${\mathcal{B}}=\{B_t\}_{t\in G}$ be a Fell bundle. Then the bundle of biduals ${\mathcal{B}}'':=\{B_t''\}_{t\in G}$ has a unique Fell bundle structure extending that of ${\mathcal{B}}$ and such that, for every $r,s\in G$ and $a\in B_r$, the functions $B_s''\to B_{rs},b\mapsto ab$, and $B_s''\to B_s'',b\mapsto b^*$, are ${{\operatorname{w}^*}}$-continuous. Let $\psi\colon {\mathcal{B}}\to {\mathcal{L}}(H)$ be a nondegenerate representation such that $\psi|_{B_e}$ contains the universal representation of $B_e$ as a sub-representation. Then we view the bidual $B_e''$ as the weak closure (or the bicommutant) of $\psi(B_e){\subseteq}{\mathcal{L}}(H)$. For every $t\in G$ we view the bidual $I_t''$ of the ideal $I_t:=B_tB_t^*{\subseteq}B_e$ as the weak closure of $\psi(I_t)$. We claim that there exists a fibre-wise linear and ${{\operatorname{w}^*}}$-continuous extension $\psi''\colon {\mathcal{B}}''\to {\mathcal{L}}(H)$. For this we view the fibre $B_t$ as a $I_t-I_{t^{-1}}$-equivalence bimodule with the operations inherited from ${\mathcal{B}}$. Let $1_t$ be the unit of $I_t''$ and $H_t:=1_t H$. Note that $B_t\otimes_{\psi|_{I_{t^{-1}}}} H_{t^{-1}}=\psi(B_t)H_{t^{-1}}$. Since every $b\in B_t$ factors as $cc^*c$ for some $c\in B_t$, we also have $\psi(B_t)H_{t^{-1}}=H_t=\psi(B_t)H$. For every $b\in B_t$ we have $\langle \psi(b)({H_{t^{-1}}}^\perp),H\rangle = \langle {H_{t^{-1}}}^\perp,\psi(b^*)H\rangle {\subseteq}\langle {H_{t^{-1}}}^\perp,H_{t^{-1}}\rangle =0$. This shows that $\psi(b)$ vanishes on ${H_{t^{-1}}}^\perp$ and its image is contained in $H_t$. Thinking of $\psi(b)$ as an operator from $H_{t^{-1}}$ to $H_t=B_t\otimes_{\psi|_{I_{t^{-1}}}} H_{t^{-1}}$, $\psi(b)$ becomes the function $h\mapsto b\otimes h$. By Corollary \[coro:representation of X”\], $\psi|_{B_t}$ has a unique ${{\operatorname{w}^*}}$-continuous extension $(\psi|_{B_t})''\colon B_t''\to {\mathcal{L}}(H)$, which is faithful. The map $\psi''$ is then given by $\psi''(b):=(\psi|_{B_t})''(b)$ for every $b\in B_t$. Notice that $\psi''$ is faithful on each fiber. Indeed, viewing $\psi''|_{B_t''}$ as a map with image in ${\mathcal{L}}(H_{t^{-1}},H_t),$ it follows that $(\psi''|_{B_t''})^r= (\psi|_{I_t})''$ is faithful because $(\psi|_{B_e})''$ is faithful. Hence, by Proposition \[prop:pi and pir\], $\psi''|_{B_t''}$ is faithful. Using ${{\operatorname{w}^*}}$-density arguments we get $$\psi''(B_s'')\psi''(B_t''){\subseteq}\psi''(B_{st}'')\mbox{ and }\psi''(B_s'')^*=\psi''(B_{s^{-1}}'').$$ Thus we may define the multiplication in such a way that, for $x\in B_s''$ and $y\in B_s''$, $xy$ is the unique element of $B_{st}''$ such that $\psi''(xy)=\psi''(x)\psi''(y)$. The involution is determined by the condition $\psi''(x^*)=\psi''(x)^*$ and the norm is $\|x\|:=\|\psi''(x)\|$. These operations clearly extend those of ${\mathcal{B}}$ and ${\mathcal{B}}''$ is a Fell bundle. Finally, $(B_t'')^*B_t''$ is a [W\*-]{}ideal because $\psi''((B_t'')^*B_t'')=I_{t^{-1}}''$. \[remark: bidual partial action and bidual bundle\] Let $\alpha$ be a partial action of $G$ on a [C\*-]{}algebra $A$. Then $({\mathcal{B}}_\alpha)''$ is canonically [W\*-]{}isomorphic to ${\mathcal{B}}_{\alpha''}$. Inspired by the previous result we introduce the following definition, which is the natural [W\*-]{}analogue of Fell bundles – also called [C\*-]{}algebraic bundles in [@Doran-Fell:Representations]. A *[W\*-]{}Fell bundle* (or *[W\*-]{}algebraic bundle*) over the group $G$ is a Fell bundle ${\mathcal{M}}=\{M_t\}_{t\in G}$ such that each $M_t$ is isometrically isomorphic to the dual of a Banach space and, for every $s,t\in G$ and $a\in M_s$, the functions $M_t\to M_{t^{-1}}, \ b\mapsto b^*$, and $M_t\to M_{st},\ b\mapsto ab$, are ${{\operatorname{w}^*}}$-continuous. By [@Zl83] the predual of each fibre $M_t$ is unique because $M_t$ is a $M_e$-$M_e$-Hilbert bimodule (not necessarily full) with respect to the canonical operations coming from the product and involution of ${\mathcal{M}}$. Central partial actions of W\*-Fell bundles {#sec:central-partial} ------------------------------------------- Take a [W\*-]{}Fell bundle $\mathcal{M}$ over a group $G$. For every $t\in G$ we define $I_t$ as the [W\*-]{}algebra generated by $M_tM_t^*$ in $M_e$. Note that $I_t$ is in fact a [W\*-]{}ideal of $M_e$. The fiber $M_t$ has a natural [W\*-]{}equivalence $I_t$-$I_{t^{-1}}$-bimodule structure with the multiplication of $\mathcal{M}$ defining the left and right actions and the inner products ${}_{I_t}\langle x,y\rangle:=xy^*$ and $\langle x,y\rangle_{I_{t^{-1}}}:=x^*y$. Then Proposition \[prop:isomorphic centres\] provides an isomorphism $\sigma_t\colon Z(I_{t^{-1}})\to Z(I_t)$. We claim that $\sigma:=\{\sigma_t\colon Z(I_{t^{-1}})\to Z(I_t)\}_{t\in G}$ is a [W\*-]{}partial action of $G$ on $Z(M_e)$. To prove this it suffices to show that $\sigma$ is a set theoretic partial action. To simplify the notation we write $Z_t$ instead of $Z(I_{t})$. It is clear that $I_e=M_e$. Moreover, $\sigma_e$ is the isomorphism corresponding to the [W\*-]{}algebra $M_e$ viewed as the identity [W\*-]{}equivalence $M_e$-$M_e$-bimodule, hence $\sigma_e$ is the identity of $Z_e$. Lets show that $\sigma_t( Z_{t^{-1}}\cap Z_s ){\subseteq}Z_t\cap Z_{ts}$. Writing $p_t$ for the unit of $I_t$, it suffices to prove that $\sigma_t(p_{t^{-1}}p_s)=p_tp_{ts}$. For every $x\in M_t$ we have $ \sigma_t(p_{t^{-1}}p_s)x =x p_{t^{-1}}p_s$, hence $\sigma_t(p_{t^{-1}}p_s)$ is the unit of $$\begin{gathered} {\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t p_{t^{-1}}p_s(M_t p_{t^{-1}}p_s)^* ={\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t p_{t^{-1}}p_sM_{t}^*\\ ={\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t M_t^* M_t M_sM_s^* M_t^* {\subseteq}{\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t M_t^* M_{ts} M_{ts}^* {\subseteq}I_t\cap I_{ts}\\ {\subseteq}{\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t M_t^* M_{ts} M_{ts}^* p_t = {\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t M_t^* M_{ts} M_{ts}^* M_tM_{t}^*\\ {\subseteq}{\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_tp_{t^{-1}} M_{s} M_{s}^* M_{t}^* {\subseteq}{\overline{\operatorname{span}}}^{{\operatorname{w}^*}}M_t p_{t^{-1}}p_sM_{t}^*.\end{gathered}$$ Thus $\sigma_t(p_{t^{-1}}p_s)$ is the unit of $I_t\cap I_{ts}$ and we have $\sigma_t(p_{t^{-1}}p_s)=p_tp_{ts}$. Now take $x\in Z_{t^{-1}}\cap Z_{t^{-1}s^{-1}}$. We already know that $\sigma_t(x)\in Z_t\cap Z_{s^{-1}}$ and $\sigma_s(\sigma_t(x))\in Z_{st}\cap Z_s$. Also $\sigma_{st}(x)\in Z_{st}\cap Z_s$. We can write $p_s$ as a ${{\operatorname{w}^*}}$-limit of the form $p_s =\lim_i \sum_{j=1}^{n_i} u_{i,j}v_{i,j}^*$ with $u_{i,j},v_{i,j}\in M_s$. Then, for all $z\in M_{st}$: $$\begin{aligned} \sigma_s(\sigma_t(x))z & = \sigma_s(\sigma_t(x))p_sz = \sigma_s(\sigma_t(x)) \lim_i\sum_{j=1}^{n_i} u_{i,j}v_{i,j}^*z = \lim_i \sum_{j=1}^{n_i}\sigma_s(\sigma_t(x)) u_{i,j}v_{i,j}^*z\\ & = \lim_i \sum_{j=1}^{n_i} u_{i,j}\sigma_t(x) v_{i,j}^*z = \lim_i \sum_{j=1}^{n_i} u_{i,j} v_{i,j}^*z x = p_s z x =\sigma_{st}(x)p_s z\\ & =\sigma_{st}(x) z.\end{aligned}$$ This implies $\sigma_{st}(x)=\sigma_s(\sigma_t(x))$. Let $\mathcal{M}$ be a [W\*-]{}Fell bundle over a group $G$. The *central partial action* of ${\mathcal{M}}$ is the [W\*-]{}partial action $\sigma$ of $G$ on $Z(M_e)$ constructed above. \[exa:central partial action of semidirect product bundle\] Let $\gamma=(\{M_t\}_{t\in G},\{\gamma_t\}_{t\in G})$ be a [W\*-]{}partial action of a group $G$ on a [W\*-]{}algebra $M$. If $\mathcal{M}$ is the semidirect product bundle of $\gamma$, which is a [W\*-]{}Fell bundle, then the central partial action of $\mathcal{M}$ is the restriction of $\gamma$ to $Z(M)$. To prove the claim above note that the [W\*-]{}ideals $I_t$ of $M=M\delta_e$ generated by $(M_t\delta_t)(M_t\delta_t)^*=\gamma_t(\gamma_{t^{-1}}(M_tM_t^*))\delta_e=M_t\delta_e$ are just $M_t$ seen as a subalgebra of $M=M\delta_e$. Then the domains of $\sigma$ and $\gamma|_{Z(M)}$ agree. If $x\in Z(M_{t^{-1}})$ and $y\in M_t$, then $$\gamma_t(x)\delta_e y\delta_t = \gamma_t(x)y\delta_t = y\gamma_t(x)\delta_t = \gamma_t(\gamma_{t^{-1}}(y) x)\delta_t = y\delta_t x\delta_e = \sigma_t(x)\delta_ey\delta_t$$ and this implies $\gamma_t(x)=\sigma_t(x)$ (because we identify $x\in M_e$ with $x\delta_e\in M_e\delta_e$). Cross-sectional W\*-algebras of W\*-Fell bundles {#ssec:reduced von Neuman algebra} ------------------------------------------------ To a [W\*-]{}Fell bundle ${\mathcal{M}}$ one can naturally assign a cross-sectional [W\*-]{}algebra $W^*_{\mathrm{r}}({\mathcal{M}})$ as follows: the usual Hilbert $M_e$-module $\ell^2({\mathcal{M}})$ is not suitable here because it might not be a [W\*-]{}module, that is, it is possibly not self-dual. We look at its self-dual completion that can be concretely described as follows. Let $\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}})$ be the space of sections $\xi\colon G\to {\mathcal{M}}$ for which the net of finite sums $\sum_{t\in F}\xi(t)^*\xi(t)$ (for $F{\subseteq}G$ finite) is bounded; since this net is increasing and consists of positive elements, it ${{\operatorname{w}^*}}$-converges to some element ${\langle\xi\!\mid\!\xi\rangle}_{M_e}:=\sum_{t\in G}\xi(t)^*\xi(t)\in M_e$. The space $\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})$ is then a right W\*-Hilbert $M_e$-module when endowed with right $M_e$-action $(\xi\cdot b)(t):=\xi(t)\cdot b$ and inner product ${\langle\xi\!\mid\!\eta\rangle}_{M_e}:=\sum_{t\in G}\xi(t)^*\eta(t)$, the limit of this sum being with respect to the ${{\operatorname{w}^*}}$-topology, for all $\xi,\eta\in \ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}).$ Next we define the left regular representation of ${\mathcal{M}}$. This is done as in the [C\*-]{}case, except that we now act on $\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}})$. More precisely, for each $t\in G$ we define the map $\Lambda_t\colon M_t\to {\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}))$ by $(\Lambda_t(a)\xi)(s):=a\cdot\xi(t^{-1}s)$ (the multiplication performed in ${\mathcal{M}}$) for all $s\in G$, $a\in M_t$ and $\xi\in \ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}})$. As in the [C\*-]{}setting, a routine argument shows that $\Lambda_t(a)$ is a well-defined adjointable operator with $\Lambda_t(a)^*=\Lambda_{t^{-1}}(a^*)$ and that $\Lambda=(\Lambda_t)_{t\in G}$ is a representation of ${\mathcal{M}}$. Note that ${\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}))$ is a $W^*$-algebra, see for example [@MR0355613]\*[Proposition 3.10]{}. The cross-sectional [W\*-]{}algebra of ${\mathcal{M}}$ is the [W\*-]{}subalgebra $W^*_{\mathrm{r}}({\mathcal{M}})$ of ${\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}))$ generated by the image of its regular representation $\Lambda$. The linear span of the image of $\Lambda$ is already a [$^*$-]{}subalgebra, so that $W^*_{\mathrm{r}}({\mathcal{M}})$ is just the ${{\operatorname{w}^*}}$-closure of that subalgebra. We also observe that the cross-sectional [C\*-]{}algebra $C^*_{\mathrm{r}}({\mathcal{M}})$ embeds as a ${{\operatorname{w}^*}}$-dense [C\*-]{}subalgebra of $W^*_{\mathrm{r}}({\mathcal{M}})$. Moreover, since $\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}})$ is the self-dual completion of $\ell^2({\mathcal{M}})$, every adjointable operator on $\ell^2({\mathcal{M}})$ extends to an adjointable operator on $\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}})$ and this gives a $C^*$-embedding ${\mathcal{L}}(\ell^2({\mathcal{M}})){\hookrightarrow}{\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}))$ that restricts to the embedding $C^*_{\mathrm{r}}({\mathcal{M}}){\hookrightarrow}W^*_{\mathrm{r}}({\mathcal{M}})$. The (reduced) [W\*-]{}algebra of a [W\*-]{}Fell bundle ${\mathcal{M}}$ is exactly the [W\*-]{}counterpart of the reduced [C\*-]{}algebra as defined by Exel and Ng in [@ExelNg:ApproximationProperty]. \[prop:faithful representation of W(B)\] Let ${\mathcal{M}}$ be a [W\*-]{}Fell bundle over a group $G$ and $\pi\colon M_e\to {\mathcal{L}}(H)$ be a weak\*-continuous representation. Then the map $$\Lambda_\pi \colon {\mathcal{M}}\to {\mathcal{L}}( \ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_\pi H),\ b\mapsto \Lambda(b) \otimes {\textup{id}}$$ is a representation which is ${{\operatorname{w}^*}}$-continuous on each fiber. The integrated form $\tilde{\Lambda}_\pi$ factors through a representation of $C^*_r({\mathcal{M}})$ that can be extended to a weak\* continuous representation $\tilde{\Lambda}_\pi^{{{\operatorname{w}^*}}}$ of $W^*_r({\mathcal{M}})$ in a unique way. Moreover, $\tilde{\Lambda}_\pi^{{{\operatorname{w}^*}}}$ is unital and $\tilde{\Lambda}_\pi^{{{\operatorname{w}^*}}}(W^*_r({\mathcal{M}}))= \tilde{\Lambda}_\pi^{{{\operatorname{w}^*}}}({\mathcal{M}})''$ (the bicommutant). If $\pi$ is injective then so is $\tilde{\Lambda}_\pi^{{{\operatorname{w}^*}}}.$ Consider the map $\rho\colon {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_\pi H),$ $\rho(R)=R\otimes {\textup{id}},$ of Lemma \[lem:weak star topology of adjointable operators\]. Then $\Lambda_\pi:= \rho\circ \Lambda \colon {\mathcal{M}}\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_\pi H)$ is clearly a representation that, when restricted to the closed unit ball of a fiber, is ${{\operatorname{w}^*}}$-continuous by Lemma \[lem:weak star topology of adjointable operators\]. Hence $\Lambda_\pi$ is a representation which is ${{\operatorname{w}^*}}$-continuous on each fiber. In case $\pi$ is faithful then so is $\rho$ and hence $\Lambda_\pi$ is faithful if $\pi$ is. Note that $\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_\pi H=\ell_2({\mathcal{M}})\otimes_\pi H.$ Thus we may very well think of $\Lambda_\pi\colon {\mathcal{M}}\to {\mathcal{L}}(\ell_2({\mathcal{M}})\otimes_\pi H)$ as the composition of the [C\*-]{}regular representation ${\mathcal{M}}\to {\mathcal{L}}(\ell_2({\mathcal{M}}))$ with $C^*_r({\mathcal{M}})\subset {\mathcal{L}}(\ell_2({\mathcal{M}}))\to {\mathcal{L}}(\ell_2({\mathcal{M}})\otimes_\pi H), $ $T\mapsto T\otimes {\textup{id}}.$ This clearly implies that $\Lambda_\pi$ factors through $C^*_r({\mathcal{M}}).$ The restriction $\rho|_{W^*_r({\mathcal{M}})}\colon W^*_r({\mathcal{M}})\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_\pi H)$ is a ${{\operatorname{w}^*}}$-continuous representation that clearly extends the integrated form of $\Lambda_\pi.$ Hence this integrated form can be extended to $W^*_r({\mathcal{M}})$ (as $\rho|_{W^*_r({\mathcal{M}})}$) and the extension is faithful if $\pi$ is. The rest of the proof follows by the Bicommutant Theorem. \[theo:Exel-Ng representations\] Assume that ${\mathcal{M}}$ is a [W\*-]{}Fell bundle over $G$ and write $\lambda$ for the left regular representation of $G$ by unitary operators on $\ell_2(G).$ Let $T \colon {\mathcal{M}}\to{\mathcal{L}}(H)$ be a nondegenerate representation which is weak\* continuous on each fiber and let $\mu_{\lambda,T}\colon {\mathcal{M}}\to {\mathcal{L}}(\ell_2(G,H))$ be the representation such that $\mu_{\lambda,T}(b)=\lambda_t\otimes T_b,$ for every $b\in B_t$ and $t\in G.$ Then the integrated form of $\mu_{\lambda,T},$ denoted $\tilde{\mu}_{\lambda,T},$ factors through a representation of $C^*_r({\mathcal{M}})$ that has a unique ${{\operatorname{w}^*}}$-continuous extension to a representation $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}$ of $W^*_r({\mathcal{M}}).$ Moreover, if $T|_{B_e}$ is faithful then so is $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}.$ It was shown in [@ExelNg:ApproximationProperty] that $\tilde{\mu}_{\lambda,T}$ factors through a representation of $C^*_r({\mathcal{M}}).$ To extend $\tilde{\mu}_{\lambda,T}$ to $W^*_r({\mathcal{M}})$ take $R\in W^*_r({\mathcal{M}}).$ Then, by [@MR641217], there exists a bounded net $(f_j)_{j\in J}\subset C^*_r({\mathcal{M}})$ such that $R = {{\operatorname{w}^*}}\lim_j \tilde{\lambda}_{{\mathcal{M}}}^{{\operatorname{w}^*}}(f_j).$ Every closed ball of ${\mathcal{L}}(\ell_2(G,H))$ is compact in the weak\* topology, thus there exists $S\in {\mathcal{L}}(\ell_2(G,H))$ and a subnet $(f_{j_l})_{l\in L}$ such that $S={{\operatorname{w}^*}}\lim_l \tilde{\mu}_{\lambda,T}(f_{j_l}).$ In order to prove that $S={{\operatorname{w}^*}}\lim_j \tilde{\mu}_{\lambda,T}(f_j)$ it suffices to show the existence of a set $X\subset \ell_2(G,H)$ spanning a dense subset of $\ell_2(G,H)$ and such that, for every $x,y\in X,$ $(\langle x,\tilde{\mu}_{\lambda,T}(f_j)y\rangle )_{j\in J}$ is a convergent net. Using the notation of [@ExelNg:ApproximationProperty]\*[Propositon 2.13]{} we define $$X:=\bigcup_{r\in G} \{ (\rho_r\otimes 1)\circ V u \colon u\in \ell_2({\mathcal{M}})\otimes_{T} H, h\in H\}.$$ Recall that $\rho\colon G\to \ell_2(G)$ is the right regular representation and that $\rho_r\otimes 1$ lies in the commutant of $\tilde{\mu}_{\lambda,T}(C^*_r({\mathcal{M}})).$ Recall also that $V\colon \ell_2({\mathcal{M}})\otimes_{T} H\to \ell_2(G,H)$ is an isometry such that $V(z\otimes h)(t)=T_{z(t)}h.$ Take $x=\rho_r\otimes 1\circ V u\in X$ and $y=\rho_r\otimes 1\circ Vv\in X.$ Then, by [@ExelNg:ApproximationProperty]\*[Proposition 2.6]{}, $$\begin{aligned} \lim_j \langle x,\tilde{\mu}_{\lambda,T}(f_j)y\rangle &= \lim_j\langle V u, (\rho_{r^{-1}}\otimes 1)\tilde{\mu}_{\lambda,T}(f_j) (\rho_s\otimes 1)Vv\rangle\\ &= \lim_j\langle V u, (\rho_{r^{-1}s}\otimes 1)V(\lambda_{\mathcal{M}}(f_j)\otimes 1)v\rangle\\ & =\langle Vu, (\rho_{r^{-1}s}\otimes 1)V (R\otimes 1)v\rangle. \end{aligned}$$ This not only shows that $(\tilde{\mu}_{\lambda,T}(f_{j}))_{j\in J}$ converges in the weak (and weak\*) topology, but also that its limit is completely determined by $R={{\operatorname{w}^*}}\lim_j \tilde{\lambda}_{{\mathcal{M}}}^{{\operatorname{w}^*}}(f_j).$ Of course, we define $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(R):=S.$ Define $V^r:=(\rho_r\otimes 1)\circ V.$ Then $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}\colon W^*_r({\mathcal{M}})\to {\mathcal{L}}(\ell_2(G,H))$ is uniquely determined by the condition $$\label{equ:condition defining the extension} \langle V^r u,\tilde{\mu}_{\lambda,T}(R) V^s v\rangle = \langle V^{s^{-1}r}u, V (R\otimes 1)v\rangle,\ \forall \ u,v\in \ell_2({\mathcal{M}}), \ r,s\in G.$$ This condition immediately implies that $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}$ is linear and ${{\operatorname{w}^*}}$-continuous in any closed ball. Moreover, it is also straightforward to prove that $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}$ preserves the involution. To show that $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}$ is multiplicative take $R,S\in W^*_r({\mathcal{M}})$ and bounded nets $(f_j)_{j\in J},(g_l)_{l\in L}\subset C^*_r({\mathcal{M}})$ weak\* converging to $R$ and $S,$ respectively. Then, using that multiplication is separately weakly continuous, we deduce $$\begin{aligned} \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(RS) & =\lim_j \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(f_jS) =\lim_j \lim_l \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(f_jg_l) =\lim_j \lim_l \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(f_j)\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(g_l)\\ & = \lim_j \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(f_j)\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(S) = \tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(R)\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(S). \end{aligned}$$ Assume $T|_{B_e}$ is faithful and $\tilde{\mu}^{{\operatorname{w}^*}}_{\lambda,T}(R)=0.$ Then implies (with $r=s=e$) that $\langle u,(R\otimes 1)v\rangle=0$ for all $u,v\in \ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\otimes_{T|_{B_e}} H.$ Since $T|_{B_e}$ is faithful, we have $R=0.$ Let ${\mathcal{M}}$ be a [W\*-]{}Fell bundle over the discrete group $G.$ We say that the subset $\mathcal{N}\subset {\mathcal{M}}$ is a [W\*-]{}Fell subbundle if it is a Fell subbundle and the ${{\operatorname{w}^*}}$ topology of $N_e$ is the restriction of the ${{\operatorname{w}^*}}$ topology of $M_e.$ Since each fiber of $\mathcal{N}$ is a [W\*-]{}equivalence bimodule between [W\*-]{}ideals of $N_e,$ the definition above actually implies that the ${{\operatorname{w}^*}}$ topology of each fiber $N_t$ is the restriction of the ${{\operatorname{w}^*}}$ topology of $B_t.$ Let $\mathcal{N}\subset {\mathcal{M}}$ be a [W\*-]{}Fell subbundle. If we view $C^*_r(\mathcal{N})$ as a [C\*-]{}subalgebra of $C^*_r({\mathcal{M}})\subset W^*_r({\mathcal{M}})$ as in [@Abadie:Enveloping]\*[Proposition 3.2]{}, then $W^*_r(\mathcal{N})$ is isomorphic to the ${{\operatorname{w}^*}}$-closure of $C^*_r(\mathcal{N})$ in $W^*_r({\mathcal{M}}).$ Our proof is a slight modification of that of [@Abadie:Enveloping]\*[Proposition 3.2]{}. By Proposition \[prop:faithful representation of W(B)\] there exists a representation $T\colon {\mathcal{M}}\to {\mathcal{L}}(H)$ with $T|_{M_e}$ faithful and ${{\operatorname{w}^*}}$-continuous on each fiber. Define $H_0:=T_{1_N}H,$ where $1_N$ is the unit of $N_e,$ and the restriction map $R\colon \mathcal{N}\to {\mathcal{L}}(H_0)$ by $R_a:=T_a|_{H_0}.$ Then $R$ is a representation ${{\operatorname{w}^*}}$-continuous on each fiber and with $R|_{N_e}$ faithful. In terms of the decomposition $\ell_2(G,H)=\ell_2(G,H_0)\oplus \ell_2(G,H_0)^\perp,$ we have $$\label{equ: mu lambda T and mu lambda R} \mu_{\lambda,T}(a)=\left(\begin{array}{cc} \mu_{\lambda,R}(a) & 0\\ 0 & 0 \end{array}\right),\ \forall a\in \mathcal{N}.$$ We get the desired result by considering the integrated forms of $\mu_{\lambda,T}$ and $\mu_{\lambda,R}$ and the respective ${{\operatorname{w}^*}}-$continuous extensions to $W^*_r({\mathcal{M}})$ and $W^*_r(\mathcal{N}),$ respectively. If we add to the hypotheses of the last theorem the condition that $\mathcal{N}$ is hereditary in ${\mathcal{M}}$ (that is $\mathcal{N}{\mathcal{M}}\mathcal{N}\subset \mathcal{N}$) then $W^*_r(\mathcal{N})$ is hereditary in $W^*_r({\mathcal{M}}).$ Indeed, it follows from separate ${{\operatorname{w}^*}}$-continuity of the product and the fact that $C^*_r(\mathcal{N})$ is hereditary in $C^*_r({\mathcal{M}}).$ The W\*-algebra of kernels {#ssec:wstar algebra of kernels} -------------------------- Let $\mathcal{M}$ be a W\*-Fell bundle over a group $G$. A kernel of $\mathcal{M}$ is a function $k\colon G\times G\to \mathcal{M}$ such that $k(r,s)\in M_{rs^{-1}}.$ As usual we denote by ${\mathbb{k}}(\mathcal{M})$ the [C\*-]{}algebra of kernels of $\mathcal{M}$ and ${\mathbb{k}}_c(\mathcal{M})$ the kernels of compact support, see [@Abadie:Enveloping] for more details. Recall that there exists a canonical action of $G$ on ${\mathbb{k}}(\mathcal{M})$, given by $\beta_tk(r,s)=k(rt,st)$. We are going to define a [W\*-]{}version of ${\mathbb{k}}(\mathcal{M})$ and also of $\beta$. Consider the canonical representation $\pi\colon {\mathbb{k}}(\mathcal{M})\to {\mathcal{L}}(\ell^2(\mathcal{M}))$ given by $\pi(k)f(s)=\sum_{s\in G}k(s,t)f(t)$ for every $k\in {\mathbb{k}}_c(\mathcal{M})$ and $f\in \ell^2(\mathcal{M})$ with finite support. This representation has been already considered in [@Abadie:Enveloping]. Using the canonical embedding ${\mathcal{L}}(\ell^2({\mathcal{M}})){\hookrightarrow}{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$, we may view $\pi$ as a representation $\pi\colon {\mathbb{k}}(\mathcal{M})\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M}))$. With the canonical action of $G$ on ${\mathbb{k}}(\mathcal{M})$ we construct the \*-homomorphism $\pi^\beta\colon {\mathbb{k}}(\mathcal{M})\to \ell^\infty(G,{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M})))$ defined by $\pi^\beta(f)|_t=\pi(\beta_t^{-1}(f))$. Note that $\pi^\beta$ is equivariant with respect to the translation [W\*-]{}action $\gamma$ on $\ell^\infty(G,{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M})))$. Recall that we may view the algebra of (generalised) compact operators ${\mathcal{K}}(\mathcal{M}):={\mathcal{K}}(\ell^2(\mathcal{M}))$ as an ideal of ${\mathbb{k}}(\mathcal{M})$ and $\beta$ is the enveloping action of $\beta|_{{\mathcal{K}}(\mathcal{M})}$. In the [C\*-]{}case we know that $\pi\colon {\mathbb{k}}(\mathcal{M})\to {\mathcal{L}}(\ell^2(\mathcal{M}))$ is the identity when restricted to ${\mathcal{K}}(\mathcal{M})$. In particular $\pi\colon {\mathbb{k}}(\mathcal{M})\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M}))$ is injective on ${\mathcal{K}}(\mathcal{M})$. Now we can prove that $\pi^\beta$ is injective. Indeed, $\pi^\beta(f)=0$ implies that $\pi(\beta_t(f)x)=0$ for every $t\in G$ and $x\in {\mathcal{K}}(\mathcal{M})$ and since $\pi$ is faithful on ${\mathcal{K}}(\mathcal{M})$, this implies $f\beta_t(x)=0$ for every $t\in G$ and $x\in{\mathcal{K}}(\mathcal{M})$, and this is equivalent to $f=0$ because the linear $G$-orbit of ${\mathcal{K}}({\mathcal{M}})$ is dense in ${\mathbb{k}}({\mathcal{M}})$. Let ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ and ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ be the ${{\operatorname{w}^*}}$-closures of $\pi^\beta({\mathbb{k}}(\mathcal{M}))$ and $\pi^\beta({\mathcal{K}}(\mathcal{M}))$, respectively. Then clearly ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ is a [W\*-]{}ideal of ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ and $\beta^{{\operatorname{w}^*}}:=\gamma|_{{\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})}$ is the [W\*-]{}enveloping action of $\beta^{{\operatorname{w}^*}}|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}=\gamma|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}$. Our construction implies that $\beta^{{\operatorname{w}^*}}$ is a quotient of $\beta''$. This quotient is such that we can faithfully view $\beta$ as a restriction of $\beta^{{\operatorname{w}^*}}$. Notice that ${\mathcal{K}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M}))$ is ${{\operatorname{w}^*}}$-dense in $N:={\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M}))$ (this follows, for instance, from [@Blecher-Merdy:Operator]\*[Lemma 8.5.23]{}). We claim that ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ is canonically isomorphic to $N$. Indeed, the evaluation at $e\in G$, $ev_e\colon \ell^\infty(G,N)\to N,$ is a surjective ${{\operatorname{w}^*}}$-continuous \*-homomorphism. Moreover, $ev_e$ is injective when restricted to ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ because $ev_e\circ\pi^\beta|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}$ is just $\pi|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}$. Thus $ev_e|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}$ is an isomorphism between ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ and $N={\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$. The [W\*-]{}algebra ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ constructed above will be called the *[W\*-]{}algebra of kernels of $\mathcal{M}$*. It will be always endowed with the canonical [W\*-]{}action $\beta^{{\operatorname{w}^*}}$ of $G$ defined above. \[def:equivalence of wstar Fell bundles\] We say that two [W\*-]{}Fell bundles are *weakly [W\*-]{}equivalent* if the canonical actions on their [W\*-]{}algebras of kernels are [W\*-]{}Morita equivalent. [W\*-]{}equivalence of [W\*-]{}Fell bundles is an equivalence relation because, as in the [C\*-]{}case, we have inner tensor products of [W\*-]{}equivalence bimodules. \[thm:enveloping action of the central partial action\] Let $\mathcal{M}$ be a [W\*-]{}Fell bundle over a group $G$. Then the [W\*-]{}enveloping action of the central partial action $\sigma$ of $\mathcal{M}$ is the restriction of $\beta^{{\operatorname{w}^*}}$ to the centre of ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$. By Proposition \[pro:center-enveloping\], $\beta^{{\operatorname{w}^*}}|_{Z({\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M}))}$ is the [W\*-]{}enveloping action of $\tau:=\beta^{{\operatorname{w}^*}}|_{Z({\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M}))}$. Hence all we need is to show that $\tau$ is isomorphic to $\sigma$. The module $\ell^2_{{\operatorname{w}^*}}(\mathcal{M})$ is a [W\*-]{}equivalence bimodule between ${\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})$ and $M_e$, hence it induces a [W\*-]{}isomorphism $\mu\colon Z(M_e)\to Z({\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M}))$ which we claim is an isomorphism of [W\*-]{}partial actions between $\sigma$ and $\tau$. To simplify our notation we write $ZM$ and $Z\mathcal{M}$ instead of $Z(M_e)$ and $Z({\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M}))$, respectively. Consequently, the domains of $\sigma$ and $\tau$ will be denoted $ZM_t$ and $Z\mathcal{M}_t$ for $t\in G$. We must show that $\mu(ZM_t)=Z\mathcal{M}_t$ or, equivalently, that $\ell^2_{{\operatorname{w}^*}}(\mathcal{M})$ induces the ideal $I_t=\operatorname{\overline{span}}^{{\operatorname{w}^*}}M_tM_t^*$ to $J_t:={\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})\cap \beta^{{\operatorname{w}^*}}_t({\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M}))$. From the proof of [@Abadie-Buss-Ferraro:Morita_Fell]\*[Theorem 3.5]{} we know that $\ell^2(\mathcal{M}){\subseteq}\ell^2_{{\operatorname{w}^*}}(\mathcal{M})$ induces $\operatorname{\overline{span}}^{\|\|}M_tM_t^*$ to ${\mathcal{K}}(\mathcal{M})\cap \beta_t({\mathcal{K}}(\mathcal{M}))$. By taking ${{\operatorname{w}^*}}$-closures in $M_e$ and $\ell^\infty(G,{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M})))$, respectively, we get the desired induction. The composition $\mu\circ \sigma_t$ equals the composition $\mu|_t\circ \sigma_t$, where $\mu|_t$ represents the restriction and co-restriction of $\mu$ to $ZM_t$ (in the domain) and $Z\mathcal{M}_t$ (in the co-domain). But $\mu|_t$ is the isomorphism corresponding to the bimodule $$X_t:=J_t\ell^2_{{\operatorname{w}^*}}(\mathcal{M})I_t=\ell^2_{{\operatorname{w}^*}}(\mathcal{M})I_t=J_t\ell^2_{{\operatorname{w}^*}}(\mathcal{M}).$$ Hence we may view $\mu\circ \sigma_t$ as the isomorphism corresponding to the bimodule $X_t\otimes^{{\operatorname{w}^*}}_{I_t} M_t $. In the same way we may view $\tau_t\circ \mu$ as the isomorphism corresponding to the bimodule $J_t\delta_t\otimes^{{\operatorname{w}^*}}_{J_{t^{-1}}\delta_e} X_{t^{-1}}$, where $J_t\delta_t$ is the fiber over $t$ of the semidirect product bundle of $\beta^{{\operatorname{w}^*}}|_{{\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M})}$, ${\mathcal{B}}^{{\operatorname{w}^*}}$, and $J_{t^{-1}}\delta_e$ is the ideal $J_{t^{-1}}$ seen as an ideal of the unit fiber of that bundle. Once again we will make use of the [C\*-]{}version of all these constructions. The semidirect product bundle of $\beta|_{{\mathcal{K}}(\ell^2(\mathcal{M}))}$ will be denoted ${\mathcal{B}}$, and we will think of it as a Fell subbundle of ${\mathcal{B}}''$. The fibre over $t$ of ${\mathcal{B}}$ is ${\mathcal{K}}(\mathcal{M})_t\delta_t$ and ${\mathcal{K}}(\mathcal{M})_t\delta_t({\mathcal{K}}(\mathcal{M})_t\delta_t)^*={\mathcal{K}}(\mathcal{M})_t\delta_e{\subseteq}{\mathcal{K}}(\mathcal{M})\delta_e$ Define $I_t^{\|\|}$ and $J_t^{\|\|}$ as the [C\*-]{}algebras generated by $M_tM_t^*$ and $$({\mathcal{K}}(\mathcal{M})_t\delta_t)({\mathcal{K}}(\mathcal{M})_t\delta_t)^*$$ in $M_e$ and ${\mathcal{K}}(\mathcal{M})\delta_e$, respectively. If we set $$X_t^{\|\|} :=J^{\|\|}_t\ell^2(\mathcal{M})I^{\|\|}_t = \ell^2(\mathcal{M})I^{\|\|}_t = J_t^{\|\|}\ell^2(\mathcal{M}),$$ then $X_t^{\|\|}\otimes_{I_t^{\|\|}} M_t$ and ${\mathcal{K}}(\mathcal{M})_t\delta_t\otimes_{J^{\|\|}_{t^{-1}}}X_{t^{-1}}$ are isomorphic as [C\*-]{}trings. To prove this claim consider the canonical $L^2$-bundle of $\mathcal{M}$, ${\mathcal{L}}\mathcal{M}=\{ L_t \}_{t\in G}$, which establishes a strong equivalence between ${\mathcal{B}}$ and $\mathcal{M}$ [@Abadie-Buss-Ferraro:Morita_Fell]. Then $X_t^{\|\|}$ is exactly $J_t^{\|\|}L_e=L_eI_t^{\|\|}=J_t^{\|\|}L_eI_t^{\|\|}$, and we have canonical injective maps $$\begin{aligned} \nu_1 &\colon X_t^{\|\|}\otimes_{I_t^{\|\|}} M_t\to L_t,\ x\otimes y\mapsto xy,\\ \nu_2&\colon {\mathcal{K}}(\mathcal{M})_t\delta_t\otimes_{J^{\|\|}_{t^{-1}}}X_{t^{-1}} \to L_t, \ T\otimes x\mapsto Tx, \end{aligned}$$ where the actions used are the actions of ${\mathcal{B}}$ and $\mathcal{M}$ on ${\mathcal{L}}\mathcal{M}$. The images of $\nu_1$ and $\nu_2$ are $L_eM_t{\subseteq}L_t$ and ${\mathcal{K}}(\mathcal{M})_t\delta_t L_e{\subseteq}L_t$, respectively, because $M_t=I_t^{\|\|}M_t$ and ${\mathcal{K}}(\mathcal{M})_t={\mathcal{K}}(\mathcal{M})_tJ^{\|\|}_{t^{-1}}$ (due to Cohen-Hewitt Theorem we do not need closed linear spans here). Recalling the definition of strong equivalence and understanding the products below as norm closed linear spans of products, we obtain: $$\begin{aligned} L_e M_t & = L_e M_tM_t^*M_t {\subseteq}L_e \langle L_{t^{-1}},L_{t^{-1}}\rangle_{\mathcal{M}} M_t {\subseteq}{}_{{\mathcal{L}}{\mathcal{B}}}\langle L_e ,L_{t^{-1}}\rangle L_{t^{-1}} M_t \\ & {\subseteq}{}_{{\mathcal{L}}{\mathcal{B}}}\langle L_e ,L_{t^{-1}}\rangle L_e {\subseteq}{\mathcal{K}}(\mathcal{M})_t\delta_t L_e{\subseteq}\ldots {\subseteq}L_e M_t. \end{aligned}$$ It can be directly shown that $\nu^r_j$ and $\nu^l_j$ ($j=1,2$) are the natural inclusions of $I^{\|\|}_t$ and $J^{\|\|}_t$ on $M_e$ and ${\mathcal{K}}(\mathcal{M})\delta_e$. This is due to the fact that we are allowed to use the inner products of ${\mathcal{L}}\mathcal{M}$ in the computations of the tensor product. Hence $$\nu_2^{-1}\circ \nu_1\colon X_t^{\|\|}\otimes_{I_t^{\|\|}} M_t \to {\mathcal{K}}(\mathcal{M})_t\delta_t\otimes_{J^{\|\|}_{t^{-1}}}X_{t^{-1}}$$ is an isomorphism of ternary [C\*-]{}trings with $(\nu_2^{-1}\circ \nu_1)^r$ and $(\nu_2^{-1}\circ \nu_1)^l$ being the identities on $I^{\|\|}_{t^{-1}}$ and $J^{\|\|}_{t}$, respectively. The question is now if we can extend $\nu_2^{-1}\circ \nu_1$ to an isomorphism $$\label{equ:key isomorphism} \overline{\nu_2^{-1}\circ \nu_1}\colon X_t\otimes^{{\operatorname{w}^*}}_{I_t} M_t\to J_t\delta_t\otimes^{{\operatorname{w}^*}}_{J_{t^{-1}}\delta_e} X_{t^{-1}}$$ In fact we can follow the same line of reasoning we used when constructing the inner [W\*-]{}tensor product (see the construction preceding Definition \[def:wstar tensor product\]). The idea is to represent the [W\*-]{}equivalence modules of using the same representation of $I_{t^{-1}}$ and then to translate ${\operatorname{wot}}$ continuity into continuity of inner products. At that point everything will follow immediately because $(\nu_2^{-1}\circ \nu_1)^r$ is the identity operator. After constructing the isomorphism $\overline{\nu_2^{-1}\circ \nu_1}$ as a ${{\operatorname{w}^*}}$-extension of $\nu_2^{-1}\circ \nu_1$ it follows directly that $\overline{\nu_2^{-1}\circ \nu_1}^r$ and $\overline{\nu_2^{-1}\circ \nu_1}^l$ are the identities (on $J_t$ and $I_t$, respectively). Now the isomorphism in and Corollary \[cor:the same iso\] imply $\mu\circ \sigma_t=\tau_t\circ\mu$. \[cor:equivalence of AD amenability\] For a [W\*-]{}Fell bundle $\mathcal{M}$ the following are equivalent: (i) The canonical action $\beta^{{\operatorname{w}^*}}$ on ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ is W\*AD-amenable. (ii) The restriction of $\beta^{{\operatorname{w}^*}}$ to $Z({\mathcal{K}}_{{\operatorname{w}^*}}(\mathcal{M}))$ is W\*AD-amenable. (iii) The central partial action of $\mathcal{M}$ is W\*AD-amenable. Follows at once from the definition of W\*AD-amenability of partial actions, Theorem \[thm:enveloping action of the central partial action\] and Theorem \[the:ADA-characterisations\]. \[def:AD amenable\] A [W\*-]{}Fell bundle is said to be *W\*AD-amenable* if the equivalent conditions of the corollary above are satisfied. A Fell bundle ${\mathcal{B}}$ is *AD-amenable* if the enveloping [W\*-]{}Fell bundle ${\mathcal{B}}''$ is W\*AD-amenable. W\*AD-amenability is preserved by weak equivalence of [W\*-]{}Fell bundles. \[rem:AD amenability of partial action and semidirect product bundle\] Proposition \[prop:AD-amenable-center\] and Example \[exa:central partial action of semidirect product bundle\] imply that a W\*-partial action is W\*AD-amenable if and only if its semidirect product bundle (which is a W\*-Fell bundle) is W\*AD-amenable. Hence the same conclusion holds for C\*-partial actions and AD-amenability. \[the:bidual and wstar algebra of kernels\] Let ${\mathcal{B}}$ be a Fell bundle over a group and let ${\mathcal{B}}''$ be the enveloping [W\*-]{}Fell bundle of ${\mathcal{B}}$. Then the canonical action $\beta^{{\operatorname{w}^*}}$ on ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{B}}'')$ and the bidual of the canonical action $\beta$ on ${\mathbb{k}}({\mathcal{B}})$, $\beta''$, are isomorphic as [W\*-]{}actions. In particular, ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{B}}'') $ is isomorphic to ${\mathbb{k}}({\mathcal{B}})''$. We first show that $\ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')\cong \ell^2({\mathcal{B}})''$ as W\*-Hilbert $M_e$-modules. This is the crucial point if we follow the original construction of ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{B}}'')$ at the beginning of Section \[ssec:wstar algebra of kernels\]. Let $\rho\colon B_e\to {\mathcal{L}}(H)$ be the universal representation; we extend it to the bidual and view it as a faithful W\*-representation $\rho''\colon B_e''\to {\mathcal{L}}(H)$. We may then view $\ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')$ as a ${\operatorname{wot}}$-closed subspace of ${\mathcal{L}}(H,\ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')\otimes_{\rho''}H)$. But $\ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')\otimes_{\rho''}H=\ell^2({\mathcal{B}})\otimes_{\rho}H=:K$ and we have a faithful representation $U\colon \ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')\to {\mathcal{L}}(H,K)$ such that $U(x)h=x\otimes h$. Moreover, $\ell^2_{{\operatorname{w}^*}}({\mathcal{B}}'')$ is the ${\operatorname{wot}}$-closure of $U(\ell^2({\mathcal{B}}))$, i.e. $\ell^2({\mathcal{B}})''$. Looking at the linking algebra $L$ of $\ell^2(B_e)$, we may view ${\mathcal{K}}_{{\operatorname{w}^*}}(G,{\mathcal{B}}'')$ as the [W\*-]{}completion of ${\mathcal{K}}({\mathcal{B}})$ in $L''$. But this closure is also equal to ${\mathcal{K}}({\mathcal{B}})''$. Now we have $$\begin{aligned} (\beta''|_{{\mathcal{K}}({\mathcal{B}})''})|_{{\mathcal{K}}({\mathcal{B}})} & =\beta''|_{{\mathbb{k}}({\mathcal{B}})}|_{{\mathcal{K}}({\mathcal{B}})} =\beta|_{{\mathcal{K}}({\mathcal{B}})} = \beta^{{\operatorname{w}^*}}|_{{\mathbb{k}}({\mathcal{B}}'')}|_{{\mathcal{K}}({\mathcal{B}})} = (\beta^{{\operatorname{w}^*}}|_{{\mathcal{K}}({\mathcal{B}})''})|_{{\mathcal{K}}({\mathcal{B}})}. \end{aligned}$$ Hence we have two [W\*-]{}partial actions on ${\mathcal{K}}({\mathcal{B}})''$, namely $\beta''|_{{\mathcal{K}}({\mathcal{B}})''}$ and $\beta^{{\operatorname{w}^*}}|_{{\mathcal{K}}_{{\operatorname{w}^*}}({\mathcal{B}}'')}$, which are the unique [W\*-]{}actions extending the [C\*-]{}partial action $\beta|_{{\mathcal{K}}({\mathcal{B}})}$. Therefore $\beta''|_{{\mathcal{K}}({\mathcal{B}})''}=\beta^{{\operatorname{w}^*}}|_{{\mathcal{K}}_{{\operatorname{w}^*}}({\mathcal{B}}'')}$. But $\beta''$ and $\beta^{{\operatorname{w}^*}}$ are both [W\*-]{}enveloping actions of $\beta''|_{{\mathcal{K}}({\mathcal{B}})''}$, then uniqueness of [W\*-]{}enveloping actions implies that $\beta''$ is isomorphic to $\beta^{{\operatorname{w}^*}}$. \[cor:invariance of AD amenability under weak equivalence\] If two Fell bundles ${\mathcal{A}}$ and ${\mathcal{B}}$ over a group are weakly equivalent then their enveloping [W\*-]{}Fell bundles ${\mathcal{A}}''$ and ${\mathcal{B}}''$ are weakly [W\*-]{}equivalent. In particular, AD-amenability of Fell bundles is preserved by weak equivalence of Fell bundles. The canonical partial actions on ${\mathbb{k}}({\mathcal{A}})$ and ${\mathbb{k}}({\mathcal{B}})$, $\alpha$ and $\beta$ respectively, are Morita equivalent through a partial action $\gamma$ on a ${\mathbb{k}}({\mathcal{A}})$-${\mathbb{k}}({\mathcal{B}})$-equivalence bimodule $X$. If $L$ is the linking partial action of $X$ and $\nu$ the linking partial action of $\gamma$, then the ${{\operatorname{w}^*}}$-closure of $X$ in $L''$ and the restriction $\gamma'':=\nu''|_{X''}$ provide a [W\*-]{}equivalence between $\alpha''$ and $\beta''$. The rest follows from Theorem \[the:bidual and wstar algebra of kernels\] and Definitions \[def:equivalence of wstar Fell bundles\] and \[def:AD amenable\]. \[cor:Fell bundle AD amenable and action on the kernels\] A Fell bundle ${\mathcal{B}}$ is AD-amenable if and only if the canonical action on ${\mathbb{k}}({\mathcal{B}}),$ $\beta,$ is AD-amenable. Just recall that ${\mathcal{B}}$ is weakly equivalent to ${\mathcal{B}}_\beta$ [@Abadie-Ferraro:Equivalence_of_Fell_Bundles; @Abadie-Buss-Ferraro:Morita_Fell] and use the Corollary above. The dual coaction: another picture for the W\*-algebra of kernels {#sec:dual-coaction} ----------------------------------------------------------------- In this section we want to show that the sectional [W\*-]{}algebra $W^*_{\mathrm{r}}({\mathcal{M}})$ of a [W\*-]{}Fell bundle ${\mathcal{M}}$ over $G$ carries a canonical $G$-coaction and identify the crossed product by this coaction with the [W\*-]{}algebra of kernels ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$. Recall that a coaction of $G$ on a [W\*-]{}algebra $N$ is a faithful unital [W\*-]{}homomorphism $\delta\colon N\to N\bar\otimes W^*_{\mathrm{r}}(G)$ satisfying $(\delta\otimes{\textup{id}})\delta=({\textup{id}}\otimes\delta_G)\delta$, were $\bar\otimes$ denotes the (spatial) tensor product of [W\*-]{}algebras. Given such a coaction, the [W\*-]{}crossed product is defined as the [W\*-]{}subalgebra of $N\bar\otimes{\mathcal{L}}(\ell^2(G))$ generated by $\delta(N)$ and $1\otimes\ell^\infty(G)$, where, as usual, $\ell^\infty(G)$ is represented as a [W\*-]{}subalgebra of ${\mathcal{L}}(\ell^2G)$ via multiplication operators. We omit this representation here for simplicity, that is, we view $\ell^\infty(G)$ as a subalgebra of ${\mathcal{L}}(\ell^2G)$. It turns out that $$N\bar\rtimes_\delta G=\operatorname{\overline{span}}^{{{\operatorname{w}^*}}}\{\delta(n)(1\otimes f): n\in N, f\in \ell^\infty(G)\}.$$ Representing $N$ on a Hilbert space or, more generally, on a self-dual Hilbert module $H$, the [W\*-]{}crossed product $N\bar\rtimes_\delta G$ gets represented as a [W\*-]{}subalgebra of ${\mathcal{L}}(H)\bar\otimes {\mathcal{L}}(\ell^2G)={\mathcal{L}}(H\otimes \ell^2G)$. This crossed product carries a canonical $G$-action, the so called dual action ${\widehat{\delta}}$. It is given on a generator $\delta(n)(1\otimes f)$ by ${\widehat{\delta}}_t(\delta(n)(1\otimes f))=\delta(n)(1\otimes\tau_t(f))$, where $\tau_t(f)(s):=f(st)$ denotes the right translation $G$-action on $\ell^\infty(G)$. This can also be described as ${\widehat{\delta}}_t(x)=(1\otimes \rho_t) x(1\otimes \rho_t^{-1})$, where $\rho\colon G\to {\mathcal{L}}(\ell^2G)$ denotes the right regular representation of $G$. Now, returning to the case of a [W\*-]{}Fell bundle ${\mathcal{M}}$, we want to define a coaction $\delta_{\mathcal{M}}\colon W^*_{\mathrm{r}}({\mathcal{M}})\to W^*_{\mathrm{r}}({\mathcal{M}})\bar\otimes W^*_{\mathrm{r}}(G)$ that acts on generators $\Lambda_t(a)\in M_t$ with $a\in M_t$ by the formula $$\label{eq:dual-coaction-relation} \delta_{\mathcal{M}}(\Lambda_t(a))=\Lambda_t(a)\otimes\lambda_t.$$ This is therefore an extension of the usual dual coaction on $C^*_{\mathrm{r}}({\mathcal{M}}){\subseteq}W^*_{\mathrm{r}}({\mathcal{M}})$. Here $W^*_{\mathrm{r}}(G)$ denotes the group [W\*-]{}algebra of $G$, that is, the [W\*-]{}subalgebra of ${\mathcal{L}}(\ell^2G)$ generated by the left regular representation $\lambda\colon G\to {\mathcal{L}}(\ell^2G).$ To prove that $\delta_{\mathcal{M}}$ exists, we proceed as in the [C\*-]{}algebra situation (see [@Abadie:Enveloping]\*[Section 8]{} or [@ExelNg:ApproximationProperty]): Let ${\mathcal{M}}\times G$ be the pullback of ${\mathcal{M}}$ along the first coordinate projection $G\times G\to G$. This is a [W\*-]{}Fell bundle over $G\times G$ whose [W\*-]{}algebra is canonically isomorphic to $W^*_{\mathrm{r}}({\mathcal{M}}\times G)=W^*_{\mathrm{r}}({\mathcal{M}})\bar\otimes W^*_{\mathrm{r}}(G)$, in particular we have a canonical [W\*-]{}embedding $$W^*_{\mathrm{r}}({\mathcal{M}})\bar\otimes W^*_{\mathrm{r}}(G){\subseteq}{\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}\times G)).$$ Now we define a unitary operator $V$ on the Hilbert [W\*-]{}module $\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}\times G)$ by the formula $$V\zeta(s,t):=\zeta(s,s^{-1}t)\quad\mbox{for all }\zeta\in \ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}\times G),\, s,t\in G.$$ Straightforward computations show that this is indeed a unitary operator with adjoint $V^*\zeta(s,t)=\zeta(s,st)$. Now we define a ${{\operatorname{w}^*}}$-continuous injective unital homomorphism $\delta_{\mathcal{M}}\colon {\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}))\to {\mathcal{L}}(\ell^2_{{{\operatorname{w}^*}}}({\mathcal{M}}\times G))$ by $$\delta_{\mathcal{M}}(a):=V(a\otimes 1)V^*,\quad a\in W^*_{\mathrm{r}}({\mathcal{M}}).$$ It is easy to see that  is satisfied. Moreover, since the elements $\Lambda_t(a)$ with $a\in M_t$ generate $W^*_{\mathrm{r}}({\mathcal{M}})$ as a [W\*-]{}algebra, the above formula restricts to an injective ${{\operatorname{w}^*}}$-continuous unital homomorphism $$\delta_{\mathcal{M}}\colon W^*_{\mathrm{r}}({\mathcal{M}})\to W^*_{\mathrm{r}}({\mathcal{M}})\bar\otimes W^*_{\mathrm{r}}(G).$$ This is indeed a coaction, that is, the coassociativity identity $(\delta_{\mathcal{M}}\otimes{\textup{id}})\circ\delta_{\mathcal{M}}=({\textup{id}}\otimes\delta_G)\circ \delta_M$ holds, where $\delta_G\colon W^*_{\mathrm{r}}(G)\to W^*_{\mathrm{r}}(G)\bar\otimes W^*_{\mathrm{r}}(G)$ denotes the comultiplication of $W^*_{\mathrm{r}}(G)$ (which, incidentally, is the coaction $\delta_{\mathcal{M}}$ for the trivial one-dimensional Fell bundle ${\mathcal{M}}={\mathbb{C}}\times G$). \[rem:cond-exp\] There is a canonical normal conditional expectation $E\colon W^*_{\mathrm{r}}({\mathcal{M}}){\twoheadrightarrow}M_e$ given on generators by $E(\Lambda(a))=\delta_{t,e}(a)$ for all $a\in M_t$. This can be proved as in the [C\*-]{}case, or it can be deduced from the existence of the dual coaction $\delta_{\mathcal{M}}$ above as follows: Consider the canonical tracial state $\tau\colon W^*_{\mathrm{r}}(G)\to {\mathbb{C}}$ given by $\tau(x)={\langle\delta_e\!\mid\!x\delta_e\rangle}$. Then $E=({\textup{id}}\otimes\tau)\circ\delta_{\mathcal{M}}$ is the desired conditional expectation. \[pro:kernel-CP\] For a [W\*-]{}Fell bundle ${\mathcal{M}}$, we have a canonical isomorphism $$W^*_{\mathrm{r}}({\mathcal{M}})\bar\rtimes_{\delta_{\mathcal{M}}} G\cong {\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}),$$ that identifies a generator $\delta_{\mathcal{M}}(a)(1\otimes f)\in W^*_{\mathrm{r}}({\mathcal{M}})\bar\rtimes_{\delta_{\mathcal{M}}} G$ with the kernel $k_{a,f}(s,t):=a(st^{-1})f(t)$ for $a\in {{C}_c}({\mathcal{M}})$ and $f\in \ell^\infty(G)$. This isomorphism is $G$-equivariant with respect to the dual $G$-action on $W^*_{\mathrm{r}}({\mathcal{M}})\bar\rtimes_{\delta_{\mathcal{M}}} G$ and the canonical $G$-action on ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$. Let $N:=W^*_{\mathrm{r}}({\mathcal{M}})$ and $\delta:=\delta_{\mathcal{M}}$. We show how to turn $\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})$ into a [W\*-]{}Hilbert $N\bar\rtimes_\delta G$-$M_e$-bimodule. Consider the map $\iota\colon {{C}_c}({\mathcal{M}})\to N\otimes_{{\operatorname{alg}}}{{C}_c}(G){\subseteq}N\bar\otimes\ell^2(G)$ defined by $\iota(\xi)=\delta(\xi)(1\otimes\delta_e)=\sum_{s\in G}\Lambda(\xi(s))\otimes\delta_s$. Here and throughout this proof $(\delta_s)_{s\in G}$ will also denote the standard ortonormal basis of $\ell^2(G)$ – apologies for the overuse of the symbol $\delta$ here! Let $X$ be the ${{\operatorname{w}^*}}$-closure of the image of $\iota$ in $N\bar\otimes\ell^2(G)$. Notice that with respect to the $N$-inner product on $N\bar\otimes\ell^2(G)$ we have $${\langle\iota(\xi)\!\mid\!\iota(\eta)\rangle}_N=\sum_{s,t\in G}{\langle\Lambda(\xi(s)\otimes\delta_s)\!\mid\!\Lambda(\eta(t))\otimes\delta_t\rangle}=\Lambda({\langle\xi\!\mid\!\eta\rangle}_{M_e}),$$ for all $\xi,\eta\in {{C}_c}({\mathcal{M}})$, where ${\langle\xi\!\mid\!\eta\rangle}_{M_e}$ denotes the $M_e$-valued inner product on ${{C}_c}({\mathcal{M}}){\subseteq}\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})$. Since $\Lambda$ is a [W\*-]{}embedding $M_e{\hookrightarrow}N$, it follows that the image of the $N$-valued inner product on $X$ takes values in $\Lambda(M_e)\cong M_e$ so that $X$ can be viewed as a right [W\*-]{}Hilbert $M_e$-module and $\iota$ extends to an isomorphism $\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})\cong X$ of [W\*-]{}Hilbert $M_e$-modules. The advantage of this picture is that $X$ is also canonically a left [W\*-]{}Hilbert $N\bar\rtimes_\delta G$-module, where the left inner product is defined by $_I{\langle\xi\!\mid\!\eta\rangle}:=\delta(\xi)(1\otimes \chi_e)\delta(\eta^*)\in I$ for $\xi,\eta\in {{C}_c}({\mathcal{M}})$. The image of this inner product generates a [W\*-]{}ideal $I$ of $N\bar\rtimes_\delta G$, namely the [W\*-]{}ideal generated by the projection $p:=\chi_e$. It follows that $I\cong {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$; this isomorphism identifies $\delta(\xi)(1\otimes p)\delta(\eta^*)$ with $\theta_{\xi,\eta}={\lvert\xi\rangle}{\langle\eta\rvert}\in {\mathcal{K}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}})){\subseteq}{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$, and it is determined by this formula and the fact that it is ${{\operatorname{w}^*}}$-continuous. Next, considering the dual $G$-action ${\widehat{\delta}}$ on $Q:=N\bar\rtimes_\delta G$, we notice that the linear $G$-orbit of $I$ is ${{\operatorname{w}^*}}$-dense. This is because ${\widehat{\delta}}_{t^{-1}}(\chi_e)=\chi_t,$ so that ${\widehat{\delta}}_{t^{-1}}(I)$ is the [W\*-]{}ideal of $N\bar\rtimes_\delta G$ generated by the projection $p_t=\chi_t$, and these projections generate $\ell^\infty(G)$ as a [W\*-]{}algebra. Therefore ${\widehat{\delta}}$ can be viewed as the [W\*-]{}enveloping action of its restriction ${\widehat{\delta}}|_I$. On the other hand, the $G$-action on the [W\*-]{}algebra of kernels ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ is also enveloping for a partial action on ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$. By uniqueness of enveloping [W\*-]{}actions (Proposition \[pro:enveloping-vn-partial\]), to see that ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})\cong Q$, it is enough to see that the restriction of ${\widehat{\delta}}$ to $I$ coincides with the partial action on ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$ obtained as restriction of the $G$-action $\beta^{{\operatorname{w}^*}}$ on ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$. But by definition, $\beta^{{\operatorname{w}^*}}$ is the unique ${{\operatorname{w}^*}}$-continuous extension of the $G$-action $\beta$ on the [C\*-]{}algebra of kernels ${\mathbb{k}}({\mathcal{M}})$ given by $\beta_r(k)(s,t)=k(sr,tr)$ for a kernel $k\in {\mathbb{k}}_c({\mathcal{M}})$. An elementary compact operator $\theta_{\xi,\eta}\in {\mathcal{K}}(\ell^2({\mathcal{M}})){\subseteq}{\mathcal{K}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$ identifies with the kernel function $k_{\xi,\eta}(s,t):=\xi(s)\eta(t)^*$. And by [@Abadie:Enveloping]\*[Proposition 8.1]{} we have a [C\*-]{}isomorphism ${\mathbb{k}}({\mathcal{M}})\cong B:=C^*_{\mathrm{r}}({\mathcal{M}})\rtimes_{\delta} G$ that is $G$-equivariant for the dual $G$-action ${\widehat{\delta}}$ on $B$ and $\beta$ on ${\mathbb{k}}({\mathcal{M}})$. Here $\delta$ also denotes the dual coaction of $G$ on $C^*_{\mathrm{r}}({\mathcal{M}})$; this is a restriction of the dual coaction on $N=W^*_{\mathrm{r}}({\mathcal{M}})$, denoted by the same symbol $\delta$. The isomorphism ${\mathbb{k}}({\mathcal{M}})\cong B$ is given as in the statement (see the proof of Proposition 8.1 in [@Abadie:Enveloping]). The [C\*-]{}algebra of compact operators ${\mathcal{K}}(\ell^2({\mathcal{M}}))$ identifies, as above, with the [C\*-]{}ideal $J$ of $B$ generated by $p=\chi_e$. This is ${{\operatorname{w}^*}}$-dense in $I$. Since the partial $G$-action on $J$ we get from viewing it as an ideal of ${\mathbb{k}}({\mathcal{M}})$ coincides with the partial action coming from the dual action on $B$, the same has to be true for the ${{\operatorname{w}^*}}$-closures, that is, via the isomorphism ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))\cong I$ the partial action on $I$ we get by restriction of ${\widehat{\delta}}$ is the partial action we get from ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ by restricting it to the [W\*-]{}ideal ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$. \[cor:duality\] For every W\*-Fell bundle ${\mathcal{M}}$ we have a canonical isomorphism $${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})\rtimes_{\beta^{{\operatorname{w}^*}}}G\cong W^*_{\mathrm{r}}({\mathcal{M}})\bar\otimes{\mathcal{L}}(\ell^2G).$$ This follows from Proposition \[pro:kernel-CP\] and general duality theory for crossed products by W\*-coactions, see [@Nakagami-Takesaki:Duality]. We recall from [@Abadie-Buss-Ferraro:Morita_Fell] that given a Fell subbundle ${\mathcal{A}}$ of ${\mathcal{B}}$ we can identify ${\mathbb{k}}({\mathcal{A}})$ with the norm closure of ${\mathbb{k}}_c({\mathcal{A}})$ in ${\mathbb{k}}({\mathcal{B}}).$ This inclusion has a [W\*-]{}counterpart. \[cor:inclusion of wstar algebra of kernels\] If $\mathcal{N}$ is a [W\*-]{}Fell subbundle of ${\mathcal{M}}$ and we view ${\mathbb{k}}(\mathcal{N})$ as a [C\*-]{}subalgebra of ${\mathbb{k}}({\mathcal{M}})\subset {\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}),$ then ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ is isomorphic to the ${{\operatorname{w}^*}}-$closure of ${\mathbb{k}}(\mathcal{N})$ in ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}).$ The inclusion ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})\subset {\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ is just the inclusion $W^*_{\mathrm{r}}(\mathcal{N})\bar\rtimes_{\delta_\mathcal{N}} G\subset W^*_{\mathrm{r}}({\mathcal{M}})\bar\rtimes_{\delta_{\mathcal{M}}} G$ provided by Proposition \[pro:kernel-CP\]. Exel’s approximation property and AD-amenability {#sec:AP-ADA} ================================================ The main goal of this section is to compare the notion of amenability in the sense of Anantharaman-Delaroche with the approximation property introduced by Exel in [@Exel:Amenability]. We start by recalling Exel’s approximation property: A Fell bundle ${\mathcal{B}}=\{B_t\}_{t\in G}$ has the approximation property (AP) if there exists a net $\{a_i\}_{i\in I}$ of functions $a_i\colon G\to B_e$ with finite support such that (i) $\sup_{i\in I} \|\sum_{r\in G} a_i(r)^*a_i(r)\|<\infty$. (ii) For every $t\in G$ and $b\in B_t$, $\lim_i \| b- \sum_{r\in G} a_i(tr)^*ba_i(r)\|=0$. A partial action $\alpha$ on a C\*-algebra has the AP if the semidirect product bundle ${\mathcal{B}}_\alpha$ has the AP. \[rem:equivalent to AP\] Notice that (1) above means that $\{a_i\}_{i\in I}$ is a bounded net when viewed as a net in the Hilbert $B_e$-module $\ell^2(G,B_e)$. Indeed, the original definition of the AP in [@Exel:Amenability] uses such nets and Proposition 4.5 in [@Exel:Amenability] says that both definitions are equivalent (the difference being whether the supports of the functions are required to be finite or not). Condition (2) can also be weakened: it is enough to check the norm convergence in (2) for $b$ in total subsets of $B_t$, that is, for $b$ in a subset $B_t^0$ spanning a norm-dense subset of $B_t$ for each $t\in G$. As a way of combining Exel’s approximation property and amenability in the sense of Anantharaman-Delaroche ([@Anantharaman-Delaroche:ActionI; @Anantharaman-Delaroche:ActionII; @Anantharaman-Delaroche:Systemes]), we introduce the following: \[def:WAP for W-Fell bundles\] A [W\*-]{}Fell bundle $\mathcal{M}=\{M_t\}_{t\in G}$ has the [W\*-]{}approximation property (W\*AP) if there exists a net of functions $\{a_i\colon G\to M_e\}_{i\in I}$ with finite support such that (i) $\sup_{i\in I} \|\sum_{r\in G} a_i(r)^*a_i(r)\|<\infty$, and (ii) for every $t\in G$ and $b\in M_t$, $$\lim_i \sum_{r\in G} a_i(tr)^*ba_i(r)=b$$ in the ${{\operatorname{w}^*}}$-topology of $M_t$. We say that a [W\*-]{}partial action $\gamma$ has the W\*AP if the associated [W\*-]{}Fell bundle ${\mathcal{B}}_\gamma$ has the W\*AP. A ([C\*-]{}algebraic) Fell bundle ${\mathcal{B}}$ has the WAP if its [W\*-]{}enveloping Fell bundle ${\mathcal{B}}''$ has the W\*AP and a [C\*-]{}partial action $\alpha$ has the WAP if $\alpha''$ has the W\*AP. The reader should read WAP as “weak approximation property”, the reason for this will be clear after Theorem \[thm:the mega theorem\]. We recommend to read the statement of that theorem at this point to get a feeling of what we want to do next. Remark \[remark: bidual partial action and bidual bundle\] implies that a [C\*-]{}partial action $\alpha$ has the WAP if and only if ${\mathcal{B}}_\alpha$ has the WAP. We shall prove in what follows that AD-amenability and the WAP are equivalent notions, first for global actions and later also for general Fell bundles. This is not trivial, even for global actions, because the AD-amenability of a global action requires the existence of a certain net that takes central values (see Theorem \[the:ADA-characterisations\]) while for the WAP this is not explicitly necessary (Definition \[def:WAP for W-Fell bundles\]). Let $\gamma$ be a (global) action of $G$ on the [W\*-]{}algebra $N$. As usual, we write $\tilde{\gamma}$ for the action of $G$ on $\ell^\infty(G,N)$ given by $\tilde{\gamma}_t(f)(r)=\gamma_t(f(t^{-1}r))$ and view $N$ as the subalgebra of constant functions in $\ell^\infty(G,N)$. Abusing the notation we also use the same notation for the $G$-action on functions $f\in \ell^2(G,N)$. The following result gives an explicit characterisation of the W\*AP for global actions. Let $\gamma$ be a global action of $G$ on a W\*-algebra $N$. Then $\gamma$ has the W\*AP if and only if there exists a net $\{a_i\}_{i\in I}$ of finitely supported functions $a_i\colon G\to N$ such that $\{a_i\}_{i\in I}$ is bounded in $\ell^2(G,N)$ and $\{\langle a_i,b\tilde{\gamma}_t(a_i)\rangle_2\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to $b$ for all $b\in N$ and $t\in G$. We view the fibre of ${\mathcal{B}}_\gamma$ at $t$ as $N\delta_t$ and denote its elements by $x\delta_t$. With this notation $x\delta_ty\delta_s = x\gamma_t(y)\delta_{ts}$ and $(x\delta_t)^* = \gamma_{t^{-1}}(x^*)\delta_{t^{-1}}$. Viewing $x\in N$ as $x\delta_e$, we can then think of a function $a\colon G\to N$ as a function from $G$ to the unit fibre $N\delta_e\equiv N$. If $a\colon G\to N$ has finite support, then for every $t\in G$ and $b\in N$ we have: $\sum_{r\in G} (a(r)\delta_e)^*(a(r)\delta_e)=\sum_{r\in G}a(r)^*a(r)$ and $$\begin{aligned} \sum_{r\in G} (a(tr)\delta_e)^*b\delta_t a(r)\delta_e & = \sum_{r\in G} a(tr)^*b\gamma_t(a(r)))\delta_t\\ & = \sum_{r\in G} a(r)^*b\gamma_t(a(t^{-1}r)))\delta_t = \langle a,b\tilde{\gamma}_t(a)\rangle\delta_t.\end{aligned}$$ The proof follows directly from the computations above and from the fact that under the identification $N\to N\delta_t,\ x\mapsto x\delta_t$, the ${{\operatorname{w}^*}}$-topology of $N\delta_t$ is just the ${{\operatorname{w}^*}}$-topology of $N$. In order to show that the W\*AD-amenability is equivalent to W\*AP for W\*-Fell bundles we shall need the following result: \[lem:characterization of AD amenability with dense subalgebra\] Let $\gamma$ be a W\*-global action of $G$ on $N.$ Then $\gamma$ is AD-amenable if and only if there exists a $\gamma$-invariant ${{\operatorname{w}^*}}$-dense \*-subalgebra $A\subset N$ and a bounded net $\{a_i\}_{i\in I}\subset \ell^2(G,N)$ of functions with finite support such that for all $b\in A$ and $t\in G,$ $\{\langle a_i,b\tilde{\gamma}_t(a_i)\rangle_2\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to $b$. The direct implication follows from Theorem \[the:ADA-characterisations\] (with $A=N$). For the converse we view $N$ as a concrete (unital) von Neumann algebra of operators on some Hilbert space $H$, $N\subset {\mathcal{L}}(H),$ and take a \*-subalgebra $A{\subseteq}N$ and a net $\{a_i\}_{i\in I}$ as in the statement. For $t\in G$ and $i\in I$ we define $\varphi_i^t\colon N\to N$ by $\varphi^t_i(b):={\langlea_i\!\mid\!b\tilde\gamma_t(a_i)\rangle}$. Then $(\varphi^t_i)_{i\in I}$ is a net of uniformly bounded linear maps (with uniform bound $c:=\sup_i \|a_i\|_2^2<\infty$). By assumption $\varphi_i^t(b)\to b$ in the weak\*-topology for every $b\in A$ and $t\in G$. A standard argument shows that the same happens for all $b$ in the norm closure of $A$ which is then a (w\*-dense) C\*-subalgebra of $N$. Hence we may assume, without loss of generality, that $A$ is already a C\*-algebra. In particular we may assume that $A$ is closed by continuous functional calculus and that $\Lambda:=\{x\in A\colon 0\leq x\leq 1\}$ is an approximate unit for $A$ and thus ${{\operatorname{w}^*}}$-converges to $1_N$ (this follows from the assumption that $A$ is w\*-dense in $N$). For each $(i,\lambda)\in I\times \Lambda$ we define $$P_{i,\lambda}\colon \ell^\infty(G,N)\to N, \ P_{i,\lambda}(f) = \langle \lambda^{1/2} a_i,f \lambda^{1/2}a_i\rangle,$$ where the product $f \lambda^{1/2}a_i$ represents the diagonal action of $f \lambda^{1/2}\in \ell^\infty(G,N)$ on $\ell^2(G,N)$. Each $P_{i,\lambda}$ is a completely positive linear map with norm $\|P_{i,\lambda}\|=\|\lambda^{1/2}a_i\|^2_2\leq c:=\sup_{i\in I}\|a_i\|_2^2<\infty$. Let $K$ be the Hilbert space $\ell^2(\Lambda,H)$ and define, for each $i\in I,$ the function $$P_i\colon \ell^\infty(G,N) \to {\mathcal{L}}(K),\ P_i(f)g|_\lambda=P_{i,\lambda}(f)(g|_\lambda).$$ If we view $K=\ell^2(\Lambda,H)$ as the direct sum of $\Lambda$-copies of $H$, then $P_i(f)$ is the “diagonal” operator formed by the family $(P_{i,\lambda})_{\lambda}.$ Thus $P_i$ is completely positive and $\|P_i\|\leq c$ for all $i\in I$. The set of completely positive maps $Q\colon \ell^\infty(G,N)\to {\mathcal{L}}(K)$ with $\|Q\|\leq c$ is compact with respect to the topology of pointwise ${{\operatorname{w}^*}}$-convergence, thus there exists a completely positive map $P\colon \ell^\infty(G,N)\to {\mathcal{L}}(K)$ and a subnet $\{P_{i_j}\}_{j\in J}$ such that $P(f)=\lim_j P_{i_j}(f)$ in the ${{\operatorname{w}^*}}$-topology for every $f\in \ell^\infty(G,N).$ By passing to a subnet we may therefore assume that $\{P_i\}_{i\in I}$ converges to $P$ for the pointwise ${{\operatorname{w}^*}}$-topology. As a consequence of the last paragraph we get that, for each $f\in \ell^\infty(G,N)$ and $\lambda\in \Lambda,$ $\{P_{i,\lambda}(f)\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to some $P_\lambda(f).$ In fact, the map $P_\lambda\colon \ell^\infty(G,N)\to N,$ $f\mapsto P_\lambda(f),$ is completely positive and $\|P_\lambda\|\leq c$ for all $\lambda\in \Lambda.$ For each $\lambda\in \Lambda$ we define $Q_\lambda\colon \ell^\infty(G,Z(N))\to N{\subseteq}{\mathcal{L}}(H)$ as the restriction of $P_\lambda.$ We claim that $\{Q_\lambda\}_{\lambda\in \Lambda}$ converges ${{\operatorname{w}^*}}$-pointwise. Indeed, it suffices to prove that for each positive $f\in \ell^\infty(G,Z(N))$ the net $\{Q_\lambda(f)\}_{\lambda\in \Lambda}$ is increasing. Take $\lambda,\mu\in \Lambda$ with $\lambda\leq \mu.$ Then, for every $h\in H$ and $i\in I$: $$\begin{aligned} \langle h,P_{i,\lambda}(f)h\rangle & = \sum_{r\in G} \langle a_i(r)h,\lambda^{1/2}f(r)\lambda^{1/2} a_i(r)h\rangle \\ & = \sum_{r\in G} \langle a_i(r)h,f^{1/2}(r)\lambda f^{1/2}(r)a_i(r)h\rangle \\ & \leq \sum_{r\in G} \langle a_i(r)h,f^{1/2}(r)\mu f^{1/2}(r)a_i(r)h\rangle = \langle h,P_{i,\mu}(f)h\rangle. \end{aligned}$$ Taking limit in $i$ we get $\langle h,Q_{\lambda}(f)h\rangle \leq \langle h,Q_{\mu}(f)h\rangle$ and it follows $Q_\lambda(f)\leq Q_\mu(f).$ Let $Q\colon \ell^\infty(G,Z(N))\to N$ be the pointwise ${{\operatorname{w}^*}}$-limit of $\{Q_\lambda\}_{\lambda\in \Lambda}.$ Let us prove that the image of $Q$ is contained in $Z(N).$ It suffices to show that for $f\in \ell^\infty(G,Z(N))^+$ and a self-adjoint $b\in A,$ $Q(f)b$ is self-adjoint. Let $\{P_{\lambda_j}\}_{j\in J}$ be a pointwise ${{\operatorname{w}^*}}$-convergent subnet of $\{P_\lambda\}_{\lambda\in \Lambda}.$ Clearly, both $fb$ and $P(fb)$ are self-adjoint. We claim that $Q(f)b=P(fb).$ Fix $h,k\in H.$ Using the inner product of $\ell^2_{{{\operatorname{w}^*}}}(G,N)\otimes_{N}H $ in the following computations, we deduce $$\begin{aligned} |\langle h, (Q(f)b-P(fb))k\rangle | & = \lim_j \lim_i |\langle \lambda_j^{1/2} a_i\otimes h,f\left( \lambda_j^{1/2}a_i\otimes bk - b\lambda_j^{1/2} a_i\otimes k\right) \rangle |\\ & \leq \lim_j \lim_i \sqrt{c}\|h\|\|f\|\| \lambda_j^{1/2}a_i\otimes bk - b\lambda_j^{1/2} a_i\otimes k\|. \end{aligned}$$ The double limit above is zero because $\lim_j \lim_i \| \lambda_j^{1/2}a_i\otimes bk - b\lambda_j^{1/2} a_i\otimes k\|^2$ is $$\begin{aligned} \lim_j \lim_i \langle bk,\langle a_i,\lambda_j a_i\rangle bk \rangle & + \langle k,\langle a_i,\lambda_j^{1/2}b^2\lambda_j^{1/2} a_i\rangle k \rangle-\\ & - \lim_j\lim_i \langle bk,\langle a_i,\lambda_j^{1/2}b\lambda_j^{1/2} a_i\rangle k \rangle - \langle k,\langle a_i,\lambda_j^{1/2}b\lambda_j^{1/2} a_i\rangle bk \rangle\\ = \lim_j \langle bk,\lambda_j bk \rangle +& \langle k,\lambda_j^{1/2}b^2\lambda_j^{1/2} k \rangle- \langle bk,\lambda_j^{1/2}b\lambda_j^{1/2} k \rangle - \langle k,\lambda_j^{1/2}b\lambda_j^{1/2} bk \rangle\\ = \langle bk,bk \rangle +\langle k,&b^2 k \rangle - \langle bk,b k \rangle - \langle k,bbk \rangle=0. \end{aligned}$$ This shows that $Q(f)b=P(fb)$. From now on we think of $Q$ as a completely positive map from $\ell^\infty(G,Z(N))$ to $Z(N).$ We claim that $Q$ is a projection. Take $a\in Z(N).$ Then, in the ${\operatorname{wot}}$ topology: $$Q(a) = \lim_\lambda \lim_i P_{i,\lambda}(a)=\lim_\lambda \lim_i \langle a_i,\lambda a a_i\rangle =\lim_\lambda \lim_i a \langle a_i,\lambda a_i\rangle=\lim_\lambda a\lambda = a.$$ In particular $Q(1)=1,$ so $Q$ is a norm one projection. The proof will be completed once we show $Q$ is equivariant. Suppose we can prove, for all $f\in \ell^\infty(G,Z(N)),$ that $$\label{equ:almost equivariance with lambda} Q_{\lambda}(\tilde{\gamma}_t(f))=\gamma_t(Q_{\gamma_{t^{-1}}(\lambda)}(f)).$$ Since $\{\gamma_t(\lambda)\}_{\lambda\in \Lambda}$ is a subnet of $\{\lambda\}_{\lambda\in \Lambda},$ if we take the ${{\operatorname{w}^*}}$-limit in we obtain $$Q(\tilde{\gamma}_t(f))=\lim_\lambda Q_{\lambda}(\tilde{\gamma}_t(f)) =\gamma_t( \lim_{\lambda} Q_{\gamma_{t^{-1}}(\lambda)}(f)) = \gamma_t( Q(f)).$$ Hence the proof will be complete after we show . Fix $f\in \ell^\infty(G,Z(N))^+,$ $\lambda\in \Lambda$ and $t\in G.$ In the ${{\operatorname{w}^*}}$-topology: $$\begin{aligned} Q_\lambda(\tilde{\gamma}_t(f)) & = \lim_i \langle \lambda^{1/2}a_i,\tilde{\gamma}_t(f)\lambda^{1/2} a_i\rangle = \lim_i \gamma_t(\langle \tilde{\gamma}_{t^{-1}}(a_i),\gamma_{t^{-1}}(\lambda)f\tilde{\gamma}_{t^{-1}}(a_i)\rangle)\end{aligned}$$ We know that the net $\{\langle \tilde{\gamma}_{t^{-1}}(a_i),\gamma_{t^{-1}}(\lambda)f\tilde{\gamma}_{t^{-1}}(a_i)\rangle\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges. We only need to prove it ${\operatorname{wot}}$-converges to $Q_{\gamma_{t^{-1}}(\lambda)}(f).$ To avoid the annoying inverse $t^{-1},$ we change $t$ by $t^{-1}.$ Note that $\langle \tilde{\gamma}_{t}(a_i),\gamma_{t}(\lambda)f\tilde{\gamma}_{t}(a_i)\rangle= \langle f^{1/2}\tilde{\gamma}_{t}( \lambda^{1/2} a_i),f^{1/2}\tilde{\gamma}_{t}( \lambda^{1/2} a_i)\rangle$ is self-adjoint, and so it is $Q_{\gamma_{t}(\lambda)}(f).$ Thus, it suffices to show that, for all $h\in H,$ $$\lim_i\langle h, \langle \tilde{\gamma}_{t}(a_i),\gamma_{t}(\lambda)f\tilde{\gamma}_{t}(a_i)\rangle h\rangle = \langle h,Q_{\gamma_t(\lambda)}(f)h\rangle$$ In any Hilbert space we have $|\|x\|^2-\|y\|^2|\leq (\|x\|+\|y\|)\|x-y\|.$ In particular we use this inequality in $\ell^2_{{{\operatorname{w}^*}}}(G,N)\otimes_{N}H $: $$\begin{aligned} \lim_i|\langle h, \langle \tilde{\gamma}_{t}(a_i),&\gamma_{t}(\lambda)f\tilde{\gamma}_{t}(a_i)\rangle h\rangle - \langle h,Q_{\gamma_t(\lambda)}(f)h\rangle | = \\ & = \lim_i | \|f^{1/2}\tilde{\gamma}_t(\lambda^{1/2}a_i)\otimes h\|^2- \| f^{1/2}\gamma_t(\lambda^{1/2})a_i\otimes h \|^2 |\\ & \leq \lim_i 2\|f\|^{1/2}\|a_i\|_2\|h\|\|f^{1/2}(\tilde{\gamma}_t(\lambda^{1/2}a_i)-\gamma_t(\lambda^{1/2})a_i)\otimes h \| \\ & \leq \lim_i 2\|f\|\|a_i\|_2\|h\|\|\gamma_t(\lambda^{1/2})(\tilde{\gamma}_t(a_i)-a_i)\otimes h \| \\\end{aligned}$$ Moreover, $\{\|a_i\|_2\}_{i\in I}$ is bounded and the limit of $\{\|\gamma_t(\lambda^{1/2})(\tilde{\gamma}_t(a_i)-a_i)\otimes h \|^2\}_{i\in I}$ is $$\begin{gathered} \lim_i \langle h, \gamma_t(\langle a_i,\lambda a_i\rangle) h\rangle + \langle h, \langle a_i,\gamma_t(\lambda)a_i\rangle h\rangle-\\ -\lim_i \langle h, \langle \tilde{\gamma}_t(a_i),\gamma_t(\lambda)a_i\rangle h\rangle+\langle h, \langle a_i,\gamma_t(\lambda)\tilde{\gamma}_t(a_i)\rangle h\rangle\\ =\langle h, \gamma_t(\lambda) h\rangle + \langle h, \gamma_t(\lambda) h\rangle- \langle h, \gamma_t(\lambda) h\rangle-\langle h, \gamma_t(\lambda) h\rangle = 0.\end{gathered}$$ This implies and the proof is complete. The next remark will be extremely useful to show that W\*AD-amenability and the W\*AP are equivalent. \[rem:matrix algebras of Fell bundles\] For a Fell bundle ${\mathcal{B}}=\{B_t\}_{t\in G}$ and an ordered set $F=\{t_1,\ldots,t_n\}\subset G$, the algebra $\mathbb{M}_F({\mathcal{B}})$ formed by the $n\times n$ matrices $M=(M_{i,j})_{i,j=1}^n$ such that $M_{i,j}\in B_{t_i t_j^{-1}}$, is a C\*-algebra with usual matrix involution and multiplication [@Abadie-Ferraro:Equivalence_of_Fell_Bundles]\*[Lemma 2.8]{}. The C\*-norm is equivalent to $\|M\|_\infty:={\mathrm{max}}_{i,j} \|M_{i,j}\|$ and each $B_{t_i t_j^{-1}}$ may be isometrically identified with a subspace of $\mathbb{M}_F({\mathcal{B}})$. Moreover, $\mathbb{M}_F ({\mathcal{B}})''=\mathbb{M}_F({\mathcal{B}}'').$ \[thm: WAP iff AD amenable for wstar Fell bundles\] A W\*-Fell bundle is W\*AD-amenable if and only if it has the W\*AP. Assume that the W\*-Fell bundle $\mathcal{M}$ over the group $G$ is W\*AD-amenable. By Corollary \[cor:equivalence of AD amenability\] the central partial action $\gamma$ on $Z:=Z(M_e)$ is W\*AD-amenable. Let $\delta$ be the W\*-enveloping action of $\gamma,$ acting on the commutative W\*-algebra $Y.$ We know that $Z$ is a W\*-ideal of $Y$ and that $\delta$ is W\*AD-amenable. Let $\{\xi_i\}_{i\in I}\subset \ell^2(G,Y)$ be a net for $\gamma$ as in Theorem \[the:ADA-characterisations\] and let $p\in Y$ be the unit of $Z.$ We define $a_i:=\xi_i p$ and claim that $\{a_i\}_{i\in I}\subset \ell^2(G,Z)$ is a net as in the definition of the W\*AP. First of all note that $\{a_i\}_{i\in I}$ is bounded because $\langle a_i,a_i\rangle = p \langle \xi_i,\xi_i\rangle,$ for all $i\in I.$ If $p_t$ is the unit of $Z_t=Z\cap\delta_t(Z),$ then for every $t\in G$ and $x\in M_t$ we have (by the definition of the central partial action): $$\begin{aligned} \lim_i \sum_{r\in G} a_i(tr)^* xa_i(r) & = \lim_i \sum_{r\in G} a_i(tr)^* xp_{t^{-1}}a_i(r) = \lim_i \sum_{r\in G} a_i(tr)^*\gamma_t(p_{t^{-1}}a_i(r)) x \\ & = \lim_i \sum_{r\in G} p\xi_i(tr)^*p_t\delta_t(p) \delta_t(\xi_i(r)) x = \lim_i p_t\langle \xi_i,\tilde{\delta}_t(\xi_i)\rangle x\\ & = p_t x = x, \end{aligned}$$ where the limits are taken in the ${{\operatorname{w}^*}}$-topology. This shows that $\mathcal{M}$ has the W\*AP. Now assume that $\mathcal{M}$ has the W\*AP. We will show that the canonical W\*-action $\beta^{{\operatorname{w}^*}}$ on ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ is W\*AD-amenable using Lemma \[lem:characterization of AD amenability with dense subalgebra\] and Theorem \[the:ADA-characterisations\]. We set $\gamma:=\beta^{{\operatorname{w}^*}},$ $N:={\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ and $A:={\mathbb{k}}_c(\mathcal{M}).$ Recall that $N$ is a W\*-completion of ${\mathbb{k}}(\mathcal{M})$ and that $A$ is norm dense in ${\mathbb{k}}(\mathcal{M}).$ Hence $A$ is ${{\operatorname{w}^*}}$-dense in $N.$ Moreover, $A$ is $\gamma$ invariant because $A$ is invariant under the canonical action on ${\mathbb{k}}(\mathcal{M}).$ We claim that $\mathbb{M}_F(\mathcal{M})$ is a W\*-subalgebra of $N.$ This is important because in such a case the convergence in the topology of $\mathbb{M}_F(\mathcal{M})$ relative to the ${{\operatorname{w}^*}}$-topology of $N$ is just entrywise ${{\operatorname{w}^*}}$-convergence on the matrix algebra $\mathbb{M}_F(\mathcal{M}).$ Recall that we defined $N={\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M})$ as the ${{\operatorname{w}^*}}$-closure of the image of the map $\pi^\beta\colon {\mathbb{k}}(\mathbb{M})\to \ell^\infty(G,{\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M})))$ (see section \[ssec:wstar algebra of kernels\]). Thus it suffices to prove that the image of $\rho\colon \mathbb{M}_F(\mathcal{M})\to {\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}(\mathcal{M})),$ $\rho(k)f(r)=\sum_{s\in G} k(r,s)f(s),$ is a W\*-subalgebra. Here we think of the matrix $k$ as a kernel of compact support. For all $f,g\in \ell^2_{{\operatorname{w}^*}}(\mathcal{M})$ the map $\mathbb{M}_F(\mathcal{M})\to M_e,$ $k\mapsto \langle f,\rho(k)g\rangle$ is ${{\operatorname{w}^*}}$-continuous. Hence the closed unit ball $\rho(\mathbb{M}_F(\mathcal{M}))_1$ is ${{\operatorname{w}^*}}$-compact by Lemma \[lem:weak star topology of adjointable operators\], so we conclude that the image of $\rho$ is a W\*-subalgebra. Take a net of functions $\{a_j\}_{j\in J}$ as in the definition of W\*AP for $\mathcal{M}.$ Let $\mathcal{F}$ be the set of finite subsets of $G$ and consider $\Xi:=\mathcal{F}\times J$ as a directed set with the order $(U,j)\leq (V,i)$ $\Leftrightarrow$ $U{\subseteq}V$ and $j\leq i$. For each $\xi=(U,j)\in \Xi$ let $a_\xi\colon G\to \mathbb{M}_U(\mathcal{M})$ be such that for every $r\in G$, $a_\xi(r)$ is the diagonal matrix with all the entries in the diagonal equal to $a_j(r)$. Note $\|\langle a_\xi,a_\xi\rangle \|=\|\langle a_j,a_j\rangle\|.$ Observe also that $\gamma_t(\mathbb{M}_U(\mathcal{M}))=\mathbb{M}_{Ut^{-1}}(\mathcal{M})$. Fix $t\in G$ and $k\in A.$ Take a finite set $U_0{\subseteq}G$ such that $\operatorname{\mathrm{supp}}(k){\subseteq}U_0\times U_0$. If $\xi=(U,i)\in \Xi$ is such that $U\supseteq U_0\cup U_0t$, that is, $U_0{\subseteq}U \cap U t^{-1}$, then $$\langle a_\xi,k\tilde{\gamma}_t(a_\xi)\rangle =\sum_{r\in G} a_\xi(tr)^* k\gamma_t(a_\xi(r)) ,$$ and $a_\xi(tr)^*k\gamma_t(a_\xi(r))\in \mathbb{M}_{\operatorname{\mathrm{supp}}(k)}(\mathcal{M})$. Moreover, considering the left and right entrywise action of $M_e$ on $\mathbb{M}_{\operatorname{\mathrm{supp}}(k)}(\mathcal{M})$, $a_\xi(tr)^*k\gamma_t(a_\xi(r))=a_j(tr)^*ka_j(r)$. It is then clear that $\lim_\xi \langle b_\xi,k\tilde{\gamma}_t(b_\xi)\rangle = k$ ${{\operatorname{w}^*}}$-entrywise and hence ${{\operatorname{w}^*}}$ in $N.$ \[rem:net in the center in the WAP\] In the proof above we incidentally showed that the net $\{a_i\}_{i\in I}$ in the Definition of the W\*AP can be taken in the unit ball of $\ell^2(G,Z(M_e)),$ without altering the definition. \[corollary:AD amenability and WAP\] A W\*-partial (resp. C\*-partial) action has the W\*AP (resp. WAP) if and only if it is W\*AD-amenable (resp. AD-amenable). Follows at once from the Theorem above and Remark \[rem:AD amenability of partial action and semidirect product bundle\]. Our next goal is to give alternative characterisations of the WAP for Fell bundles. \[thm:the mega theorem\] For every Fell bundle ${\mathcal{B}}$ over a group $G$ the following are equivalent: (i) \[item:AD\] ${\mathcal{B}}$ is AD-amenable. (ii) \[item:WAP\] ${\mathcal{B}}$ has the WAP. (iii) \[item:W\*AD\] ${\mathcal{B}}''$ is the W\*AD-amenable. (iv) \[item:W\*AP\] ${\mathcal{B}}''$ has the W\*AP. (v) \[item:net in center bidual\] There exists a bounded net $\{a_i\}_{i\in I}\subset \ell^2(G,Z(B_e''))$ of functions with finite support such that, for every $t\in G$ and $b\in B_t,$ $\lim_i \sum_{r\in G}a_i(tr)^*ba_i(r)=b$ in $B_t''$ with respect to the ${{\operatorname{w}^*}}$-topology. (vi) \[item:netbe\] There exists a bounded net $\{a_i\}_{i\in I}\subset \ell^2(G,B_e)$ of functions with finite support such that, for every $t\in G$ and $b\in B_t,$ $\lim_i \sum_{r\in G}a_i(tr)^*ba_i(r)=b$ in the weak topology of $B_t.$ The equivalences between (\[item:AD\]) and (\[item:W\*AD\]) and between (\[item:WAP\]) and (\[item:W\*AP\]), follow directly from the definitions of AD and W\*AD amenability, and of WAP and W\*AP properties. We know from the previous theorem that ${\mathcal{B}}''$ is W\*AD-amenable if and only if it has the W\*AP, hence (\[item:W\*AD\]) and (\[item:W\*AP\]) are equivalent. By Remark \[rem:net in the center in the WAP\], (\[item:W\*AP\]) and (\[item:net in center bidual\]) are equivalent. To prove that (\[item:netbe\]) implies (\[item:W\*AP\]) we can proceed exactly as in the proof of the converse in Theorem \[thm: WAP iff AD amenable for wstar Fell bundles\], noticing that convergence in the weak topology of $\mathbb{M}_F({\mathcal{B}})$ is entrywise convergence in the weak topology and, also, ${{\operatorname{w}^*}}$-convergence in $\mathbb{M}_F({\mathcal{B}})''=\mathbb{M}_F({\mathcal{B}}'').$ We now prove that (\[item:W\*AP\]) implies (\[item:netbe\]). First we indicate how to approximate elements of $\ell^2(G,B_e'')$ by elements of $\ell^2(G,B_e)$ in a certain particular way. We start by representing $\ell^2(G,B_e'')$ and $\ell^2(G,B_e)$ faithfully. Let $\pi\colon {\mathcal{B}}''\to {\mathcal{L}}(H)$ be a nondegenerate \*-representation, fiber-wise faithful and ${{\operatorname{w}^*}}$-continuous (we constructed one such representation in the proof of Theorem \[the:defining-B”\]). Define $\rho:=\pi|_{B_e''}\colon B_e''\to {\mathcal{L}}(H)$ and note that we have canonical identifications $$K:= \ell^2(G,H) = \ell^2(G,B_e)\otimes_\rho H = \ell^2(G,B_e'')\otimes_\rho H.$$ The map $\hat\pi \colon \ell^2(G,B_e'')\to {\mathcal{L}}(H,K)$, $\hat{\pi}(f)h(r)=\pi(f(r))h$ is a faithful representation of the $C^*$-ternary ring $\ell^2(G,B_e'')$. Then we have a canonical nondegenerate representation $\hat{\pi}^l\colon {\mathcal{K}}(\ell^2(G,B_e''))\to {\mathcal{L}}(K)$ such that $\hat{\pi}^l(T)\pi(f)=\pi(Tf)$, and thus we get a nondegenerate representation of the linking algebra $L$ of $\ell^2(G,B_e'')$: $$\hat{\pi}^L\colon L\to {\mathcal{L}}(K\oplus H) \qquad \hat{\pi}^L\left( \begin{array}{cc} T & f\\ \tilde{g} & S \end{array}\right) = \left( \begin{array}{cc} \hat{\pi}^l(T) & \hat{\pi}(f)\\ \hat{\pi}(g)^* & \hat{\pi}^r(S) \end{array}\right),$$ where $\hat{\pi}^r\colon B_e''\to {\mathcal{L}}(H)$ is just $\rho$. Fix an element $c\in C_c(G,B_e'')$. Using a net in $B_e$ to approximate $c(t)$ (for each $t$ in the finite support of $c$) with respect to the w\*-topology, we can construct a net $\{c_i\}_{i\in I}\subset C_c(G,B_e)$ such that $\operatorname{\mathrm{supp}}(c_i)\subset \operatorname{\mathrm{supp}}(c)$ and $c_i(t)\to c(t)$ in the ${{\operatorname{w}^*}}$-topology for every $t\in G$. This construction implies that $\{\hat{\pi}(c_i)\}_{i\in I}$ ${\operatorname{wot}}-$converges to $\hat{\pi}(c)$ because, for all $h\in H$ and $k\in K$: $$\begin{aligned} \lim_i\langle\hat{\pi}(c_i)h,k\rangle =\lim_i \sum_{r\in\operatorname{\mathrm{supp}}(c)}\langle\pi(c_i(r))h,k(r)\rangle =\langle\hat{\pi}(c)h,k\rangle.\end{aligned}$$ It follows from the previous comments that $\hat{\pi}(c)\in \overline{\hat{\pi}(C_c(G,B_e))}^{{\operatorname{wot}}}$. Now, according to [@MR996436]\*[Theorem 4.8]{} and [@MR641217]\*[Part I Ch. 3]{}, the unit ball of $\hat{\pi}^L(L)$ is \*-strongly dense in the unit ball of $\hat{\pi}^L(L)''$, and this bicommutant is the ${\operatorname{wot}}-$closure of $\hat{\pi}^L(L).$ Hence there exists a net $\{\left( \begin{smallmatrix} T_j & a_j\\ \tilde{b_j} & S_j \end{smallmatrix} \right)\}_{j\in J}{\subseteq}L$ in the closed ball of radius $\|\hat{\pi}(c)\|=\|c\|$ such that $\{\hat{\pi}^L\left( \begin{smallmatrix} T_j & a_j\\ \tilde{b_j} & S_j \end{smallmatrix} \right)\}_{j\in J}$ converges to $\left( \begin{smallmatrix} 0 & \hat{\pi}(c)\\ 0 & 0 \end{smallmatrix} \right)$ \*-strongly. Then, in the strong operator topology: $$\begin{aligned} \lim_j \left( \begin{smallmatrix} 0 & \hat{\pi}(a_j)\\ 0 & 0 \end{smallmatrix} \right) & = \lim_j \left( \begin{smallmatrix} 1 & 0\\ 0 & 0 \end{smallmatrix} \right)\hat{\pi}^L\left( \begin{smallmatrix} T_j & a_j\\ \tilde{b_j} & S_j \end{smallmatrix} \right)\left( \begin{smallmatrix} 0 & 0\\ 0 & 1 \end{smallmatrix} \right) = \left( \begin{smallmatrix} 1 & 0\\ 0 & 0 \end{smallmatrix} \right) \left( \begin{smallmatrix} 0 & \hat{\pi}(c)\\ 0 & 0 \end{smallmatrix} \right)\left( \begin{smallmatrix} 0 & 0\\ 0 & 1 \end{smallmatrix} \right) = \left( \begin{smallmatrix} 0 & \hat{\pi}(c)\\ 0 & 0 \end{smallmatrix} \right). \end{aligned}$$ Now we arrange the supports of the $a_j$’s to be contained in $\operatorname{\mathrm{supp}}(c)$. Let $P\in {\mathcal{L}}(K)={\mathcal{L}}(\ell^2(G,H))$ be the multiplication by the indicator function of $\operatorname{\mathrm{supp}}(c)$. Then, in the strong operator topology: $\lim_j P\hat{\pi}(a_j)=P\hat{\pi}(c)=\hat{\pi}(c)$ and $P\hat{\pi}(a_j)=\hat{\pi}(a_j|_{\operatorname{\mathrm{supp}}c})$. Thus we are allowed to assume $\operatorname{\mathrm{supp}}(a_j){\subseteq}\operatorname{\mathrm{supp}}(c)$ for all $j\in J$. We must retain the following facts about the net $\{a_j\}_{j\in J}{\subseteq}\ell^2(G,B_e)$: - $\operatorname{\mathrm{supp}}(a_j){\subseteq}\operatorname{\mathrm{supp}}(c)$ for all $j\in J$. - $\|a_j\|\leq \|c\|$ for all $j\in J,$ with the norm of $\ell^2(G,B_e).$ - $\{\hat{\pi}(a_j)\}_{j\in J}$ converges strongly to $\hat{\pi}(c)$. We claim that these conditions imply, for every $t\in G$, $b\in B_t$ and $\varphi\in B_t',$ that $$\label{equ:wstar convergence} \lim_j \varphi\left( \sum_{r\in G}a_j(tr)^*ba_j(r) \right) = \varphi\left( \sum_{r\in G}c(tr)^*bc(r) \right).$$ In other words, we claim that the net $\{ \sum_{r\in G}a_j(tr)^*ba_j(r) \}_{k\in J}$ weakly converges to $\sum_{r\in G}c(tr)^*bc(r)$ in $B_t$. Indeed, since $\pi|_{B_t''}$ is an isomorphism over its image, and a homeomorphism considering in $B_e''$ and in $\mathcal{L}(H)$ the w\*-topology and the ultraweak topology $\sigma w$ respectively, it is enough to prove that $\pi(\sum_{r\in G}a_j(tr)^*ba_j(r))\stackrel{\sigma w}{\to}\pi(\sum_{r\in G}c(tr)^*bc(r))$. Let $U\colon G\to {\mathcal{L}}(K)={\mathcal{L}}(\ell^2(G,H))$ be the unitary representation given by $U_tf(r)=f(t^{-1}r)$, and $\pi^G\colon {\mathcal{B}}''\to {\mathcal{L}}(K)$ be the $\ell^2$-direct sum of $G$ copies of $\pi$, that is, $\pi^G(b)f(r):=\pi(b)f(r)$. Note that $\{ \sum_{r\in G}a_j(tr)^*ba_j(r) \}_{j\in J}$ is bounded because, for all $u,v\in H$, $$\label{equ:inner product} \langle u,\pi\left( \sum_{r\in G}a_j(tr)^*ba_j(r) \right)v\rangle = \langle U_t^* \hat{\pi}(a_j)u,\pi^G(b)\hat{\pi}(a_j)v\rangle.$$ Since the ultraweak topology coincides with the weak operator topology on bounded sets, to prove  it is enough to show that $\{ \pi(\sum_{r\in G}a_j(tr)^*ba_j(r)) \}_{j\in J}$ converges to $\pi(\sum_{r\in G}c(tr)^*bc(r))$ in the ${\operatorname{wot}}$ topology. But our construction of $\{a_j\}_{j\in J}$ and implies $$\begin{aligned} \lim_j \langle u,\pi\left( \sum_{r\in G}a_j(tr)^*ba_j(r) \right)v\rangle & = \lim_j \langle U_t^* \hat{\pi}(a_j)u,\pi^G(b)\hat{\pi}(a_j)v\rangle\\ & =\langle U_t^* \hat{\pi}(c)u,\pi^G(b)\hat{\pi}(c)v\rangle\\ & = \langle u,\pi\left( \sum_{r\in G}c(tr)^*bc(r) \right)v\rangle.\end{aligned}$$ Therefore holds (note that does not imply if we only know that $\pi(a_i)\stackrel{{\operatorname{wot}}}{\to}\pi(c)$). Now assume that ${\mathcal{B}}''$ has the W\*AP and take a net $\{c_i\}_{i\in I}$ as in the definition of the W\*AP for ${\mathcal{B}}''$, with all the $c_i$’s with compact support. Set $M:=\sup_{i\in I}\|\sum_{t\in G}c_i(t)^*c_i(t)\|$ and let $\mathcal{F}$ and $\mathcal{F}'$ be the families of finite subsets of ${\mathcal{B}}$ and $\uplus_{t\in G} {B_{t,1}'}$, respectively, where ${B_{t,1}'}$ is the closed unit ball of $B_t'$. On $\Lambda:=(0,1)\times \mathcal{F}\times \mathcal{F}'$ we consider the canonical order $(\varepsilon,U,V)\leq (\delta,Y,Z)$ $\Leftrightarrow$ $\delta\leq \varepsilon$, $U{\subseteq}Y$ and $V{\subseteq}Z$. For every $\lambda=(\varepsilon, U,V)\in \Lambda$ there exists $i_0\in I$ such that, for every $t\in G$, $b\in B_t\cap U$ and $\varphi\in B_t'\cap V$, $$\left|\varphi\left(b - \sum_{r\in G} c_{i_0}(tr)^*bc_{i_0}(r)\right)\right|<\varepsilon/2.$$ Our approximation procedure ensures the existence of $a_\lambda\in \ell^2(G,B_e)$ such that: $\operatorname{\mathrm{supp}}(a_\lambda){\subseteq}\operatorname{\mathrm{supp}}(c_i)$, $\|a_\lambda\|^2\leq \|c_i\|^2\leq M$ and $$\left|\varphi\left(b - \sum_{r\in G} a_\lambda (tr)^*ba_\lambda (r)\right)\right|<\varepsilon,$$ for every $t\in G$, $b\in B_t\cap U$ and $\varphi\in B_t'\cap V$. It is then clear that $\{a_\lambda\}_{\lambda\in \Lambda}$ is a net satisfying (\[item:netbe\]). By the proof above and Remark \[rem:net in the center in the WAP\], we could replace the condition “bounded net” in the the last Theorem by “net in the closed unit ball” without changing the conclusions. \[cor:WAP and canonical action on kernels\] A Fell bundle ${\mathcal{B}}$ has the WAP if and only if the canonical action on its C\*-algebra of kernels ${\mathbb{k}}({\mathcal{B}})$ is AD-amenable. Follows from Theorem \[thm:the mega theorem\] and Corollary \[cor:Fell bundle AD amenable and action on the kernels\]. The AP implies the WAP. The AP clearly implies condition (\[item:netbe\]) of Theorem \[thm:the mega theorem\]. Notice that by Example \[exa:trivial-partial\] every group partially acts AD-amenably on ${\mathbb{C}}$, so that the above situation does happen for every group. For global actions the situation is different: no non-amenable group can act globally AD-amenably on a finite dimensional non-zero C\*-algebra. We do not know if the WAP implies (and hence is equivalent to) the AP in general. We will show in Section \[sec:commutative-unit-fibre\] that this is true at least in the case of Fell bundles whose unit fibre is (Morita equivalent to) a commutative C\*-algebra. Invariance under equivalences {#ssec:Invariance under equivalences} ----------------------------- We have shown that AD-amenability of Fell bundles is equivalent to the WAP and both are preserved by the weak equivalence of Fell bundles. But, is the AP preserved by weak equivalence of Fell bundles? Every Fell bundle ${\mathcal{B}}$ is weakly equivalent to the semidirect product bundle of an action $\alpha$ on a C\*-algebra, see [@Abadie-Buss-Ferraro:Morita_Fell]. Moreover, $\alpha$ is unique up to Morita equivalence of actions and the equivalence class is that of the canonical action on the C\*-algebra of kernels of ${\mathcal{B}}$, see [@Abadie:Enveloping]. In order to show that the AP is preserved by weak equivalences we decompose such equivalences into “elementary” pieces. By [@Abadie-Buss-Ferraro:Morita_Fell], every weak equivalence (represented by $\sim$) between the Fell bundles ${\mathcal{A}}$ and ${\mathcal{B}}$ (over $G$) can be decomposed as a chain of equivalences $$\label{equ:decomposition of weak equivalence} {\mathcal{A}}\approx {\mathcal{B}}_\alpha\sim {\mathcal{B}}_\gamma\approx{\mathcal{B}}_\sigma\sim {\mathcal{B}}_\beta\approx{\mathcal{B}},$$ where $\approx$ represents strong equivalence and - $\alpha$ and $\beta$ are partial actions of $G$ on C\*-algebras. - $\gamma$ ($\sigma$) is the canonical action of $G$ on the C\*-algebra of kernels of ${\mathcal{A}}$ (${\mathcal{B}}$, respectively) and it is also the C\*-enveloping action of $\alpha$ ($\beta$, respectively). The advantage of this decomposition is that we have changed a weak equivalence for some strong equivalences and a very specific type of weak equivalence: that of C\*-enveloping actions. \[lemma:AP preserved by strong equivalence\] The AP is preserved by strong equivalence of Fell bundles. Suppose ${\mathcal{A}}$ and ${\mathcal{B}}$ are Fell bundles over $G$, ${\mathcal{A}}$ has the AP and ${\mathcal{X}}$ is an ${\mathcal{A}}$-${\mathcal{B}}$-weak equivalence bundle. Let $\{a_i\}_{i\in I}$ be a set of functions for ${\mathcal{A}}$ as in the definition of the AP. Let $\mathcal{F}$ be the collection of finite subsets of ${\mathcal{X}}$ and consider in $\Lambda:=\mathcal{F}\times (0,+\infty)$ the order $(U,\varepsilon)\leq (V,\delta)\Leftrightarrow U{\subseteq}V$ and $\delta\leq \varepsilon$. We will construct a net of functions $\{ b_\lambda \}_{\lambda\in \Lambda}$, $b_\lambda\colon G\to B_e$, with finite supports such that - $\sup_{\lambda\in \Lambda}\| \sum_{r\in G} b_\lambda(r)^* b_\lambda(r) \|\leq \sup_{i\in I}\|\sum_{r\in G} a_i(r)^*a_i(r)\|<\infty$ - For every $\lambda=(U,V,\varepsilon)\in \Lambda$ and $u,v\in U$, if $\langle u,v\rangle_{\mathcal{B}}\in B_t$ then $$\left\| \sum_{r\in G} b_\lambda(tr)^*\langle u,v\rangle_{\mathcal{B}}b_\lambda(r) - \langle u,v\rangle_{\mathcal{B}}\right\|<\varepsilon.$$ This will clearly suffice to complete the proof because, for every $t\in G$, $$\overline{\operatorname{span}}\{\langle u,v\rangle_{\mathcal{B}}\colon u\in X_r,v\in X_{rt},r\in G\}=B_t.$$ Fix $\lambda=(U,\varepsilon)\in \Lambda$. Take a positive $c\in B_e$ such that $\|c\|<1$ and $\| c\langle u,v\rangle_{\mathcal{B}}c-\langle u,v\rangle_{\mathcal{B}}\|<\varepsilon$ for all $u,v\in U$. By [@Abadie-Ferraro:Equivalence_of_Fell_Bundles] we can assume $c=\sum_{j=1}^n\langle x_j,x_j\rangle_{{\mathcal{B}}}$ for some $x_1,\ldots,x_n\in X_e$. Define, for every $i\in I$, $b_i\colon G\to B_e$ as $b_i(r):=\sum_{j=1}^n\langle x_j,a_i(r)x_j\rangle_{\mathcal{B}}$. The function $b_\lambda$ will be one of the $b_i$’s, that we will indicate how to choose. We claim that $\|\sum_{r\in G} b_i(r)^*b_i(r)\|\leq \|\sum_{r\in G}a_i(r)^*a_i(r)\|$. Let $F=\{t_1,\ldots,t_n\}$ be such that $x_j\in X_{t_j}$ ($j=1,\ldots,n$). Define $\mathbb{M}:=\mathbb{M}_{F}({\mathcal{A}})$ as in Remark \[rem:matrix algebras of Fell bundles\]. The direct sum $E:=X_{t_1}\oplus \cdots \oplus X_{t_n}$ is an $\mathbb{M}$-$B_e$-Hilbert bimodule (not full in general). If we think of the elements of $E$ as column matrices, the action of $\mathbb{M}$ is given by matrix multiplication and the left inner product is ${}_{\mathbb{M}}\langle \xi,\eta\rangle = \xi \eta^* = ({}_{\mathcal{A}}\langle \xi_i,\eta_j\rangle)_{i,j= 1}^n. $ If $x$ is the column vector $(x_1,\ldots,x_n)^t\in E$, then $\|x\|^2=\|c\|<1$ and $$\begin{aligned} \left\|\sum_{r\in G} b_i(r)^*b_i(r)\right\| & = \left\|\sum_{r\in G}\sum_{j,k=1}^n \langle a_i(r)^* {}_{\mathcal{A}}\langle x_k , x_j\rangle a_i(r)x_j,x_k\rangle_{\mathcal{B}}\right\|\\ & = \left\|\sum_{r\in G} \langle {\operatorname{diag}}(a_i(r))^* {}_{\mathbb{M}}\langle x, x\rangle {\operatorname{diag}}(a_i(r)) x,x\rangle_{B_e}\right\|\\ & \leq \left\|{}_{\mathbb{M}}\langle x, x\rangle \| \langle {\operatorname{diag}}(\sum_{r\in G} a_i(r)^* a_i(r)) x,x\rangle_{B_e}\right\|\\ \\ & \leq \|x\|^2 \left\| \sum_{r\in G} a_i(r)^* a_i(r)\right\| \|x\|^2 \leq \left\| \sum_{r\in G} a_i(r)^* a_i(r)\right\| . \end{aligned}$$ Now take $u,v\in U$ and let $t\in G$ be such that $\langle u,v\rangle_{\mathcal{B}}\in B_t$. For all $i\in I$ we have $$\begin{aligned} \sum_{r\in G} b_i(tr)^*\langle u,v\rangle_{\mathcal{B}}b_i(r) & = \sum_{r\in G}\sum_{j,k=1}^n {\langle x_j,a_i(tr)x_j\rangle_{\mathcal{B}}}^* \langle u,v\rangle_{\mathcal{B}}\langle x_k,a_i(r)x_k\rangle_{\mathcal{B}}\\ & = \sum_{r\in G}\sum_{j,k=1}^n \langle u\langle x_j,a_i(tr)x_j\rangle_{\mathcal{B}},v\langle x_k,a_i(r)x_k\rangle_{\mathcal{B}}\rangle_{\mathcal{B}}\\ & = \sum_{r\in G}\sum_{j,k=1}^n \langle {}_{\mathcal{A}}\langle u, x_j\rangle a_i(tr)x_j, {}_{\mathcal{A}}\langle v,x_k\rangle a_i(r)x_k\rangle_{\mathcal{B}}\\ & = \sum_{j,k=1}^n \langle \sum_{r\in G} a_i(t^{-1}r)^* {}_{\mathcal{A}}\langle x_k,v\rangle {}_{\mathcal{A}}\langle u, x_j\rangle a_i(r)x_j, x_k\rangle_{\mathcal{B}}. \end{aligned}$$ Note that ${}_{\mathcal{A}}\langle x_k,v\rangle {}_{\mathcal{A}}\langle u, x_j\rangle = {}_{\mathcal{A}}\langle x_k \langle u,v\rangle_{{\mathcal{B}}}^*, x_j\rangle \in A_{t^{-1}}$. Then, taking limit in $i$, $$\begin{aligned} \lim_i \sum_{r\in G} b_i(tr)^*\langle u,v\rangle_{\mathcal{B}}b_i(r) & = \sum_{j,k=1}^n \langle\lim_i \sum_{r\in G} a_i(r)^* {}_{\mathcal{A}}\langle x_k,v\rangle {}_{\mathcal{A}}\langle u, x_j\rangle a_i(r)x_j, x_k\rangle_{\mathcal{B}}\\ & = \sum_{j,k=1}^n \langle {}_{\mathcal{A}}\langle x_k,v\rangle {}_{\mathcal{A}}\langle u, x_j\rangle x_j, x_k\rangle_{\mathcal{B}}\\ & = \sum_{j,k=1}^n \langle u \langle x_j, x_j\rangle_{\mathcal{B}}, v \langle x_k\, x_k\rangle_{\mathcal{B}}\rangle_{\mathcal{B}}= c\langle u,v\rangle_{\mathcal{B}}c. \end{aligned}$$ We then can choose $i_0\in I$ such that $\| \sum_{r\in G} b_{i_0}(tr)^*\langle u,v\rangle_{\mathcal{B}}b_{i_0}(r) -\langle u,v\rangle_{\mathcal{B}}\|<\varepsilon $ for all $u,v\in U$. Thus we take $b_\lambda:= b_{i_0}$. \[lem:AP of action on the kernels\] Let ${\mathcal{B}}$ be a Fell bundle. If ${\mathcal{B}}$ has the AP and $\beta$ is the canonical action on the C\*-algebra of kernels of ${\mathcal{B}}$, then $\beta$ has the AP. Take a net of functions $\{b_j\}_{j\in J}\subset \ell^2(G,B_e)$ as in the definition of the AP and construct a net $\{b_\xi\}_{\xi\in \Xi}\subset \ell^2(G,{\mathbb{k}}({\mathcal{B}}))$ exaclty as in the proof of Theorem \[thm: WAP iff AD amenable for wstar Fell bundles\]. This time we can ensure that, for every $k\in {\mathbb{k}}_c({\mathcal{B}}),$ $\{\langle b_\lambda,k\tilde{\beta}_tb_\lambda\rangle\}_{\lambda\in \Lambda} $ converges (entrywise) in norm to $k.$ The rest follows from Remark \[rem:equivalent to AP\]. \[lem:AP and enveloping actions\] Let $\alpha$ be a partial action of a group $G$ on a C\*-algebra $A$. If a Morita enveloping action of $\alpha$ has the AP then $\alpha$ has the AP. Suppose $\beta$ is a Morita enveloping action of $\alpha$. By definition $\alpha$ is Morita equivalent to a restriction of $\beta$, but Lemma \[lemma:AP preserved by strong equivalence\] implies the AP is preserved under Morita equivalence of actions. Thus we may assume $\beta$ is an enveloping action of $\alpha$. We assume $\beta$ is an action of $G$ on $B$ and recall that $A_t=\beta_t(A)\cap A$ and $\alpha_t(a)=\beta_t(a)$. Moreover, ${\mathcal{B}}_\alpha$ is a Fell subbundle of ${\mathcal{B}}_\beta$. We think of $A$ and $B$ as the unit fibres of these bundles. Let $\{b_i \}_{i\in I}$ be a net of functions, as in the definition of the $AP$ for the bundle ${\mathcal{B}}_\beta$. Take a positive $c\in A$ with $\|c\|<1$ and any $a\delta_t\in {\mathcal{B}}_\alpha$. By $cb_i$ we mean the function $r\mapsto cb_i(r)$. Note that $cb_i$ is an $A$ valued function. Making the following computations in ${\mathcal{B}}_\beta$ we deduce $$\label{equ:restriction to ideal has the AP} \lim_i \sum_{r\in G} (cb_i)(tr)^* (a\delta_t) (cb_i)(r)=\lim_i \sum_{r\in G} b_i(tr)^* ca\beta_t(c)b_i(r)\delta_t =ca\beta_t(c).$$ Since $a\in A_t$, if we replace $c$ by an approximate unit of $A$ and take limit then $ca\beta_t(c)$ converges to $a$. Imitating the ideas we used to prove Lemma \[lemma:AP preserved by strong equivalence\] to show that ${\mathcal{B}}_\alpha$ has the AP, we can construct a net of functions (for ${\mathcal{B}}_\alpha$) indexed over $I\times \mathcal{F}\times (0,+\infty)$, where $\mathcal{F}$ is the family of finite subsets of ${\mathcal{B}}_\alpha$. We leave this task to the reader. Now we use Lemmas \[lemma:AP preserved by strong equivalence\] and \[lem:AP and enveloping actions\] to prove our next Theorem, which in turn implies those lemmas. \[thm:AP preserved by weak equivalence\] The AP is preserved by the weak equivalences of Fell bundles. Let ${\mathcal{A}}$ and ${\mathcal{B}}$ be weakly equivalent Fell bundles and consider the equivalences in . Recall that $\gamma$ and $\sigma$ are the canonical actions on the algebras of kernels of ${\mathcal{A}}$ and ${\mathcal{B}}$, respectively. If ${\mathcal{A}}$ has the AP then, by Lemmas \[lem:AP of action on the kernels\] and \[lemma:AP preserved by strong equivalence\], ${\mathcal{B}}_\sigma$ has the AP. Now Lemmas \[lem:AP and enveloping actions\] and \[lemma:AP preserved by strong equivalence\] imply that ${\mathcal{B}}$ has the AP. \[rem:WAP-weak-equivalence\] We know that Theorem \[thm:AP preserved by weak equivalence\] (and hence also Corollary \[cor:amenable-Morita-enveloping\], Lemmas \[lem:AP and enveloping actions\], \[lem:AP of action on the kernels\] and \[lemma:AP preserved by strong equivalence\]) hold if we replace the AP by the WAP because, by Theorem \[thm:the mega theorem\] and Corollary \[cor:invariance of AD amenability under weak equivalence\], the WAP is equivalent to AD-amenability and both are preserved by weak equivalence of Fell bundles. The converse of Lemma \[lem:AP and enveloping actions\] is also true. \[cor:amenable-Morita-enveloping\] Let $\alpha$ be a partial action of $G$ on a C\*-algebra $A$. Then $\alpha$ has the AP if and only if one (hence all) Morita enveloping action of $\alpha$ has the AP. In particular the double dual (global) action of $G$ on $A\rtimes_\alpha G\rtimes_{\widehat\alpha}G$ has the AP if and only if $\alpha$ has the AP. This follow from Theorem \[thm:AP preserved by weak equivalence\] and the fact that ${\mathcal{B}}_\alpha$ is weakly equivalent to the semidirect product bundle of each Morita enveloping action of $\alpha$. Moreover, the double dual action on $A\rtimes_\alpha G\rtimes_{\widehat\alpha}G$ is a Morita enveloping action of $\alpha$, which is isomorphic to the canonical action on the [C\*-]{}algebras of kernels under the isomorphism ${\mathbb{k}}({\mathcal{B}}_\alpha)\cong C^*({\mathcal{B}}_\alpha)\rtimes_{\delta_{{\mathcal{B}}}} G\cong A\rtimes_\alpha G\rtimes_{\widehat\alpha}G$ by [@Abadie:Enveloping]\*[Proposition 8.1]{}, where $\delta_{{\mathcal{B}}}$ denotes the dual coaction on $C^*({\mathcal{B}}_\alpha)$ as in Section \[sec:dual-coaction\]. \[cor:AP-enveloping\] If a partial action $\alpha$ of $G$ on $A$ admits an enveloping global action $\beta$ of $G$ on $B$, then $\alpha$ has the AP if and only if $\beta$ has the AP. By Remark \[rem:WAP-weak-equivalence\] the AP and the WAP are equivalent if and only if they are equivalent for actions on C\*-algebras. Thus the AP and the WAP agree if and only if every AD-amenable action has the AP. This is an important question that will be left open. A positive answer would solve another important question raised by Exel: if the reduced cross-sectional C\*-algebra $C^*_{\mathrm{r}}({\mathcal{B}})$ of a Fell bundle (over a discrete group) is nuclear, does it follow that ${\mathcal{B}}$ has the AP? By our Proposition \[prop:AD amenability and nuclearity\] below this would follow if we know that the AD-amenability implies the AP. \[cor:AP and canonical action on kernels\] Let ${\mathcal{B}}$ be a Fell bundle and $\beta$ the canonical action on the [C\*-]{}algebra of kernels of ${\mathcal{B}}$. Then ${\mathcal{B}}$ has the AP if and only if $\beta$ has the AP. Recall that ${\mathcal{B}}$ is weakly equivalent to ${\mathcal{B}}_\beta,$ as we discussed at the beginning of Section \[ssec:Invariance under equivalences\]. The conclusion now follows from Theorem \[thm:AP preserved by weak equivalence\]. Cross-sectional C\*-algebras and the WAP {#sec:Cross-sec-WAP} ======================================== After Theorem \[thm:the mega theorem\] we can think of the WAP as the Fell bundle counterpart of AD-amenability of noncommutative [C\*-]{}dynamical systems. In fact many well-known results about AD-amenable actions hold for Fell bundles with the WAP. We start with a result involving W\*-Fell bundles. Let ${\mathcal{M}}=\{M_t\}_{t\in G}$ be a W\*-Fell bundle. Then the following assertions are equivalent. (i) $M_e$ injective and ${\mathcal{M}}$ has the W\*AP (or, equivalently, ${\mathcal{M}}$ is W\*AD-amenable); (ii) ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ is injective and its canonical [W\*-]{}action $\beta^{{\operatorname{w}^*}}$ has the W\*AP (or is W\*AD-amenable); (iii) ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})\bar\rtimes_{\beta^{{\operatorname{w}^*}}} G$ is injective; (iv) $W^*_{\mathrm{r}}({\mathcal{M}})$ is injective. First notice that $M_e$ is injective if and only if the [W\*-]{}algebra of kernels ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ is injective. Indeed, $M_e$ is [W\*-]{}Morita equivalent to ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$ (via the [W\*-]{}equivalence bimodule $\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$); it follows that $M_e$ is injective if and only if ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$ is injective. But ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ carries a W\*-action that is enveloping for a partial [W\*-]{}action on ${\mathcal{L}}(\ell^2_{{\operatorname{w}^*}}({\mathcal{M}}))$. The claim now follows from Remark \[rem:abelian-injective\]. Also observe that $M_e$ is injective if $W^*_{\mathrm{r}}({\mathcal{M}})$ is injective because we have a canonical (normal) conditional expectation $W^*_{\mathrm{r}}({\mathcal{M}}){\twoheadrightarrow}M_e$ (Remark \[rem:cond-exp\]). The discussion above implies that (1) is equivalent to (2). Since (2) involves a [W\*-]{}action, (2)$\Leftrightarrow$(3) by Theorem \[the:ADA-characterisations\]. Finally, (3)$\Leftrightarrow$(4) by Corollary \[cor:duality\]. Let ${\mathcal{B}}$ be a Fell bundle and let $\pi\colon C^*({\mathcal{B}})\to C^*_r({\mathcal{B}})$ be the canonical map between the full and reduced cross-sectional [C\*-]{}algebras [@Doran-Fell:Representations; @Exel:Amenability]. If ${\mathcal{B}}$ has the WAP then $\pi$ is an isomorphism. Since ${\mathcal{B}}$ has the WAP, the canonical action $\beta$ on the [C\*-]{}algebra of kernels of ${\mathcal{B}}$ is AD-amenable (Corollary \[cor:WAP and canonical action on kernels\]). Hence the full and reduced cross-sectional algebras $C^*({\mathcal{B}}_\beta)$ and $C^*_r({\mathcal{B}}_\beta)$ (i.e. the full and reduced $\beta$-crossed product) are canonically isomorphic. This implies that $\pi$ is an isomorphism, see [@Abadie-Ferraro:Equivalence_of_Fell_Bundles; @Abadie-Buss-Ferraro:Morita_Fell]. \[prop:AD amenability and nuclearity\] Let ${\mathcal{B}}$ be a Fell bundle over a group $G$ with $B_e$ nuclear. Then the following are equivalent: (i) $C^*({\mathcal{B}})$ is nuclear. (ii) $C^*_r({\mathcal{B}})$ is nuclear. (iii) ${\mathcal{B}}$ has the WAP. Let ${\mathbb{k}}({\mathcal{B}})$ be the [C\*-]{}algebra of kernels and $\beta$ the canonical action of $G$ on ${\mathbb{k}}({\mathcal{B}})$. By the proof of [@Abadie-Buss-Ferraro:Morita_Fell]\*[Theorem 6.3]{}, ${\mathbb{k}}({\mathcal{B}})$ is nuclear. Moreover, by Corollary \[cor:WAP and canonical action on kernels\] and [@Anantharaman-Delaroche:Systemes]\*[Th[é]{}or[è]{}me 4.5]{}, (3) is equivalent to any of the following: - ${\mathbb{k}}({\mathcal{B}})\rtimes_\beta G:=C^*({\mathcal{B}}_\beta)$ is nuclear. - ${\mathbb{k}}({\mathcal{B}})\rtimes_{r,\beta} G:=C^*_r({\mathcal{B}}_\beta)$ is nuclear. - $\beta$ is AD-amenable. Since nuclearity is preserved by Morita equivalence of [C\*-]{}algebras, by [@Abadie-Buss-Ferraro:Morita_Fell] and [@Abadie-Ferraro:Equivalence_of_Fell_Bundles] we know that ($n$) is equivalent to ($n$’), for $n=1,2,3$. When specialised to partial actions the above proposition takes the following form: \[cor:AD amenability of pa and nuclearity\] Let $\alpha$ be a partial action of the group $G$ on a nuclear [C\*-]{}algebra $A$. Then the following are equivalent: (i) The full crossed product $A\rtimes_{\alpha} G$ is nuclear. (ii) The reduced crossed product $A\rtimes_{\alpha,{\mathrm{r}}} G$ is nuclear. (iii) $\alpha$ is AD-amenable. Follows directly from the last Proposition and Corollary \[corollary:AD amenability and WAP\]. The last two results are examples of a general way of extending known results from [C\*-]{}actions to Fell bundles. The trick is to use the weak equivalence of Fell bundles and the canonical action on the [C\*-]{}algebra of kernels. We use this very same idea to treat exactness of cross sectional [C\*-]{}algebras, but first we introduce the spatial tensor product of a Fell bundle (over a discrete group) and a [C\*-]{}algebra. This construction is a special case of the tensor products of Fell bundles developed in [@Abadie:Tensor]. We recall the basic facts here for the convenience of the reader. Take a Fell bundle ${\mathcal{B}}$ and a [C\*-]{}algebra $C.$ Let $L_t$ be the linking algebra of $B_t$ and define $B_t\bar\otimes C$ as the closure of the algebraic tensor product $B_t\odot C$ in $L_t \bar\otimes C.$ We claim that ${\mathcal{B}}\otimes C:=\{ B_t\otimes C \}_{t\in G}$ is a Fell bundle with a multiplication and involution such that $(a\otimes x)(b\otimes y)=ab\otimes xy$ and $(a\otimes x)^*=a^*\otimes x^*.$ For future purposes, and to prove ${\mathcal{B}}\otimes C$ is actually a Fell bundle, it is convenient to indicate how to construct this bundle using a representation of ${\mathcal{B}}.$ Let $T\colon {\mathcal{B}}\to {\mathcal{L}}(H)$ be a nondegenerate \*-representation (in the sense of [@Doran-Fell:Representations_2]) with $T|_{B_e}$ faithful and take a nondegenerate and faithful representation $\pi\colon C\to {\mathcal{L}}(K)$ (here $H$ and $K$ are Hilbert spaces). Consider, for each $t\in G,$ the map $\rho_t \colon L_t\to {\mathcal{L}}(H\oplus H)=\mathbb{M}_2({\mathcal{L}}(H))$ such that $$\rho_t\left( \begin{array}{cc} a & b\\ \overline{c} & d \end{array} \right) = \left( \begin{array}{cc} T_a & T_b\\ T_c^* & T_d \end{array} \right),\ a\in {\overline{\operatorname{span}}}(B_tB_t^*),\ b,c\in B_t,\ d\in{\overline{\operatorname{span}}}(B_t^*B_t).$$ Then we get the canonical (linear and injective) map $\rho_t\otimes \pi\colon L_t\bar\otimes C\to {\mathcal{L}}(H^2\otimes K).$ If we restrict this map to $B_t\bar\otimes C$ we note that $H\otimes K =(H\oplus 0)\otimes K\subset H^2\otimes K$ is an invariant subspace and that the compression (of the restriction) to this subspace is an isometric linear representation of $B_t\bar\otimes C.$ Hence we obtain the map $T\bar\otimes \pi \colon {\mathcal{B}}\otimes C\to {\mathcal{L}}(H\otimes K)$ which is linear isometric on each fiber and $T\bar\otimes \pi (a\otimes c)=T_a\otimes \pi(c).$ Note that $T\bar\otimes \pi(B_s\bar\otimes C)T\bar\otimes \pi(B_t\bar\otimes C)\subset T\bar\otimes \pi(B_{st}\bar\otimes C)$ and that $T\bar\otimes \pi(B_s\bar\otimes C)^*=T\bar\otimes \pi(B_{s^{-1}}\bar\otimes C).$ Thus we are forced to define the multiplication and involution of ${\mathcal{B}}\bar\otimes C$ in such a way that $ T\bar\otimes \pi(xy)=T\bar\otimes \pi(x)T\bar\otimes \pi(y) $ and $T\bar\otimes \pi(x^*)=T\bar\otimes \pi(x)^*.$ \[prop:kB exact iff Be exact\] If ${\mathcal{B}}$ is a Fell bundle, then $B_e$ is exact if and only if ${\mathbb{k}}({\mathcal{B}})$ is exact. In the proof of Theorem \[thm: WAP iff AD amenable for wstar Fell bundles\] we constructed an inclusion $\mathbb{M}_F({\mathcal{M}})\subset {\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{M}).$ That inclusion can be used to prove that ${\mathbb{k}}({\mathcal{B}})$ is the direct limit of $\{\mathbb{M}_F({\mathcal{B}})\}_{F},$ where $F$ runs over the finite subsets of $G.$ Hence ${\mathbb{k}}({\mathcal{B}})$ is exact if and only if $\mathbb{M}_F({\mathcal{B}})$ is exact for every finite set $F\subset G.$ Notice that if we take $F=\{e\}$ we conclude that $B_e$ is exact if ${\mathbb{k}}({\mathcal{B}})$ is. Assume $B_e$ is exact and take a finite set $F\subset G$ and a short exact sequence (SES) of [C\*-]{}algebras $I{\hookrightarrow}A{\twoheadrightarrow}A/I.$ For every $t\in G$ the linking algebra of $B_t,$ $L_t,$ is an exact [C\*-]{}algebra because it is Morita equivalent to the ideal ${\overline{\operatorname{span}}}(B_t^*B_t)$ of $B_e.$ Thus we get the SES $L_t\bar\otimes I{\hookrightarrow}L_t\bar \otimes A{\twoheadrightarrow}L_t\bar\otimes A/I$ and, by our construction of spatial tensor products, we obtain the following SES of Fell bundles $${\mathcal{B}}\bar\otimes I{\hookrightarrow}{\mathcal{B}}\bar \otimes A{\twoheadrightarrow}{\mathcal{B}}\bar\otimes A/I.$$ By entrywise computation of the maps above we get the SES $$\label{equ:SEC for tensor matrix} \mathbb{M}_F({\mathcal{B}}\bar\otimes I){\hookrightarrow}\mathbb{M}_F({\mathcal{B}}\bar \otimes A){\twoheadrightarrow}\mathbb{M}_F({\mathcal{B}}\bar\otimes A/I).$$ Using a nondegenerate representation $T\colon {\mathcal{B}}\to {\mathcal{L}}(H)$ with $T|_{B_e}$ faithful and representing $I$ faithfully, $I\subset {\mathcal{L}}(K),$ we can think of $\mathbb{M}_F({\mathcal{B}}\bar\otimes I)$ as a subalgebra of ${\mathcal{L}}( H^n\otimes K )={\mathcal{L}}( (H\otimes K)^n ).$ But we can also represent ${\mathcal{B}}\bar\otimes I$ in ${\mathcal{L}}(H\otimes K)$ and thus we get a faithful representation $\mathbb{M}_F({\mathcal{B}}\bar\otimes I)\subset {\mathcal{L}}( (H\otimes K)^n ).$ It turns out that, after taking faithful representations, $\mathbb{M}_F({\mathcal{B}}\bar\otimes I)=\mathbb{M}_F({\mathcal{B}}) \bar\otimes I.$ The same argument holds for the tensor products with $A$ and $A/I.$ Moreover, the identifications $\mathbb{M}_F({\mathcal{B}}\bar\otimes Z)=\mathbb{M}_F({\mathcal{B}}) \bar\otimes Z$ (for $Z=I,A,A/I$) are compatible with the maps of and thus we get the SES $$\mathbb{M}_F({\mathcal{B}})\bar\otimes I{\hookrightarrow}\mathbb{M}_F({\mathcal{B}})\bar \otimes A{\twoheadrightarrow}\mathbb{M}_F({\mathcal{B}})\bar\otimes A/I.$$ This proves $\mathbb{M}_F({\mathcal{B}})$ is exact. If $B$ is the enveloping [C\*-]{}algebra of a partial action $\alpha$ of a locally compact and Hausdorff group on a [C\*-]{}algebra $A,$ then $B$ is exact if and only if $A$ is exact. We can drop the topology of the group and work with the discrete one because this does not affect the enveloping action [@MR3795739]. The the proof follows directly from Proposition \[prop:kB exact iff Be exact\] because $B$ is Morita equivalent to ${\mathbb{k}}({\mathcal{B}}_\alpha)$ and $A$ is the unit fiber of ${\mathcal{B}}_\alpha.$ It is known [@kirchberg1994commutants]\*[Proposition 7.1]{} that the crossed product of an amenable group acting on an exact [C\*-]{}algebra is exact. Recently this was proved in [@buss2019injectivity]\*[Theorem 6.1]{} for AD-amenable actions. For the convenience of the reader we give a direct proof here. If we go back to the ideas of Kirchberg [@kirchberg1994commutants] we see that the following Lemma is the key point. Let $\alpha$ be an AD-amenable action of $G$ on the [C\*-]{}algebra $A$ and $B$ a C\*-algebra endowed with the trivial $G$-action ${\textup{id}}$. Then the tensor product $G$-action $\alpha \otimes {\textup{id}}$ on $A\otimes B$ is AD-amenable. Decomposing the universal representation $\pi\colon A\otimes B\to {\mathcal{L}}(H)$ as $\pi=\pi_A\times \pi_B$ as in [@Brown-Ozawa:Approximations]\*[Theorem 3.2.6]{} we get a ${{\operatorname{w}^*}}-$continuous \*-homomorphism $A'' \to (A \otimes B)'',$ $a\mapsto a\otimes 1.$ Let $\{a_i\}_{i\in I}$ be a net of functions as in (5) of Theorem \[thm:the mega theorem\]. We claim that $\{a_i\otimes 1\}_{i\in I}$ is a net of functions giving the WAP for $\alpha\otimes {\textup{id}}.$ For this we use Lemma  \[lem:characterization of AD amenability with dense subalgebra\] with $A\otimes_{{\operatorname{alg}}} B$ as the ${{\operatorname{w}^*}}$-dense \*-subalgebra of $(A\otimes B)''.$ Note that $\langle a_i\otimes 1,a_i\otimes 1\rangle =\langle a_i,a_i\rangle \otimes 1,$ hence $\sup_i\|a_i\otimes 1\|=\sup_i\|a_i\|<\infty.$ Given an elementary tensor $x\otimes y\in A\bar\otimes B$ we have, in the ${{\operatorname{w}^*}}-$topology: $$\lim_i \langle a_i\otimes 1, (x\otimes y) \widetilde{\alpha_t\otimes {\textup{id}}} (a_i\otimes 1)\rangle =\lim_i \langle a_i, x \tilde{\alpha_t} (a_i) \rangle \otimes y=x\otimes y.$$ This completes the proof. \[cor:crossed product and exactness\] Let $\alpha$ be an AD-amenable action of the group $G$ on the [C\*-]{}algebra $A.$ If $A$ is exact, then so it is $A\rtimes G=A\rtimes_{r}G.$ It suffices to use the Lemma above and the very same ideas of the proof of [@kirchberg1994commutants]\*[Proposition 7.1]{}. If ${\mathcal{B}}$ is a Fell bundle (over $G$) with the WAP and $B_e$ is exact, then so is $C^*_r({\mathcal{B}})=C^*({\mathcal{B}}).$ We know, by Proposition \[prop:kB exact iff Be exact\], that ${\mathbb{k}}({\mathcal{B}})$ is exact and the canonical action on ${\mathbb{k}}({\mathcal{B}})$ is AD-amenable (Corollaries \[cor:Fell bundle AD amenable and action on the kernels\] and \[corollary:AD amenability and WAP\]). By Corollary \[cor:crossed product and exactness\], ${\mathbb{k}}({\mathcal{B}})\rtimes_r G={\mathbb{k}}({\mathcal{B}})\rtimes G$ is exact. Since this algebra is Morita equivalent to $C^*_r({\mathcal{B}})=C^*({\mathcal{B}}),$ $C^*_r({\mathcal{B}})$ is exact. In [@Exel:Partial_dynamical]\*[Definition 21.19]{} Exel introduces the notion of conditional expectation for Fell bundles: if ${\mathcal{A}}$ is a Fell subbundle of ${\mathcal{B}}$, a conditional expectation from ${\mathcal{B}}$ to ${\mathcal{A}}$ is a map $P\colon {\mathcal{B}}\to {\mathcal{A}}$ which restricts to bounded surjective idempotent linear maps $P_g\colon B_g{\twoheadrightarrow}A_g{\subseteq}B_g$ such that $P_e\colon B_e{\twoheadrightarrow}A_e$ is an ordinary conditional expectation and $P_g(b)^*=P_{g^{-1}}(b^*)$ and $P_{gh}(ba)=P_g(b)a$ for all $b\in B_g$ and $a\in A_h$, $g,h\in G$. \[theo:WAP and conditional expectation for Wstar bundles\] Let ${\mathcal{M}}$ be a [W\*-]{}Fell bundle over $G,$ $\mathcal{N}$ a [W\*-]{}Fell subbundle of ${\mathcal{M}}$ and $P\colon {\mathcal{M}}\to \mathcal{N}$ a (not necessarily ${{\operatorname{w}^*}}-$continuous) conditional expectation. Then there exists a conditional expectation $P_{\mathbb{k}}\colon {\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})\to {\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ which is equivariant with respect to the canonical [W\*-]{}actions. Moreover, the restriction of $P_{\mathbb{k}}$ to ${\mathbb{k}}({\mathcal{M}})$ is a conditional expectation onto ${\mathbb{k}}(\mathcal{N})$. By Corollary \[cor:inclusion of wstar algebra of kernels\] we can think of ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ as a [W\*-]{}subalgebra of ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}).$ The matrix algebras $\mathbb{M}_F({\mathcal{M}})$ (for $F\subset G$ finite) of Remark \[rem:matrix algebras of Fell bundles\] form an upward directed set of [C\*-]{}subalgebras of ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ with norm closure equal to ${\mathbb{k}}({\mathcal{M}}).$ Moreover, $\mathbb{M}_F({\mathcal{M}})$ is hereditary in ${\mathbb{k}}({\mathcal{M}})$ and in the proof of Theorem \[thm: WAP iff AD amenable for wstar Fell bundles\] we showed that $\mathbb{M}_F({\mathcal{M}})$ is in fact a [W\*-]{}subalgebra of ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}).$ Hence the family $\{\mathbb{M}_F({\mathcal{M}})\}_{F}$ is an upward directed family of hereditary [W\*-]{}subalgebras of ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ whose union is ${{\operatorname{w}^*}}-$dense in ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}}).$ We denote $1_{F}$ the unit of $\mathbb{M}_F({\mathcal{M}})$. Then $1_F$ may or may not be equal to the unit of $\mathbb{M}_F(\mathcal{N}),$ which we denote $1'_F.$ Define, for each finite subset $F\subset G,$ the map $P_F\colon \mathbb{M}_F({\mathcal{M}})\to \mathbb{M}_F(\mathcal{N})\subset {\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ as the entriwise application of $P.$ We claim that this map is a conditional expectation. Indeed, by Tomiyama’s theorem it suffices to prove it is contractive. Let $X_{F{\mathcal{M}}}$ be the $\mathbb{M}_F({\mathcal{M}})-$Hilbert module obtained by considering on $\mathbb{M}_F({\mathcal{M}})$ the inner product $\langle X,Y\rangle_{F{\mathcal{M}}} :=\operatorname{trace}(X^*Y)$ and the action given by matrix multiplication. Then matrix multiplication on the left gives a faithful representation $\mathbb{M}_F({\mathcal{M}})\to {\mathcal{L}}(X_{F{\mathcal{M}}}).$ If $A\in \mathbb{M}_F({\mathcal{M}})$ and $X,Y\in X_{F\mathcal{N}},$ then $$\langle P_F(A)X,Y\rangle_{F\mathcal{N}} = \operatorname{trace}(P_F(X^*AY))=P(\langle AX,Y\rangle_{F{\mathcal{M}}}).$$ This implies $\|P_F(A)\|\leq \|A\|$ and $P_F$ is contractive. We can extend $P_F$ to ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ by defining $P_F\colon {\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})\to {\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ as $P_F(x)=P_F(1_Fx1_F).$ Then $P_F$ is clearly ccp, in fact it is a conditional expectation over $\mathbb{M}_F(\mathcal{N}).$ In this way we get a net of ccp maps $\{P_F\}_F$ from ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ to ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N}).$ Let $P_{\mathbb{k}}$ be a pointwise ${{\operatorname{w}^*}}-$limit of a converging subnet $\{P_{F_j}\}_j.$ Clearly $P_{\mathbb{k}}$ is ccp. Take $x\in {\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N}).$ Since $P_F(x)=1'_Fx1'_F,$ both $\{P_F(x)\}_F$ and $\{P_{F_j}(x)\}_{F_j}$ ${{\operatorname{w}^*}}-$converge to $x.$ Thus $P_{\mathbb{k}}(x)=x$ and $P_{\mathbb{k}}$ is a conditional expectation. We claim that $P_{\mathbb{k}}$ is equivariant with respect to the canonical [W\*-]{}actions. Take $t\in G$ and note that $\beta_t^{{\operatorname{w}^*}}(1_F)=1_{Ft^{-1}}$ and that, given $x\in \mathbb{M}_{F}(\mathcal{N}),$ it follows that $P_{Ft^{-1}}(\beta_t^{{\operatorname{w}^*}}(x))=\beta^{{\operatorname{w}^*}}_t(P_F(x)).$ Considering ${{\operatorname{w}^*}}-$limits we have $$\begin{aligned} P_{\mathbb{k}}(\beta^{{\operatorname{w}^*}}_t(x)) & = \lim_j P_{F_j}(1_{F_j}\beta^{{\operatorname{w}^*}}_t(x)1_{F_j}) = \lim_j P_{F_j}(\beta^{{\operatorname{w}^*}}_t(1_{F_j t}x1_{F_j t}))\\ & = \lim_j \beta^{{\operatorname{w}^*}}_t(P_{F_j t}(1_{F_j t}x1_{F_j t})) = \beta^{{\operatorname{w}^*}}_t( \lim_j P_{F_jt}(1_{F_j t}x1_{F_j t}))\end{aligned}$$ Thus $\{P_{F_j t}(1_{F_j t}x1_{F_j t})\}_j$ actually has a ${{\operatorname{w}^*}}-$limit (for every $x$) and it suffices to show that this limit is $P_{\mathbb{k}}(x).$ Every element $v$ of ${\mathbb{k}}_{{\operatorname{w}^*}}(\mathcal{N})$ is completely determined by the products $uvw,$ for $u,v\in {\mathbb{k}}_c(\mathcal{M}).$ Then it suffices to prove that $\lim_j u P_{F_jt}(1_{F_j t}x1_{F_j t})w = uP_{\mathbb{k}}(x)w,$ for all $u,w\in {\mathbb{k}}_c(\mathcal{M}).$ Fix $u,w\in {\mathbb{k}}_c(\mathcal{M})$ and take a finite set $K\subset G$ such that $K\times K$ contains both the supports of $u$ and $w.$ Since the families $\{F_j\}_{j}$ and $\{F_jt\}_{j}$ are cofinal in the finite subsets of $G$ we have $$\begin{aligned} \lim_j u P_{F_jt}(1_{F_j t}x1_{F_j t})w & = \lim_j u 1'_K P_{F_jt}(1_{F_j t}x1_{F_j t})1'_Kw\\ & = \lim_j u P_{F_jt}(1'_K 1_{F_j t}x1_{F_j t}1'_K)w = uP_K(1'_Kx1'_K)v\\ & = uP_{\mathbb{k}}(1'_Kx1'_K)v = u1'_KP_{\mathbb{k}}(x)1'_Kv=uP_{\mathbb{k}}(x)v.\end{aligned}$$ Finally, the last statement is clear from the computations above. In fact if $\mathcal{F}:=\{F\subset G:F\textrm{ is finite}\}$, then it is easy to see also that the $C^*$-limits of the direct systems $\{\mathbb{M}_F(\mathcal{M})\}_{F\in\mathcal{F}}$ and $\{\mathbb{M}_F(\mathcal{N})\}_{F\in \mathcal{F}}$ are ${\mathbb{k}}(\mathcal{M})$ and ${\mathbb{k}}(\mathcal{N})$ respectively, and that $P_{\mathbb{k}}|_{{\mathbb{k}}(\mathcal{M})}$ is the limit of the direct system $\{\mathbb{M}_F(\mathcal{M})\}_{F\in \mathcal{F}}\stackrel{P_F}{\to}\{\mathbb{M}_F(\mathcal{N})\}_{F\in \mathcal{F}}$. Let ${\mathcal{M}}$ be a [W\*-]{}Fell bundle over $G,$ $\mathcal{N}$ a [W\*-]{}Fell subbundle of ${\mathcal{M}}$ and $P\colon {\mathcal{M}}\to \mathcal{N}$ a (not necessarily ${{\operatorname{w}^*}}-$continuous) conditional expectation. If ${\mathcal{M}}$ has the W\*AP then so does $\mathcal{N}.$ Recall that ${\mathcal{M}}$ has the W\*AP iff the canonical [W\*-]{}action on ${\mathbb{k}}_{{\operatorname{w}^*}}({\mathcal{M}})$ is W\*AD-amenable. Then everything follows from [@Anantharaman-Delaroche:ActionI]\*[Proposition 3.8]{} and the Theorem above. Let ${\mathcal{A}}$ be a Fell subbundle of ${\mathcal{B}}.$ If ${\mathcal{B}}$ has the WAP and the associated inclusion ${\mathcal{A}}''{\hookrightarrow}{\mathcal{B}}''$ admits conditional expectation, then ${\mathcal{A}}$ has the WAP. In particular, this is the case if ${\mathcal{A}}$ is hereditary in ${\mathcal{B}}$ (i.e. $A_eB_rA_e\subset A_r$ for all $r\in G$). If ${\mathcal{A}}$ is hereditary in ${\mathcal{B}}$ and $p$ is the unit of $A_e''\subset B_e'',$ then the map $P\colon {\mathcal{B}}''\to {\mathcal{A}}'',\ b\mapsto pbp,$ is a conditional expectation. Then the proof follows from our last Corollary. Let ${\mathcal{A}}$ be a Fell subbundle of a Fell bundle ${\mathcal{B}}$ and suppose there exists a conditional expectation $P\colon {\mathcal{B}}{\twoheadrightarrow}{\mathcal{A}}$. If ${\mathcal{B}}$ has the WAP, then so does ${\mathcal{A}}$. It suffices to construct a conditional expectation $P''\colon {\mathcal{B}}''\to {\mathcal{A}}''.$ Take a fiber $B_t$ and consider it’s linking algebra as $$\mathbb{L}(B_t)= \left( \begin{array}{cc} I_t & B_t\\ B_{t^{-1}} & I_{t^{-1}} \end{array} \right),$$ where $I_t$ is (the closed linear span of) $B_tB_t^*$ in $B_e.$ Then we can form a conditional expectation $\mathbb{L}(P)_t \colon \mathbb{L}(B_t)\to \mathbb{L}(A_t)$ by entrywise computation of $P.$ Using Stinespring’s factorization theorem can be extended $\mathbb{L}(P)_t$ ${{\operatorname{w}^*}}-$continuously to a conditional expectation $\mathbb{L}(P)_t'' \colon \mathbb{L}(B_t)''\to \mathbb{L}(A_t)''.$ If we now restrict this last map to $B_t''$ we get a map $P_t''\colon B_t''\to A_t''.$ We leave to the reader the verification of the fact that $P'':=\{P_t''\}_{t\in G}\colon {\mathcal{B}}''\to {\mathcal{A}}''$ is a conditional expectation. Fell bundles with commutative unit fibre {#sec:commutative-unit-fibre} ======================================== This section is dedicated to the study of amenability for Fell bundles with commutative unit fiber. Let ${\mathcal{B}}=(B_t)_{t\in G}$ be a Fell bundle such that $B_e={{C}_0}(X)$ is a commutative [C\*-]{}algebra. Such a Fell bundle canonically induces a partial action of $G$ on $X$ and hence also on ${{C}_0}(X)$. This is because imprimitivity bimodules between commutative [C\*-]{}algebras yield isomorphisms between their spectra. Since each $B_t$ can be viewed as an imprimitivity $I_{t}$-$I_{t^{-1}}$-bimodule, where $I_t:=B_tB_t^*\cong {{C}_0}(A_t)$ for some open subset $A_t{\subseteq}X$, it yields an isomorphism $\alpha_t\colon {{C}_0}(A_{t^{-1}})\to {{C}_0}(A_t)$ or, equivalently, to a homeomorphism $\theta_t\colon A_{t^{-1}}\to A_t$. The collection $\alpha=(\alpha_t)_{t\in G}$ (resp. $\theta=(\theta_t)_{t\in G}$) is then the desired partial action of $G$ on ${{C}_0}(X)$ (resp. $X$); they are related by the equation $\alpha_t(f)=f\circ\theta_{t^{-1}}$ for all $f\in {{C}_0}(A_{t^{-1}})$. The partial action $\theta$ of $G$ on $X$ or its associated partial action $\alpha$ on ${{C}_0}(X)=B_e$ defined above will be call the *spectral partial action* of ${\mathcal{B}}$. These partial actions are analogous to the central partial actions defined in Section \[sec:central-partial\]. Moreover, they are special cases of the more general partial actions on the spectrum of $B_e,$ as in [@Abadie-Abadie:Ideals] for an arbitrary Fell bundle ${\mathcal{B}}$ ($B_e$ need not be abelian here). Moreover, we see from the constructions that the central partial action of ${\mathcal{B}}''$ is the double dual partial action $\alpha''$ of $G$ on the W\*-algebra ${{C}_0}(X)''$ associated with $\alpha$. From this we immediately derive the following result: A Fell bundle ${\mathcal{B}}$ with commutative unit fiber is AD-amenable (or, equivalently, has the WAP) if and only if its spectral partial action is AD-amenable (or has the WAP). By definition, $\alpha$ is AD-amenable if and only if its double dual partial action $\alpha''$ is W\*AD-amenable. Since $\alpha''$ is the central partial action of ${\mathcal{B}}''$, the result follows from Corollary \[cor:equivalence of AD amenability\], the definition of AD-amenability (Definition \[def:AD amenable\]) and the equivalence between AD-amenability and the WAP, Theorem \[thm:the mega theorem\]. From the spectral partial action $\alpha$ of ${\mathcal{B}}$, we obtain another Fell bundle ${\mathcal{B}}_\alpha$, the one associated to the partial action $\alpha$. These Fell bundles are not necessarily isomorphic in general because the original Fell bundle may contain some “twist”. One form of twist is given in terms of 2-cocycles for partial actions as defined by Exel in [@Exel:TwistedPartialActions]. More precisely, Exel introduces the notion of a *twisted partial action*. In the commutative case, besides a partial action $\alpha$ of $G$ on ${{C}_0}(X)$, this envolves certain unitary multipliers $\omega(s,t)\in U{\mathcal{M}}(D_{st})$. We do not need to recall the precise conditions on $\omega$ and its relation with $\alpha$. We only recall that the Fell bundle ${\mathcal{B}}_{\alpha,\omega}$ associated with the twisted partial action $(\alpha,\omega)$ has fibres ${\mathcal{B}}_{\alpha,\omega,t}:={{C}_0}(D_t)\delta_t\cong {{C}_0}(D_t)$ and multiplications and involutions given by: $$(f\delta_s)\cdot (g\delta_t):=\omega(s,t)\alpha_s(\alpha_s^{-1}(f)g)\delta_{st},\quad (f\delta_s)^*:=\omega(s^{-1},s)^*\alpha_{s^{-1}}(f^*)\delta_{s^{-1}}$$ for all $s,t\in G$, $f\in {{C}_0}(D_s)$ and $g\in {{C}_0}(D_t)$. The main result in [@Exel:TwistedPartialActions] states that every *regular* Fell bundle is isomorphic to one associated with a twisted partial action. The regularity of ${\mathcal{B}}$ concerns the structure of the fibres $B_t$ as imprimitivity $I_t$-$I_{t^{-1}}$-bimodules. Since the [C\*-]{}algebras $I_t={{C}_0}(D_t)$ are commutative, such imprimitivity bimodules are necessarily given as ${{C}_0}$-sections of a certain (complex) line bundle $L_t$ over $D_t$. The ${{C}_0}$-section ${{C}_0}(L_t)$ of such a line bundle may be viewed as an imprimitivity ${{C}_0}(D_t)$-${{C}_0}(D_{t^{-1}})$-bimodule; using the isomorphism $\alpha_t\colon {{C}_0}(D_{t^{-1}}){\xrightarrow\sim}{{C}_0}(D_t)$ we may also view ${{C}_0}(L_t)$ as an imprimitivity ${{C}_0}(D_t)$-${{C}_0}(D_{t^{-1}})$-bimodule which is then isomorphic to $B_t$. The regularity of $B_t$ is then equivalent to $L_t$ being topologically trivial as a complex line bundle. This is always the case for Fell bundles associated with twisted partial actions but it might be not the case in general, so that our original Fell bundle ${\mathcal{B}}$ is not necessarily isomorphic to ${\mathcal{B}}_{\alpha,\omega}$, not even as Banach bundles. However amenability does not see these diferences. Indeed, again the spectral and central partial actions of all three Fell bundles ${\mathcal{B}}$, ${\mathcal{B}}_\alpha$ and ${\mathcal{B}}_{\alpha,\omega}$ are isomorphic, so we immediately obtain the next corollary (an improvement of the previous one): A Fell bundle with commutative unit fibre ${\mathcal{B}}$ is AD-amenable (or has the WAP) if and only if so is ${\mathcal{B}}_\alpha$ or, equivalently, ${\mathcal{B}}_{\alpha,\omega}$. Notice that by Proposition \[prop:AD amenability and nuclearity\] the equivalent conditions in the above corollary are also equivalent to nuclearity of one of the [C\*-]{}algebras $C^*_{({\mathrm{r}})}({\mathcal{B}})$, $C^*_{({\mathrm{r}})}({\mathcal{B}}_\alpha)\cong {{C}_0}(X)\rtimes_{\alpha,({\mathrm{r}})}G$ or $C^*_{({\mathrm{r}})}({\mathcal{B}}_{\alpha,\omega})={{C}_0}(X)\rtimes_{\alpha,\omega,({\mathrm{r}})}G$. In particular we obtain the interesting consequence that ${{C}_0}(X)\rtimes_{\alpha,({\mathrm{r}})}G$ is nuclear if and only if ${{C}_0}(X)\rtimes_{\alpha,\omega,({\mathrm{r}})}G$ is nuclear for every twisted partial action $(\alpha,\omega)$. The parenthesis around ${\mathrm{r}}$ here means that we can take either the full or the reduced crossed product (or cross-sectional C\*-algebras) in all equivalent statements. Indeed, any other exotic crossed-product norm between the full and reduced could be used for that matter. The above results can also be interpreted using groupoid descriptions of the associated [C\*-]{}algebras. To explain this, let us first recall that a partial action $\theta$ of $G$ on $X$ yields a locally compact Hausdorff étale transformation groupoid $\Gamma=X\rtimes_\theta G$ (see [@Abadie:On_partial]). As a set it consists of pairs $(x,t)$ with $t\in G$ and $x\in D_{t^{-1}}$. The source and range maps are ${s}(x,t):=x$ and ${r}(x,t):=t\cdot x:=\theta_t(x)$ and multiplication and inversion are given by $$(x,s)\cdot (y,t)=(y,st),\quad (x,t)^{-1}=(t\cdot x,t^{-1})\quad \mbox{for }x=t\cdot y.$$ The topology is the one inherited from the product topology on $X\times G$. The domains $D_t$ give rise to subsets $\Gamma_t:=D_{t}\times\{t^{-1}\}{\subseteq}\Gamma$ that are clopen bisections of $\Gamma$ (although the domains $D_t$ are only assumed to be open in $X$). Hence $\Gamma$ decomposes as a disjoint union $\Gamma=\sqcup_{t\in G}\Gamma_t$ of clopen subsets. In particular the vector space ${{C}_c}(\Gamma)$ identifies canonically with the algebraic direct sum $\oplus^{{\operatorname{alg}}}_{t\in G}{{C}_c}(\Gamma_t)$, that is, functions $\zeta\in {{C}_c}(\Gamma)$ correspond bijectively to finite sets of functions $\zeta_t\in {{C}_c}(\Gamma_t)$, $t\in G$. This identification extends to a canonical isomorphism $C^*_{({\mathrm{r}})}(\Gamma)\cong {{C}_0}(X)\rtimes_{\alpha,({\mathrm{r}})} G$, where $\alpha$ is the partial action of $G$ on ${{C}_0}(X)$ corresponding to $\theta$. Now, given a Fell bundle ${\mathcal{B}}$ over $G$ with unit fibre $B_e={{C}_0}(X)$ as above, let $\theta$ be its spectral action and $\Gamma$ the corresponding transformation groupoid that we call the *spectral groupoid* of ${\mathcal{B}}$. As previously, we also identify each fibre $B_t$ with the sections ${{C}_0}(L_t)$ of a line bundle $L_t$ over $D_t$. The disjoint union $L:=\sqcup_{t\in G} L_t$ can then be viewed as a line bundle over $\Gamma=\sqcup_{t\in G}\Gamma_t$. Moreover, with the Fell bundle structure inherited from ${\mathcal{B}}$, $L$ is indeed a Fell line bundle over $\Gamma$; such a Fell bundle is also usually viewed as a *twist* over $\Gamma$. By construction we get an obvious identification ${{C}_c}(\Gamma,L)\cong {{C}_c}({\mathcal{B}})$ that extends to an isomorphism $C^*_{({\mathrm{r}})}(\Gamma,L)\cong C^*_{({\mathrm{r}})}({\mathcal{B}})$. In other words, we have described every Fell bundle over a discrete group with commutative unit fibre in terms of a twisted groupoid. This result can be deduced from the constructions and results in [@BussExel:Regular.Fell.Bundle] that describe Fell bundles over inverse semigroups with commutative fibres over idempotents (also call semi-abelian Fell bundles in [@BussExel:Regular.Fell.Bundle]) in a similar way via twisted groupoids. The Fell bundles in [@BussExel:Regular.Fell.Bundle] are assumed to be saturated, but the same constructions can also be done in general for non-saturated ones; alternatively, one can view a non-saturated Fell bundle over $G$ as a saturated Fell bundle over the inverse semigroup $S(G)$ constructed by Exel in [@Exel:Partial_actions], see [@BussExel:InverseSemigroupExpansions]. Next we relate amenability of ${\mathcal{B}}$ in terms of amenability of its spectral groupoid. Amenable groupoids are defined and studied mainly in [@Renault_AnantharamanDelaroche:Amenable_groupoids]. We shall use the characterisation from [@Brown-Ozawa:Approximations]\*[Lemma 5.6.14]{} that says that an étale groupoid $\Gamma$ is amenable if and only if there is a net $(\zeta_i){\subseteq}{{C}_c}(\Gamma)$ with $\|\zeta_i\|_2\leq 1$ for all $i$ and $(\zeta_i^**\zeta_i)(\gamma)\to 1$ uniformly for $\gamma$ in compact subsets of $\Gamma$. One of the main results in this direction states that $\Gamma$ is amenable if and only if $C^*_{({\mathrm{r}})}(\Gamma)$ is nuclear. Notice that the spectral groupoids of ${\mathcal{B}}$ and ${\mathcal{B}}_\alpha$ (and also of ${\mathcal{B}}_{\alpha,\omega}$) are the same; they are just the transformation groupoid $\Gamma=X\rtimes_\theta G$ of the spectral partial action of ${\mathcal{B}}$. In particular we can reinterpret our previous results as follows: A Fell bundle with commutative unit fibre is AD-amenable if and only if its spectral groupoid is amenable. Using the description of ${\mathcal{B}}$ in terms of a twisted groupoid $(\Gamma,L)$ and that AD-amenability is equivalent to nuclearity of the corresponding [C\*-]{}algebras, we can also interpret the above result as the statement that $C^*_{({\mathrm{r}})}(\Gamma,L)$ is nuclear if and only if $C^*_{({\mathrm{r}})}(\Gamma)$ is nuclear. In other words, nuclearity of a twisted groupoid C\*-algebra is independent of the twist. Indeed, in this form this result is already known, see [@Takeishi:Nuclearity]. Up to this point we have only looked at AD-amenability or, equivalently, the WAP for Fell bundles with commutative unit fibre. We also want to consider the AP for such Fell bundles. We know already that the AP always implies the WAP but we do not know whether the converse holds in general. The next result aims at a partial converse: \[thm:AP WAP equivalence when commutative unit fibre\] Let ${\mathcal{B}}$ be a Fell bundle over $G$ with commutative unit fibre $B_e={{C}_0}(X)$. Let $\theta$ be its spectral partial action with associated partial action $\alpha$ on ${{C}_0}(X)$, and let $\Gamma=X\rtimes_\theta G$ be its spectral groupoid. Then the following assertions are equivalent: (i) ${\mathcal{B}}$ has the WAP or is AD-amenable, that is, $C^*_{({\mathrm{r}})}({\mathcal{B}})$ is nuclear; (ii) ${\mathcal{B}}_\alpha$ has the WAP or is AD-amenable; (iii) $C^*_{({\mathrm{r}})}({\mathcal{B}}_\alpha)=C^*_{({\mathrm{r}})}(\Gamma)={{C}_0}(X)\rtimes_{\alpha,({\mathrm{r}})} G$ is nuclear; (iv) $\Gamma$ is amenable; (v) ${\mathcal{B}}_\alpha$ has the AP; (vi) for every $2$-cocycle $\omega$ for $\alpha$, the corresponding Fell bundle ${\mathcal{B}}_{\alpha,\omega}$ has the AP; (vii) ${\mathcal{B}}$ has the AP. We already checked the equivalences (i)$\Leftrightarrow$(ii)$\Leftrightarrow$(iii)$\Leftrightarrow$(iv). It remains to check the equivalence of these conditions with (v), (vi) and (vii). Assume that $\Gamma$ is amenable and let $\{\zeta_i\}_{i\in I}$ be a net of functions in ${{C}_c}(\Gamma)$ with $\|\zeta_i\|_2\leq 1$ for all $i$ and $\zeta_i^**\zeta_i(\gamma)\to 1$ uniformly for $\gamma$ in compact subsets of $\Gamma$. Define $\xi_i\colon G\to{{C}_0}(X)$ by $\xi_i(t)|_x:=\zeta_i(x,t^{-1})$ if $x\in D_t$ and $0$ otherwise. In other words, we just use the canonical identification ${{C}_c}(\Gamma)\cong \oplus_{t\in G}^{{\operatorname{alg}}}{{C}_c}(D_t)$ to view each $\zeta_i$ as a finitely supported function $\xi_i\colon G\to {{C}_c}(X)$ with $\xi_i(t)\in {{C}_c}(D_t)$ for all $t\in G$. We verify that this net yields the AP for ${\mathcal{B}}_\alpha$. The boundedness of $(\zeta_i)$ for the $\ell^2$-norm implies the same boundedness for $(\xi_i)$. It remains to check the convergence condition that gives the AP. For this it is enough to check that if $f\in {{C}_c}(D_t)$, then $\sum_{s\in G}\xi_i(ts)^* (f\delta_t) \xi_i(s)$ converges in norm to $f\delta_t$. By definition, we have $$\label{eq:AP-partial-action} \sum_{s\in G}\xi_i(ts)^* (f\delta_t) \xi_i(s)=\sum_{s\in G}\xi_i(ts)^* \alpha_t(\alpha_t^{-1}(f)\xi_i(s))\delta_t.$$ Computing this sum at some $x\in D_t$ we get an expression of the form: $$\sum_{s\in G}\overline{\zeta_i(x,s^{-1}t^{-1})} f(x)\zeta_i(\theta_t^{-1}(x),s^{-1})$$ where the sum varies over all $s\in G$ in a finite subset (depending on the support of $\zeta_i$) satisfying $\theta_t^{-1}(x)\in D_s$ or, equivalently, $x\in D_{ts}$. The above sum can be rewritten as $$\left(\sum_{\alpha\in \Gamma}\overline{\zeta_i(\alpha)}\zeta_i(\alpha\gamma)\right) f(x)=(\zeta_i^**\zeta_i)(\gamma)f(x)$$ where $\gamma=(\theta_t^{-1}(x),t)$ and $\alpha\in \Gamma$ varies in a finite subset (depending on the support of $\zeta_i$) satisfying ${s}(\alpha)={r}(\gamma)$; those $\alpha$ are necessarily of the form $(x,s^{-1}t^{-1})$ with $x\in D_{ts}$. If $x$ varies in the compact support $K:=\operatorname{\mathrm{supp}}(f){\subseteq}D_t$ of $f$, then $\gamma=(\theta_t^{-1}(x),t)$ varies in a compact subset of $\Gamma$ so that $(\zeta_i^**\zeta_i)(\gamma)\to 1$ uniformly on this compact subset. This implies the desired convergence that gives the AP for ${\mathcal{B}}_\alpha$. Hence (iv)$\Rightarrow$(v). Moreover, if $\omega$ is a $2$-cocycle for $\alpha$, then the computation  is the same because $\omega(t,e)=1$. Therefore the same argument also yields the implication (iv)$\Rightarrow$(vi). Conversely, if ${\mathcal{B}}_\alpha$ or ${\mathcal{B}}_{\alpha,\omega}$ has the AP, then it also has the WAP and we already observed that this is equivalent to amenability of $\Gamma$. This yields the implications (v),(vi),(vii)$\Rightarrow$(iv). It remains to check (iv)$\Rightarrow$(vii). The proof is essentially the same as before, let us give more details: let $\{\zeta_i\}_{i\in I}{\subseteq}{{C}_c}(\Gamma)$ be a net that gives the amenability of $\Gamma$ and let $\{\xi_i\}_{i\in I}$ be the same net as above defined from $\{\zeta_i\}_{i\in I}$ that gives the AP for ${\mathcal{B}}_\alpha$. We check that this net also gives the AP for ${\mathcal{B}}$. For this we identify $B_t\cong {{C}_0}(L_t)$ for a line bundle $L_t$ as before. The structure of ${{C}_0}(L_t)$ as a Hilbert ${{C}_0}(D_t)$-${{C}_0}(D_{t^{-1}})$ is as follows: the left and right inner products are given by $_l{\langle\xi\!\mid\!\eta\rangle}(x):={\langle\eta(x)\!\mid\!\xi(x)\rangle}_x$ and ${\langle\xi\!\mid\!\eta\rangle}_r(x):={\langle\xi(\theta_t(x)\!\mid\!\eta(\theta_t(x))\rangle}_x$. Here we use that $L_t$ is a Hermitian complex line bundle and ${\langle\cdot\!\mid\!\cdot\rangle}_x$ denotes the inner product on each fibre $L_{t,x}$; this inner product is assumed to be linear on the second variable and it is continuous so that the inner products on ${{C}_0}(L_t)$ are well defined. The left action of ${{C}_0}(D_t)$ and the right action of ${{C}_0}(D_{t^{-1}})$ on ${{C}_0}(L_t)$ are given by $(f\cdot\xi)(x):=f(x)\xi(x)$ and $(\xi\cdot g)(x):=\xi(x)g(\theta_{t}^{-1}(x))$ for all $x\in D_t$. Having this, essentially the same proof as before still works: we take an element $\eta\in {{C}_c}(L_t)$ and verify that $$\label{eq:AP-partial-action1} \sum_{s\in G}\xi_i(ts)^*\cdot\eta\cdot \xi_i(s)\to \eta$$ with respect to the norm of ${{C}_0}(L_t)\cong B_t$. But the expression above is a section of $L_t$ and when we compute at some $x\in D_t$ we get: $$\sum_{s\in G}\overline{\zeta_i(x,s^{-1}t^{-1})} \eta(x)\zeta_i(\theta_t^{-1}(x),s^{-1})$$ which as before can be rewritten as $$\left(\sum_{\alpha\in \Gamma}\overline{\zeta_i(\alpha)}\zeta_i(\alpha\gamma)\right) \eta(x)=(\zeta_i^**\zeta_i)(\gamma)\eta(x).$$ Using that $(\zeta_i^**\zeta_i)(\gamma)\to 1$ uniformly on compacts, the desired result follows. Let ${\mathcal{B}}$ be a Fell bundle which is weakly equivalent to a Fell bundle ${\mathcal{A}}$ with commutative unit fibre. Then ${\mathcal{B}}$ has the AP if and only if it has the WAP (i.e. is AD-amenable). We showed that both the WAP and the AP are preserved by the weak equivalence of Fell bundles and our last Theorem implies ${\mathcal{A}}$ has the AP if and only if it has the WAP. Thus the claim follows. Given a Fell bundle ${\mathcal{B}}$ as in the Corollary above, there may not be a suitable candidate for the spectral grupoid, mainly because the spectrum of $B_e$ may not be Hausdorff. Consider for example the semidirect product bundle of a Morita enveloping action of a partial action on a commutative C\*-algebra which does not have an enveloping action [@Abadie:Enveloping]. If we want to generalize Theorem \[thm:AP WAP equivalence when commutative unit fibre\], it is then reasonable to assume $B_e$ is Morita equivalent to a commutative C\*-algebra. \[thm:equivalence bundle from equivalence bimodule\] Suppose ${\mathcal{B}}$ is a Fell bundle over $G,$ $A$ is a C\*-algebra and $M$ is an $A$-$B_e$-equivalence bimodule. Consider, for each $t\in G,$ $B_t$ as a left $B_e$-Hilbert module and let $M\otimes B_t$ be the $B_e$-inner tensor product. Then there exists a unique right Hilbert ${\mathcal{B}}$-bundle structure [@Abadie-Ferraro:Equivalence_of_Fell_Bundles]\*[Definition 2.1]{} on $\mathcal{X}:=\{M\otimes B_t\}_{t\in G}$ such that, for all $x,y\in M$ and $a,b\in {\mathcal{B}}:$ $$\langle x\otimes a,y\otimes b\rangle_{\mathcal{B}}= a^*\langle x,y\rangle_{B_e}b \quad \mbox{ and }\quad (x\otimes a)b=x\otimes (ab).$$ Let also ${\mathcal{K}}({\mathcal{X}})=\{K_t\}_{t\in G}$ be the bundle of generalized compact operators, as in [@Abadie-Ferraro:Equivalence_of_Fell_Bundles]\*[Theorem 3.9]{}. Then ${\mathcal{X}}$ is a strong ${\mathcal{K}}({\mathcal{X}})-{\mathcal{B}}$ equivalence and the unit fibre $K_e$ is isomorphic to $A.$ Uniqueness follows from [@Abadie-Ferraro:Equivalence_of_Fell_Bundles] and the fact that elementary tensor products span a dense subspace of the tensor products $M\otimes B_t,$ thus we only need to prove the existence claim. First we show that the action of ${\mathcal{B}}$ on ${\mathcal{X}}$ is defined. Take $r,s\in G,$ $x_1,\ldots,x_n\in M,$ $a_1,\ldots,a_n\in B_r$ and $b\in B_s.$ Then $$\begin{aligned} \| \sum_{i=1}^n x_i\otimes (a_ib) \|^2 & = \|\sum_{i,j=1}^n b^*a_i^*\langle x_i,x_j\rangle_{B_e} a_j b \| =\| b^* \langle \sum_{i=1}^n x_i\otimes a_i,\sum_{i=1}^n x_i\otimes a_i\rangle b \| \\ & \leq \|b\|^2\| \sum_{i=1}^n x_i\otimes a_i \|^2. \end{aligned}$$ With the inequality above we can easily prove the existence of a bilinear map $(M\otimes B_r)\times B_s\to M\otimes B_{rs},\ (u,b)\mapsto ub,$ such that $(x\otimes a)b=x\otimes (ab)$ and $\|ub\|\leq \|u\|\|b\|.$ These maps define the action of ${\mathcal{B}}$ on ${\mathcal{X}}.$ We now construct the ${\mathcal{B}}$-valued inner product of ${\mathcal{X}}.$ Take $r,s\in G,$ $x_1,\ldots,x_n\in M,$ $y_1,\ldots,y_n\in M,$ $a_1,\ldots,a_n\in B_r$ and $b_1,\ldots,b_n\in B_s.$ Set $u:=\sum_{i=1}^n x_i\otimes a_i\in M\otimes B_r,$ $v:=\sum_{i=1}^n y_i\otimes b_i\in M\otimes B_s$ and $w:=\sum_{i,j=1}^n a_i^*\langle x_i,y_j\rangle_{B_e}b_j\in B_{r^{-1}s}.$ In order to prove the inner product is defined it suffices to show that $$\label{equ:inner product bounded} \|w\|\leq \|u\|\|v\|,$$ because after this inequality we can set $\langle u,v\rangle_{\mathcal{B}}:=w.$ Let $[u,u]_r\in {\mathcal{K}}(M\otimes B_r)$ represent the generalized compact operator $z\mapsto u\langle u,z\rangle,$ and let $\varphi_r\colon A={\mathcal{K}}(M)\to {\mathcal{K}}(M\otimes B_r)$ be the unique \*-homomorphism such that $\varphi_r(a)(z\otimes c)=(az)\otimes c.$ It is straightforward to show that $[u,u]_r= \varphi_r( \sum_{i,j=1}^n {}_A\langle x_ia_ib_j^*, x_j\rangle ).$ We know $\varphi_r$ may not be injective, but it is injective when restricted to the ideal $\operatorname{\overline{span}}\langle MB_rB_r^*,M\rangle.$ Thus $$\label{equ:norm of u} \|u\|^2= \|[u,u]_r\| = \| \sum_{i,j=1}^n {}_A\langle x_ia_ib_j^*, x_j\rangle \|= \| \sum_{i,j=1}^n {}_A\langle x_i, x_j b_ja_i^*\rangle \|.$$ To prove note that $w^*w = \sum_{i,j,k,l=1}^n b_j^*\langle y_j,x_i\rangle_{B_e}a_ia_l^*\langle x_l,y_k\rangle_{B_e}b_k.$ We have $a:=(a_ia_l^*)_{i,l=1}^n\in \mathbb{M}_n(B_e)^+$ and, if $d:=a^{1/2}\in \mathbb{M}_n(B_e),$ then $a_ia_l^* = \sum_{p=1}^n d_{i,p}{d_{l,p}}^*.$ This implies $$\begin{aligned} w^*w & = \sum_{i,j,k,l,p=1}^n b_j^*\langle y_j,x_i\rangle_{B_e}d_{i,p}{d_{l,p}}^*\langle x_l,y_k\rangle_{B_e}b_k\\ & = \sum_{i,j,k,l,p=1}^n b_j^*\langle {}_A\langle x_l d_{l,p}d_{i,p}^*, x_i\rangle y_j ,y_k\rangle_{B_e}b_k \\ & = \sum_{j,k=1}^n b_j^*\langle \left(\sum_{i,l=1}^n{}_A\langle x_l a_l a_i^*, x_i\rangle\right) y_j ,y_k\rangle_{B_e}b_k. \end{aligned}$$ Consider the direct sum of $n$ copies of $M,$ $\oplus_nM,$ as a $\mathbb{M}_n(A)-B_e$ equivalence bimodule with left and right inner products given by $$\begin{aligned} {}_{\mathbb{M}_n(A)}\langle (f_1,\ldots,f_n),(g_1,\ldots,g_n)\rangle & := ({}_A\langle f_i,g_j\rangle )_{i,j=1}^n\\ \langle (f_1,\ldots,f_n),(g_1,\ldots,g_n)\rangle_{B_e} & := \sum_{i=1}^n \langle f_i,g_i\rangle_{B_e}. \end{aligned}$$ The action on the right of $B_e$ on $\oplus_nM$ is given by entrywise multiplication, while the action of $\mathbb{M}_n(A)$ on the left is given by matrix multiplication by considering the elements of $\oplus_nM$ as column vectors with entries in $M.$ Let $A\to \mathbb{M}_n(A), d\mapsto {\operatorname{diag}}(d),$ be the inclusion of $A$ in the diagonal. Consider also $\oplus_n B_s$ as a $\mathbb{M}_n(B_e)-B_e$ bimodule, with analogous operations. In we identified $d:=\sum_{i,l=1}^n{}_A\langle x_l a_l a_i^*, x_i\rangle$ with $[u,u]_r$ via $\varphi_r,$ thus $d\geq 0.$ With these considerations and defining $\xi:=(b_1,\ldots,b_n)\in \oplus_n B_s$ and $\eta:=(y_1,\ldots,y_n)\in \oplus_nM$ we have $$w^*w =\langle \xi , {}_{\mathbb{M}_n(B_e)}\langle \eta,{\operatorname{diag}}(d)\eta\rangle \xi \rangle_{B_e}.$$ Viewing the direct sum of adjoints $\oplus_n M^*$ as an $\mathbb{M}_n(B_e)-A$ Hilber bimodule, we deduce that ${}_{\mathbb{M}_n(B_e)}\langle \eta,{\operatorname{diag}}(d)\eta\rangle\leq \|d\|{}_{\mathbb{M}_n(B_e)}\langle \eta,\eta\rangle.$ By , in $B_e$ we have $$w^*w \leq \|d\| \langle \xi , {}_{\mathbb{M}_n(B_e)}\langle \eta,\eta\rangle \xi \rangle_{B_e} = \|u\|^2 \langle v,v\rangle_{B_e},$$ and this clearly implies $\|w\|\leq \|u\|\|v\|.$ At this point we have shown that the inner product of ${\mathcal{X}}$ and the action of ${\mathcal{B}}$ on ${\mathcal{X}}$ are defined, the reader can now check that these operations satisfy the conditions of [@Abadie-Ferraro:Equivalence_of_Fell_Bundles]\*[Definition 2.1]{}. In the rest of the proof we use the notation of [@Abadie-Ferraro:Equivalence_of_Fell_Bundles]\*[Theorem 3.9]{}. Recall in particular that, for $u\in M\otimes B_r$ and $v\in M\otimes B_s,$ $[u,v]$ is the adjointable operator of order $rs^{-1}$ given by ${\mathcal{X}}\to {\mathcal{X}},w\mapsto u\langle v,w\rangle_{{\mathcal{B}}}.$ The ajointable operators of order $e$ of ${\mathcal{X}},$ $\mathbb{B}_e({\mathcal{X}}),$ form a C\*-algebra and $$\begin{aligned} K_e &= \operatorname{\overline{span}}\{ [u,v]\colon u,v\in M\otimes B_t, \ t\in G\} \\ & = \operatorname{\overline{span}}\{ [x\otimes b,y\otimes c]\colon x\otimes b,y\otimes c\in M\otimes B_r, \ r\in G\}. \end{aligned}$$ There exists a unique \*-homomorphism $\varphi\colon A\to \mathbb{B}_e({\mathcal{X}})$ such that $\varphi(a)(x\otimes b) = (ax)\otimes b.$ Note that $\varphi$ is injective because we can think of the unit fiber $M\otimes B_e$ as an $A-B_e$ equivalence bimodule. If $x\otimes b,y\otimes c\in M\otimes B_r,$ then for all $z\otimes d\in M\otimes B_s$ we have $$\begin{aligned} [x\otimes b,y\otimes c](z\otimes d) & = x\otimes b c^*\langle y,z\rangle_{B_e}d = xb c^*\langle y,z\rangle_{B_e} \otimes d = {}_A\langle xb c^*,y\rangle z \otimes d\\ & = \varphi({}_A\langle xb c^*,y\rangle)z\otimes d. \end{aligned}$$ Since the elements $[x\otimes b,y\otimes c]$ span a dense subset of $K_e,$ we conclude that $\varphi(A)=K_e$ is isomorphic to $A.$ In order to prove that ${\mathcal{X}}$ is a strong equivalence we must show that $$\label{equ:equality of ideals} \operatorname{\overline{span}}K_t K_t^* = \operatorname{\overline{span}}[M\otimes B_t,M\otimes B_t],\ \forall \ t\in G.$$ Recall that $K_t$ is the closure in $\mathbb{B}_t({\mathcal{X}})$ of $\operatorname{span}\{[u,v]\colon u\in M\otimes B_{tr},\ v\in M\otimes B_r,\ r\in G\}.$ Fix $t\in G$ and take $r_1,r_2\in G,$ $x_i\otimes a_i\in B_{tr_i},y_i\otimes b_i\in M\otimes B_{r_i},$ for $i=1,2.$ Then $$\begin{aligned} [x_1\otimes a_1,y_1\otimes b_1][x_2\otimes a_2,y_2\otimes b_2]^*(z\otimes c) & = [x_1\otimes a_1,y_1\otimes b_1]y_2\otimes b_2 a_2^*\langle x_2,z\rangle_{B_e}c \\ & = x_1\otimes \underbrace{a_1b_1^*\langle y_1,y_2\rangle_{B_e}b_2 a_2^*}_{\in B_e}\langle x_2,z\rangle_{B_e}c\\ & = x_1a_1b_1^*\langle y_1,y_2\rangle_{B_e}b_2 a_2^*\langle x_2,z\rangle_{B_e}\otimes c \\ & = {}_A\langle x_1a_1b_1^*\langle y_1,y_2\rangle_{B_e}b_2 a_2^* , x_2\rangle z\otimes c\\ & =\varphi( {}_A\langle x_1a_1b_1^*\langle y_1,y_2\rangle_{B_e}b_2 a_2^* , x_2\rangle)z\otimes c\\ & = [x_1\otimes a_1b_1^*\langle y_1,y_2\rangle_{B_e},x_2\otimes a_2b_2^* ](z\otimes c). \end{aligned}$$ This implies the inclusion $\subseteq$ in . To prove the converse take $x\otimes a,y\otimes b\in M\otimes B_t.$ We can write $a=a_1b_1^*$ and $b=a_2b_2^*$ for some $a_1,a_2\in B_t$ and $b_1,b_2\in B_e$ (by Cohen-Hewitt’s Theorem). We can also approximate $a=a_1b_1^*$ in norm by sums of elements of the form $a_1b_1^*\langle y_1,y_2\rangle_{B_e}.$ This allows us to approximate, in $\mathbb{B}_e({\mathcal{X}}),$ the operator $[x\otimes a,y\otimes b] $ by sums of operators of the form $$[x_1\otimes a_1b_1^*\langle y_1,y_2\rangle_{B_e},x_2\otimes a_2b_2^* ] = [x_1\otimes a_1,y_1\otimes b_1][x_2\otimes a_2,y_2\otimes b_2]^*\in K_tK_t^*.$$ Thus the inclusion $\supseteq$ in follows. Suppose ${\mathcal{B}}$ is a Fell bundle over $G$ and that $B_e$ is Morita equivalent to a commutative C\*-algebra $C_0(X)$ through an equivalence bimodule $M.$ Identify $X$ with the primitive ideal space of $B_e$ and let $\alpha$ be the partial action defined by ${\mathcal{B}}$ on $C_0(X).$ Let also $\Gamma$ be the grupoid associated to $\alpha.$ Then the following assertions are equivalent: (i) ${\mathcal{B}}$ has the WAP or is AD-amenable, that is, $C^*_{({\mathrm{r}})}({\mathcal{B}})$ is nuclear; (ii) ${\mathcal{B}}_\alpha$ has the WAP or is AD-amenable; (iii) $C^*_{({\mathrm{r}})}({\mathcal{B}}_\alpha)=C^*_{({\mathrm{r}})}(\Gamma)={{C}_0}(X)\rtimes_{\alpha,({\mathrm{r}})} G$ is nuclear; (iv) $\Gamma$ is amenable; (v) ${\mathcal{B}}_\alpha$ has the AP; (vi) for every $2$-cocycle $\omega$ for $\alpha$, the corresponding Fell bundle ${\mathcal{B}}_{\alpha,\omega}$ has the AP; (vii) ${\mathcal{B}}$ has the AP. Let ${\mathcal{X}}=\{M\otimes B_t\}_{t\in G}$ be the equivalence bundle of Theorem \[thm:equivalence bundle from equivalence bimodule\]. Since ${\mathcal{X}}$ is a strong equivalence bundle and $C_0(X)$ is the unit fibre of ${\mathcal{K}}({\mathcal{X}}),$ $\alpha$ is (isomorphic to) the partial action defined by ${\mathcal{K}}({\mathcal{X}})$ [@Abadie-Buss-Ferraro:Morita_Fell]. These facts and Theorem \[thm:AP WAP equivalence when commutative unit fibre\] imply that: - \(ii) to (vi) are equivalent to: (i’) ${\mathcal{K}}({\mathcal{X}})$ has the WAP or is AD-amenable, that is, $C^*_{({\mathrm{r}})}({\mathcal{K}}({\mathcal{X}}))$ is nuclear; and to (vii’) ${\mathcal{K}}({\mathcal{X}})$ is amenable. - \(i) $\Leftrightarrow$ (i’). - \(vii) $\Leftrightarrow$ (vii’). In [@Exel:Partial_dynamical]\*[Proposition 37.9]{} Exel provides a partial crossed product description for the C\*-algebra of every directed graph $E=({s},{r}\colon E^1\to E^0)$ with no sinks (i.e. $s^{-1}(v)\not=\emptyset$ for all $v\in E^0$). In other words, we have an isomorphism $$C^*(E)\cong {{C}_0}(X)\rtimes_\alpha G$$ for a certain partial action $\alpha$ of the free group $G={\mathbb F}_n$ on $n=|E^1|$ generators (this can be infinite), and $X$ is a certain (totally disconnected) locally compact Hausdorff space. The exact description of this space and the partial action is slightly complicated in general but it simplifies under certain regularity conditions on $E$. For instance, if every vertex $v\in E^0$ is *regular* in the sense that ${r}^{-1}(v)$ is non-empty and finite, that $X$ is just the infinite path space $E^\infty$ of $E$. Regardless of how $X$ and the partial action $\alpha$ above are defined, using that graph [C\*-]{}algebras are always nuclear (a well-known fact, see [@Kumjian-Pask:C-algebras_directed_graphs]\*[Proposition 2.6]{}), it follows from our previous theorem that $\alpha$ has the AP. Indeed, Exel gives a more direct proof of this fact in [@Exel:Partial_dynamical]\*[Theorem 37.10]{}. We shall give more details about the partial action $\alpha$ and its amenability in what follows in the case of the graph $E$ that describes the Cuntz algebra $\mathcal{O}_n$, that is, the graph with one vertex and $n$ loops with $2\leq n<\infty$. This is a special and representative case. This is a finite graph that has no sinks or sources. In this case, $X\cong \{1,\ldots, n\}^\infty$ is Cantor space and $G={\mathbb F}_n$ is the free group on $n$ generators that we also view as the free group generated by $E^1$. The partial action $\alpha$ is defined as follows: the domains $D_g$ for $g\in {\mathbb F}_n$ are defined in terms of the cylinders $X_a=\{a\mu:\mu\in X\}$ if $g\in {\mathbb F}_n$ can be written in reduced form as $g=ab^{-1}$ for $a,b\in E^*$, the set of finite paths viewed as elements of ${\mathbb F}_n$. In this case $D_{g^{-1}}={C}(X_b)$ and $D_g={C}(X_a)$ and $\alpha_g\colon D_{g^{-1}}{\xrightarrow\sim}D_g$ is given $\alpha_g(f)=f\circ\theta_g^{-1}$, where $\theta_g\colon X_b{\xrightarrow\sim}X_a$ is the canonical homeomorphism sending $b\mu\mapsto a\mu$. If $g$ is not of the form $ab^{-1}$, then $D_g$ is defined to be the zero ideal (and $\alpha_g$ is the zero map). The AP for $\alpha$ means the existence of a net of finitely supported functions $\xi_i\colon G\to {C}(X)$ that is uniformly bounded for the $\ell^2$-norm and satisfying $$\label{eq:AP-partial} {\langle\xi_i\!\mid\!a\tilde\alpha_g(\xi_i)\rangle}_2:=\sum_{h\in G}\xi_i(h)^*\alpha_g(\alpha_g^{-1}(a\xi_i(g^{-1}h)))\to a$$ for all $g\in G$ and $a\in D_g$. Notice that all the ideals $D_g$ are unital here. If $1_g$ denotes its unit (so that $D_g=A\cdot 1_g$), then  is equivalent to $$\sum_{h\in {\mathbb F}_n}\xi_i(h)\alpha_g(1_{g^{-1}}\xi_i(g^{-1}h))\to 1_g$$ for all $g\in G$. One explicit sequence $\xi_i\colon G\to C(X)$ that gives the AP for this partial action can be defined by $\xi_i(g)=\frac{1}{\sqrt{i}}1_g$ if $g\in {\mathbb F}_n^+$ (the positive cone of ${\mathbb F}_n$) with length $|g|\leq i$ and $\xi_i(g)=0$ otherwise. Recall that $1_g$ denotes the characteristic function on the cylinder set $X_g=\{g\mu:\mu\in X=E^\infty\}$ which makes sense because $g$ is positive. The fact that all domain ideals $D_g$ are unital also implies that $\alpha$ has an enveloping global action and we know from Corollary \[cor:AP-enveloping\] that this global action also has the AP or, equivalently, it is AD-amenable. Indeed, a concrete description of the enveloping action for the partial action of ${\mathbb F}_n$ on $X$ is as follows: instead of considering only words on positive words, we also consider their inverses, that is, we consider the generators of ${\mathbb F}_n$ and their inverses, and then look at all infinite reduced words on this new alphabet. This yields a new space, denoted $\bar X$ that naturally contains $X$ as a clopen subspace. Now notice that ${\mathbb F}_n$ naturally acts (globally) on $\bar X$ by (left) concatenation and the partial action on $X$ is just the restriction of this global action. Moreover, the global action of ${\mathbb F}_n$ on $\bar X$ is known to be amenable: this action can be viewed as the action on a certain boundary of ${\mathbb F}_n$, and this is an amenable action, see [@Anantharaman-Delaroche:Amenability]\*[Examples 2.7(4)]{} and [@Brown-Ozawa:Approximations]\*[Proposition 5.1.8]{}. Indeed, this is the standard way to see that ${\mathbb F}_n$ is an exact group. W\*-bimodules and their representations ======================================= Let $M$ be a [W\*-]{}algebra. A [W\*-]{}Hilbert $M$-module is an ordinary [C\*-]{}Hilbert $M$-module $X$ which is isometrically isomorphic to a dual Banach space, $X\cong X_*'$, and such that the $M$-action and $M$-inner product are separately ${{\operatorname{w}^*}}$-continuous. These are exactly the *self-dual* Hilbert modules; this means that every bounded $M$-linear map $X\to M$ is of the form $y\mapsto {\langlex\!\mid\!y\rangle}_M$ for some (uniquely determined) element $x\in X$. In this case the predual $X_*$ is unique up to isomorphism. In a similar fashion one defines left [W\*-]{}modules and [W\*-]{}bimodules (requiring both left and right inner products and actions to be separately ${{\operatorname{w}^*}}$-continuous). Specially, we want to emphasise the [W\*-]{}equivalence bimodules: Given two [W\*-]{}algebras, $M$ and $N$, a *[W\*-]{}equivalence bimodule* is a [W\*-]{}Hilbert $M$-$N$-bimodule $X$ such that the left and right inner products span ${{\operatorname{w}^*}}$-dense ideals of $M$ and $N$. Here is an elementary concrete example: for Hilbert spaces $H$, $K$, the space ${\mathcal{L}}(H,K)$ is a [W\*-]{}equivalence ${\mathcal{L}}(K)$-${\mathcal{L}}(H)$-bimodule with respect to the obvious operations given by composition and adjunction of operators. For example, the right inner product is given by ${\langleS\!\mid\!T\rangle}_{{\mathcal{L}}(H)}:=S^*T$. The predual in this case can be identified with ${\mathcal{K}}(H,K)$. On bounded subsets the ${{\operatorname{w}^*}}$-topology coincides with the weak topology, that is, $T_i\to T$ with respect to the ${{\operatorname{w}^*}}$-topology if and only if ${\langleu\!\mid\!T_iv\rangle}\to {\langleu\!\mid\!Tv\rangle}$ whenever $\{T_i\}_{i\in I}$ is a norm-bounded net. Every [W\*-]{}equivalent bimodule can be faithfully represented into some concrete bimodule of the form ${\mathcal{L}}(H,K)$ as above. We explain in what follows how this can be done. Let $X$ be a [W\*-]{}equivalence $M$-$N$-bimodule. Using the notation of [@Zl83], we view $X$ as a ternary [W\*-]{}ring with the ternary operation $$(x,y,z):= x\langle y,z\rangle_N = {}_M\langle x,y\rangle z.$$ We now indicate how to translate the fundamental results of Zettl [@Zl83] to represent [W\*-]{}equivalence bimodules on Hilbert spaces. For example, Zettl shows that the adjointable operators of $X_N,$ ${\mathcal{L}}(X),$ form a W\*-algebra. We indicate how to represent this algebra W\*-faithfully. \[lem:weak star topology of adjointable operators\] Let $X$ be a W\*-Hilbert right $M$-module. Consider a unital and faithful W\*-representation $M\subset {\mathcal{L}}(H)$, and let $K$ be the Hilbert space $X\otimes_{M}H.$ Then the representation $\rho\colon {\mathcal{L}}(X)\to {\mathcal{L}}(K),$ such that $\rho(T)(x\otimes h)=Tx\otimes h,$ is a unital and faithful W\*-representation. Moreover, a bounded net $\{T_i\}_{i\in I}\subset {\mathcal{L}}(X)$ ${{\operatorname{w}^*}}$-converges to $T$ if and only if $\{\langle y,T_ix\rangle\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to $\langle y,Tx\rangle,$ for all $x,y\in X.$ Clearly $\rho$ is an injective and unital \*-homomorphism. To show that the image of $\rho,$ $M,$ is a concrete W\*-algebra it suffices to prove that its closed unit ball $M_1$ is ${\operatorname{wot}}$ closed. Take a net $\{\rho(T_i)\}_{i\in I}\subset M_1$ that weakly converges to $R\in {\mathcal{L}}(K).$ If $X_1$ is the closed unit ball of $X$ with the ${{\operatorname{w}^*}}$-topology, then $X_1$ is compact and so it is $Y:=\Pi_{x\in X_1} (X_1\times X_1).$ Let $h\colon {\mathcal{L}}(X)\to Y$ be such that $h(T)_x = (Tx,T^*x).$ Then $\{h(T_i)\}_{i\in I}$ has a converging subnet $\{h(T_{i_j})\}_{j\in J}.$ This implies the existence of two linear maps $U,V\colon X\to X$ such that $Ux=\lim_j T_{i_j}x$ and $Vx=\lim_j T_{i_j}^*x,$ in the ${{\operatorname{w}^*}}$-topology, for all $x\in X.$ Hence, for all $x,y\in X,$ $$\langle Ux,y\rangle = \lim_j \langle T_{i_j}x,y\rangle =\lim_j \langle x,T_{i_j}^*y\rangle = \langle x,Vy\rangle,$$ where the limits are taken with respect to the ${{\operatorname{w}^*}}$-topology. Then $U\in {\mathcal{L}}(X)$ and our construction implies $\|U\|\leq 1.$ We have $\rho(U)=R$ because, for all $x,y\in X$ and $h,k\in H,$ $$\langle x\otimes h,\rho(U)(y\otimes k)\rangle = \lim_j \langle h, \langle x, T_{i_j}y\rangle k\rangle = \lim_j \langle x\otimes h, \rho(T_{i_j})(y\otimes k)\rangle = \langle x\otimes h,R(y\otimes k)\rangle.$$ This shows that $M_1$ is ${\operatorname{wot}}$ closed, hence $M$ is a concrete W\*-algebra. On bounded sets of ${\mathcal{L}}(K)$ the ${\operatorname{wot}}$ topology (and hence the ${{\operatorname{w}^*}}$-topology) is determined by the functionals $R\mapsto \langle x\otimes h,R(y\otimes k)\rangle.$ When translated to ${\mathcal{L}}(X)$ this means that on bounded sets of ${\mathcal{L}}(X)$ the ${{\operatorname{w}^*}}$-topology is determined by the functionals ${\mathcal{L}}(X)\to X,$ $T\mapsto \langle x,Ty\rangle,$ considering on $X$ the ${{\operatorname{w}^*}}$-topology. Let $X$ be a [W\*-]{}equivalence $M$-$N$-bimodule. A *representation* of $X$ is a linear and ${{\operatorname{w}^*}}$-continuous map $\pi\colon X\to {\mathcal{L}}(H,K)$, where $H$ and $K$ are Hilbert spaces and $\pi(x\langle y,z\rangle_N)=\pi(x)\pi(y)^*\pi(z)$ for all $x,y,z\in X$. We say that $\pi$ is *nondegenerate* if $K=\operatorname{\overline{span}}\pi(X)H$ and $H=\operatorname{\overline{span}}\pi(X)^*K$. Every [W\*-]{}equivalence bimodule admits a nondegenerate faithful representation. Every [W\*-]{}equivalence $M$-$N$-bimodule $X$ is a ternary [W\*-]{}ring, and by [@Zl83] has a faithful representation $\pi\colon X\to {\mathcal{L}}(H,K)$. Let $H_0:=\operatorname{\overline{span}}\pi(X)^*K$ and $K_0=\operatorname{\overline{span}}\pi(X)H$. Clearly, $\operatorname{\overline{span}}\pi(X)H_0{\subseteq}K_0$ and $\operatorname{\overline{span}}\pi(X)^*K_0{\subseteq}H_0$. We claim that $\pi(X)(H_0^\perp)=0$. If $h\in H_0^\perp$ and $x\in X$, then $\pi(x)^*\pi(x)h\in H_0$ and $$\|\pi(x)h\|^2 = \langle \pi(x)h,\pi(x)h\rangle = \langle \pi(x)^*\pi(x)h,h\rangle = 0.$$ In a similar way it can be shown that $\pi(X)^*(K_0^\perp)=0$. Thus we may consider the representation $\pi_0\colon X\to {\mathcal{L}}(H_0,K_0)$ given by $\pi_0(x)h=\pi(x)h$. It suffices to show that $\pi_0$ is nondegenerate. We show that $\operatorname{\overline{span}}\pi_0(X)H_0=K_0$; the proof of $\operatorname{\overline{span}}\pi_0(X)^*K_0=H_0$ is analogous. Take $x\in X$ and $h\in H$. We can approximate $x$ by sums of elements of the form $u\langle v,w\rangle$, thus $\pi(x)h$ lies in the closed linear span of $\pi(X)\pi(X)^*\pi(X)h{\subseteq}\pi(X)(H_0) = \pi_0(X)H_0$. Hence $\pi(x)h\in \operatorname{\overline{span}}\pi_0(X)H_0$. Given a representation $\pi$ of a [W\*-]{}equivalence bimodule, the representation $\pi_0$ constructed in the proof above is called de essential part of $\pi$. Let $X$ be a [W\*-]{}equivalence $M$-$N$-bimodule and $\pi\colon X\to {\mathcal{L}}(H,K)$ a nondegenerate representation. Then there exists a unique unital and normal representation $\pi^l\colon M\to {\mathcal{L}}(K)$ such that $\pi^l({}_M\langle x,y\rangle)=\pi(x)\pi(y)^*$ for all $x,y\in X$. If $\pi$ is faithful then so it is $\pi^l$. Let $M_X$ be the norm closure of $\operatorname{span}{}_M\langle X,X\rangle$ in $M$. By [@Abadie:Enveloping]\*[Proposition 4.1]{} there exists a unique \*-homomorphism $\rho^l \colon M_X\to {\mathcal{L}}(K)$ such that $\rho^l({}_M\langle x,y\rangle)=\pi(x)\pi(y)^*$ for all $x,y\in X$. We claim this representation can be extended in a unique way to a normal representation $\pi^l$ of $M$. Let $\rho^r\colon N_X\to {\mathcal{L}}(H)$ be the \*-homomorphism such that $\rho^r(\langle x,y\rangle_N)=\pi(x)^*\pi(y)$. Since $\pi$ is nondegenerate, there exists a unique unitary $U\colon X\otimes_{\rho^r} H\to H$ such that $U(x\otimes h)=\pi(x)h$. We also have a representation $\mu\colon M\to {\mathcal{L}}(X\otimes_\pi H)={\mathcal{L}}(K)$ such that $\mu(a)\pi(x)h=\pi(ax)h$. We claim $\mu$ is ${{\operatorname{w}^*}}$-continuous, to show this it suffices to prove $\mu$ is ${{\operatorname{w}^*}}$-continuous on the closed unit ball $M_1$. Since $\mu(M_1)$ is bounded, it suffices to prove that given a net $\{a_\lambda\}_{\lambda}{\subseteq}M_1$ that ${{\operatorname{w}^*}}$-converges to $a\in M_1$, then $$\lim_\lambda \langle \mu(a_\lambda)(x\otimes \pi(y)^*k),(x\otimes \pi(y)^*k)\rangle = \langle \mu(a)(x\otimes \pi(y)^*k),(x\otimes \pi(y)^*k)\rangle,$$ for every $x,y\in X$ and $k\in K$. But $$\begin{aligned} \lim_\lambda \langle \mu(a_\lambda)(x\otimes \pi(y)^*k),(x\otimes \pi(y)^*k)\rangle & = \lim_\lambda \langle h,\pi(y\langle a_\lambda x, x \rangle)\pi(y)^*h\rangle\\ & = \langle h,\pi(y\langle ax, x \rangle)\pi(y)^*h\rangle\\ & = \langle \mu(a)(x\otimes \pi(y)^*k),(x\otimes \pi(y)^*k)\rangle. \end{aligned}$$ It is straightforward to show that the restriction of $\mu$ to $M_X$ is $\rho^l$, thus $\pi^l:=\mu$ is the unique ${{\operatorname{w}^*}}$-continuous extension of $\rho^l$. If $\pi$ is faithful and $\pi^l(a)=0$ then $\pi(ax)h=\pi^l(a)\pi(x)h=0$ for every $x\in X$ and $h\in H$. Hence $ax=0$ for every $x\in X$ and this implies $a=0$. Let $X$ be a [W\*-]{}equivalence $A$-$B$-bimodule and let $Y$ be a [W\*-]{}equivalence $M$-$N$-bimodule. A map $\pi\colon X\to Y$ is a [W\*-]{}homomorphism if it is linear, ${{\operatorname{w}^*}}$-continuous and $\pi(x\langle y,z\rangle_N)=\pi(x)\langle \pi(y),\pi(z)\rangle_B$ for every $x,y,z\in X$. Let $X$ and $Y$ be [W\*-]{}equivalence $M-N$ and $A$-$B$-bimodules, respectively, and $\pi\colon X\to Y$ a ${{\operatorname{w}^*}}$-continuous linear map such that $\pi(x\langle y,z\rangle_N)=\pi(x)\langle \pi(y),\pi(z)\rangle_B$ for every $x,y,z\in X$. Then there exist unique ${{\operatorname{w}^*}}$-continuous homomorphisms $\pi^l\colon M\to A$ and $\pi^r\colon N\to B$ such that $\pi^l(\langle x,y\rangle_N)=\langle \pi(y),\pi(z)\rangle_B$ and $\pi({}_M\langle y,z\rangle)={}_A\langle \pi(x),\pi(y)\rangle $ and $\pi(\langle y,z\rangle_N)=\langle \pi(x),\pi(y)\rangle_B$ for every $x,y\in X$. If $\pi$ is an isomorphism then so are $\pi^r$ and $\pi^l$. We construct $\pi^r$, the map $\pi^l$ can be constructed considering the adjoint module of $X$. Take a nondegenerate and faithful representation $\rho\colon Y\to {\mathcal{L}}(H,K)$. In this situation $\rho^l\colon M\to {\mathcal{L}}(K)$ is a faithful unital [W\*-]{}representation. Then $\rho\circ\pi\colon X\to {\mathcal{L}}(H,K)$ is a representation, that may or may not be nondegenerate. In any case, the essential part $(\rho\circ\pi)_0$ is nondegenerate and we may think of $\rho\circ\pi$ as the null extension of $(\rho\circ\pi)_0$ (from $H_0$ to $H_0\oplus (H_0^\perp)$). We know $(\rho\circ \pi)_0^r\colon A\to {\mathcal{L}}(K_0)$ is a [W\*-]{}homomorphism. Define $(\rho\circ \pi)^r\colon A\to {\mathcal{L}}(K)$ as the null extension of $(\rho\circ \pi)_0^r$. We claim $(\rho\circ \pi)^r(A){\subseteq}\rho^r(M)$. Indeed, note $(\rho\circ \pi)^r(A)$ is the ${{\operatorname{w}^*}}$-closure of $(\rho\circ \pi)^r(A_Y)$. Considering only the C\*-structre $Y$ and using the map $\pi^r\colon M_X\to A_Y$ of [@Abadie:Enveloping]\*[Proposition 4.1]{}, we get that $(\rho\circ \pi)^r({}_A\langle x,y\rangle) = \rho^r({}_M\langle \pi^r(x),\pi^r(y)\rangle )\in \rho^r(M)$. Then the map $\pi^r\colon M\to A$ we are looking for is the unique ${{\operatorname{w}^*}}$-continuous extension of $\pi^r\colon M_X\to A_Y$ and can be computed as $(\rho^r)^{-1}\circ (\rho\circ \pi)^r$. In case $\pi$ is an isomorphism $(\pi^{-1})^r$ is the inverse of $\pi^r$. Let $X$ be a [W\*-]{}equivalence $M$-$N$-bimodule. The [W\*-]{}linking algebra of $X$ is the Banach space formed by all all the matrices $$\left(\begin{array}{cc} a & x\\ \tilde y & b \end{array}\right),$$ where $\tilde Y$ is the module conjugate to $X$. To give $L$ a [W\*-]{}algebra structure take a faithful and nondegenerate representation $\pi\colon X\to {\mathcal{L}}(H,K)$. Then $$\rho\colon L\to {\mathcal{L}}(H\oplus K) = \left(\begin{array}{cc} {\mathcal{L}}(H) & {\mathcal{L}}(H,K)\\ {\mathcal{L}}(K,H) &{\mathcal{L}}(H,K) \end{array} \right);\ \rho\left(\begin{array}{cc} a & x\\ \tilde{y} & b \end{array} \right) = \left(\begin{array}{cc} \pi^l(a) & \pi(x)\\ \pi(y) & \pi^r(b) \end{array} \right),$$ is a faithful representation of \*-algebras and $\rho$ induces a C\*-algebra structure on $L$. Moreover, $\rho(L)$ is a unital subalgebra closed with respect to the weak operator topology (${\operatorname{wot}}$) because convergence in ${\mathcal{L}}(H\oplus K)$ in the ${\operatorname{wot}}$ is just entrywise ${\operatorname{wot}}$-convergence. This implies that $M,N$ and $X$ are ${{\operatorname{w}^*}}$-closed subspaces of $L$. In particular $M$ and $N$ are hereditary [W\*-]{}subalgebras of $L$. \[prop:isomorphic centres\] Let $X$ be a [W\*-]{}equivalence $M$-$N$-bimodule. Then there exists a unique [W\*-]{}isomorphism $\pi_X\colon Z(N)\to Z(M)$ such that $xa=\pi(a)x$ for all $a\in Z(M)$ and $x\in X$. By the definition of the centre of an algebra we have $$\left(\begin{array}{cc} a & x\\ \tilde{y} & b \end{array} \right)\in Z(L) \Leftrightarrow x=y=0, a\in Z(M), b\in Z(N), az=zb\ \forall z\in X.$$ Note $a$ and $b$ completely determine each other, thus we have an injective ${{\operatorname{w}^*}}$-continuous \*-homomorphism $$\pi\colon Z(L)\to Z(N),\ \pi\left(\begin{array}{cc} a & 0\\ 0 & b \end{array} \right)=b.$$ We claim $\pi$ is surjective and hence an isomorphism. Note the image of $\pi$ is a [W\*-]{}algebra because $\pi$ is ${{\operatorname{w}^*}}$-continuous. Hence it suffices to show that $Im(\pi)$ contains every projection of $Z(N)$. Let $p\in Z(N)$ be a projection and take a unital and normal representation on a Hilbert space $\rho\colon N\to {\mathcal{L}}(H)$ with $\ker(\rho) = (1-p)N$. Consider the representation of $M$ induced by $\rho$ through $X$, $Ind(\rho)$, and let $q\in M$ be projection such that $\ker(Ind(\rho))=(1-q)M$. Then for all $x,y\in X$ and $h,k\in H$: $$\begin{aligned} \langle k, \pi(y^*(qx -xp))k\rangle & = \langle k, \pi(y^*qx)k\rangle - \langle k, \pi(y^*x)k\rangle\\ & = \langle Ind(\rho)(q)(y\otimes_\rho k), (x\otimes_\rho h)\rangle - \langle (y\otimes_\rho k), (x\otimes_\rho h)\rangle =0\end{aligned}$$ We conclude $y^*(qx-xp)p=0$ for all $x,y\in X$ and this implies $qxp=xp$ for all $x\in X$. By symmetry (or double induction) we get $qx=xp$ for all $x\in X$. Then $p=\pi\left(\begin{smallmatrix} q & 0\\ 0 & p \end{smallmatrix}\right)$ and $\pi$ is surjective. It may look strange to consider the above isomorphism $\pi_X$ as a homomorphism $Z(N)\to Z(M)$ and not the opposite. Implicitly we have chosen this convention because we view $X$ as a “generalised” morphism from $N$ to $M$. This choice also makes it easier to see that the constructions we perform in Section \[sec:central-partial\] are exactly the [W\*-]{}counterparts of that in [@Abadie-Abadie:Ideals]. Another motivation for our notation is the relation between the composition and [W\*-]{}tensor products in Remark \[rem:tensor products and isomorphisms\]. \[cor:the same iso\] Let $X$ and $Y$ be two [W\*-]{}equivalence $M$-$N$-bimodules and $\rho\colon X\to Y$ an isomorphism such that $\pi^l$ and $\pi^r$ are the identities on $M$ and $N$, respectively. Then the isomorphisms $\pi_X$ and $\pi_Y$ of Proposition \[prop:isomorphic centres\] are equal. Take $a\in Z(N)$. For all $x\in X$ we have $xa=\pi_x(a)x$, hence $$\rho(x)a=\rho(x)\rho^r(a)=\rho(ax)=\rho(\pi_X(a)x)=\rho^l(\pi_X(a))\rho(x)=\pi_X(a)\rho(x).$$ Since $\rho$ is surjective we deduce that $\pi_X(a)=\pi_Y(a)$. Induction of representations and tensor products ================================================ \[prop:pi and pir\] Let $X$ be an [W\*-]{}equivalence $M$-$N$-bimodule and $\pi\colon N\to {\mathcal{L}}(H)$ a unital [W\*-]{}representation. If $K:=X\otimes_\pi H$, then there exists a unique nondegenerate representation $\hat{\pi}\colon X\to {\mathcal{L}}(H,K)$ such that $\hat{\pi}(x)h=x\otimes h$. Moreover, if $\rho\colon X\to {\mathcal{L}}(H,K)$ is a nondegenerate representation then there exists a unique unitary $U\colon X\otimes_{\rho^r} H\to K$ such that $U(x\otimes h)=\rho(x)h$ and we have $\rho(x)=U\circ \widehat{\rho^r}(x)$ for all $x\in X$. In particular, $\rho$ is faithful if and only if $\rho^r$ is faithful. Regarding $\hat{\pi}$, we only have to show it is ${{\operatorname{w}^*}}$-continuous. It suffices to show that given a bounded net $\{x_i\}_{i\in I}{\subseteq}X$ that ${{\operatorname{w}^*}}$-converges to $x\in X$, we have $\lim_i \langle \hat{\pi}(x_i)h,y\otimes k\rangle=\langle \pi(x_i)h,y\otimes k\rangle$ for all $y\in X$ and $h,k\in H$. But the separate ${{\operatorname{w}^*}}$ continuity of the inner products implies $$\lim_i \langle \hat\pi(x_i)h,y\otimes k\rangle = \lim_i \langle h,\pi(\langle x_i,y\rangle_N) k\rangle =\langle h,\pi(\langle x,y\rangle_N) k\rangle = \langle \hat\pi(x)h,y\otimes k\rangle$$ Now consider a nondegenerate representation $\rho$ as in the statement. There exists a unique linear isometry $U\colon X\otimes_{\rho^r} H\to K$ such that $U(x\otimes h)=\rho(x)h$ because $$\langle \rho(x)h,\rho(y)k\rangle = \langle h,\rho^r(\langle x,y\rangle_N)k\rangle.$$ This isometry is in fact surjective because $\rho$ is nondegenerate. Then $ U\circ \widehat{\rho^r}(x)h = U(x\otimes h) = \pi(x)h$. We know $\rho^r$ is faithful whenever $\rho$ is. Assume $\rho^r$ is faithful and $\rho(x)=0$. Then, for every $h\in H$, $\langle h,\rho^r(\langle x,x\rangle_N)h\rangle =\|\rho(x)h\|^2=0$. Thus $\langle x,x\rangle_N=0$ and $x=0$. Given a [W\*-]{}equivalence $M$-$N$-bimodule $X$ and a unital [W\*-]{}representation $\pi\colon N\to {\mathcal{L}}(H)$, the representation induced by $\pi$ through $X$, denoted $\operatorname{Ind}_X(\pi)$, is $\widehat{\pi}^l$. Let $X$ and $Y$ be [W\*-]{}equivalence $M$-$N$ and $N$-$P$-bimodules, respectively. We want to construct a tensor product $X\otimes_N^{{\operatorname{w}^*}}Y$, with a natural $M-P$ [W\*-]{}equivalence bimodule structure. Take faithful and unital [W\*-]{}representation $\pi\colon P \to {\mathcal{L}}(H)$ and define $H_\pi:= (X\otimes_N Y)\otimes_\pi H$, where $X\otimes_N Y$ is the usual tensor product of Hilbert modules. We have a natural representation $\hat{\pi}\colon X\otimes_N Y\to {\mathcal{L}}(H,H_\pi)$ such that $\hat{\pi}(x\otimes y)h=x\otimes y \otimes h$. We define $X\otimes_N^\pi Y$ as the ${\operatorname{wot}}$-closure of $\pi(X\otimes_N Y)$. Note $$\begin{aligned} \pi(P)& =\operatorname{\overline{span}}^{{\operatorname{wot}}} \{ \pi(u)^*\pi(v)\colon u,v\in X\otimes_N Y \}\\ \operatorname{Ind}_Y(\operatorname{Ind}_X(\pi))(M) & =\operatorname{\overline{span}}^{{\operatorname{wot}}} \{ \pi(u)\pi(v)^*\colon u,v\in X\otimes_N Y \}\end{aligned}$$ Then we may think of $X\otimes_N^\pi Y$ as a [W\*-]{}equivalence $M$-$P$-bimodule. Let $\rho\colon P \to {\mathcal{L}}(H)$ be another unital and faithful [W\*-]{}representation. We have represented $X\otimes_N Y$ faithfully, as a ternary C\*-ring, in ${\mathcal{L}}(H,H_\pi)$ and in ${\mathcal{L}}(K,K_\rho)$. With some abuse of notation we denote these representations $\hat{\pi}\colon X\otimes_N Y\to {\mathcal{L}}(H,H_\pi)$ and $\hat{\rho}$. There exists a unique isomorphism of ternary C\*-rings $\mu\colon \hat{\pi}(X\otimes_N Y)\to \hat{\rho}(X\otimes_N Y)$ such that $\mu(\hat{\pi}(x\otimes y))=\hat{\rho}(x\otimes y)$. We claim that $\mu$ is continuous on bounded sets with respect to the ${\operatorname{wot}}$ topologies. Indeed, let $\{u_i\}_{i\in I}{\subseteq}X\otimes_N Y$ be a bounded net and $u\in X\otimes_N Y$ such that $\{\hat{\pi}(u_i)\}_{i\in I}$ ${\operatorname{wot}}$-converges to $\hat{\pi}(u)$. Then, for every $h,k\in H$ and $v\in X\otimes_N Y$, we have $$\begin{aligned} \lim_i \langle h,\pi(\langle u_i,v\rangle_M) k\rangle & = \lim_i \langle \hat{\pi}(u_i)h,\hat{\pi}(v) k\rangle \\ & = \langle \hat{\pi}(u) h,\hat{\pi}(v) k\rangle = \langle h,\pi(\langle u,v\rangle) k\rangle.\end{aligned}$$ In fact we can conclude that the ${\operatorname{wot}}$-convergence of $\{\hat{\pi}(u_i)\}_{i\in I}$ to $\hat{\pi}(u)$ is equivalent to the ${{\operatorname{w}^*}}$ convergence of $\{\langle u_i,v\rangle_M)\}_{i\in I}$ to $\langle u,v\rangle_M$ for every $v\in X\otimes_N Y$, which in turn is equivalent to the ${\operatorname{wot}}$-convergence of $\{\hat{\rho}(u_i)\}_{i\in I}$ to $\hat{\rho}(u)$. Then $\mu$ has a unique extension to a [W\*-]{}isomorphism $\overline{\mu}\colon X\otimes_N^\pi Y\to X\otimes_N^\rho Y$. \[def:wstar tensor product\] The [W\*-]{}tensor product $X\otimes_N^{{\operatorname{w}^*}}Y$ is the [W\*-]{}isomorphism class of the modules $X\otimes_N^\pi Y$. As usual we abuse the notation and view $X\otimes_N^{{\operatorname{w}^*}}Y$ as any of its representatives. \[rem:tensor products and isomorphisms\] (1) Almost by construction we have, for any unital [W\*-]{}representation $\pi\colon P\to {\mathcal{L}}(H)$, that $\operatorname{Ind}_{X\otimes_N^{{\operatorname{w}^*}}Y}(\pi)$ is unitarly equivalent to $\operatorname{Ind}_Y(\operatorname{Ind}_X(\pi))$. \(2) If $\pi_X\colon Z(N)\to Z(M)$ and $\pi_Y\colon Z(P)\to Z(N)$ are the isomorphisms of Proposition \[prop:isomorphic centres\], then $\pi_X\circ \pi_Y=\pi_{X\otimes_N^{{\operatorname{w}^*}}Y}$. Biduals of Hilbert bimodules ============================ \[prop:bidual of Hilbert module\] Let $X$ be a Hilbert $A$-$B$-bimodule. Then there exists a unique Hilbert $A''$-$B''$-bimodule structure on $X''$ extending that of $X$ and with (left and right) inner products and actions of $A''$ and $B''$ separately ${{\operatorname{w}^*}}$-continuous. Moreover, if $X$ is an equivalence $A$-$B$-bimodule, that is, if the left and right inner products on $X$ generate $A$ and $B$ as [C\*-]{}algebras, then the inner products on $X''$ generate $A''$ and $B''$ as [W\*-]{}algebras, that is, $X''$ is a [W\*-]{}equivalence $A''$-$B''$-bimodule. Uniqueness follows immediately because $X$ and $A$ and $B$ are ${{\operatorname{w}^*}}$-dense in $X''$, $A''$ and $B''$, respectively. Let $L$ be the linking algebra of $X$. Since $A$ and $B$ are [C\*-]{}subalgebras of $L$, we may view $A''$ and $B''$ as [W\*-]{}subalgebras of $L''$. Moreover, we also view $X$ as a closed subspace of $L$ and identify $X''$ with the ${{\operatorname{w}^*}}$-closure of $X$ in $L''$. Note that $AXB{\subseteq}X$, $XX^*{\subseteq}A$ and $X^*X{\subseteq}B$ imply $A''X''B''{\subseteq}X''$, $X''{X''}^*{\subseteq}A''$ and ${X''}^*X''{\subseteq}B''$ because the multiplication of $L''$ is separately ${{\operatorname{w}^*}}$-continuous and the involution of $L''$ is ${{\operatorname{w}^*}}$-continuous. The rest follows directly because the Hilbert module operations of $X''$ are defined in terms of the [W\*-]{}algebra structure of $L''$. The reader should note that $X''$ is usually not an $A''$-$B''$-equivalence bimodule in the [C\*-]{}sense because the images of the inner products on $X''$ might be not linearly *norm* dense in $A''$ or $B''$ (only ${{\operatorname{w}^*}}$-dense). Let $A$ and $B$ be [C\*-]{}algebras and $X$ an $A$-$B$-equivalence bimodule. Given a nondegenerate representation $\pi\colon B\to {\mathcal{L}}(H)$, write $\pi''\colon B''\to {\mathcal{L}}(H)$ for its unique ${{\operatorname{w}^*}}$-continuous extension, and $\operatorname{Ind}_X^A \pi\colon A\to {\mathcal{L}}(X\otimes_\pi H)$ for the representation induced by $\pi$ through $X$. Then $(\operatorname{Ind}_X^A\pi)''$ is faithful if and only if $\pi''$ is faithful. This result is certainly well-known, but we could not find it explicitly in the literature, so we give a proof here. A quick way to prove the statement is to notice that the induction process of representations via an equivalence bimodule preserves quasi-equivalence of representations which is, in turn, determined by their central cover projections, see [@Pedersen:Cstar_automorphisms]\*[Section 3.8]{}. And $\pi''$ is faithful if and only if its central cover is zero. A more elementary way to prove the result is as follows: for $a\in A''$, $\xi_1,\xi_2\in X$ and $v_1,v_2\in H$, we have $${\langle\xi_1\otimes v_1\!\mid\!\operatorname{Ind}_X^A(\pi)''(a)(\xi_2\otimes v_2)\rangle}={\langlev_1\!\mid\!\pi''({\langle\xi_1\!\mid\!a\cdot \xi_2\rangle})v_2\rangle}$$ where $a\cdot\xi_2\in X''$ means the left action of $A''$ on $X''$. The above equation holds because it does for $a\in A$ and all the operations involved are ${{\operatorname{w}^*}}$-continuous. Now, if $\operatorname{Ind}_X^A(\pi)''(a)=0$, then ${\langle\xi_1\!\mid\!a\cdot\xi_2\rangle}=0$ for all $\xi_1,\xi_2\in X$ from which it follows that $a=0$. The converse (faithfulness of $\pi$ from $\operatorname{Ind}_X^A(\pi)$) follows by symmetry since $\pi$ can be seen as the induced representation of $\operatorname{Ind}_X^A(\pi)$ through the dual equivalence bimodule $X^*$. \[coro:representation of X”\] Let $X$ be a Hilbert $A$-module and $\pi\colon A\to {\mathcal{L}}(H)$ a nondegenerate representation. Then the representation $\pi_X\colon X\to {\mathcal{L}}(H,X\otimes_\pi H)$, $\pi_X(x)h=x\otimes h$, has a unique ${{\operatorname{w}^*}}$-continuous extension $\pi_X''\colon X''\to {\mathcal{L}}(H,X\otimes_\pi H)$ to a representation of ternary [W\*-]{}rings [@Zl83]. Moreover, if $\pi''$ is faithful then so is $\pi_X''$. We view $X$, $A$ and the algebra of generalized compact operators of $X$, $B$, as subspaces of the linking algebra $L$ of $X$. Then $LA=X\oplus A$ and the representation $\operatorname{Ind}_{X\oplus A}^L\pi$ of $L$ induced by $\pi$ through $X\oplus A$ can be seen as $$\begin{aligned} \operatorname{Ind}_{X\oplus A}^L\pi & \colon L\to {\mathcal{L}}( (X\oplus A)\otimes_\pi H )\cong {\mathcal{L}}((X\otimes_\pi H) \oplus H),\\ \operatorname{Ind}_{X\oplus A}^L\pi & \left( \begin{array}{cc} T & x\\ \tilde y & a \end{array} \right) = \left(\begin{array}{cc} \operatorname{Ind}_X^B\pi(T) & \pi_X(x)\\ \pi_X(y)^* & \pi(a) \end{array} \right). \end{aligned}$$ Since $\operatorname{Ind}_{X\oplus A}^L\pi$ is nondegenerate, we have a canonical extension $$(\operatorname{Ind}_{X\oplus A}^L\pi)''\colon L''\to {\mathcal{L}}( (X\oplus A)\otimes_\pi H ).$$ In the proof of Proposition \[prop:bidual of Hilbert module\] we have identified $X''$ with the ${{\operatorname{w}^*}}$-closure of $X$ in $L''$. Thus the restriction of $(\operatorname{Ind}_{X\oplus A}^L\pi)''$ to $X''$ is a ${{\operatorname{w}^*}}$-continuous extension of $(\operatorname{Ind}_{X\oplus A}^L\pi)|_X$. The image of $(\operatorname{Ind}_{X\oplus A}^L\pi)|_X$ consists entirely of operators of the form $\left(\begin{smallmatrix}0 & y\\ 0 & 0\end{smallmatrix} \right)$. Under the identification $y=\left(\begin{smallmatrix}0 & y\\ 0 & 0\end{smallmatrix} \right)$ we may view $(\operatorname{Ind}_{X\oplus A}^L\pi)''|_{X''}$ as the unique ${{\operatorname{w}^*}}$-extension of $\pi_X$. In case $\pi''$ is faithful then so is $(\operatorname{Ind}_{X\oplus A}^L\pi)''$, so $\pi_X''$ is faithful because it is a restriction of a faithful map. \[cor:weak topology on bounded sets\] Let $X$ be a Hilbert $A$-module. For a bounded net $\{x_i\}_{i\in I}{\subseteq}X''$ and $x\in X''$, the following assertions are equivalent: (i) $\{x_i\}_{i\in I}{\subseteq}X''$ ${{\operatorname{w}^*}}$-converges to $x$. (ii) For every $y\in X$, $\{\langle x_i,y\rangle_{A''}\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to $\langle x,y\rangle_{A''}$. (iii) For every $y\in X$, $\{\langle y,x_i\rangle_{A''}\}_{i\in I}$ ${{\operatorname{w}^*}}$-converges to $\langle y,x\rangle_{A''}$. Let $\pi\colon A\to {\mathcal{L}}(H)$ be the universal representation and consider $\pi_X''\colon X''\to {\mathcal{L}}(H,X\otimes_\pi H)$. On bounded sets the ${{\operatorname{w}^*}}$-topology on $X''$ coincides with the weak operator topology it inherits from ${\mathcal{L}}(H,X\otimes_\pi H)$ via $\pi_{X}''$ and it is determined by the functionals of the form $X\to \mathbb{C}, z\mapsto \langle y\otimes k,\pi_X''(z)h\rangle =\langle k,\langle y,z\rangle_{A''}h\rangle$ for $h,k\in H$ and $y\in X$. The proof then follows immediately.
mini_pile
{'original_id': '860d0376d979a5b783022b198d96238c444031bedaad0370c45e34843ed5434d'}
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc (version 1.7.0_07) on Sat Sep 26 18:07:50 CST 2015 --> <meta http-equiv="Content-Type" content="text/html" charset="UTF-8"> <title>XEnum.LegendType</title> <meta name="date" content="2015-09-26"> <link rel="stylesheet" type="text/css" href="../../../stylesheet.css" title="Style"> </head> <body> <script type="text/javascript"><!-- if (location.href.indexOf('is-external=true') == -1) { parent.document.title="XEnum.LegendType"; } //--> </script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a name="navbar_top"> <!-- --> </a><a href="#skip-navbar_top" title="Skip navigation links"></a><a name="navbar_top_firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/XEnum.LegendType.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../index-files/index-1.html">Index</a></li> <li><a href="../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../org/xclcharts/renderer/XEnum.LabelSaveType.html" title="enum in org.xclcharts.renderer"><span class="strong">Prev Class</span></a></li> <li><a href="../../../org/xclcharts/renderer/XEnum.LineStyle.html" title="enum in org.xclcharts.renderer"><span class="strong">Next Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../index.html?org/xclcharts/renderer/XEnum.LegendType.html" target="_top">Frames</a></li> <li><a href="XEnum.LegendType.html" target="_top">No Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_top"> <li><a href="../../../allclasses-noframe.html">All Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_top"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#enum_constant_summary">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li><a href="#enum_constant_detail">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_detail">Method</a></li> </ul> </div> <a name="skip-navbar_top"> <!-- --> </a></div> <!-- ========= END OF TOP NAVBAR ========= --> <!-- ======== START OF CLASS DATA ======== --> <div class="header"> <div class="subTitle">org.xclcharts.renderer</div> <h2 title="Enum XEnum.LegendType" class="title">Enum XEnum.LegendType</h2> </div> <div class="contentContainer"> <ul class="inheritance"> <li>java.lang.Object</li> <li> <ul class="inheritance"> <li>java.lang.Enum&lt;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>&gt;</li> <li> <ul class="inheritance"> <li>org.xclcharts.renderer.XEnum.LegendType</li> </ul> </li> </ul> </li> </ul> <div class="description"> <ul class="blockList"> <li class="blockList"> <dl> <dt>All Implemented Interfaces:</dt> <dd>java.io.Serializable, java.lang.Comparable&lt;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>&gt;</dd> </dl> <dl> <dt>Enclosing class:</dt> <dd><a href="../../../org/xclcharts/renderer/XEnum.html" title="class in org.xclcharts.renderer">XEnum</a></dd> </dl> <hr> <br> <pre>public static enum <span class="strong">XEnum.LegendType</span> extends java.lang.Enum&lt;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>&gt;</pre> <div class="block">图例类型</div> <dl><dt><span class="strong">Author:</span></dt> <dd>XCL</dd></dl> </li> </ul> </div> <div class="summary"> <ul class="blockList"> <li class="blockList"> <!-- =========== ENUM CONSTANT SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="enum_constant_summary"> <!-- --> </a> <h3>Enum Constant Summary</h3> <table class="overviewSummary" border="0" cellpadding="3" cellspacing="0" summary="Enum Constant Summary table, listing enum constants, and an explanation"> <caption><span>Enum Constants</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colOne" scope="col">Enum Constant and Description</th> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../org/xclcharts/renderer/XEnum.LegendType.html#COLUMN">COLUMN</a></strong></code>&nbsp;</td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../org/xclcharts/renderer/XEnum.LegendType.html#ROW">ROW</a></strong></code>&nbsp;</td> </tr> </table> </li> </ul> <!-- ========== METHOD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="method_summary"> <!-- --> </a> <h3>Method Summary</h3> <table class="overviewSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation"> <caption><span>Methods</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colFirst" scope="col">Modifier and Type</th> <th class="colLast" scope="col">Method and Description</th> </tr> <tr class="altColor"> <td class="colFirst"><code>static <a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a></code></td> <td class="colLast"><code><strong><a href="../../../org/xclcharts/renderer/XEnum.LegendType.html#valueOf(java.lang.String)">valueOf</a></strong>(java.lang.String&nbsp;name)</code> <div class="block">Returns the enum constant of this type with the specified name.</div> </td> </tr> <tr class="rowColor"> <td class="colFirst"><code>static <a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>[]</code></td> <td class="colLast"><code><strong><a href="../../../org/xclcharts/renderer/XEnum.LegendType.html#values()">values</a></strong>()</code> <div class="block">Returns an array containing the constants of this enum type, in the order they are declared.</div> </td> </tr> </table> <ul class="blockList"> <li class="blockList"><a name="methods_inherited_from_class_java.lang.Enum"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.Enum</h3> <code>compareTo, equals, getDeclaringClass, hashCode, name, ordinal, toString, valueOf</code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods_inherited_from_class_java.lang.Object"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.Object</h3> <code>getClass, notify, notifyAll, wait, wait, wait</code></li> </ul> </li> </ul> </li> </ul> </div> <div class="details"> <ul class="blockList"> <li class="blockList"> <!-- ============ ENUM CONSTANT DETAIL =========== --> <ul class="blockList"> <li class="blockList"><a name="enum_constant_detail"> <!-- --> </a> <h3>Enum Constant Detail</h3> <a name="COLUMN"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>COLUMN</h4> <pre>public static final&nbsp;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a> COLUMN</pre> </li> </ul> <a name="ROW"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>ROW</h4> <pre>public static final&nbsp;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a> ROW</pre> </li> </ul> </li> </ul> <!-- ============ METHOD DETAIL ========== --> <ul class="blockList"> <li class="blockList"><a name="method_detail"> <!-- --> </a> <h3>Method Detail</h3> <a name="values()"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>values</h4> <pre>public static&nbsp;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>[]&nbsp;values()</pre> <div class="block">Returns an array containing the constants of this enum type, in the order they are declared. This method may be used to iterate over the constants as follows: <pre> for (XEnum.LegendType c : XEnum.LegendType.values()) &nbsp; System.out.println(c); </pre></div> <dl><dt><span class="strong">Returns:</span></dt><dd>an array containing the constants of this enum type, in the order they are declared</dd></dl> </li> </ul> <a name="valueOf(java.lang.String)"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>valueOf</h4> <pre>public static&nbsp;<a href="../../../org/xclcharts/renderer/XEnum.LegendType.html" title="enum in org.xclcharts.renderer">XEnum.LegendType</a>&nbsp;valueOf(java.lang.String&nbsp;name)</pre> <div class="block">Returns the enum constant of this type with the specified name. The string must match <i>exactly</i> an identifier used to declare an enum constant in this type. (Extraneous whitespace characters are not permitted.)</div> <dl><dt><span class="strong">Parameters:</span></dt><dd><code>name</code> - the name of the enum constant to be returned.</dd> <dt><span class="strong">Returns:</span></dt><dd>the enum constant with the specified name</dd> <dt><span class="strong">Throws:</span></dt> <dd><code>java.lang.IllegalArgumentException</code> - if this enum type has no constant with the specified name</dd> <dd><code>java.lang.NullPointerException</code> - if the argument is null</dd></dl> </li> </ul> </li> </ul> </li> </ul> </div> </div> <!-- ========= END OF CLASS DATA ========= --> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a name="navbar_bottom"> <!-- --> </a><a href="#skip-navbar_bottom" title="Skip navigation links"></a><a name="navbar_bottom_firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/XEnum.LegendType.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../index-files/index-1.html">Index</a></li> <li><a href="../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../org/xclcharts/renderer/XEnum.LabelSaveType.html" title="enum in org.xclcharts.renderer"><span class="strong">Prev Class</span></a></li> <li><a href="../../../org/xclcharts/renderer/XEnum.LineStyle.html" title="enum in org.xclcharts.renderer"><span class="strong">Next Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../index.html?org/xclcharts/renderer/XEnum.LegendType.html" target="_top">Frames</a></li> <li><a href="XEnum.LegendType.html" target="_top">No Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_bottom"> <li><a href="../../../allclasses-noframe.html">All Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_bottom"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#enum_constant_summary">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li><a href="#enum_constant_detail">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_detail">Method</a></li> </ul> </div> <a name="skip-navbar_bottom"> <!-- --> </a></div> <!-- ======== END OF BOTTOM NAVBAR ======= --> </body> </html>
mini_pile
{'original_id': 'a650322213653be7d3f553187c7d7ff9cf9b1db6d361585b0254863bd02e1174'}
Field of Science Happy Birthday, Charles! Bend said... Cheer up, Phytophactor. The most anti-science candidates for the GOP nom. have dropped out. While Santorum is still pro-creation "science" and believes global warming is a hoax, Romney, who believes in evolution and believes that global warming is taking place (but that we shouldn't do anything about it) is still the most likely candidate to take on Obama in the fall. This may be cold comfort to you. Consider this, then: it's going to be very difficult for any Republican to defeat Obama for the presidency. Hmmmmmm said... "it's going to be very difficult for any Republican to defeat Obama for the presidency." I guess you are kidding right
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '260', 'language_id_whole_page_fasttext': "{'en': 0.9468141198158264}", 'metadata': "{'Content-Length': '173156', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RCGSCTPHFXAG3XDGXR36OWTLK5LSTDEX', 'WARC-Concurrent-To': '<urn:uuid:96946c90-96fa-4bdd-ae51-c23d6ded2993>', 'WARC-Date': datetime.datetime(2018, 10, 16, 23, 52, 45), 'WARC-IP-Address': '172.217.7.147', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:NCDZ6G2FOUCNF25ZTPJEMTDRZNO2QHL4', 'WARC-Record-ID': '<urn:uuid:35bc5612-66f5-4ad3-a161-f6af97dc5ba4>', 'WARC-Target-URI': 'http://phytophactor.fieldofscience.com/2012/02/happy-birthday-charles.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:423558c2-1094-4b31-a8fc-a9a1c2937c99>', 'WARC-Truncated': None}", 'previous_word_count': '360', 'url': 'http://phytophactor.fieldofscience.com/2012/02/happy-birthday-charles.html', 'warcinfo': 'isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-30-126-152.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0695028305053711', 'original_id': '33177958704e14985a9abc62d8f0816372cc3d361468a4f35d7c20443e04792f'}
Satellite image of Texas dust storm Rainfall Leaves Behind Red Dirt From Texas December 16, 2003 Red dirt on car The Milwaukee/Sullivan National Weather Service Office was notified by Milwaukee TV stations and the Wisconsin DNR that citizens in the counties of Milwaukee, Ozaukee and Waukesha reported a layer of red dirt on vehicles (Image 1/ Image 2). The red dirt was deposited by the rain during the mid-moring hours of Tuesday, December 16, 2003. The red dirt, which appears to be clay-based, originated from west central Texas and eastern New Mexico. Strong west winds gusting to 55 to 65 mph for serveral hours in that region the previous day, lifted the red dirt into the atmosphere. Poor visibilities were noted over parts of the Texas Panhandle into Oklahoma Monday (12/15/03) afternoon and evening. The wind flow associated with a low pressure system lifted the dirt to a high altitude and brought the red dirt into southeast Wisconsin as the low pressure system moved northeast through Wisconsin Tuesday morning. The soil in eastern New Mexico and west Texas was very dry, allowing it to be easily lifted by the strong winds. The satellite image above shows the turbulent winds lifting the dirt and pushing it northeast. The Hysplit Computer Model The Hysplit Computer ModelThe Hysplit computer model, normally used by the NWS to predict the spread of hazardous material in the atmosphere, was used to see where air parcels, originating at different altitudes over Lubbock, TX at 600 A.M Monday, December 15, 2003, would end up at 600 A.M. Tuesday, December 16, 2003. The resultant plot clearly shows that wind currents, associated with a low pressure moving northeast from the Kansas area to Wisconsin, transported the lofted red dirt from eastern New Mexico and western Texas, northeast to southeast Wisconsin, northeast Illinois and Lower Michigan. Rain showers associated with the low pressure washed the red dirt out of the atmosphere over a large area. The red line shows the track an air parcel, at 1000 meters above the ground over Lubbock, TX, would take during the 24 hour period ending 600 A.M Tuesday morning. The blue line represents what happened at 2000 meters above the ground, and the green line indicates activity at 3000 meters above the ground. Note that the air parcels at all three levels continue to mix and rise to higher altitudes as they appoach the deposition area. The amount of deposited dirt and the widespread nature of the deposit was very unusual for the Upper Midwest. It has happend before, but not on the scale of what occurred during the morning hours of Tuesday, December 16, 2003.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '10', 'language_id_whole_page_fasttext': "{'en': 0.95114266872406}", 'metadata': "{'Content-Length': '8412', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LRWC5TY5EB65L5YEE2HVPOIVWTTJZ5WW', 'WARC-Concurrent-To': '<urn:uuid:1764eafa-a529-4b45-bbe6-aaac68ea8354>', 'WARC-Date': datetime.datetime(2014, 8, 2, 0, 23, 55), 'WARC-IP-Address': '184.51.126.50', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:LEPFOEXNEACPWQ7TB4PUQBDM44IMJA3H', 'WARC-Record-ID': '<urn:uuid:192cba1c-993b-4179-9528-0addc18ee20c>', 'WARC-Target-URI': 'http://www.crh.noaa.gov/mkx/document/other/reddirt.php', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2c07c904-bbf0-4feb-a7b5-df5d90879011>', 'WARC-Truncated': None}", 'previous_word_count': '458', 'url': 'http://www.crh.noaa.gov/mkx/document/other/reddirt.php', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03301483392715454', 'original_id': 'd743b76b18a9e539a1c93b8e72d2d53eeea9675d52d0bf284e15eaa5baff080e'}
Q: Ruby add 31 days to date string within 2d array I have a 2d array. array = [["2014-01-12", "2014-01-12", "2014-01-12"], ["2012-08-26", "2012-10-18", "2012-08-31"], ["2013-04-09", "2013-05-22", "2013-07-01"]] I need to add 31 days to the third value in each sub array (eg: "2014-01-12" & "2012-08-31" & "2012-07-01") I have considered something like: changed_date = array.map { |due| ((Date.strptime(due[2], "%Y-%m-%d"))+ 31) } But wanted to see what other ways there are of doing this... Thanks! EDIT: I need the result to be an array of strings with with row.last having an additional 31 days. The resulting array should look like this: array = ["2014-02-12", "2012-09-31", "2012-08-31"] A: You're doing it correct but you're changing your array form. Perhaps you should do array.map{ |due| due[2] = (Date.strptime(due[2]) + 31).strftime("%Y-%m-%d"); due } Or array.each{ |due| due[2] = (Date.strptime(due[2]) + 31).strftime("%Y-%m-%d"); }
mini_pile
{'original_id': '37c70e4843430a2ebc1672e766f657f9984a44b212e122edb0e017fd559e47e1'}
There are lots of ways to travel in Lao PDR. Slinging through Lao mountain turns on a motorbike? Fantastic. Getting a cheap, last-minute ticket for a twelve hour bus ride? Not so great. The bus trip from Vientiane back up to Luang Prabang was almost comically bad. Every Lao person on the bus, of course, Laos Bus Travel Tourhad tuberculosis. The man in front of me couldn’t bear to put his cans of motor oil in the overhead containers, and instead stuffed them under his seat, taking up all the room for my feet. (He also apparently needed to push past me every time we got off or on the bus; very rude. He spat on the floor of the bus at least once.) The three Dutch girls whose row I punctuated like a comma, not a period, had brought a feast of croissants, papaya, cookies, and other snacks for the twelve hour ride. They divided these up periodically and passed them over me to each other, never once asking if I’d like some to share. My seatmate, however, continually offered me tissues, making me paranoid about things hanging off my nose. My seat had one position: fully reclined. The air conditioner worked only off and on and when it did seemed to fill the bus with white, powdery smoke. The “toilet” on the bus was instead the action of stopping every three hours, sometimes at restaurants and shops, sometimes simply by the side of the road, where you could choose to relieve yourself in pitch blackness on a muddy slope behind the bus, or bathe your white ass in the light of the headlights in front. I know I slept some, because I don’t remember checking my phone and seeing a time between one am and three am Motorbike travel Laos(roadside pee break!) and then again between three and five. When I woke up at five, however, I couldn’t quite accept that the incredible grayscale scene out the window was actually real. The black trees sketched against the receding gray mountains had to be–I rubbed my bleary eyes–a painting on the side of a building we were scraping? I didn’t want to believe it could be a real place–and then to have it taken away from me as we dove through another bank of cloud, ah, that was cruel. But we rounded a bend and it became the actual landscape: black peaks rising up out of silvery pools that looked like mercury lakes but were actually cloud. We skirted around the sides of mountains, skimming just over the top of the low-lying clouds, and then the sun started to rise and the thick, white mist turned orange and the black mountains grew green and we plunged down into the fog and then up out of it again and I would have signed on for another night like this, and another, and another, just to see it again. Laos Travel tips: When traveling in Laos on a bus, maybe buy 2 seats at the same time, and NOT share it When you like to travel to Laos on a motorbike, this might be your choice though. Offroad Laos motorbike tours
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9687159657478333}", 'metadata': "{'Content-Length': '77664', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ARKVQ36MQ3QAJ4CD4RZ36R77FNGETUEN', 'WARC-Concurrent-To': '<urn:uuid:361f477c-6b40-4bc2-82b1-1c96a7fe018c>', 'WARC-Date': datetime.datetime(2021, 2, 27, 9, 9, 48), 'WARC-IP-Address': '46.4.29.163', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:AX6RBYSNPKTC3VMSEQH33QDQ2SSJ3UYU', 'WARC-Record-ID': '<urn:uuid:700aa431-ac71-4e09-8855-f2bb35080435>', 'WARC-Target-URI': 'https://explore-laos.com/relative-distance/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6c1a1b33-0e7d-42c1-87f4-a489c0d2c4b8>', 'WARC-Truncated': None}", 'previous_word_count': '528', 'url': 'https://explore-laos.com/relative-distance/', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-210.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02729332447052002', 'original_id': '3ae04ebd5bf97af9501ef735bd95e0ff7a79e8bfca75f902b96b6acae48c4247'}
What is the simplest way to restrict access to certain site pages? I am looking at ways to restrict access to certain pages of a site for only a temporary period to allow only a certain subset of people. I have the peoples email addresses and names. I would much rather do this without the need for full fledged sign ups. The simplest way to restrict access to a directory under Apache is to use a Require directive. Here is a simple tutorial on how to set this up: http://httpd.apache.org/docs/2.0/howto/htaccess.html#auth Note that use of groups is not required, you could simplify to use only usernames: AuthType Basic AuthName "Password Required" AuthUserFile /www/passwords/password.file Require valid-user @AJ this is not a simple way btw @diEcho what would be a simple way? The simplest way.... create a unique string that only you know. And do this: if ( array_key_exists('MY SECRET_STRING',$_GET) ) // allow access Then email users a URL like: http://www.example.com/?MY_SECRET_STRING If you want to get fancier you can use a cookie to store it so it persists across pages. Disclaimer: You asked for the easiest not the most secure. If anyone gets a hold of the URL with the key in it then they WILL be able to see your site. Create a TRULY RANDOM NAME folder Move the pages you want to this folder Send an email to those people with the link to the folder DO NOT add an entry in your robots.txt file Remove the folder after this "temporary period" DO NOT TELL ANYONE I TOLD YOU TO DO THIS! P.S. security trough obscurity is highly discourage but in certain cases it's acceptable.
common_corpus
{'identifier': 'https://stackoverflow.com/questions/6349411', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2011.0', 'title': 'Stack Exchange', 'creator': 'Emir Hadzajlic, Mathiesen Mcknight, Romario Oliveira, afarazit, https://stackoverflow.com/users/13802030, https://stackoverflow.com/users/13802031, https://stackoverflow.com/users/13802032, https://stackoverflow.com/users/13802246, https://stackoverflow.com/users/13802308, https://stackoverflow.com/users/13916652, https://stackoverflow.com/users/155861, https://stackoverflow.com/users/455934, thundling, user13916652, willc, xkeshav', 'language': 'English', 'language_type': 'Spoken', 'word_count': '274', 'token_count': '430', '__index_level_0__': '3029', 'original_id': 'ca7974cabc33b01e5e18adad9810685be06c9d899449ceb446d1dd01e5b0b2c9'}
Web Development How Important Web Security In E-commerce Industry during Covid-19 Pandemic Web Security Today, no industry has been completely immune to any kind of cyberattacks. The sad part is that the cybercriminals have not even spared any sector and have managed to infiltrate into their networks using malicious practices. The number of e-commerce sites are growing every year, resulting in more number of connected devices. This huge number of connected devices has indirectly exposed the e-commerce sector to vulnerable cyber threats. Like any other industry, the e-commerce industry also has crucial data assets that have to be properly secured. The Wave Of Cyberattacks On Retailers As countries across the world are shutting down their borders, isolating their cities, and retailers are going into hibernation, cybercriminals are becoming more active than ever. Amid the coronavirus fears, they are more likely to accelerate their infection-spread. According to a report by Sophos Labs, more than 42,000 websites have been created with domains that are named after “COVID.” A lot of these websites are doing the rounds since January and do not look legit. Therefore, it is only apparent how opportunistic cybercriminals are and how eagerly they are trying to exploit fears to gain advantage from the pandemic. Consequently, scams are being devised for retailer customers. There is a surprising influx of spam emails containing links for COVID-19 updates, social media ads, and ads redirecting to unsolicited websites. So, the following are major ways in which cyber attackers penetrate the networks. Phishing Scams In a phishing scam, an email is designed in a way to fool the user to fall into the bait of virtually-trusted websites for gaining access to their credentials, be it- student-critical data or any confidential research carried out by the students and faculties. Hackers usually deploy this method to target this sector. Ransomware and Malware As we have seen in the case of IIT-Madras, the Windows users were denied from accessing their network and files leading to mass disruptions. The advanced form of this threat is when the attackers hold user files for ransom. Ransomware and malware are injected into systems of the educational institutes by either a file or an attachment that might look legitimate. Which Data is at Risk? Based on the recent cybersecurity attack trends, it has been observed that the education sector continues to be the top target for cyber attackers. This is because of the fact that most of the educational institutes do not take the security challenges seriously and miserably fail to understand the impact of a cyberattack. The educational institutes have large volumes of personal data of students, admin staff. So, let us understand what types of data are at risk in the education industry. 1. Distributed Denial of Service (DDoS) Attacks A DDoS attack involves your website’s servers being flooded with requests from potentially thousands of untraceable IP addresses. Often driven by the manipulation of IoT devices, today’s more sophisticated attacks can cause your entire site to go offline, leaving it wide open to more vicious attacks, such as a malware infection. The frequency of these security threats to e-businesses is on the rise, particularly during peak sales periods. For example on Cyber Monday 2018, eCommerce sites experienced a 109% increase in DDoS attacks compared to the rest of November. This security threat can cost your business thousands in lost revenue and mitigation (<$55,000 per attack, in some cases). However, the costliest damage done by DDoS attacks is often reputational – losing your customers’ trust and confidence. That is, according to 78% of security professionals in a survey by Corero Network Security. With 69% of security professionals reporting they experience, on average, one DDoS attack a day, it’s clear that eCommerce sites should take every precaution to  this risk. 2. Credit card fraud The old classic, credit card fraud, remains the most common security threat facing eCommerce sites, in part due to the fact it’s so difficult to trace. Detecting that a fraudulent transaction has taken place is a crucial first step, but it isn’t easy, especially if your site processes hundreds of transactions a day. Here are a few tell-tale signs to help you spot an instance of credit card fraud: • An order that’s set to ship to an address other than the billing address • A sale of a much higher value than you’re used to receiving • A successful order preceded by multiple unsuccessful ones • A customer’s IP address is not in the same location as the billing information on the order It’s important to try and verify these kinds of  before any payment is taken. If you fail to do this, not only will you lose valuable inventory, but it’s your responsibility to pay back whoever’s card has been scammed. This all adds up to a considerable sum of money. And this is before you consider the damage this will do to your company’s reputation. Staying vigilant against card fraud is essential to protecting your business and maintaining great eCommerce customer experience 3. E-skimming E-skimming refers to hacker methods of stealing personal data, such as credit card information, from payment card processes pages on eCommerce sites. It’s a significant security risk in eCommerce, as shoppers can be misguided by misleading external links and portals to payment pages. Or, cyber-criminals gain access to your site via a third-party, a successful phishing attempt, or cross-site scripting. These methods allow hackers to capture shopper payment information in real-time, as soon as the customer accesses the payment page. To avoid this, ensure your website is secure, remind customers to never enter their details on unverified websites, and prompt them to check whether a payment page is genuine.  Challenges Faced by the Industry Every organisation has several departments and many users have access to these from remote locations. A huge volume of data flows in and out of the network system and this, in turn, has increased the challenges that are faced by the industry. Some top-challenges that this industry faces include. Lack of Centralized IT Systems Most of the departments in the Business institutes have their intra-departmental IT systems, leading to no centralized IT infrastructures. All these departments have several systems connected to these local networks based on their individual requirements. With no centralized IT system in place, it becomes difficult to uniformly implement security policies across the organization. Rise of BYOD* Culture (*Bring Your Own Device) Most of the educational institutes allow the students to bring in their own devices for storing data. To carry out their projects simultaneously, students bring their USB drives and connect to the systems that are available to them. In most cases, it has been seen that students do not have anti-malware software installed in their systems. This leads to students going for a pirated version of the required software. This free software enters the institute’s network once the student’s infected device gets connected to a system on the network.  Internal Threats In any industry, internal threats are one of the main reasons for data breach and loss. An insider attack can take place by the means of a phishing email or even transferring crucial information across personal and insecure devices on the network. Sometimes, the login credentials of an employee/student can be compromised by an insider resulting in loss of sensitive information.  Overcoming Challenges Once the above-stated threats and their channels have been identified, the following are some countermeasures that the industry can deploy to safeguard their crucial information. Identifying the top assets and securing them with a security solution Creating a detailed analysis of potential risks and vulnerabilities to strengthen the current security posture Implementing a strong access control system based on the User’s authentication role to stop any unauthorized access on the network Creating strict cyber security policies and enhancing the awareness levels inside the e-business institute  The first step to thwarting hackers is understanding their most common modes of operation. Once you know the different types of threats in eCommerce, you can take the necessary steps to protect against attacks and mitigate any damage done. Do the right thing – for your business and your customers: take precautions to ensure your eCommerce site is well defended against cyber-criminals, so your shoppers get a friction less shopping experience. To learn more about designing an eCommerce website with great user experience.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9430781602859496}", 'metadata': "{'Content-Length': '183189', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VRXJU3KQMM55OJLHE4AKCVZ55J757E2T', 'WARC-Concurrent-To': '<urn:uuid:dc026033-68b9-43eb-a07a-fa0631679128>', 'WARC-Date': datetime.datetime(2021, 1, 20, 23, 36, 40), 'WARC-IP-Address': '52.71.127.34', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RNR252GIE4GE55DATP3FP4ZRGPQATJXE', 'WARC-Record-ID': '<urn:uuid:884fc9a3-ba85-4a82-8876-5ef9148412ef>', 'WARC-Target-URI': 'https://www.smactechlabs.com/how-important-web-security-in-e-commerce-industry-during-covid-19-pandemic/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:696d6fbb-a175-4818-8be4-dde9447c72f0>', 'WARC-Truncated': None}", 'previous_word_count': '1393', 'url': 'https://www.smactechlabs.com/how-important-web-security-in-e-commerce-industry-during-covid-19-pandemic/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-32.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.031156063079833984', 'original_id': '5e9e227d0ede0fa04b02477471f82bc0e62e4bc75be521f92f440ee850efaf21'}
VALLEGRANDE, Bolivia (Reuters) - Thousands gathered on Monday in a small town in southern Bolivia, where the leader of the Cuban revolution Ernesto “Che” Guevara was executed by CIA-backed Bolivian soldiers 50 years earlier. Slideshow ( 4 images ) Bolivia’s President Evo Morales, one of few remaining leftist leaders in a region that has shifted to the political right, camped in a sleeping bag and tent and welcomed dignitaries from allies Cuba and Venezuela. “50 years later, the legend of Ernesto Che Guevara lives in the young people, in their unquestionable struggle for equality and liberation,” Morales wrote on Twitter ahead of a scheduled speech. Over the weekend artists, activists, veterans of the Cuban revolution and Guevara’s descendants gathered to commemorate the revolutionary hero in Vallegrande, where he was buried in a hidden, unmarked grave in 1967 before his remains were moved to Cuba 30 years later. The Argentine-born doctor met Fidel Castro in Mexico, where they trained and bought guns in preparation for the Cuban revolution before setting sail for the island on Nov. 25, 1956, to start the insurgency that toppled U.S.-backed dictator Fulgencio Batista two years later. Guevara rose to become one of the most important men in the rebel force and later in Cuba’s revolutionary government, heading the central bank and industry ministry. He had hoped to replicate the revolution in Congo and then in Bolivia, but his call to arms largely failed and he was surrounded by U.S.-trained soldiers and caught in a ravine near La Higuera on Oct. 8, 1967. The next day he was taken to Vallegrande, 60 km (37 miles) away and Bolivia’s then-President René Barrientos ordered his execution, avoiding a trial. Guevara was 39. His remains were exhumed and reburied in Santa Clara, Cuba, in 1997, when the Cuban Communism he helped build was struggling to survive after the Soviet Union collapsed. Commemorative ceremonies were held in Santa Clara on Sunday, and Cuba’s Vice President Ramiro Valdés joined Morales in Bolivia on Monday. Guevara remains an anti-imperialist hero to many, especially in Latin America and Africa. In Cuba he is remembered for promoting unpaid voluntary work by toiling shirtless on building sites and hauling sacks of sugar. But in the town of Rosario, Argentina, where he was born, some residents have been collecting signatures to have his statue removed, protesting what they call his violent means to promote communism and lack of human rights in today’s Cuba.
mini_pile
{'original_id': '5a30540159b21a6ffbf024e8163613e2d7c4568009b0adcd6ffe60cbd6e5cf00'}
coconuts (DEENの曲) coconuts (DEENの曲) 分類 シングル coconuts (DEENの曲) レコードレーベル アリオラジャパン coconuts (DEENの曲) ジャンル J-POP coconuts (DEENの曲) 演者・演奏者・歌手 DEEN coconuts (DEENの曲) 出版日 2010 coconuts (DEENの曲) 前 Negai coconuts (DEENの曲) 次 Brand New Wing coconuts (DEENの曲) 以下の一部分 クロール (DEENのアルバム) coconuts (DEENの曲) MusicBrainzリリース・グループ識別子 7ae8a670-b1ea-4d32-8afb-9d855299d4d7 Coconuts single Coconuts instance of single Coconuts record label Ariola Japan Coconuts genre J-pop Coconuts performer Deen Coconuts publication date 2010 Coconuts follows Negai Coconuts followed by Brand New Wing Coconuts part of Crawl Coconuts MusicBrainz release group ID 7ae8a670-b1ea-4d32-8afb-9d855299d4d7 Coconuts Coconuts nature de l’élément single Coconuts label discographique Ariola Japan Coconuts genre artistique J-pop Coconuts interprète Deen Coconuts date de publication 2010 Coconuts identifiant MusicBrainz d'un groupe de sorties 7ae8a670-b1ea-4d32-8afb-9d855299d4d7 Coconuts single van Deen Coconuts is een single Coconuts platenlabel Ariola Japan Coconuts genre J-pop Coconuts uitvoerend artiest Deen Coconuts datum van uitgave 2010 Coconuts vorige Negai Coconuts volgende Brand New Wing Coconuts onderdeel van Crawl Coconuts MusicBrainz-identificatiecode voor uitgavegroep 7ae8a670-b1ea-4d32-8afb-9d855299d4d7 Coconuts cantar de Deen Coconuts instancia de cenciellu Coconuts xéneru J-pop Coconuts intérprete Deen Coconuts data d'espublización 2010 Coconuts sigue a Negai Coconuts siguío por Brand New Wing Coconuts Coconuts instancia de sencillo Coconuts sello discográfico Ariola Japan Coconuts género J-pop Coconuts intérprete Deen Coconuts fecha de publicación 2010 Coconuts precedido por Negai Coconuts sucedido por Brand New Wing Coconuts forma parte de Crawl Coconuts identificador MusicBrainz del grupo de lanzamiento 7ae8a670-b1ea-4d32-8afb-9d855299d4d7
common_corpus
{'identifier': 'https://www.wikidata.org/wiki/Q11194725', 'collection': 'Wikidata', 'open_type': 'Semantic data', 'license': 'CC0', 'date': '', 'title': 'Coconuts', 'creator': 'None', 'language': 'Multilingual', 'language_type': 'Semantic data', 'word_count': '225', 'token_count': '747', '__index_level_0__': '51443', 'original_id': '1408d1930695f69c42064dd5bac489a1cb77b9e09651f59120fb7b1bab0e7f68'}
• Spike Design Service Custom Infinity Mirrors Custom infinity mirrors provide a visual experience that honestly has to be seen, in order to be believed and appreciated! A great way to add depth to any slightly more confined spaces, infinity mirrors bounce light from one mirror to the next, creating the impression you’re staring out into infinity!
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.8498372435569763}", 'metadata': "{'Content-Length': '14572', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:PB7PGXGJV4K6DVCFU2JWMPL54THGULWR', 'WARC-Concurrent-To': '<urn:uuid:4ce3ab57-ca55-493e-840d-e86f286e2b0f>', 'WARC-Date': datetime.datetime(2020, 4, 4, 1, 57, 10), 'WARC-IP-Address': '114.141.197.213', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:4KFAGNSNPFA2KEVFE2LTL6ZG7P3AP5BB', 'WARC-Record-ID': '<urn:uuid:dc1b503b-5456-4fe6-ae76-af76567d566d>', 'WARC-Target-URI': 'https://spikedesign.com.au/products/environmental-interior-graphics/custom-infinity-mirrors', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:372c9fda-0291-4876-9d9e-854966dbe3a1>', 'WARC-Truncated': None}", 'previous_word_count': '56', 'url': 'https://spikedesign.com.au/products/environmental-interior-graphics/custom-infinity-mirrors', 'warcinfo': 'isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-152.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11910128593444824', 'original_id': '8bbcf0d3a8adc4bd96990f69b82ced124e1c3a186c106236dc31808aeed5606a'}
People’s necessity, smartphone Smartphone is a device of wireless transmission that is embedded with several tools together. With the increasing of number of gadgets embedded in smartphones such as the MP3, Internet, Camera, and small TV. Since the market need lead to decrease in size and price, smartphones have become ubiquitous. A large population from different age groups who are interested to consume smartphone for creating social circle on social networking media, surfing their favorite websites, listening the music, online casino and so forth. The excessive usage of smartphones cause some people to have trouble tearing them away long enough to reconnect with the real world. You can most likely see them around town, on public transportation, in stores with their eyes and fingers glued to their mobile device. Anytime, anywhere, instead of interacting with people around them, they ignore face-to-face conversation for virtual ones. It is a habitually checking on the phones but not a necessarily that it was really needed to check on their phones for emails. This means that people are actually relying on phone more than doing things themselves. Nowadays, smartphone tend to become a necessity for everyone so that bring convenience on their working purpose, social interaction and so forth. Don’t be over-rely on smartphone but use it wisely.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9589271545410156}", 'metadata': "{'Content-Length': '10988', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:F5PTEPBVYUKWL56NDS34BPPUALF3EOV4', 'WARC-Concurrent-To': '<urn:uuid:76dbe4a1-a227-4253-9dc4-15516dd467af>', 'WARC-Date': datetime.datetime(2018, 8, 18, 23, 42, 8), 'WARC-IP-Address': '176.58.100.223', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:B7NSUNC7DJESXV6K57YP7OX7KJUGOTGP', 'WARC-Record-ID': '<urn:uuid:1e01fc29-177b-42ae-9f1d-2884ca9527a8>', 'WARC-Target-URI': 'http://www.middlewichfestival.org/category/technology/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:1092ef8b-29b3-4ab8-b8c3-d5873d7857ae>', 'WARC-Truncated': None}", 'previous_word_count': '215', 'url': 'http://www.middlewichfestival.org/category/technology/', 'warcinfo': 'isPartOf: CC-MAIN-2018-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-185-139-225.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6555086970329285', 'original_id': 'ca030a6cb876adf93f0d0aa7811614947a312c76d115580f5997484a178df3a4'}
Categories Number of Children Poisoned by Opioids DoublesNovember 9, 2016 Kids in homes where drugs are present are more at-risk than ever, with a growing number of children and teens ending up in the E.R. due to prescription opioid poisoning, according to a new study in JAMA Pediatrics. Poisoned By Opioids Study findings Researchers recently studied U.S. hospital discharge records over a 16-year period, from 1997 to 2012. According to the paper, the largest percentage increase of prescription opioid poisonings – a whopping 205 percent – occurred among children ages one to 4, most of whom ingested the opioids accidentally. Teens ages 15 to 19 experienced the most poisonings overall, with most overdoses resulting from a suicide attempt or recreational use. Across all age groups of children in the study, hospitalizations nearly doubled. A fatal epidemic for the youngest in our population As a recent Wall Street Journal article explains, these drugs are killing people in record numbers. “Opioids were the most common cause of the nation’s 47,000 drug-overdose deaths in 2014—a record that exceeded the number of people killed in car accidents.” A bigger problem is this: Most past research on opioids has primarily focused on adults. But, according to Daniel Miller, an associate professor of emergency medicine at the University of Iowa, more emphasis should be placed on recognizing the dangerous effects on children and adolescents. In the same WSJ article, he says he’s noticed a distinct uptick. “Prescription-drug use seemed much less common among teens when I graduated from medical school,” Miller said. “Over the last 10 years I’ve seen a change. The age of patients I see displaying drug-seeking behavior keeps getting lower and lower.” Need for intervention It is no surprise that opioid poisoning rates have risen so sharply, given the drastic increase in opioid prescriptions overall. According to the Centers for Disease Control and Prevention, doctors wrote nearly a quarter of a billion prescriptions for them in 2013—with wide variation across states. To put it in perspective, that amount is enough for every American adult to have their own bottle of pills. When leftover prescription medications remain in a home, the likelihood a child will find them increases greatly. Though there is no one clear answer on how to address this growing problem, it’s become clear that comprehensive strategies for opioid storage, packaging, and misuse are more necessary than ever. These kinds of changes will serve to protect vulnerable children from the dangers of opioid poisoning. Getting help If you are struggling with opioid addiction, or any other substance abuse problem, we can help. The Watershed is here to offer you and your loved ones the care and support you need to get well. Contact us now for more information.
mini_pile
{'original_id': '9ece762947ebc2f311cda4c169a73ab1502790aa94f7e94fed5203c4f2dc66a9'}
By Tova Cohen TEL AVIV (Reuters) - Retired Mossad chief Tamir Pardo said he has assembled a team of more than 30 hackers from Israel's security and intelligence services into a startup called XM Cyber that seeks to keep companies' networks safe by imitating how real hackers work. Pardo, who headed the Israeli spy agency from 2011-2016, started XM Cyber two years ago and serves as its president. "I thought there are so many companies with great products but they are not focusing on the right question," Pardo told Reuters. "The real question is are my crown jewels really protected." Pardo brought with him hackers that were on the offence teams of Israel's security services, including the Mossad, the Shin Bet and the army's elite 8200 unit. Many companies assemble so-called red teams of hackers to find vulnerabilities in their networks but this option is expensive and once they leave, their findings can quickly become outdated as corporate networks are constantly changing. Pardo, who while at the Mossad initiated the idea for a fund to help develop new spy techniques that was launched in 2017, said his company's platform continuously simulates attacks and exposes a network's blind spots. "We built a machine that sits on site doing the job done by human hackers," Pardo said, adding that the technology provides protection by blocking a network's holes. XM Cyber raised $15 million, mostly from Israeli billionaire Shaul Shani, who sold his Brazilian company Global Village Telecom to Vivendi for $4.5 billion in 2009. The company has customers in Europe, Israel and the United States in insurance, banking and critical infrastructure, though Pardo declined to name them. "By the end of the year we will have more than 30 paying customers," Pardo said. (Reporting by Tova Cohen; Editing by Steven Scheer and Louise Heavens)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9719586968421936}", 'metadata': "{'Content-Length': '110002', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6ISHNGGSRJDSFBUII2ZMOATUSI4C73QO', 'WARC-Concurrent-To': '<urn:uuid:2299879e-f731-4478-81c9-1eb7230a6bad>', 'WARC-Date': datetime.datetime(2018, 11, 21, 16, 8, 39), 'WARC-IP-Address': '131.108.41.165', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:2UFIFKAI7G6UPTX34GQCFF2LHDLTSH5D', 'WARC-Record-ID': '<urn:uuid:a8a2f1db-c15a-434c-8594-673bf3ba2274>', 'WARC-Target-URI': 'https://www.metro.us/news/reuters/former-israeli-spy-chief-and-team-elite-hackers-form-cybersecurity-firm', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:100da366-d35f-4545-942c-7cba5711fe3f>', 'WARC-Truncated': None}", 'previous_word_count': '293', 'url': 'https://www.metro.us/news/reuters/former-israeli-spy-chief-and-team-elite-hackers-form-cybersecurity-firm', 'warcinfo': 'isPartOf: CC-MAIN-2018-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-36-246.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.026148498058319092', 'original_id': '4eba9e1b60cf95e15d2f61005b89e92549fcd5a46a49452064b6a2d21701e52a'}
OUt of my Control....Paranoid for the next 9 week. Long story...Just need to get some anxiety out.Positive comments needed please! I'm stress everyday, but there is nothing I can do. Awhile back I had posted that I hadn't felt the baby for over 24hours. I was 28 weeks at the time, but the baby was fine.I even had an ultrasound and you could see her moving around and kicking. I couldn't feel her. After that I accepted that I wouldn't feel her that much but as long as I was feeling her a few times a day then I know she is fine. I'm having less and less movement every week. I went to my OB last week because I wanted to check on her because I was starting to doubt whatever little movement i felt. It might just be my stomach (that's how faint I'm feeling it), She did the Doppler and she had a strong heartbeat and you could hear that she was moving. My Ob said that I might not be feeling her because my placenta is in the front, and she is facing my spine, also that my weight might have a factor. I have an U/S this Thursday and my OB will be sending me every two weeks for U/S so that I can have some peace of mind and we can check her movement. I'm feeling so worried that I'm having a hard time sleeping, It's just out of my control. I knew when I was pregnant that I wasn't going to see my belly move or see a hand or foot poke out, but at least I thought that I would feel the little person inside me. I'm just looking forward to D_DAY Comments (13)Add a comment / 2 You are in good hands! What a great doc you have, sending you for so many ultrasounds just for peace of mind. That's awesome.  I think another factor that may be coming into play as the baby grows is that she might just be running out of room to make the movements that you expect- that could explain why it seems like the movements are actually decreasing. I hear you on the stress front. When I feel movement, I get so paranoid because I can't tell which baby has moved and I start to think that maybe something is wrong with one of them.... or I'll only feel movement on one side and then freak out that the other side has been still for so long!  Meditation... just some deep breathing and visualization, has helped me deal with some of these stresses. You say you have 9 weeks of stress left... try to reframe it this way: you took your baby through 31 risk-filled weeks and the last time you and your doc checked, she was getting through with flying colours! The major hurdles in her development are essentially over. (You probably know all this rationally, and I know it's hard to bring ourselves there emotionally, but you're doing great.) I know it's hard, but really try not to stress.  All these guidelines they give - feel your baby kick 10 times in an hour, go to hospital if you're having more than 4 BH in an hour ... blah blah blah, they're all just that - guidelines.  I think they almost put TOO much information out and while we're trying to reassure ourselves by reading up about everything, it just serves to freak us out. I was like you with my first.  Anterior placenta, baby's kicks were being directed at my back and there's no nerves back there (or few nerves) to transmit the feeling to our brains.  Plus, I was (am) very overweight and they kept telling me that was a factor (I don't buy it - I'm 30 pounds heavier with this pregnancy and I feel CONSTANT movement this time) ... I was in the hospital every other week because I hadn't felt baby all day and my BH were super intense.  Everything was always 100% fine.  What's my point?  Hang in there, I know it's hard to trust what you can't feel, but please believe me when I say when there's something wrong, YOU'LL KNOW. Oh my gosh, angelabianco82, I came on here just now to write almost EXACTLY the post that you wrote. I wanted to know if any other ladies were experiencing the same thing. My little one has been quieter than usual too. Same deal for me, anterior placenta, and my weight may be a factor too. I hope you can take some solace in that you're not alone! I'm sure in the end we with both be fine, and so will our babies! All the best to you. Hopefully feeling that you're not the only one normalizes it a bit (as you've done for me). And thank you to the rest of the ladies on here sharing, it really helps ease a troubled mind. I just spent 4 days in Sunnybrook High risk unit due to some heart rate concerns for baby.  I constantly had a heart rate and a baby movement monitor on.  Baby was moving a lot, and I did not feel half the movements. My point is you may not always feel baby move, but that doesn`t mean baby isn`t moving around.  All of those reasons your dr. listed for not being able to feel her as much are true,  your doctor sounds great, trust them, try to take it one day at a time, and enjoy your pregnancy. best of luck. Tomorrow I meet with the high risk OB and will have a level 2 ultrasound and Bio Physical Profiles done. This will be happening every 1-2 weeks until my due date. These will be on top of my apts with my midwifes. This is due to my history with my first born DD. I had to do the same with DS (he was fine and is now a healthy 4 year old) I have lots of anxiety happening now and I totally understand what you are going through.  I also have an anterior placenta with this baby and am overweight and I get very anxious when movement feels less frequent or changes. Currently baby is doing less kicks and big bumps and more squiggles, wiggles and squirms. Anyway I try to use my mantra (big, strong, healthy baby) and breathing exercises, positive images (like holding my perfectly healthy baby in my arms and nursing him/her) and just trying to stay in the moment.  I hope the next 8-9 weeks goes by quickly and uneventful for all of us! Thanks Ladies it really does help hearing your stories.My husband didn't know what to say anymore but just to have a bit of faith.I have been blessed with a good pregnancy with regards normal BP, No protein or sugar in my urine test, and passing my GD test even thou diabetes runs in my family and being overweight Feeling better that I'm not alone and that I'm not going crazy... It's so hard to not be anxious when there's so much on the line! Would renting a doPpler be an option? I would suggest renting a doppler also if you can. I've had so much stress relieved after I ordered my doppler at 13 weeks. I'm able to find baby's heartbeat immediately now and on days that I worry I listen to it and feel so much better. I still worry though, it is totally normal to worry but you can't let it consume you, try to meditate and think positive thoughts like Julians_mama suggested and keep busy to keep your mind off worrying as it doesn't help anything! You're lucky you have an OB that will send you for u/s's every 2 weeks! Where can I rent a doppler? Will rent one for sure with the second one. Had an ultrasound today and the baby is fine. She is breech right now, and is laying across my hips towards my spine. Will have to go back and check if she moves! Thanks everyone, and please let me know where I can rent a doppler 1 2 First page | Last page Log in or sign up to post a comment! Recent posts in June 2012 Ask a question or share your story Start a post Track your baby’s development Trying to conceive? June 2012 See group details Group owners Group members (573) Group details 1163 posts Created 26/10/11 Getting pregnant For you
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '15', 'language_id_whole_page_fasttext': "{'en': 0.9789959788322448}", 'metadata': "{'Content-Length': '183535', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:WWBWMBINZZXIFNVJUKIYIQ4L6D4WVJX2', 'WARC-Concurrent-To': '<urn:uuid:556b338d-855b-44e9-ab79-557c3dd2adf6>', 'WARC-Date': datetime.datetime(2014, 7, 24, 19, 23, 59), 'WARC-IP-Address': '23.218.148.61', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:VVEKLQJIA33QXW5BOQZUJ6XUJV4HORDE', 'WARC-Record-ID': '<urn:uuid:7643b71f-ed48-4cb2-82b8-a08c85107172>', 'WARC-Target-URI': 'http://www.babycenter.ca/thread/51315/out-of-my-controlparanoid-for-the-next-9-week', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9dda6272-52a0-46d5-85ff-5c86512e6ff0>', 'WARC-Truncated': None}", 'previous_word_count': '1440', 'url': 'http://www.babycenter.ca/thread/51315/out-of-my-controlparanoid-for-the-next-9-week', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-131-23.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.031727135181427', 'original_id': 'b3a8ca5854c30f126c13aae101da34392c973cab55fc2353f5e618dd232e096e'}
Willingham makes big return to Target Field Former Twins slugger is excited to be part of playoff race with Royals Willingham makes big return to Target Field MINNEAPOLIS -- Just four days after he was traded from the Twins to the Royals, Josh Willingham made his return to Target Field to face his former team on Friday and belted a bases-clearing double in a five-run fourth that propelled Kansas City to a 6-5 win. Willingham, who was claimed by the Royals on waivers and traded for right-hander Jason Adam on Monday, was back in a familiar place on Friday. But he admitted it was strange heading to the visitor's clubhouse at Target Field. Willingham, 35, played nearly three seasons with the Twins after signing a three-year, $21 million deal before the 2012 season. He hit .232/.353/.446 with 61 homers and 192 RBIs in 324 games with Minnesota before being traded. Willingham said he enjoyed his time with the Twins despite their struggles, but he was excited to join a club in the thick of the playoff race. "It was strange because the first couple days, you don't really know the guys so you're just trying to fit in," Willingham said. "But there's a lot of good energy here and lots of really good players, too. A lot of good things are happening. We're getting good pitching and timely hitting. So I'm looking forward to what's to come." Willingham, who has played in the big leagues for 11 years, has never played in the postseason. So he's looking forward to trying to help the Royals down the stretch as they aim for their first playoff berth since 1985. "It would mean a lot," Willingham said. "Playing games that mean something in August and September, I've never experienced that before. So I'm glad I'm able to experience that this year. I just want to help my ballclub get to October." Twins manager Ron Gardenhire, who informed Willingham of the trade shortly before Monday's game against the Astros, said Willingham's presence is missed. "He's a guy who can put the ball in the seats," Gardenhire said. "He was actually swinging pretty good as of late for us, driving the baseball. But he's a class act and a leader. He's a quiet guy but does really well with the kids. He's one of those guys we hated to see leave."
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '28', 'language_id_whole_page_fasttext': "{'en': 0.988211154937744}", 'metadata': "{'Content-Length': '47964', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:LI5HRMOWJQPCCI5Q7XVACECDUMO4OU6O', 'WARC-Concurrent-To': '<urn:uuid:9081e3f5-9744-4a57-8303-1f83b9975f04>', 'WARC-Date': datetime.datetime(2015, 3, 1, 19, 40), 'WARC-IP-Address': '23.0.160.10', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WSZP5N73UP22ZH6MPGJZFLRGJ6CP4JFK', 'WARC-Record-ID': '<urn:uuid:4d7c6ed1-fbe3-4ca0-a9ee-ec7c0eb346dc>', 'WARC-Target-URI': 'http://m.twins.mlb.com/news/article/89797954/royals-outfielder-josh-willingham-makes-big-return-in-win-over-twins-at-target-field', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:65911aa9-d5ea-4eaf-babf-074b71210724>', 'WARC-Truncated': None}", 'previous_word_count': '419', 'url': 'http://m.twins.mlb.com/news/article/89797954/royals-outfielder-josh-willingham-makes-big-return-in-win-over-twins-at-target-field', 'warcinfo': 'robots: classic\r\nhostname: ip-10-28-5-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-11\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for February 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05589401721954346', 'original_id': '3d14a1f3de66098485028ce8b3837a3efe165e1fcd0c628e2508034411ff3569'}
/* * $Id: ChannelPage.cs 137 2006-11-06 18:49:57Z meebey $ * $URL: svn+ssh://svn.qnetp.net/svn/smuxi/smuxi/trunk/src/Engine/ChannelPage.cs $ * $Rev: 137 $ * $Author: meebey $ * $Date: 2006-11-06 19:49:57 +0100 (Mon, 06 Nov 2006) $ * * Smuxi - Smart MUltipleXed Irc * * Copyright (c) 2005-2006 Mirco Bauer <meebey@meebey.net> * * Full GPL License: <http://www.gnu.org/licenses/gpl.txt> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ using System; using Smuxi.Common; namespace Smuxi.Engine { public class ProtocolChatModel : ChatModel { #if LOG4NET private static readonly log4net.ILog _Logger = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType); #endif public ProtocolChatModel(string id, string name, IProtocolManager networkManager) : base(id, name, ChatType.Protocol, networkManager) { } } }
mini_pile
{'original_id': '7dc9db1a4310980e616d1e7547206ba068231c4bd84d4b6ab0f6ec12c227a4dd'}
Alpha Streams Creating an Alpha To create an Alpha for the marketplace, you need just two principal components from the Framework: 1. A Universe Selection Model, to determine the assets your Alpha will be trading; and 2. An Alpha Model, to generate Insight objects on selected assets. The rest of the Algorithm Framework (Portfolio Construction, Execution, and Risk Management) are related to position sizing and trade management and not relevant to an external fund. In this section, we will only cover creating an Alpha using the Algorithm Framework. If you have a Classic Algorithm, please see the documentation for Upgrading Classic Algorithms. All algorithms utilizing the QuantConnect Algorithm Framework are eligible for licensing in the Alpha Streams marketplace. Choosing An Investment Thesis The investment thesis is arguably the most important and artistic part of the alpha creation process. Here you should imagine a hypothesis which will guide your implementation. The thesis is typically a quantifiable effect (something we can measure) that we believe has an impact on our selected assets. Each Alpha should implement one investment thesis. Combining multiple theories in a single strategy prevents external funds from being able to discern the components. If your algorithm has other signals you believe should be used together, list them as a separate Alpha and link to them in the Alpha description. Some examples of a focused alpha model are: • "Profitability Alpha" - Company profitability as a signal of its upward motion. • "Public Sentiment Alpha" - Public opinion as an indicator of company trajectory. • "Product Demand Alpha" - Tracking sales to project the trajectory of a company. Your alpha does not need to perform well in all markets to be a good alpha. The fund consuming the alpha will need to decide when to apply your signal. In fact, the more focused your alpha is, the more widely applicable it will be to potential clients. Selecting Your Universe Universe Selection is the first model of the Algorithm Framework. QuantConnect provides four techniques for selecting an asset universe: Coarse, Fine, Scheduled, and Manual Universes. For more information on defining your universe, see the documentation on Algorithm Framework/Universe Selection. Depending on your algorithm, you can likely use one of these helpers to select the stocks required. Manual Universe Selection Manual Universes are primarily used for a fixed set of assets representing a broader index. You may be selecting a basket of ETFs or a set of Forex Symbols representing the entire universe. Coarse and Fine Universe Selection Coarse and Fine Universes allow you to select US Equities based on price-volume action or corporate fundamental data. They are useful for filtering large volumes of information down to a smaller actionable set of assets. Scheduled Universe Selection Scheduled Universes trigger at defined points in time and run a generic function. This is useful for using an external API or file to define your universe source. As we must ensure Alpha algorithms are robust, only some external data sources are approved for Alpha Streams. Make sure to get your data approved before submission to Alpha Streams. DropBox/FTP driven universes require your continual effort, so are not an approved universe source. Generating Insights The next component of your algorithm is the Alpha Model. It is responsible for generating the Insight objects Funds consume as factors for their portfolio. Your Alpha Model should return a list or enumerable of Insight objects from its Update() method. For more information on creating Insights, see AlgorithmFramework / Alpha Creation. An Insight constructor takes the following arguments: # Insight Constructor Arguments: # Insight(symbol, timedelta, type, direction, magnitude=None, confidence=None, sourceModel=None, weight=None) Insight("IBM", timedelta(minutes=20), InsightType.Price, InsightDirection.Up, 0.0025, 1.00, "MyAlphaModel", 0.25) // Insight Constructor Arguments // new Insight(symbol, period, type, confidence=null, magnitude=null, source=null, weight=null); var insight = new Insight("IBM", TimeSpan.FromMinutes(20), InsightType.Price, InsightDirection.Up, 0.0025m, 1.0m, "MyAlphaModel", 0.25m); We have provided a helper method to make creating Insights easier. This can be used in your Update method to create insight objects for your Alpha Model of the Price type: insight = Insight.Price("IBM", timedelta(minutes = 20), InsightDirection.Up, 0.0025, 1.00, "MyAlphaModel", 0.25) var insight = Insight.Price("IBM", TimeSpan.FromMinutes(20), InsightDirection.Up, 0.0025m, 1.0m, "MyAlphaModel", 0.25m); For generating insights with Classic Algorithms, see Upgrading Classic Algorithms. Determining Insight Confidence, Magnitude, and Weight To maximize the compatibility and use of an Alpha Model, it should populate as many fields as possible. As the author, you should put some thought into the abstract, relatively artistic properties of an Insight. Insight Period How long do you expect the signal to last? Can you use any information from the data you're consuming to build a theory on the Insight time frame? Although tricky questions, with some creative thought you can likely estimate this field. High-frequency strategies generate short insights; foundational moves in the economy produce much longer predictions. Insight Magnitude What is the expected return from your Insight? Will this data cause a large change in the asset price within the time frame you are specifying? The Insight magnitude indicates how tradable the signal is for the Fund. The price movement, combined with the asset volume, gives the depth of the signal and an estimate of how much capital can be deployed to your Alpha. Insight Confidence How strong is your signal? Some Portfolio Construction techniques, such as Black Litterman, allow using the confidence of the signal as a factor in the allocation. When applicable, include Confidence in your Alpha Model, so consumers can factor this into their decision. Insight Weight How much emphasis should a fund put on your signal? The weight property is essential in using the Framework models, as it allows funds to allocate capital based on Insight weight using either the Framework models or their own. Submitting an Alpha for Review Once your Alpha is ready to be submitted, you can create a profile for it through your Alpha Streams Dashboard. Here you can manage your Alphas and edit the pricing and description information. For more information on submitted a new Alpha see Submitting an Alpha Did you find this page helpful? Contribute to the documentation:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '11', 'language_id_whole_page_fasttext': "{'en': 0.8596648573875427}", 'metadata': "{'Content-Length': '85806', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3J5KCYMLBHMTWIXMXKND2NUGMFGC52RR', 'WARC-Concurrent-To': '<urn:uuid:64408b54-c06f-4323-97c0-015b5b9f8278>', 'WARC-Date': datetime.datetime(2020, 8, 4, 14, 54, 46), 'WARC-IP-Address': '34.74.174.216', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:VYYFWAY3PWMV6JDSKVAWZYTE4SUUFLGJ', 'WARC-Record-ID': '<urn:uuid:11edce69-26fe-418c-b31b-616a5c32ca78>', 'WARC-Target-URI': 'https://www.quantconnect.com/docs/alpha-streams/creating-an-alpha', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:fd47713a-04b6-45fd-973d-5bc404aacfcf>', 'WARC-Truncated': None}", 'previous_word_count': '1000', 'url': 'https://www.quantconnect.com/docs/alpha-streams/creating-an-alpha', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-189.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.025775551795959473', 'original_id': '7aebcad35812f3837659ab1c79ce621ea10f034dcf99b0c42216ccb4e50fb7af'}
How Do I Write a Lease Purchase Agreement? Written by Jodi Thornton-O'Connell; Reviewed by Jann Seal, Licensed Real Estate Sales Associate. Former California Real Estate Sales Associate.; Updated December 02, 2018 A lease purchase is an option for buying a new home. A lease purchase is an option for buying a new home. new home for sale image by itsallgood from High-priced housing markets such as those in San Francisco and other parts of California can leave buyers at a loss to come up with down payments, closing costs and financing for homes. In San Francisco, for example, the median sales price exceeds $1.6 million. Writing a lease purchase contract with a willing seller can let you move in now and use the next one to three years to get your financial ducks in a row. A lease purchase contract is a legal obligation that can have financial repercussions if defaulted upon. Get a legal opinion before signing. Lease Purchase vs. Lease Option A lease purchase agreement with a seller legally obligates you to buy the property at the end of the lease. The contract usually includes a percentage of rent held in an escrow account until the lease term is up and the buyer closes the sale. It might also include an upfront down payment before the buyer/lessee moves into the home. The buyer is generally responsible for maintaining the property and paying for the property taxes. Rent is usually higher than the market value to allow some of the rent to go into escrow toward the purchase of the home. The borrower has no out at the end of the lease term other than buying the house. If the financial picture prohibits this, the seller can sue the buyer for specific performance, which essentially forces them to buy the home. However, it's usually easier to find another buyer than collect damages from an insolvent one. A lease option is similar in structure except that at the end of the lease term, the lessee isn't obligated to buy the property. All funds paid toward the option to purchase get forfeited should they not carry through with a sale by the end of the rental period. In California, this is the more popular of the two options. Writing an Agreement for Lease Purchase Check with your state's department of real estate to see the forms available to you. Although you can type up your own contract in almost any state, it's essential to have all the legal aspects that could arise covered. In the Golden State, a form titled the California Residential Lease With Option to Purchase spells out how much of the rent goes toward the purchase price, the dollar amount of the option consideration and whether the full purchase price of the property hinges on the present market value at the end of the lease or if the sale will be at a predetermined rate. Other necessary information includes the refundable amount of the security deposit for the lease, the property's legal description, any fees and penalties for late payment of rent and the conditions under which the parties can cancel the contract. Make it clear in the document at what point the lessee must commit to buying the property and how long after the lease is up they have to move out if the option to purchase isn't exercised. About the Author Jodi Thornton-O'Connell Photo Credits • new home for sale image by itsallgood from bibliography-icon icon for annotation tool Cite this Article
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '90', 'language_id_whole_page_fasttext': "{'en': 0.948344588279724}", 'metadata': "{'Content-Length': '78497', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:X2QQESLYKLVPHJRKMAZTXVU4UMAKQTKZ', 'WARC-Concurrent-To': '<urn:uuid:30605d80-9c88-4c2f-99bb-516f4a6a2e6a>', 'WARC-Date': datetime.datetime(2019, 11, 22, 21, 9), 'WARC-IP-Address': '23.67.60.209', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:RPPFU3XPMPHWLXVZAYSHKECMSLGAZT65', 'WARC-Record-ID': '<urn:uuid:89b4db93-0bcd-4532-bb9b-2e8b63a4ca40>', 'WARC-Target-URI': 'https://homeguides.sfgate.com/write-lease-purchase-agreement-2737.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e7c6c91c-2f00-4b54-9699-0216970fc309>', 'WARC-Truncated': None}", 'previous_word_count': '621', 'url': 'https://homeguides.sfgate.com/write-lease-purchase-agreement-2737.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-133.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.021090924739837646', 'original_id': 'c9cee7cd4c77fdfb110fc07860febda3d483316ef4af0b03ada88f79ab8081e8'}
Is KAUST Saudi Enough? By A Saudi princess has attacked the flagship university set up by her own uncle, the king of Saudi Arabia, as a “disaster” because it does not educate enough local students. Basmah bint Saud bin Abdulaziz Al Saud told Times Higher Education that her country needs to embrace mass higher education rather than bringing in Western scholars to educate an “elite” – a model she claims is used by the King Abdullah University for Science and Technology (KAUST), which started teaching in 2009 backed by a $10 billion endowment from the monarch himself. Princess Basmah lives in London and has called before for legal gender equality in the kingdom, where women are banned from driving and must be accompanied in public by a male chaperone. Educated in the UK, Switzerland and Beirut, she is the daughter of King Saud (and reportedly his 115th and last child), the elder brother of the current king, who ruled from 1953 to 1964. At a conference on Gulf education held in London she told Times Higher Education that KAUST was for the “elites of the elites of the elites of the elites – of not even Saudi Arabia.” The graduate institution has set up a generous scholarship program to attract foreign students and has managed to draw in international faculty, reportedly using top salaries and in some cases tailor-made labs. It was set up by the king with the aim of rekindling science and learning in the Arab world, and is free of many of the discriminatory laws against women in effect in the rest of the country. But Princess Basmah asked why the university was not educating more Saudis. “It’s a disaster… you see Japanese and Chinese coming to learn in Saudi Arabia and the Saudi Arabian [students] have no … right to go there,” she said – adding that those Saudi students who did attend were still drawn from a tiny elite. Brian Moran, dean of graduate affairs at KAUST, countered that at the university’s most recent commencement ceremony in December last year, 37 percent of the students were Saudis. Speaking during a debate at the Gulf Education Conference 2014, held last month, Princess Basmah also argued that the region was going “backwards” by attempting to attract more scholars from abroad. Instead, the Gulf should use “the people that we have” and that there were “beautiful minds in our countries that we [do] not recognize.” She claimed that the West had a commitment to an equal education for all citizens that was lacking in the Gulf. “Educate the masses, this is where everybody should start,” she said. But asked by Times Higher Education if her rhetoric about equality meant she believed men and women should be educated on campus together in Saudi Arabia, Princess Basmah said that this segregation was “not an issue at all.” She said she was calling for “equality to learn for both sexes in the same way, the same manner, the same subjects, the same opportunities, that’s what I was talking about – I was not talking about having both sexes together.” She added that universities for women in Saudi Arabia were “much better” than those set aside for men.
mini_pile
{'original_id': '5bd6b4062e90f6e4374347066a34fc85245a82b739d93d271024cc132c3f6884'}
Duplex-Doppler ultrasonography in the evaluation of cirrhotic patients with portal hypertension and in the analysis of their response to drugs. Sixteen patients (15 males, aged 48-70) affected by liver cirrhosis and oesophageal varices were subjected to duplex-Doppler ultrasonographic study (DDUS). Four patients (three with a portal thrombosis and one with a hepatofugal portal flow) were excluded from the subsequent pharmacological test. The twelve remaining patients took part in a double blind cross-over study that evaluated the variations of heart rate (HR), mean systemic arterial pressure (SAP), portal vein diameter (PVD), maximal and mean portal flow velocity (PFV) after the administration of either 40 mg of propranolol or placebo per os, on two consecutive days. Propranolol caused no significant variation in mean SAP and in PVD, whereas it reduced the HR from 67.7 +/- 8.0 to 58.4 +/- 7.0 beats/min (mean +/- s.d.; P less than 0.001); the maxPFV dropped from 18.2 +/- 5.4 to 14.0 +/- 3.7 cm/s (P less than 0.001) and the meanPFV dropped from 15.3 +/- 4.1 to 13.2 +/- 3.1 cm/s (P less than 0.005). No significant variation was observed with placebo. After propranolol administration eight patients exhibited a significant maxPFV decrease, whereas the other four patients exhibited only a drop in HR, suggesting either drug inefficacy, inappropriate dosage or inadequate duration of treatment. DDUS is the only non-invasive method for the examination of the portal vein system.(ABSTRACT TRUNCATED AT 250 WORDS)
mini_pile
{'original_id': 'b9f44c4bccb22b595a17911ce1d9b768d01a62be403606376bacc54e8aeee20f'}
// ----------------------------------------------------------------------- // Verizon Wireless // ----------------------------------------------------------------------- class VZW { // Start Unlimited // 5th line and above $30 per line startUnlimited = [70, 120, 135, 140, 150, 180, 210, 240, 270, 300, 330, 360]; // Play More Unlimited // 5th line and above $40 per line playMoreUnlimited = [ 80, 140, 165, 180, 200, 240, 280, 320, 360, 400, 440, 480, ]; // Do More Unlimited // 5th line and above $40 per line doMoreUnlimited = [80, 140, 165, 180, 200, 240, 280, 320, 360, 400, 440, 480]; // Get More Unlimited // 5th line and above $50 per line getMoreUnlimited = [ 90, 160, 195, 220, 250, 300, 350, 400, 450, 500, 550, 600, ]; // Just Kids // 5th line and above $25 per line justKids = [null, 100, 120, 140, 125, 150, 175, 200, 225, 250, 275, 300]; } export default new VZW();
common_corpus
{'identifier': 'https://github.com/bhuschle/CustomerSavingsCalculator/blob/master/dist/js/views/VZW.js', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'CustomerSavingsCalculator', 'creator': 'bhuschle', 'language': 'JavaScript', 'language_type': 'Code', 'word_count': '147', 'token_count': '341', '__index_level_0__': '967', 'original_id': '4ee38d82c92de27ceaa0b13379226af740bf7d8b8b0a9dbf8eb7762290603265'}
1. Are you a gamer? Come join us at GameNotOver.com Dismiss Notice Coaching 101 by Sean Payton Discussion in 'NFL Zone' started by Paniolo22, Dec 11, 2006. 1. Paniolo22 Paniolo22 Hawaiian Cowboy 3,784 Messages 184 Likes Received He did things the way he wanted. The last 3 years of Parcells handcuffs came out tonight and he did everything right. I thought the D was kept off balance all freakin night. 4th and 1- reverse!?!? Brilliant! Goal line run to Mike freakin Carney!?!?! Brilliant! This was a display of how coaches can win games for you. Then, the coup de gras. Onside kick. Talk about "Nail in the Coffin". Brilliant! Also, who did he pick on in the secondary? Davis, Williams, James. 3rd down conversions? How about 9 of 16. BTW, I think the flat is still open. I think they should hve called Payton the freakin' Jedi, cause he pretty much mind ****ed Parcells and Zimmer pretty hard. :banghead: I hope Parrish is starting next week. 2. jbsg02 jbsg02 Active Member 1,719 Messages 0 Likes Received I too hope Parrish plays next week, there HAS to be a change. you don't give up nearly 400 yards passing without seeing some kind of change. having said that, i doubt parrish changes anything. the real problem is zimmer 3. Undisputed Undisputed Well-Known Member 2,116 Messages 432 Likes Received The onside kick made my jaw drop. It really did. It just completely summed up the night. As if we weren't owned enough on offense and defense, we had to be punched in the mouth on special teams as well. Forget miracle comebacks at that point. He snatched the very opportunity for one away from us. I have to give him credit. But man, I am really pissed. Sure our players stunk it up, but the coaches just didn't put us in a position to win this game either. It was like the Mighty Ducks 2 when they got their ***** beat by Iceland, who had them scouted to perfection. Payton was so ready in this game it wasn't even funny. :bang2: :banghead: :bang2: :banghead: 4. Paniolo22 Paniolo22 Hawaiian Cowboy 3,784 Messages 184 Likes Received :hammer: And the Saints are the first team to actually wipe Romo's smirk off of his face. See here- Something has to be said for that. Teams around the league are applauding. 5. Clove Clove Shrinkage Zone Supporter 47,183 Messages 8,030 Likes Received BP tries to operate his business where he runs everything and even the coordinators. It's his philosophy and you either do it his way or get TFO. So Payton got TFO and now he's doing things his way with a youthful spirit, and it helps to have Bush in the backfield running all over the da*n place. Romo is the laughing stock around the league now, and he has to come out and show this NFL why he isn't a fluke. 6. Paniolo22 Paniolo22 Hawaiian Cowboy 3,784 Messages 184 Likes Received I thought he called a hell of a game and we did the same ol ****. No new wrinkles and Romo looked flustered. GLIDINGJJ New Member 58 Messages 0 Likes Received [ Romo is the laughing stock around the league now, and he has to come out and show this NFL why he isn't a fluke.[/quote] Everyone can have a bad game. Look at Indy yesterday. Teams get on a roll and it just happens. Thank goodness it doesn't happen very much. I'm guessing next week against Atlanta will be a war now. No team likes to be embarrassed, especially on a prime time game. NFL 101 dictates any quarterback can suck when they are under pressure. Not sure where New Orleans got all these pass rushers, but they seemed to be in Romo's face all night long. However, make no mistake about it, the defense was god awful last night. I've never seen them play worse.:bang2: Share This Page
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '83', 'language_id_whole_page_fasttext': "{'en': 0.9680616855621338}", 'metadata': "{'Content-Length': '46025', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BVVKCWHQSER6JZAG5KR24BYYTFO2KVKG', 'WARC-Concurrent-To': '<urn:uuid:1d6d1053-81a0-4735-a729-334f4f36e8ae>', 'WARC-Date': datetime.datetime(2017, 2, 24, 8, 56, 14), 'WARC-IP-Address': '45.33.20.180', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:SN6CFEAUYVWH42PFHLTNBEH67AAWIPVJ', 'WARC-Record-ID': '<urn:uuid:62e7c50e-3212-4a8d-9609-f1ddcde47390>', 'WARC-Target-URI': 'http://cowboyszone.com/threads/coaching-101-by-sean-payton.73855/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:183f9bfe-7bdc-4349-b072-9c9da9cd2ff1>', 'WARC-Truncated': None}", 'previous_word_count': '717', 'url': 'http://cowboyszone.com/threads/coaching-101-by-sean-payton.73855/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-171-10-108.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-09\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for February 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03956568241119385', 'original_id': '873c45d01bc1011ba41f0df74c279b7ccbd17fcdfc73d781a3337464357ce4e7'}
Featured Articles Maternal diet vital to offspring 1 August 2003: Scientists have produced startling evidence of just how profound the effect a mother's diet is on her offspring. Press Photo They were able to change the coat colour of baby mice simply by feeding their mothers four common nutritional supplements before and during pregnancy. The supplements also lowered the offspring's susceptibility to obesity, diabetes and cancer. The researchers gave some pregnant mice dietary supplements containing vitamin B12, folic acid, choline and betaine. They gave birth to babies predominantly with brown coats. But another group of pregnant mice given no supplements gave birth predominantly to mice with yellow coats. Analysis showed the extra nutrients caused the coat colour change by reducing activity of a specific gene called Agouti. The structure of the gene itself was unchanged, but the nutrients triggered a process called DNA methylation which suppressed its activity. The researchers, from Duke University, North Carolina, believe the same process could potentially affect dozens of other genes that make humans and animals susceptible to cancer, obesity, diabetes, and even autism. Huge implications Lead researcher Dr Rob Waterland said: "Our study demonstrates how early environmental factors can alter gene expression without mutating the gene itself. "The implications for humans are huge because methylation is a common event in the human genome, and it is clearly a malleable effect that is subject to subtle changes in utero." The researchers found evidence of DNA methylation in many different types of cell throughout the bodies of the baby mice - indicating that the process was triggered at an early stage of gestation. Professor Randy Jirtle, head of the lab which carried out the research, said: "Our data suggest these changes occur early in embryonic development, before one would even be aware of the pregnancy. "Any environmental condition that impacts these windows in early development can result in developmental changes that are life-long, some of them beneficial and others detrimental." Prof Jirtle said it was possible if the same changes occur in the developing sperm or eggs of the baby mice, then they could be passed down the generations, and potentially become a permanent change in the family line. Fighting viruses DNA methylation is caused by additional groups of atoms attaching themselves to genes. Cells use the mechanism as a way to inactivate DNA fragments from viruses which sometimes lodge themselves in the genetic material. But when the process goes awry the activity of the gene may be suppressed at the same time. Dr Waterland said the fact that maternal diet seems, in some instances, to trigger the process may explain differences between individuals. "It could, for example, explain the differences between genetically identical twins, or the disparities in the incidence of stroke between the South and the North," he said. "The possibilities are endless." Amanda Wynne, of the British Dietetic Association, told BBC News Online that it wasn't possible to draw direct conclusions about humans from studies on animals. But she said: "It is well known that a well-nourished mother is likely to have a better pregnancy outcome than a malnourished mother. "It is important to have a good healthy balanced diet during pregnancy and it may be beneficial to also have a good multi-vitamin and mineral supplement that provides levels of nutrients in line with recommended daily intakes." The research is published in the journal Molecular and Cellular Biology.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '5', 'language_id_whole_page_fasttext': "{'en': 0.9518200159072876}", 'metadata': "{'Content-Length': '8049', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:C3PLX4KAW3BMMLTGQ7RD32WKUBJHQ2BQ', 'WARC-Concurrent-To': '<urn:uuid:5178c807-6234-4d28-9f80-327375afc013>', 'WARC-Date': datetime.datetime(2019, 4, 20, 13, 14, 38), 'WARC-IP-Address': '216.70.93.42', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:HFXRGV6HFI6MJEGQCJDZPXY2V3UWLCBK', 'WARC-Record-ID': '<urn:uuid:00eec9f0-0bfe-4d99-82d7-6d37b5b9b81a>', 'WARC-Target-URI': 'http://geneimprint.com/site/press/12861015-1154826458', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:b12d6ae7-d3e1-4c20-8515-bf70f24f9643>', 'WARC-Truncated': None}", 'previous_word_count': '556', 'url': 'http://geneimprint.com/site/press/12861015-1154826458', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-143-100-67.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0388413667678833', 'original_id': '62eb032bdbdc92a1fe3b39114767d1a8640d10eb65ab44310935372ff0eb4b06'}
World Gestures The Meanings of Gestures Around the World Using the wrong gesture could get you into. Be particularly aware of these gestures: Such as: The "thumbs up" sign - In America the gesture indicates "a-okay." Yet it is considered rude in Australia, Iran and some other Muslim countries. It translates to "up yours." The "OK" sign - Often used in America to mean approval, it is considered vulgar and obscene in Brazil, southern Italy, Germany and Greece. In Japan, this gesture signifies money. In southern France it is used to convey that something is worthless. The pointed index finger - A pointed index finger is used to emphasize a point in American culture. However, it is impolite in the Middle East, Russia and Asia. Rather than pointing with a finger, point with an open palm instead. The victory sign - With the index finger and middle finger raised to form a V, this gesture is a common signal in America. It means victory or peace. Be careful about using it in Britain, however. If the palm is facing toward you, the gesture is considered obscene. Two fingers crossed - Often viewed as a sign of wishing someone good luck in Europe and the United States, it is considered offensive in Paraguay. Shaking your head from side to side - In the U.S., shaking one's head from side to side means "no." In Bulgaria the same gesture means "yes"; moving the head up and down translates to "no"! The hook 'em horns - This gesture is made by raising the index and pinky fingers while curling the other fingers into the palm. It is a common gesture in Texas to cheer on a sports team. In Brazil it is used to wish someone good luck. In Africa, it is considered a curse. The beckoning gesture - This gesture is formed by curling and uncurling the index finger. It is common in most countries and means "come here." However, the gesture is offensive to Mexicans, Filipinos and the Vietnamese. Snapping your fingers - Some might use this gesture to get someone's attention. In France...
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.935208022594452}", 'metadata': "{'Content-Length': '11511', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NL6FLGT4UJX5CAK4J7F26LKCMRAA7GI6', 'WARC-Concurrent-To': '<urn:uuid:ec04ac92-1ce6-472b-b079-e0ef1b2f808f>', 'WARC-Date': datetime.datetime(2019, 4, 22, 8, 54, 1), 'WARC-IP-Address': '99.84.104.28', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:7AQ2EAEVSGPZXJ7TZP2SKK4MVMEIELBE', 'WARC-Record-ID': '<urn:uuid:7a1dd085-2f50-4c2f-a67f-07f159488d6d>', 'WARC-Target-URI': 'https://www.cyberessays.com/Term-Paper-on-World-Gestures/61211/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f3d57532-e5d5-42e5-8341-44361086acd8>', 'WARC-Truncated': None}", 'previous_word_count': '335', 'url': 'https://www.cyberessays.com/Term-Paper-on-World-Gestures/61211/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-45-61-6.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6867388486862183', 'original_id': '892b74cf48d1a86f6826e125ad7e561a6db1370732fe9e6d1a2cd6a2be475183'}
Q: ManifoldCF error when creating ElasticSearch output connector I have ElasticSearch 2.2 running on a linux VM. I'm running ManifoldCF 2.3 on another VM in the same netowrk. Using ManifoldCF's browser UI I added the ElasticSearch output connector and when I save it I get an error in the connector status: Name: Elastic Description: Elastic search Connection type: ElasticSearch Max connections: 10 Server Location (URL): http://<IP_ADDRESS>:9200 Index name: index Index type: sharepoint Use mapper-attachments: false Content field name: contentfield Connection status: ERROR "root_cause":["type":"illegal_argument_exception" Any ideas? A: Looking further in ElasticSearch logs I see the following error: /_status Params: {index=_status} java.lang.IllegalArgumentException: No feature for name [_status] A google search for No feature for name [_status] led to ES documentation that states: The index _status API has been replaced with the Indices Stats and Indices Recovery APIs. It looks like manifoldCF's ES connector is not fully compatible with ES v.2 But, I just tested it the connector still works fine, despite the error. So if you see the same issue, just ignore it until ManufoldCF developers fix it. I filed bug with Apache on this issue: CONNECTORS-1272
mini_pile
{'original_id': 'dfe615f4a382a650d780ee4d4ff6678b5da42cac6b9f86c24a330584452c0470'}
1. Help Cyrano De Bergerac Project Cyrano De Bergerac Project - Page Text Content S: Cyrano de Bergerac Project FC: By: Deion Sampson | Source:http://www.anvil.uk.net/CYRANO/GRAPHICS/cyranohooker.jpg 1: Act 1: In Paris at The Hall of the Hotel de Bourgogne in the year 1640. A Tennis Court modified to work as a Stage. Double doors are closed and Chandeliers are lit to add to the mood and feel of the Play. 2: Act 2: The Bakery Shop of Ragueneau, on the corner of Rue St.-Honore and the Rue de l'Arbre Sec. The center of the shop has a iron ring that hands from a rope over a pulley. Ovens are on Baking things. Hams and various other meats are hung from rafters, as well as various pastries are staked in pyramids. 3: Act 3: A square in old Marais, surrounded by old houses and narrow streets. Roxane's house is near, jasmine embraces the balcony. There is a bench on the front porch, which is accompanied by stonework that is easily climbable to reach the balcony. 4: Act 4: The Post of Carbon De Castel-Jaloux located at The Siege of Arras. Located near the country, because houses of Arras are located within the sky-line. A platun is there as well, due to the fact that; tents,scattered weapons,drums, and campfires are located nearby. The Cadets are asleep, watched over by Carbon De Casterl-Jaloux and Le Bret, Christian is among the Cadets. 5: Act 5: The year is now 1655, the location is still in Paris, it is in late October. The Park Of The Convent is occupied by the Ladies of the Cross. A house in near, a large tree is in a small space and adjacent these things among Bushes is a semi-circle stone bench. Along the background stands a Chapel. The color of foliage are a mix of red, yellow and brown, there are a heap of these multicolored leaves under every tree. Nuns are coming and going across this park, several are seated on the bench around Mother Marguerite De Jesus. The leaves are falling. 6: Cyrano De Bergerac- He is a poor, humble, man, but he is very courageous and witty. He is in love with is cousin Roxane but feels that she doesnt love him due to his extremely large nose. He is a good fencer (he is like a musketeer). He is the owner of the "Theater" at which they are performing. He is also Christian's friend. 7: Christian de Neuvillette- Confident and Prideful of his good looks and charm, this causes him to tend to be more shallow then Cyrano. . He is legitimatly in love with Roxane but lacks the ability to express himself, unlike Cyrano with his poetry and letters. 8: Roxane (Madeleine Robin)- She is an attractive women, almost all men in this play want her love direct or indirectly. She is Cyrano's cousin. She is at first in love with Christian's looks, but come to find out she truly loves his supposed "wit", which further on turns out to be Cyrano's. So therefore at the end of the play she decides that it is Cyrano that she truly loves for his inner beauty and nothing more. 9: Comte De Guiche- He is somewhat like Cyrano's evil twin. He has the same wit but uses it for flattery and social climbing. He is bitter because Cyrano is like him and he wishes him dead because of it. This changes, because towards the end of the play he is influenced by Cyrano's kindness and comes up with a plan to help get Roxane away from the battle. 10: Act 1 Summary- A group of people has come to see the play La Clorise, but ultimately they have heard that an actor named Montfleury has showed up even after being banned by the theater owner Cyrano De Bergerac. A young nobleman arrives by the name of Christian and looks for a girl he has been seeing at the play recently, his friend Lingniere says her name is Roxane and that she is already promised to another man that is the Vicomte De Valvert. Montfleury tries to take the stage, he even ask for help to make Cyrano be quiet but it does not do any good. Finally Comte De Guiche tells Valvert he needs to just challenge Cryano to a duel to which Cyrano accepts. After the duel Roxane's Duenna tells Cyrano that Roxane wants to talk to him, he says he will and meets her at Ragueneau's Bakery the next day.Ligniere rushes in. He tells Cyrano about the hundred men waiting at the Porte de Nesle to kill him and announces that he is too afraid to go home. Cyrano says that he will fight all hundred men and escort Ligniere safely home. Cyrano shows man different sides of himself throughout Act 1 including his wittiness, humor, humbleness and many other things. 11: Act 2 Summary- Cyrano appears at Ragueneau's Bakery and tells him he is meeting someone there. Cyrano is nervous and jumpy, he is constantly asking for the time and cannot sit still. Cyrano tries to write something poetic to Roxane after hearing other poets describing Raguenueau's pastries so easily. When Roxane arrives, Cyrano is overcome with love. He gives Roxane's duenna pastries to distract her while he and Roxane spend time together alone. Cyrano quickly asks Roxane to say why she has come to talk to him. She simply ignores him, and they talk about the childhood summers they spent together. She tends to his wounded hand, and Cyrano tells her he was hurt in a fight the night before when he defeated a hundred men. Roxane finally admits to Cyrano that she is in love with Christian.Roxane asks Cyrano to protect him, and Cyrano agrees. She also asks Cyrano to have Christian write to her. After that she confesses friendly love and admiration for Cyrano, and leaves. Christian instantly makes a mockery of Cyrano's nose.Rather than killing Christian, Cyrano embraces him and reveals that he is Roxane’s cousin. Christian admits that he cannot write to Roxane because he is too stupid.Cyrano offers to write letters for Christian because he wants the opportunity to express his feelings to Roxane. 12: Act 3 Summary- Cyrano tries to help Christian prepare for his meeting with Roxane. He tries to get Christian to memorize lines that Cyrano has written,but Christian refuses. Christian says he wants to speak to Roxane in his own words, and Cyrano says that he can speak for himself. After a failed attempt of tell Roxane how he truely felt he loved her. Cyrano hides underneath Roxane’s balcony while Christian stands in front of it. He throws gravel at Roxane’s window, and when she comes out, Cyrano whispers words for Christian to say.Roxane is moved by Christian’s words, Cyrano to save time and confusion replaces Christian and begins to tell Roxane the things he has always longed to tell her. Christian says that afterwards he wants one kiss. Then, Cyrano and Christian switch places again, and Christian climbs up to receive the kiss. 13: Act 4 Summary- Located at the siege of Arras, the Cadets of Carbon de Castel-Jaloux languish, are surrounded by Spaniards and lack food and water. Le Bret keeps watch over the Cadets with Carbon early one morning when they hear distent gunfire and Cyrano runs in. The cadets wake up and start complaining about their hunger. There is talk of a mutiny, and Carbon asks Cyrano for his help. Cyrano comes out and talks to the cadets, he restores morale with a clever speech and passionate commitment to the cause. Christian tells Cyrano he wishes he could say farewell to Roxane, and Cyrano shows him the farewell letter he has just written. Christian notices that a mark of a tear on the letter, and nearly guesses Cyrano’s secret. Cyrano tells Christian that he has written Roxane more often than Christian thought,in fact, every day. Christian again suspects Cyrano’s secret, but Roxane interrupts him before he can say anything. 14: Act 5 Summary- This act takes place fifteen years in the future in Paris. Cyrano has become old and poor. Christian are still one of the most powerful men and is still magnificent. In the act Christian and La Bret find out that Cyrano has made quite a few enemies that are looking to possibly have him killed. They were right because some lackeys push a log on to his head and causes a gash and possibly a concussion. It looks as if he is going to die when he reads this love letter for Roxane and she realizes that it was him who said those things when he was under the deck. Then soon after he passes away. 15: Quote 1- "Your true self has prevailed over your outer appearance. I now love you for your soul alone." Roxane’s changing sentiments have affected Christian and Cyrano’s plan. Just before Christian is about to go off to battle, Roxane tells him that he loves him for his “soul alone” and no longer for his “outer appearance.” This seemingly positive romantic development troubles and depresses Christian since he essentially borrowed his “soul” from Cyrano. Without his good looks, he essentially has nothing to offer Roxane. The moment is ironic since what Roxane believes to be her statement of true, lasting love for Christian is based upon a trait that Christian does not have. This is important in real life because it goes to show that being "fake" will come back to bite you, you can alone act like something your not for so long. It is better to just be yourself and if they do not like you for who you are then it is just not meant to be. 16: Quote 2- "Your nose is . . . very big" Valvert, one of de Guiche’s men, makes fun at the size of Cyrano’s nose which is a big mistake. Cyrano makes fun of Valvert’s lack of creativity and eloquence, and he continues to start making fun of his own nose. This quote demonstrates several of Cyrano’s important qualities: eloquence, sense of humor, creativity, resourcefulness, courage, and confidence, as well as his showmanship and bravado. Suddenly he remembers the promise he made to Roxane to keep Christian safe, so he somewhat plays it off instead of being violent. This is important in life because sometimes you want to defend yourself by cannot because you fear what might happen to your friend. 17: Quote 3- "His face shines with wit and intelligence. He's proud, noble, young, fearless, handsome. . . ." Roxane speaks to Cyrano about a man she loves, well who she thinks loves her.When she is revealing his identity, Cyrano thinks that she might be referring to him—after all, each piece of information fits him. When she says that this man is “handsome,” however, Cyrano becomes certain that she is not talking about him, and that she must be talking about someone else. Cyrano reacts by cringing in pain. To cover up for his heartbreak, he quickly invents an excuse for his noticeable pain: his hand wound which she is tending to.This quote also highlights Cyrano’s weakening self-confidence and self-esteem. He always believes that Roxane will never love him. With this idea firmly planted in his head, he agrees to help Christian win her love. This is important in real life because if you never ask or go for something that you truly love you will never know if it will accept you or love you back. 18: Quote 4- "I need eloquence, and I have none!" Cyrano and Christian are talking about winning Roxane’s love. Cyrano is the first of the two to realize that they can combine their abilities, Cyrano’s wit and poetry, and Christian’s good looks and charm. Together they believe they can woo her. Essentially, they would become one person, as Cyrano states, a “romantic hero.” In a sense, both Christian and Cyrano represent stereotypes. Christian is unpoetic yet is very handsome, while Cyrano perfectly fills the role of the intelligent but, is physically unattractive. This is important in real life because it goes to show that sometimes you do not have all the characteristic that someone wants. You can never be 100% of what someone wants in a person, so you can only give what you have and they have to be happy with that. 19: Quote 5- ". . . . How can you read now? It’s dark. And for fourteen years you played the part of an old friend who came to be amusing!" Roxane begins to realize that Cyrano is the one that wrote all the letters and spoke outside her window on Christian’s behalf. As Cyrano begins to read Christian’s last letter out loud, Roxane is amazed at his ability to recite the letter from memory. Seeing tears roll down his face, she is convinced that the tears on the letter were his all along. Cyrano’s declaration about the blood on the letter is symbolic because his tears and Christian’s blood have combined on the letter. Together they represent the combination of a man. This man was the “romantic hero”—that Roxane truly loved. When Roxane accuses him of writing and speaking on Christian’s behalf, Cyrano firmly denies it. Roxane refuses to believe him and says that she has loved only one man, and has now lost him twice. This is important in real life because this goes to show you that you could let one simple thing govern all your decisions. In this case Cyrano was so affected by his large nose that he would not even talk to the love of his life. It was ovious that they were meant to be but he let a simple physical appearance influence his decisions. 20: Quote 6- "What if she turns out to be a prude - or an intellectual? I wouldn't dare speak to her, I don't have the brains. The way people speak and write nowadays makes my head hurt. I'm just an honest, simple, terrified soldier." Act 1, pg. 20 This is from Act 1 whenever Christian spots the women of his dreams named Roxane. Ironically he says that if she is an intellectual that he would not even dare speak to her, but by the end of the play he has tried every poetic trick you could think of in an attempt to win her love. This also shows that his true motives are not for anything long term, because it seems to me that he is going to try to win her over by bragging about being a solider. This is important in real life because it goes to show have even back in the 1600's guys were just as shallow as they are now, they think that good looks and being a young soldier will instantly get you a girlfriend. When they need to actually get to know the girl first, because as I mentioned by the end of this play Christian was doing almost everything he could to please her, no matter what it may be. Because he got to know her, and it turned out he liked her for both her looks and intellect. 21: Quote 7- "Does it seem strange: a hundred cutthroats against one poor poet? It is not strange. It is a minimal defense, mademoiselle- (Drawing his sword; quietly.) -when that poet is a friend of Cyrano de Bergerac." Act 1, pg. 47 Apparently bullying was still a popular thing back in the 1600's. This comes from Act 1 whenever Cyrano's friend is threated to be killed by 100 men. It is funny and somewhat ironic how confident Cyrano is to take on all 100 men to protect his drunk of a friend. This is ironic because Cyrano is constantly downing himself and lacks self-confidence because of the fact that his nose is so large. But whenever it comes to defending his friends, or his love Roxane he is quick to want to fight 100 men. This is important in real life because some people are actually just like Cyrano. They have almost no self confidence, but if a friend is put in jeopard they are quick to rush to their assistance. 22: Quote 8- "Cyrano: I had no worthy opponent. Lise: Lying through you teeth again, as usual! Cyrano: Better than lying through my nose. Now that would be a gargantuan falsehood!" Act 2, pg. 52 This is both funny and ironic because Cyrano is not only admitting to lying but he is also making fun of his own nose. This is important in real life because sometimes you have to make fun of your imperfections, because sometimes if you do not laugh at yourself a little you can get really down on yourself. Because, if you do not have any self confidence then usually you do not do anything out of your small comfort zone, which can really affect your major important decisions. 23: Quote 9- "I would die at the stake rather than change a semi-colon!" Act 2, pg. 67 This is from Act two whenever Cyrano is speaking. This goes to show you that Cyrano is very passionate about his poetry and other thoughts. This is important in real life because if you do not express your true self, and you let people's opinion of you control how you act then you are not truly being yourself. That is why Cyrano is saying that he would basically rather be killed then change a simple semi-colon of what he has written. Because, he believes in what he has written and said and refuses to take it back no matter what. 24: Quote 10- “I may climb perhaps to no great heights, but I will climb alone.” This is Cyrano speaking, and this quote is very significant to the play I think. This quote applies in many different ways to Cyrano during the play. His attitude toward life in general is kind of this way. It is basically he is going to do it his way or no way. He may not do it the best or even right at all but he will do it his way. This is important in real life because if you constantly do something that other people are doing not you are giving into peer pressure. On top of that you are also not being yourself, everyone is there own person, and if you never individualize yourself then you are basically the same as everyone else. 25: Rhinoplasty Information Page- The cost for Rhinoplasty Surgery is approximately $2,500 dollars. Before we being this intense surgery we must prep you for it. We must ensure that we do everything we can to get you looking you best the fastest and easiest way possible. You may experience a tingling itchy sensation, or a sore throbbing around the nasal area for about a week or so. Some people have report rare cases of numbness also occurring. After the surgery is complete your nose will look completely different and back to "normal". We want to ensure that you have no fears about this surgery and that any new people you encounter even notice it, it will be as if it never happened. 26: Memorial Speech- Cyrano de Bergarac was a multi-talented man. He was an amazing poet, musician,and friend above all else. He was the best when it came to swordsmanship, it was as if he was born with it in his hands. His nose may have set him apart from the crowd, but I feel that it made him unique,maybe even special. His individuality and hard headed-ness defiantly made him out as a either you liked him or hated him kind of fellow. He had one true love and her name was Roxane, he would have went around the world and back for this girl. He was a poor man, but his humbleness and constant humor helped him to be seen as someone rich and prosperous. He may not have had a lot of money, but he had a lot of heart. He lived each day like his last, but because of his nose he did have a hard time truly doing anything he loved. He never judged himself on his inner beauty, his "soul". Roxane did not even realize what was ovious, which was that Cyrano truly loved her, and her alone. He went as far as to help Christian to hook up with her, how badly would you feel if a girl you liked asked you to protect her crush. This man went through a lot, and he still tried to put on a smile. That is what I think is most important, no matter what always make the most of what you have, and that is what my friend Cyrano did. 27: Tombstone Epitaph- | "Perhaps the most important things we can undertake towards the reduction of fear is make it easier for people to accept themselves to like themselves." -Bonaro Overstreet 28: Half Page Lover Letter from Roxane to Cyrano- Dear Cyrano, It came as a big surprise to me to find out that you were in love with me. I never expected you, my own cousin to ever fall in love with me. I always admired your amazing poetic skills and your wit. It is what I have been searching for in a man. You may not have the best looks, but you had what mattered most a beautiful inner "soul". That night on the balcony was so romantic and poetically beautiful. It was as if angels were singing sweet words into my ears. When I finally discovered the truth I was both sadened and happy at the same time. Because, now you lay here on your death bed and I can do nothing to help you. I loved a man, it turned out to be the same man, and now I have lost him twice. R.I.P. Your true love, Roxane 29: Half Page Lover Letter from Roxane to Christian- Dear Christian, I always found you very physically attractive. You were always very witty; intelligent, proud, noble, young, and fearless. You were everything I though i could every want. But everytime I am alone with you it seems like all you can say are the simple words, "I Love You". I Love You as well but, it seems to me that there is more ways to describe our love then this. It would seem as if you are getting help to come up with your amazingly well spoken poetry. I do believe it is truly you that thinks of these amazing things to say to me, but I need to be sure it is really you. Let us meet and talk soon. With all my love and more, Roxane Sizes: mini|medium|large|jumbo Deion Sampson • By: Deion S. • Joined: over 7 years ago • Published Mixbooks: 0 • Michael Burke • By: Michael B. • Contributions: 0 photos , 0 pages About This Mixbook • Title: Cyrano De Bergerac Project • Tags: None • Started: over 7 years ago • Updated: over 7 years ago
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '115', 'language_id_whole_page_fasttext': "{'en': 0.9819050431251526}", 'metadata': "{'Content-Length': '172492', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:CGTNHZJQDBQ7BDINEDK6R23LW3W4CN3Y', 'WARC-Concurrent-To': '<urn:uuid:78103c8c-8d9d-4efd-ba50-5f6d5c48f5e8>', 'WARC-Date': datetime.datetime(2019, 4, 24, 7, 8, 49), 'WARC-IP-Address': '204.2.50.124', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:526HNHNHWVCCQ3K5MEC7Q6HWC6K6RXAI', 'WARC-Record-ID': '<urn:uuid:3787c808-05fb-4019-a4c1-134449ad8698>', 'WARC-Target-URI': 'https://www.mixbook.com/photo-books/interests/cyrano-de-bergerac-project-6895443?vk=NxcnBu1l4l', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:49f441ae-c169-464d-b52c-53d88ba0cabe>', 'WARC-Truncated': None}", 'previous_word_count': '3854', 'url': 'https://www.mixbook.com/photo-books/interests/cyrano-de-bergerac-project-6895443?vk=NxcnBu1l4l', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-34-30.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.027230024337768555', 'original_id': '84b8af83f049f9747f030216d12f687c1704d36b8c77f140da8234e32eac3ac9'}
Heading Logo Civil war rages on in Syria amidst presidential election By DIAA HADID andALBERT AJI Associated Press Published: June 4, 2014 4:00 AM • 1 of 15 Photos | View More Photos Fears that the rebels would rain down mortar shells on government-controlled territory did not materialize, but fighting persisted. State-run media reported that voting closed on midnight Tuesday, and election officials began the process of checking the number of votes against lists of registered voters to ensure numbers matched. In one central Damascus voting booth, 2,196 people cast their ballots -- all but two were for Assad, counted an AP reporter who watched representatives of each presidential candidate tally votes. [Article continues below] The announcement was accompanied by wild beeping and cheering on central Damascus by Assad supporters. It was not immediately clear when election results would be announced. Earlier in Damascus, the dull sounds of explosions reverberated in the distance as government forces and rebels battled in nearby rural towns and plumes of gray smoke marked the skyline. Several mortar rounds reportedly hit in the capital, including one that fell near the Opera House on a major plaza. At least three fighter jets roared low over the city, which residents said was unusual. Government warplanes and helicopters pounded the rebellious Damascus suburb of Daraya, the southern city of Daraa and the nearby town of Nawa, as well as opposition-held districts of the divided northern city of Aleppo. Voting took place only in government-controlled areas, excluding much of northern and eastern Syria. Tens of thousands of Syrians abroad voted last week, although many of the more than 2.7 million Syrian refugees across the region either abstained or were excluded by law. There were ostentatious shows of support for the 48-year-old Assad, who has ruled Syria since 2000, when he took over after the death of his father, Hafez. There was a carnival-like atmosphere, with voters singing, banging drums and dancing with Syrian flags. Chants of "God, Syria and Bashar!" were heard. [Article continues below] At a polling station in the upscale Dama Rose hotel in central Damascus, a blue cup filled with pins was set out for those who wanted to vote in blood. Some pricked their fingers repeatedly to draw enough blood to mark the circle under Assad's name on the ballot -- an act of allegiance and patriotism that has been used in previous elections under both Assads. Most voted in ink, though, and some made their choice for Assad in full sight of other voters and TV cameras instead of using a curtained booth for privacy. They said re-electing Assad would give him more legitimacy to find a solution to the devastating conflict that opposition activists say has killed more than 160,000 of their countrymen, about a third of them civilians. Most Syrians said they believed some sort of reconciliation had to take place alongside the military crackdown, which they saw as inevitable. "Dialogue can't be a solution when somebody is waving a gun in your face," said Zeina Habal after she voted in Damascus. "You speak to the people who have wisdom to understand, and you defend yourself at the same time." The government has portrayed the election as the solution to the conflict, but there is no indication it will halt the violence or mend a bitterly divided nation. "Assad's victory will not legitimize the regime, but will cement its resilience," said Ayham Kamel, an analyst with the Eurasia group in London. He said the election will also reinforce the military's recent gains and further undermine the ability of radical or moderate rebels to replace the government. "The Western countries are claiming that they are practicing democracy, so we came here to vote to show and teach them how democracy could be," said George Saadeh, a resident of the overwhelmingly Christian district of Bab Touma. Despite the civil war, Assad has retained support among a significant section of the population, including religious minorities who fear for their future. The Interior Ministry said there were 15.8 million eligible voters, both inside and outside Syria, and that 9,600 voting centers were set up around the country. The committee had extended voting earlier in the day by five hours because of what it called "high turnout at the ballot box." Assad voted in the morning at a school in his posh Damascus neighborhood of al-Malki with his wife, Asma. Both were shown on Syrian TV signing their names in a registration book after inserting their ballots in a transparent box. Crowds around him burst into applause. It was Syria's first multicandidate presidential election in more than 40 years. Assad faced two government-approved challengers, Maher Hajjar and Hassan al-Nouri, both of whom were little known in the country before declaring their candidacy in April. Foreign Minister Walid al-Moallem voted with a Syrian flag wrapped like a shawl in his first public appearance since undergoing heart surgery in March, saying: "The path toward a political solution to the crisis begins today." A few polling stations operated in the capital's destroyed Old City, which was recently evacuated by hundreds of rebels after a cease-fire agreement with government forces. One station was set up in the courtyard of the heavily damaged St. Mary's Church of the Holy Belt. "With the leadership of Bashar, my country will return to safety," said student Uday Jurusni, who voted in blood. "He is my leader and I love him." In rebel-held territory, some residents openly derided the election. In the northern town of Jisr al-Shughour, a group of people including armed rebels expressed their hatred for Assad by dropping their shoes in a "ballot box" made of cardboard. "We will vote for him with our shoes," one man said to the cries of "Allahu akbar," or "God is great." In opposition-controlled eastern Aleppo, residents voted to strip Assad "the killer" of his Syrian citizenship. Activists inside Syria referred to the voting as "blood elections" for the horrific toll the country has suffered. Ahmad Ramadan, a senior member of the Western-backed Syrian National Coalition, described the election as "an act of deception," while the opposition's Western and regional allies, including the U.S., Britain, France, Saudi Arabia and Turkey, have called it a sham. U.S. State Department deputy spokeswoman Marie Harf said the election was a "disgrace" and "staged," adding that Assad has denied people the right to vote. A London-based Syrian opposition figure, Muhieddine Lathkani, called the vote a "black comedy." "This election has no value and no one will recognize it, no matter what North Korea and Iran think about it," he said, referring to some of Syria's allies. At the U.N., Russian Ambassador Vitaly Churkin criticized Western countries that believe the election ruled out any progress on the political front. Associated Press writers Bassem Mroue, Zeina Karam and Ryan Lucas contributed to this report from Beirut. Rate this article
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '129', 'language_id_whole_page_fasttext': "{'en': 0.977749764919281}", 'metadata': "{'Content-Length': '44357', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IEIAN55DPPUDBWKTEDROE7UAKEIZY5EL', 'WARC-Concurrent-To': '<urn:uuid:86405b0f-8e33-4708-9586-4dba6c140455>', 'WARC-Date': datetime.datetime(2016, 7, 30, 7, 31, 50), 'WARC-IP-Address': '23.23.125.205', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:5IB42UI25AAOYUZZFLBNT42TBLORQEY4', 'WARC-Record-ID': '<urn:uuid:fa61a70e-56e3-4dfc-af49-f187b8443775>', 'WARC-Target-URI': 'http://www.recordpub.com/latest%20headlines/2014/06/04/civil-war-rages-on-in-syria-amidst-presidential-election', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0afbf71f-602c-4280-bf99-6eefc3ff5129>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1255', 'url': 'http://www.recordpub.com/latest%20headlines/2014/06/04/civil-war-rages-on-in-syria-amidst-presidential-election', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-27-174.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-30\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for July 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0498775839805603', 'original_id': '6bd0eba4199c51fcf27c37040712d7c5b4dbf2ed12868148c3931a18cc7e632a'}
How to center a spinner with cell content view after removing a cell accessory? I have a tableview in my storyboard where the prototype cell has a disclosure indicator by default. When I populate my table I want to remove the indicator only from the last cell AND center a spinner on it. I'm doing it like this: func tableView(_ tableView: UITableView, cellForRowAt indexPath: IndexPath) -> UITableViewCell { let cell = tableView.dequeueReusableCell(withIdentifier: "CharacterCell", for: indexPath) as! CharacterCell if indexPath.row == charactersViewModel.charactersCount - 1 { cell.accessoryType = .none cell.accessoryView = .none // Spinner let spinner = UIActivityIndicatorView(style: .large) spinner.color = .white spinner.center = cell.contentView.center cell.contentView.addSubview(spinner) spinner.startAnimating() } return cell } The problem is that the spinner is offcenter, a little bit to the left, just like if the accessory is still there, but hidden. I feel maybe I'm missing the lifecycle of a table cell, maybe it's getting the center value of the content view when the accessory is still there, so when it's removed it is offcenter? I tried on willDisplay as well but the same thing happens. Any tips on this? You should never add sub views in cellForRow as it will cause problems when cells are reused. I think a better approach would be to use a different cell subclass for the last row, one that already has the spinner and doesn't have the disclosure accessory. @Paulw11 ok, I didn't know about that. I'll look into it. Ty friend! As @Paulw11 mentioned, I used a second subclass and created another cell prototype in my tableview. Then when the last position at the table is reached, we can use the second prototype on cellForRowAt. Here how it is: func tableView(_ tableView: UITableView, cellForRowAt indexPath: IndexPath) -> UITableViewCell { if indexPath.row >= charactersViewModel.charactersCount - 1 { reloadRows(indexPath: indexPath) let cell = tableView.dequeueReusableCell(withIdentifier: "LoadingCharacterCell", for: indexPath) as! LoadingCharacterCell cell.startSpinner() return cell } else { let cell = tableView.dequeueReusableCell(withIdentifier: "CharacterCell", for: indexPath) as! CharacterCell cell.configureCell(charactersViewModel: charactersViewModel, cell: cell, index: indexPath.row) return cell } } private func reloadRows(indexPath: IndexPath) { var indexPathList = [IndexPath]() indexPathList.append(indexPath) charactersTableView.reloadRows(at: indexPathList, with: .automatic) } And with the reloadRows function, the last cell is updated and removed when the table receives more data.
common_corpus
{'identifier': 'https://stackoverflow.com/questions/65587242', 'collection': 'StackExchange', 'open_type': 'Open Web', 'license': 'CC-By-SA', 'date': '2021.0', 'title': 'Stack Exchange', 'creator': 'Paulw11, Rodrigo SA, https://stackoverflow.com/users/10992996, https://stackoverflow.com/users/3418066', 'language': 'English', 'language_type': 'Spoken', 'word_count': '365', 'token_count': '740', '__index_level_0__': '6778', 'original_id': 'b8ca17ac9831e7b24523d8c8890e7e09bae39f3ba0c65dd26f0bbb869a4cd892'}
IBM's new X6 Server: A look at maintenance Summary:Sure there's a lot to crow about when you consider IBM's new X6 Server lineup. But hardly anyone's talking about my favorite part of this hardware: ease of maintenance. Here's what you'll want to know about the X6 systems. I could write 5,000, or more, words on IBM's new X6 systems and how fast and agile they are. How they're perfect for high density virtualization applications. How companies are deploying them for cloud applications and high-end analytics for IoT, OLTP, and a gaggle of other acronymic* devices. How IBM's new architecture brings affordable, highly-scalable, rock-solid computing to a data center near you. But, you can get that anywhere and everywhere. All those things are certainly true. You don't read my posts for the normal, everyday, fluffy, or mentally stable information that a hundred other analysts give you. You read me because you know that I approach technology from an "in the trenches" perspective that's unvarnished, untarnished, and honest. I'm not saying that anyone else is dishonest or anything but you can get cake and ice cream from anyone. You come to me for the recipe—or at the very least, the secret ingredient. I like to give you what you can't get anywhere else at any price. However, I hate for my posts to read like the opening lines of one of those hyper infomercial things that you see on TV but there's just no other way to do it, so here goes. Have you ever gone to the data center to find that not only is the server you need to work on near the bottom of the rack but the maintenance requires you to practically disassemble the whole system? Yeah? Well, it's happened to me more than once and I hate it. How many times have you cut your hands working on servers in those cramped cases or battled clips that won't pop loose with standard amounts of force? Perhaps halfway into your maintenance activity you find that you really need three tiny hands instead of just two normal ones. I've done all that and I've done it more times than I care to remember. The problem that I've complained about for years is that manufacturers build cases and components that were obviously not designed to be worked on while still racked. Sure, they're a dream to work on if you have a nice clear table nearby. Heck, sometimes, I'd rather work on the floor. But you don't typically remove the server from its rack to work on it, do you? Here's a typical scenario: I walk into the data center, locate my target system, assess it hardwarewise from the front and the rear, and then begin my attack. Of course, the system is always near the bottom of a packed rack—that's a given. Then I remove all of the cables and connections from the system's backside. I check out the case removal strategy while I'm back there. Naturally, it's in the front, so I go around. I loosen the front screw connectors of the racked server so that I can slide it out a bit to reach the clever method of top removal. Many systems require that you grab pressure-sensitive clips or mash down then push back or a combination of awkward movements that are difficulty enhanced by the yoga-esque position you have to contort your body into to make that movement a foot-and-a-half off the floor, while cold air blows up your shirt. Finally, the top comes loose. I push back all the way on the large metal top until the restraints clear the slider holes, which makes me have to pull the system farther out before I can remove the top. The top is now liberated from the case. I'm panting with frustration, while mumbling almost unintelligibly that there are easier ways to make a living. I set the top aside and reassess my position by pulling the system about halfway out of the rack slot. I find that the component that I need to add/replace/remove is only accessible from the rear of the system. I joyfully walk to the rear of the unit. Wait, it's dark back here. I need a flashlight. I grab a flashlight and pull the system backwards until it hits a hard stop. OK, I realize that I can't pull it back beyond its normal resting place. Awesome. I begin to unscrew, unlatch, and free each cowl, slot placeholder, and component that stands between me and hardware victory. With my quarry in sight, I gingerly remove it, replace it, or add it to the now half-disassembled system before me. Once my actual task is complete, I begin my journey of restoration. All the while I'm thinking, "Gee, I hope I reseated that riser card and reattached that connector correctly." I continue my rebuild process until I'm now ready to push the system out the front and replace its top. "Why", you ask innocently, "Would you replace the top if you're not sure if everything's back in place correctly"?  Because some manufacturer's cases require them to be on and in place solidly before the system can be powered on. And, before you ask, no, I haven't taken the time to locate the little pressure doors or switches that I need to depress in order to "fake out" the system into thinking that its case is actually in place. I replace the top, move to the rear of the system again, plug in all the cables—hopefully back into their correct locations, secure the server into the rack, cross my fingers, and press the power button. I always close my eyes for that last part. I then find its console (KVM), if one exists, and watch the POST to be sure everything's OK. If it is, I know I've successfully conquered the data center gremlins and all is well. If not, I happily** return to a bit of troubleshooting—depending on where I see a failure in POST—and breathe life back into that rack-mounted beast. "All of this could have been prevented with some good design", I tell myself. Enter IBM's X6 systems. All modular—easy to access components from both the front and the rear of the system. Here's a video that demonstrates it better than I can describe it to you. The part I'm talking about begins approximately 2:05 minutes in. Modular. Ease of maintenance. No hand cuts. No soul-condemming rants.  No push. No pull. Finally a server that would be pleasant to work on physically. I can live with that. The IBM X6 family of servers can do a lot for you and your company. My favorite thing that it does for me is maintain my healthy blood pressure***. *Acronymic. Probably not a real word but you understood it didn't you? **Happily is relative and usually preceeded by a rash of expletives, a list of "where did I go wrong in life" questions, and several deep breaths. ***Which, by the way, is 120/62 when not working on servers. Related Stories: Topics: IBM, Hardware zdnet_core.socialButton.googleLabel Contact Disclosure Related Stories The best of ZDNet, delivered Subscription failed.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '51', 'language_id_whole_page_fasttext': "{'en': 0.947329878807068}", 'metadata': "{'Content-Length': '84330', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:NOUW5JHR6PH54HGNAAC7GZB34CL2C2HN', 'WARC-Concurrent-To': '<urn:uuid:65d7b43b-7821-4b61-8aaa-b2e06530ee0a>', 'WARC-Date': datetime.datetime(2015, 1, 25, 4, 17, 59), 'WARC-IP-Address': '23.15.9.145', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:SO2R7AWI56WGCD55ASZK6RHYTFTHJJOR', 'WARC-Record-ID': '<urn:uuid:3a57bca5-153b-4d21-80a6-c333b56ea7ce>', 'WARC-Target-URI': 'http://www.zdnet.com/article/ibms-new-x6-server-a-look-at-maintenance/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:58431410-ead1-4c1d-82f7-8a919bcdfdbd>', 'WARC-Truncated': None}", 'previous_word_count': '1247', 'url': 'http://www.zdnet.com/article/ibms-new-x6-server-a-look-at-maintenance/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-180-212-252.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-06\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for January 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.04487812519073486', 'original_id': 'ada85e5ff85829b05333a81d8db7ddbeeea7a5604330c0e94ebadd834f42147a'}
My baby is just hot in the head, is this a fever? my baby is just hot in the head, is this a fever - Fever is one of the diseases of children's subscription that often makes the Mother to panic.  how ya if baby fever in the head? Can it be called a fever ? How to handle it? The head of the baby turned out to tend to be warmer. According to dr. Yusi Caprianti as reported from the journal  heat in the head, the head on the baby feels warmer because the scalp baby thin, The number of vessels in the head area makes the baby's head is warmer than his body. So, you should check the temperature of the baby tubu using the right measuring tool rather than just feel the heat just hot in the head only, according to the American Academy of Pediatrics, babies can be said to have a fever when viewed from the temperature menguhnya. Normally, the baby's body temperature ranges from 26 degrees Celsius to 28 degrees Celsius. Moreover, babies are practically experiencing a fever  Measuring the most appropriate fever is to use a thermometer that is clamped in the armpit or inserted into the rectum. You need to know that fever is a symptom of infection that occurs in children. Infection can occur in any part of the body. So to overcome it, Mom needs to give her enough rest time. Giving him a comfortable place will help your little one sleep enough. Giving her fluid intake is also important to help her fight the infection. Avoid clothing that is too thick because the heat will make their body temperature to rise, does your baby need a fever? If the child has a fever but does not show any signs of excessive illness it's good that she just let him to rest. Mom needs to give her medicine if the body temperature is more than 38 degrees Celsius. Provision of febrifuge drugs at infant age should also be according to the doctor's recommendation. Provide a febrifuge if the child feels uncomfortable, lethargic and can not receive fluids such as breast milk or other foods. A fever that lasts continuously for several days also marks the mother should immediately take her to the doctor.Babies who need further treatment usually cause signs of pain other than fever eg cough does not go away, babies who experience dehydration signs when the fever should also be alert, similarly, if fever occurs in infants under the age of three months. Mom needs to bring her to the doctor as soon as possible.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2', 'language_id_whole_page_fasttext': "{'en': 0.9594692587852478}", 'metadata': "{'Content-Length': '83141', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:E3P4O6NNKAIKRWL7ATTBXBW5E5BBDQ2M', 'WARC-Concurrent-To': '<urn:uuid:7107e8c4-0ca8-441e-8949-d65d44652a3e>', 'WARC-Date': datetime.datetime(2019, 6, 20, 19, 35, 38), 'WARC-IP-Address': '172.217.7.179', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:VVXCLMIVIKD25YBI2D7QTFJMDYMDJAWX', 'WARC-Record-ID': '<urn:uuid:b4923b35-2ac1-46ba-a243-0885299b1d1a>', 'WARC-Target-URI': 'https://www.pediatricmedic.com/2018/07/my-baby-is-just-hot-in-head-is-this.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:99016358-e19f-49c3-9f7d-e69d9b17576c>', 'WARC-Truncated': None}", 'previous_word_count': '446', 'url': 'https://www.pediatricmedic.com/2018/07/my-baby-is-just-hot-in-head-is-this.html', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-152-93-158.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.16465240716934204', 'original_id': '158914630fc38e0c28e212f3c30fb1a08c778c49f35d8f28a8a253f39e96e1a4'}
Q: Getting JSON and cross to another class in AsyckTask I'm trying to receive JSON from sever and continue to another class, but can't, not working, this how to look my code class when I click button: public void onHistoryCheckIn(View view) { String nCar = numberCar; // to send number car for receive all data json String type = "historyChckIn"; PreHistoryCheckIn preHistoryCheckIn = new PreHistoryCheckIn(this); preHistoryCheckIn.execute(type,nCar); // send the data to recieve json } Know I go to doInBackground, and I use the onPostExecute protected void onPostExecute(String s) { // jsonResult ==> I NEED THE DATA!!! Intent intent = new Intent(context, HistoryCheckIn.class); // have Damage context.startActivity(intent); // alertDialog.setMessage(jsonResult); // alertDialog.show(); } I come to class HistoryCheckIn but without JSON, what I can do? I want to bring jsonResult and I want to come to HistoryCheckIn.class A: You have to set the result as an extra to the Intent e.g. protected void onPostExecute(String s) { Intent intent = new Intent(context, HistoryCheckIn.class); intent.putExtra("result", s); context.startActivity(intent); } and retrieve it by calling in HistoryCheckIn String jsonResult = getIntent().getStringExtra("result");
mini_pile
{'original_id': '23a7c0c07a730d22b1b8a12345474f6b4351214e12ff2f77665190ddfc7979aa'}
/** * @file rodsuploadthread.h * @brief Definition of class RodsUploadThread * * The RodsUploadThread class extends the Qt thread management class QThread * and implements a worker thread for an iRODS put operation. * * Copyright (C) 2014-2015 University of Jyväskylä. All rights reserved. * License: The BSD 3-Clause License, see LICENSE file for details. * * @author Ilari Korhonen */ #ifndef RODSUPLODADTHREAD_H #define RODSUPLODADTHREAD_H // Qt framework headers #include <QThread> #include <QString> #include <QStringList> #include <QProgressDialog> #include <QFileInfo> #include <QDir> // Kanki iRODS C++ class library headers #include "rodsconnection.h" // application headers #include "rodsmainwindow.h" #include "rodsobjtreemodel.h" class RodsUploadThread : public QThread { Q_OBJECT public: // Constructor initializes the upload worker thread and sets its parameters for execution, // requires a rods conn pointer, file paths list and dest coll path. RodsUploadThread(Kanki::RodsConnection *theConn, QStringList filePaths, std::string destColl, std::string rodsResc); // Constructor initializes the upload worker thread and sets its parameters for execution, // requires a rods conn pointer, base path for recursive upload and dest coll path. RodsUploadThread(Kanki::RodsConnection *theConn, std::string baseDirPath, std::string destColl, std::string rodsResc); signals: // Qt signal for initializing a progress bar display, it signals out // the initial message text, initial value and maximum value. void setupProgressDisplay(QString text,int value, int maxValue); // Qt signal for updating the progress bar display, it signals out // the current message text and current progress value. void progressUpdate(QString text, int progress); // Qt signal for setting the progress bar display in marquee mode, // it signals out the current text message. void progressMarquee(QString text); // Qt signal for reporting errors to ui, it signals out a message, // an error string and an error code. void reportError(QString msgStr, QString errorStr, int errorCode); // Qt signal for requesing a rods object tree model refresh, // at a given index (after upload complete, signals ui). void refreshObjectModel(QString path); private: // Overrides superclass virtual function, executes the upload // work in a thread instantiated with the thread object. void run() Q_DECL_OVERRIDE; // Makes a bill of materials list for the upload, i.e recursively reads // the local directory for files and directories paths. void makeBillOfMaterials(const QString &dirPath, QStringList *filePaths); // pointer to the rods connection object Kanki::RodsConnection *conn; // bill of materials for the upload QStringList filePathList; // destination rods collection path std::string destCollPath, basePath, targetResc; }; #endif // RODSUPLODADTHREAD_H
common_corpus
{'identifier': 'https://github.com/trel/kanki-irodsclient/blob/master/src/rodsuploadthread.h', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'BSD-3-Clause', 'date': '2020.0', 'title': 'kanki-irodsclient', 'creator': 'trel', 'language': 'C', 'language_type': 'Code', 'word_count': '386', 'token_count': '829', '__index_level_0__': '28431', 'original_id': 'c1c42e1f4d50936813b3a371aa839ea068508c0a335cb851f4ba936659492f3a'}
<!DOCTYPE html> <html lang="pt-br"> <head> <meta charset="UTF-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>semantica</title> <link rel="shortcut icon" href="semanticaicon.png" type="image/x-icon"> </head> <body> <h1>semantica</h1> <ul> <li><a href="index.html">voltar</a></li> </ul> <hr> <p> o <abbr title="Hyper Text Markup Lenguage">HTML</abbr> é a linguagem da web. é importante dizer que HTML <strong>não é linguagem de programação</strong> mas sim uma <em>de marcação.</em> </p> <p> CSS é uma <mark>linguagem de estilização.</mark> É através da CSS que formatamos um texto, mudamos o tipo de <del>letra</del>, <ins>fonte</ins> sua cor, tamanho, colocamos bordas ou algum elemento. </p> <p> É muito comum ouvir alguem dizer <q>estou programando em HTML</q>, isso esta errado, o certo seria falar que você esta escrevendo HTML. </p> <p> observe o código python abaixo: <code> <pre> num1 = 10 num2 - 5 total = num1 + num2 if total > 15: print("número maior que 15") print ("fim do programa") </pre> </code> </p> <blockquote> "tudo é interessante se você olhar o suficiente" - Richard Feynman. </blockquote> <bdo dir="rtl" html a linguagem da web </bdo> <p> <small>python, javascript, java, c#, PHP são linguagens de programação</small> </p> </body> </html>
the_stack
{'hexsha': '0d89028eeb6591fa76691dc7c86fdb74124ba5f4', 'size': '1683', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'semantica.html', 'max_stars_repo_name': 'guilhermeMgimenez/atividades23-11-21', 'max_stars_repo_head_hexsha': '2f0e2c66b0377abfc996cf1b4747d554b08ba064', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'semantica.html', 'max_issues_repo_name': 'guilhermeMgimenez/atividades23-11-21', 'max_issues_repo_head_hexsha': '2f0e2c66b0377abfc996cf1b4747d554b08ba064', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'semantica.html', 'max_forks_repo_name': 'guilhermeMgimenez/atividades23-11-21', 'max_forks_repo_head_hexsha': '2f0e2c66b0377abfc996cf1b4747d554b08ba064', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '30.6', 'max_line_length': '117', 'alphanum_fraction': '0.5632798574', 'original_id': 'a478148a6f19325d0e2c76eea11fad6d05e1c60c78be05d5e53fa1f6b552a1ee'}
Monday - Thursday: 8am - 5pm Friday: 9am - 2pm Saturday: By Appointment Sunday: Closed 5965 W.RAY RD SUITE #27 Kyrene Family Dentistry Chandler Arizona Logo 6 Serious Reasons for Toothache – It’s not Always Cavities 6 Serious Reasons for Toothache – It’s not Always CavitiesMore often than not, people will be told that their toothaches are caused by cavities and can be remedied as long as they visit their dentist and practice proper oral hygiene. While this may be true, there are some cases where the underlying cause for toothaches is not just cavities but a serious issue as well. Some serious reasons why teeth hurt include: 1. Health concerns Sometimes, having an aching tooth is just one of the symptoms of another, more serious complication. For example, your teeth enamel may already be worn down by an excessive habit of teeth grinding called bruxism. Sometimes, people with severe sinus infection also feel their gums seem to be tender and sore, along with mild toothaches. Meanwhile, there are also cases where toothache is one of the results of temporomandibular joint disorders. 1. Impacted wisdom teeth Although you regularly go to your dentist to have your teeth examined, and practice proper oral hygiene, you may find yourself having a tooth ache for no apparent, cavity-related reason. Often, impacted wisdom teeth can also be the cause. 1. Serious mouth infection Although there are no cavities present, toothache may also occur when there is an infection in the mouth or inside the gum line. Toothache, particularly a constant, throbbing one, may even be caused by an abscessed or cracked tooth, though there is no outward appearance of the infection. 1. Tooth sensitivity When the enamel gets worn down, some of the teeth may already have exposed nerves, which trigger pain when you eat hot or cold foods. If your teeth are sensitive days after a dental treatment, it may be that a portion of the pulp tissues in the teeth became inflamed. 1. Gum disease Gingivitis, while a common cause for toothache, is also a serious one. If left untreated, it may lead to more serious complications like periodontal disease. Periodontal disease happens when gingivitis has progressed deep into the mouth that bacteria have already inflamed and infected the bone structure at the base of the teeth. Aside from toothache, gingivitis can also be a symptom of more serious disorders like cancer, diabetes mellitus, and vitamin deficiency. READ: Deep Cleaning for Gum Disease: An Essential Guide 1. Damaged or improper dental work Sometimes, fillings in the teeth may be dislodged, opening up cavities causing pain. There are also cases where after dental treatment, the pain did not subside since the work is either inadequate or the wrong procedure was done.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9378135204315186}", 'metadata': "{'Content-Length': '89846', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VECDOQPQJWH3EX2IHN55EWPVYYGMQ33O', 'WARC-Concurrent-To': '<urn:uuid:fbe9ca9e-9dd1-429f-ac51-7c9ff17b439b>', 'WARC-Date': datetime.datetime(2017, 9, 22, 20, 40, 1), 'WARC-IP-Address': '104.239.157.110', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:CFWHSG6KPO4KVR2IX3GMSB72EN4WMSHW', 'WARC-Record-ID': '<urn:uuid:9f515e72-b9ea-43f7-b653-1f4ebaaf8e80>', 'WARC-Target-URI': 'https://www.kyrenefamilydentistry.com/blog/6-serious-reasons-toothache-not-always-cavities/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:9c36f9c4-62c5-4816-858f-a229568c82fb>', 'WARC-Truncated': 'length'}", 'previous_word_count': '459', 'url': 'https://www.kyrenefamilydentistry.com/blog/6-serious-reasons-toothache-not-always-cavities/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-158-141-5.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-39\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for September 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.030791819095611572', 'original_id': 'ef2f2f9db8db765d5c96377901776d8b2cfa1db0320f6a55c6878b1ea01e504e'}
If you do enjoy dressed up furniture and knitted stools then the Jumper chair by Dutch designer Bertjan Pot might be interesting for you, too. The chair features a knitted sweater-like continuous oversized woolen cover that makes it very comfy and cozy. Buttons hold it over the wooden structure and bent steel legs. The cover is knitted on a ‘Knit and Wear’ machine that is skilled for clothing garments, but this is where the fashion and design production processes divide. Once the garment is completed it is then runs through a high degree wash to attain a seamless and upholstered effect eradicating most of the stretch from the wool but presenting a high quality fabric that layers the structure with precision and rigor. The chair is available in a Grey-Charcoal and Red-Grey striped versions as well as all-Grey through Established & Sons stores.
mini_pile
{'original_id': '3d5085d1d0a7adea0ae9e247ca96a933857c4b17912db49ba515771b63cbd910'}
Chicago store owners report children using counterfeit cash - FOX 29 News Philadelphia | WTXF-TV Chicago store owners report children using counterfeit cash Posted: Updated: CHICAGO (FOX 32 News) - Chicago police say they're looking for a counterfeiter, around 20 to 27 years old, who has been using phony hundred dollar bills at stores on Chicago's Near North Side. In other Chicago neighborhoods, merchants say kids as young as four years old are showing up with phony bills. The question is whether it's happening by accident, or whether the real counterfeiters are using the kids as pawns to launder their phony bills. Everybody knows that it's Abraham Lincoln's face on the five dollar bill, but at the Abraham Lincoln Elementary School in East Chicago Indiana, it was Benjamin Franklin's face that made some headlines last year. A first grader showed up with six fake Benjamin Franklins: counterfeit hundred dollar bills. The youngster who showed up told investigators his mother kept a bag of the counterfeits in a closet at home. He's not the only child passing off bad bills. On Chicago's West Side and South Sides, children aged 4, 5, and 6 are showing up with the fake cash. "That's basically the age," store owner Big Homie says. "Like they send a younger crowd, they don't send an older crowd like I used to be. So it's different now." "It started from last December where you can see, a lot of bills, have been twenty dollars, five dollars one dollars," store owner Jeff Khan says. "Ages of 7 to 12." They've noticed a new trend too. Most are using smaller bills now. "Before we used to see big bills, like twenty dollars, and ten dollars," Khan says. "Recently we've come across…we see ten dollars and five dollars counterfeit." A few years ago, they say they were seeing lots of phony hundreds. Many are produced by what's called bleaching, which uses common household cleansers to scrub the ink off of five dollar bills. Then, the paper was used to print hundred dollars bills. The phonies could be detected by checking the watermarks. If a Ben Franklin hundred had an Abe Lincoln watermark, the bill was a bleached five dollar bill. Now, they're seeing smaller bills: ones, fives, tens, and twenties. Those are not printed on bleached bills, but with regular paper; likely on home computers. Sometimes they're easy to spot. "The back has got two layers," Khan explains. "If you raise it up, you cannot see this five over here inside," Ayman Salaymeh says. "If you can't see it, that's when it's fake." But the smaller bills are bills are so common, many stores typically don't have the time to check them. They seem to be turning up in areas frequented by gangs. One owner speculated that older gang members might be doing the counterfeiting and using juveniles--the younger gang members--to launder the cash on the streets. "A young boy comes in the store, you won't look at a younger boy, versus how you look at an older person," Big Homie says. "So, its able to get away with it more. You get what I mean?" The Secret Service investigates counterfeiters. The agency's website says they have zero tolerance and will investigate each and every counterfeiting case. Share Your Photos & Video Powered by WorldNow 330 Market Street Philadelphia, PA 19106-2796 Phone: (215) 925-2929 Fax: (215) 982-5494 Didn't find what you were looking for? Privacy Policy | Terms of Service | Ad Choices
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '8', 'language_id_whole_page_fasttext': "{'en': 0.9661508798599244}", 'metadata': "{'Content-Length': '71998', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:A6GHGDXR7DRHE7YNCE4RCM465ARUXIIV', 'WARC-Concurrent-To': '<urn:uuid:8e6cbd93-7943-472b-90af-e87b4ddb7a91>', 'WARC-Date': datetime.datetime(2014, 7, 30, 5, 15, 16), 'WARC-IP-Address': '23.62.6.66', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WFRNELBNDH65DDG6ZGNQ7FTR7UDR27WU', 'WARC-Record-ID': '<urn:uuid:313c9af9-3d48-4a5f-9e91-847b5658f687>', 'WARC-Target-URI': 'http://www.myfoxphilly.com/story/21192125/kids-as-young-as-6-years-old-using-conterfeit-cash', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f5d6f0dd-25e5-4437-b11e-63c1d685c083>', 'WARC-Truncated': None}", 'previous_word_count': '577', 'url': 'http://www.myfoxphilly.com/story/21192125/kids-as-young-as-6-years-old-using-conterfeit-cash', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.052561163902282715', 'original_id': 'ff026a205b437010fe0b7b72f7d94481e0c043616a2856a766c571ef2d33f097'}
First Page: ALL ROADS LEAD TO CALVARY CHAPTER I She had not meant to stay for the service. The door had stood invitingly open, and a glimpse of the interior had suggested to her the idea that it would make good copy. "Old London Churches: Their Social and Historical Associations." It would be easy to collect anecdotes of the famous people who had attended them. She might fix up a series for one of the religious papers. It promised quite exceptional material, this particular specimen, rich in tombs and monuments. There was character about it, a scent of bygone days. She pictured the vanished congregations in their powdered wigs and stiff brocades. How picturesque must have been the marriages that had taken place there, say in the reign of Queen Anne or of the early Georges. The church would have been ancient even then. With its air of faded grandeur, its sculptured recesses and dark niches, the tattered banners hanging from its roof, it must have made an admirable background. Perhaps an historical novel in the Thackeray vein? She could see her heroine walking up the aisle on the arm of her proud old soldier father. Later on, when her journalistic position was more established, she might think of it. It was still quite early. There would be nearly half an hour before the first worshippers would be likely to arrive: just time enough to jot down a few notes. If she did ever take to literature it would be the realistic school, she felt, that would appeal to her. The rest, too, would be pleasant after her long walk from Westminster. She would find a secluded seat in one of the high, stiff pews, and let the atmosphere of the place sink into her. And then the pew opener had stolen up unobserved, and had taken it so for granted that she would like to be shown round, and had seemed so pleased and eager, that she had not the heart to repel her. A curious little old party with a smooth, peach like complexion and white soft hair that the fading twilight, stealing through the yellow glass, turned to gold. So that at first sight Joan took her for a child. The voice, too, was so absurdly childish appealing, and yet confident. Not until they were crossing the aisle, where the clearer light streamed in through the open doors, did Joan see that she was very old and feeble, with about her figure that curious patient droop that comes to the work worn. She proved to be most interesting and full of helpful information. Mary Stopperton was her name. She had lived in the neighbourhood all her life; had as a girl worked for the Leigh Hunts and had "assisted" Mrs. Carlyle. She had been very frightened of the great man himself, and had always hidden herself behind doors or squeezed herself into corners and stopped breathing whenever there had been any fear of meeting him upon the stairs. Until one day having darted into a cupboard to escape from him and drawn the door to after her, it turned out to be the cupboard in which Carlyle was used to keep his boots. So that there was quite a struggle between them; she holding grimly on to the door inside and Carlyle equally determined to open it and get his boots. It had ended in her exposure, with trembling knees and scarlet face, and Carlyle had addressed her as "woman," and had insisted on knowing what she was doing there. And after that she had lost all terror of him. And he had even allowed her with a grim smile to enter occasionally the sacred study with her broom and pan. It had evidently made a lasting impression upon her, that privilege. "They didn't get on very well together, Mr. and Mrs. Carlyle?" Joan queried, scenting the opportunity of obtaining first class evidence. "There wasn't much difference, so far as I could see, between them and most of us," answered the little old lady. "You're not married, dear," she continued, glancing at Joan's ungloved hand, "but people must have a deal of patience when they have to live with us for twenty four hours a day... Continue reading book >>
mini_pile
{'original_id': 'cd1c75b9b24a5e1222aded96817cfdb1a2eb52331de2b226a14ada8176146091'}
/* * WeChat social provider for uproxy * @author Spencer Walden * */ var wechat = require("../node_modules/wechat-webclient/wechat.js"); /* * Constructor for a WechatSocialProvider object. */ var WechatSocialProvider = function(dispatchEvent) { this.client = new wechat.weChatClient(true, true); this.dispatchEvent_ = dispatchEvent; this.networkName_ = "wechat"; this.initLogger_("WechatSocialProvider"); this.storage = freedom["core.storage"](); this.syncInterval = 4000; // This seems like a good interval (August 1st, 2015) this.loggedIn = null; this.wxids = 0; this.CONTACT_NAME_SCHEME = "uProxy_"; // + user1 / user2 this.inviteds = {}; // wxid => invite mapping this.initState_(); this.initHandlers_(); }; // End of constructor /* * Initializes the state of this WechatSocialProvider */ WechatSocialProvider.prototype.initState_ = function() { this.storage.get("WechatSocialProvider-was-QQ-user").then(function(value) { if (value !== null) { this.client.isQQuser = value; } }.bind(this), this.client.handleError.bind(this.client)); this.clientStates = {}; this.userProfiles = {}; }; /* * Initializes event handlers */ WechatSocialProvider.prototype.initHandlers_ = function() { /* * Defines how to handle a newly received message. * @param {Object} message */ this.client.events.onMessage = function(message) { var availability = "ONLINE_WITH_OTHER_APP"; if (message.MsgType === this.client.HIDDENMSGTYPE) { availability = "ONLINE"; } var fromUser = this.client.contacts[message.FromUserName]; var fromUserId = this.userProfiles[fromUser.Uin || fromUser.wxid]; var eventMessage = { "from": { "userId": fromUserId, "clientId": message.FromUserName, "status": availability, "lastUpdated": Date.now(), "lastSeen": Date.now() }, "message": message.Content }; try { var jason = JSON.parse(message.Content); if (jason.userStatus === 0) { this.storage.get("invited_" + this.client.thisUser.Uin) .then(function(invites) { var iContact = invites[fromUserId]; if (iContact.timestamp < jason.timestamp) { resolve(true); // If timestamp of my invite sent before theirs, I create chatroom } else { resolve(false); } }.bind(this), this.client.handleError.bind(this.client)) .then(function(chatroomCreater) { if (chatroomCreater) { var chatroomname = this.CONTACT_NAME_SCHEME + this.client.contacts[contact].NickName; // FIXME, better naming scheme this.client.log(1, "Social Provider: creating chatroom with name " + chatroomname); var THE_INVISIBLE_CONTACT = "filehelper"; var list = [contact, THE_INVISIBLE_CONTACT]; this.client.webwxcreatechatroom(list) .then(this.client.webwxbatchgetcontact.bind(this.client), this.client.handleError.bind(this.client)) .then(this.client.webwxupdatechatroom.bind(this.client, "modtopic", chatroomname), this.client.handleError.bind(this.client)) //.then(this.client.webwxupdatechatroom.bind(this.client, "delmember", arbitrarycontact), this.client.handleError.bind(this.client)) .then(function(chatroom) { var hey = "Hey, " + this.client.contacts[contact].NickName + "! We're now friends "; hey += "on uProxy! I made this group between us so we can use uProxy privately."; var welcome = { "type": 1, "content": hey, "recipient": chatroom }; delete this.inviteds[fromUserId]; this.storage.set("invited_" + this.client.thisUser.Uin, this.inviteds); return this.client.webwxsendmsg(welcome); }.bind(this), this.client.handleError.bind(this.client)); } else { delete this.inviteds[fromUserId]; this.storage.set("invited_" + this.client.thisUser.Uin, this.inviteds); } }.bind(this), this.client.handleError.bind(this.client)); } } catch(e) { console.error(e); // don't want to kill uProxy, just means we haven't gotten an invite message } this.client.log(5, eventMessage.message, -1); this.dispatchEvent_("onMessage", eventMessage); }.bind(this); /* * Updates clientStates and userProfiles using the information of a modified chatroom. * @param {Object} — modified chatroom from this.client.webwxsync */ this.client.events.onModChatroom = function(modChatroom) { this.addOrUpdateClient_(modChatroom); //for (var i = 0; i < modChatroom.MemberCount; i++) { // var member = modChatroom.MemberList[i]; // var clientId = member.UserName; // if (member.wxid && !this.clientStates[clientId].userId) { // this.client.log(1, "contact Uin discovered: " + member.NickName + " => " + member.wxid); // this.clientStates[clientId].userId = member.wxid; // this.dispatchEvent_("onClientState", this.clientStates[clientId]); // this.addUserProfile_(member); // } //} }.bind(this); /* * Defines how to handle the receiving of a new UUID from the WeChat webservice. * @param {String} url of QR code */ this.client.events.onUUID = function(url) { var OAUTH_REDIRECT_URLS = [ "https://www.uproxy.org/oauth-redirect-uri", "http://freedomjs.org/", "http://localhost:8080/", "https://fmdppkkepalnkeommjadgbhiohihdhii.chromiumapp.org/" ]; var oauth = freedom["core.oauth"](); var qrsrc = url; url = "<h1>File any issues at https://github.com/freedomjs/freedom-social-wechat</h1>"; url += "<img src='" + qrsrc + "'/>"; url = "data:text/html," + encodeURIComponent(url); this.client.log(1, "QR code can be scanned at: " + url, -1); oauth.initiateOAuth(OAUTH_REDIRECT_URLS).then(function(stateObj) { return oauth.launchAuthFlow(url, stateObj).then(function(responseUrl) { return responseUrl; }); }); }.bind(this); /* * Defines how to handle the receiving of a new Icon from the WeChat webservice. * @ param {Object} JSON object containing the dataURL of the QR code, and * the HeadImgUrl of the given icon as (iconURLPath). */ this.client.events.onIcon = function(iconJSON) { if (iconJSON) { try { var jason = JSON.parse(iconJSON); var userName = jason.iconURLPath.split("?")[1].split("&")[1].split("=")[1]; var user = this.client.contacts[userName]; var friend = this.userProfiles[user.Uin || user.wxid]; if (friend) { friend.imageData = jason.dataURL; this.dispatchEvent_('onUserProfile', friend); } else this.client.handleError("Icon corresponds to unknown contact.").bind(this); } catch (e) { this.client.handleError(e).bind(this); } } }.bind(this); /* * Defines the function that handles the case where the retrieved UUID corresponds * to the wrong domain for this user trying to get in. Also saves which domain * the user was associated with for future reference. * * @param {String} referral URL address. * TODO: referral isn't used, consider excluding. * @returns {Promise} that fulfills if restepping through the beginning of the * login process went sucessfully, rejects promise if there was an error. */ this.client.events.onWrongDom = function(referral) { this.storage.set("WechatSocialProvider-was-QQ-user", this.client.isQQuser); return this.preLogin(referral); }.bind(this); /** * handler for wxids -> userID */ this.client.events.onWXIDs = function(wxids) { var expected = Object.keys(this.client.contacts).length + Object.keys(this.client.chatrooms).length; var selfContact = this.client.thisUser.UserName; if (this.wxids !== expected) { for (var userName in wxids) { console.log(userName); if (userName.startsWith("@@") && this.client.chatrooms[userName]) { this.client.log(1, "chatroomUser wxid found: " + this.client.chatrooms[userName].NickName); this.client.chatrooms[userName].wxid = wxids[userName]; if (!this.userProfiles[wxids[userName]]) { this.wxids++; } if (this.client.chatrooms[userName].NickName.startsWith(this.CONTACT_NAME_SCHEME)) { this.addOrUpdateClient_(this.client.chatrooms[userName], "ONLINE"); //FIXME } } else if (!userName.startsWith("@@") && this.client.contacts[userName]){ this.client.log(1, "contact wxid found: " + this.client.contacts[userName].NickName); this.client.contacts[userName].wxid = wxids[userName]; if (!this.userProfiles[wxids[userName]]) { this.wxids++; } if (userName !== this.client.thisUser.UserName) { //this.addOrUpdateClient_(this.client.contacts[userName], "ONLINE"); //FIXME this.addUserProfile_(this.client.contacts[userName]); } // else { // this.addOrUpdateClient_(this.client.thisUser, "ONLINE"); // this.addUserProfile_(this.client.thisUser); // } } } if (this.wxids === expected) { this.client.log(0, "wxids fully resolved"); this.client.webwxgeticon(); this.storage.get("invited_" + this.client.thisUser.Uin) .then(function(invites) { for (var invite in invites) { this.client.webwxsendmsg(invite); } }.bind(this), this.client.handleError.bind(this.client)); this.loggedIn(this.clientStates[selfContact]); } else { this.client.log(-1, "wxids not fully resolved"); } } }.bind(this); }; /* * Initialize this.logger using the module name */ WechatSocialProvider.prototype.initLogger_ = function(moduleName) { this.logger = console; // Initialize to console if it exists. if (typeof freedom !== 'undefined' && typeof freedom.core === 'function') { freedom.core().getLogger('[' + moduleName + ']').then(function(log) { this.logger = log; }.bind(this)); } }; /* * Logs the user into WeChat * @returns {Promise} -- fulfills on proper login, rejects on failure. */ WechatSocialProvider.prototype.login = function(loginOpts) { return new Promise(function(fulfillLogin, rejectLogin) { this.client.preLogin(false) .then(this.client.webwxinit.bind(this.client), this.client.handleError.bind(this)) .then(function () { setTimeout(this.client.synccheck.bind(this.client), this.syncInterval); this.client.webwxgetcontact(false).then(function() { this.addOrUpdateClient_(this.client.thisUser, "ONLINE"); this.addUserProfile_(this.client.thisUser); this.loggedIn = fulfillLogin; }.bind(this), this.client.handleError.bind(this)); }.bind(this), this.client.handleError.bind(this)); // end of getOAuthToken_ }.bind(this)); // end of return new Promise }; /* * Returns a Promise which fulfills with all known ClientStates. */ WechatSocialProvider.prototype.getClients = function() { return Promise.resolve(this.clientStates); }; /* * Returns a Promise which fulfills with all known UserProfiles */ WechatSocialProvider.prototype.getUsers = function() { return Promise.resolve(this.userProfiles); }; /* * Sends a message to another clientId. * @param {String} friend's clientId * @param {String} message you wish to send them */ WechatSocialProvider.prototype.sendMessage = function(friend, message) { //<friend>.UserName and message string to be sent (hidden) return new Promise(function (fulfullSendMessage, rejectSendMessage) { var msg = { "type": this.client.HIDDENMSGTYPE, "content": message, "recipient": friend }; //this.client.log(3, "WechatSocialProvider sending message", msg.content); this.client.webwxsendmsg(msg).then(fulfullSendMessage, rejectSendMessage); }.bind(this)); }; /* * Logs the user out of WeChat, and reinitializes the social provider state. * @returns {Promise} fullfills on successful logout, rejects on failure to logout. */ WechatSocialProvider.prototype.logout = function() { return new Promise(function (fulfillLogout, rejectLogout) { if (this.client.loginData) { this.client.webwxlogout().then(function() { this.addOrUpdateClient_(this.client.thisUser, "OFFLINE"); //this.client.log(0, "WechatSocialProvider logout"); this.initState_(); fulfillLogout(); }.bind(this), this.client.handleError.bind(this)); } else { this.client.log(-1, "Couldn't log out; not logged in"); rejectLogout(); } }.bind(this)); }; /* * Adds a UserProfile. * @param {Object} WeChat friend JSON object. */ WechatSocialProvider.prototype.addUserProfile_ = function(friend) { var uid = friend.Uin || friend.wxid || ''; var userProfile = { "userId": uid, // Unique identification number "name": friend.NickName || '', // Their display name "lastUpdated": Date.now(), "url": friend.url || '', // N/A "imageData": '' // Gets added later. }; this.userProfiles[uid] = userProfile; this.dispatchEvent_('onUserProfile', userProfile); return userProfile; }; /* * Adds or updates a client. * @param {Object} WeChat friend JSON object. * @param {String} friend's uProxy status. ("ONLINE", "OFFLINE", "ONLINE_WITH_OTHER_APP") * @returns {Object} modified ClientState object * */ WechatSocialProvider.prototype.addOrUpdateClient_ = function(friend, availability) { var state = this.clientStates[friend.UserName]; if (state) { state.status = availability; state.lastUpdated = Date.now(); state.lastSeen = Date.now(); } else { if (friend.MemberCount === 2) { for (var member in friend.MemberList) { if (member.UserName !== this.client.thisUser.UserName) { state = { "userId": member.Uin || member.wxid || '', // Unique identification number "clientId": member.UserName, // Session username "status": availability, // All caps string saying online, offline, or online on another app. "lastUpdated": Date.now(), "lastSeen": Date.now() }; } } } else if (friend.MemberCount === 0) { state = { "userId": friend.Uin || friend.wxid || '', // Unique identification number "clientId": friend.UserName, // Session username "status": availability, // All caps string saying online, offline, or online on another app. "lastUpdated": Date.now(), "lastSeen": Date.now() }; } } this.clientStates[friend.UserName] = state; this.dispatchEvent_('onClientState', this.clientStates[friend.UserName]); return this.clientStates[friend.UserName]; }; /** * Included to conform with API; is a noop function in this context */ WechatSocialProvider.prototype.acceptUserInvitation = function(invite) { return Promise.reject(); // this shall just do nothing. }; // This is just a stub for how some of the invite process will go. WechatSocialProvider.prototype.inviteUser = function(contact) { return new Promise(function (resolve, reject) { var uProxy_info = JSON.stringify({ "userStatus": 0, // friend request "timestamp": Date.now() }); var uProxy_invite = { "type": this.client.HIDDENMSGTYPE, "content": uProxy_info, "recipient": contact.UserName }; this.inviteds[contact.wxid] = uProxy_invite; var plaintext_invite = { "type": 1, "content": "Hey " + this.client.contacts[contact].NickName + "! You should use uProxy!", // FIXME "recipient": contact.UserName }; this.client.webwxsendmsg(uProxy_invite); this.client.webwxsendmsg(plaintext_invite); this.storage.set("invited_" + this.client.thisUser.Uin, this.inviteds); }.bind(this)); }; // Register provider when in a module context. if (typeof freedom !== 'undefined') { if (!freedom.social) { freedom().providePromises(WechatSocialProvider); } else { freedom.social().providePromises(WechatSocialProvider); } }
common_corpus
{'identifier': 'https://github.com/freedomjs/freedom-social-wechat/blob/master/src/wechat-social-provider.js', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'Apache-2.0', 'date': '2018.0', 'title': 'freedom-social-wechat', 'creator': 'freedomjs', 'language': 'JavaScript', 'language_type': 'Code', 'word_count': '1493', 'token_count': '5029', '__index_level_0__': '20053', 'original_id': '8d1b713742adb065e12762fae70c1298a6417ab9478728ed77547929f18f3515'}
Inborn errors of steroid biosynthesis: detection by a new mass-spectrometric method. A new mass-spectrometric technique relies on ionization during bombardment of the analyte (dissolved in a liquid matrix, usually glycerol) by an atom beam (e.g., Ar0, Xe0). This technique, termed "fast atom bombardment," is particularly useful in the characterization of polar charged molecules. A neutral beam is not essential, and a primary beam of cesium ions has been successfully used to produce spectra equivalent to those obtained by fast atom bombardment. In this communication I report data on the use of both ion and atom primary beams for producing secondary-ion mass spectra of conjugated steroids. In negative-ion spectra produced for steroid glucuronides and sulfates, the ion [M - H]- is invariably the major high-mass peak, and the lack of substantial fragmentation allows assay of relatively complex mixtures if the analytes differ in mass. I describe here the use of secondary-ion mass spectrometry for distinguishing, by urinary steroid analysis, patients with the four enzyme defects that can affect cortisol synthesis: defects in 17 alpha-hydroxylase, 3 beta-hydroxysteroid dehydrogenase/isomerase, 21-hydroxylase, and 11 beta-hydroxylase.
mini_pile
{'original_id': 'b9e651b8749aa667023f7627ead589c6c50f7be40897c31f7544b44de240834d'}
Staring into the brown eyes of these highly endangered gentle giants, who share 95% of their genes with humans, is often described as a life-changing event. Uganda, the 'Pearl of Africa', is best known for its highly endangered mountain gorillas and chimpanzees. The country is also home to many diverse species, some of which are rarely found elsewhere in Africa.   Situated in East Africa, Uganda is mostly a plateau straddling the equator, resulting in a mild climate with three wet seasons that nourish its rich rainforests. Uganda boasts of ten national parks, ten wildlife reserves, seven wildlife sanctuaries and thirteen community wildlife areas, allowing travelers to enjoy truly spectacular and diverse scenery from snow covered mountains to dry savannah grasslands and tropical rain forests bisected by the majestic River Nile. Half of the world’s remaining mountain gorilla population reside in Uganda and the country is also home to man's closest relative, the chimpanzee. A number of habituated mountain gorilla troops and chimpanzee communities can be tracked and visited by a limited number of tourists daily. Five of the six fastest land animals live in Africa: cheetah, topi / tsessebe, wildebeest, springbok and lion. All of these animals can run at speeds above 60 kilometres per hour, with the cheetah reaching a top speed of about 120 kilometres per hour. Ready for your trip? Let us help you plan everything.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '42', 'language_id_whole_page_fasttext': "{'en': 0.9105998873710632}", 'metadata': "{'Content-Length': '62207', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XNWHYODYUD2623TYTWMEJ7JZMAN73QNS', 'WARC-Concurrent-To': '<urn:uuid:5c8f119a-3e8b-43b5-ba3f-6ca239aea5ed>', 'WARC-Date': datetime.datetime(2020, 1, 18, 23, 29, 58), 'WARC-IP-Address': '54.213.129.97', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:7F4YNSA5RUYBW2NTXZKA5SIH6IL6G5UH', 'WARC-Record-ID': '<urn:uuid:553ffbf7-ed29-4476-806a-48faf2b99c6e>', 'WARC-Target-URI': 'https://www.a2asafaris.com/africa/destinations/Uganda', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:56158288-d46c-470c-9a4d-5e00f7c992a6>', 'WARC-Truncated': None}", 'previous_word_count': '270', 'url': 'https://www.a2asafaris.com/africa/destinations/Uganda', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-27.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17475348711013794', 'original_id': 'ab302ee82ec15ff5a7504f129fc574e1d364a4ff9a84fda7f800cd02602e6866'}
Learn more about other poetry terms nobody sees me nobody hears me swear I've been screaming tell me I'm dreaming tired of running away from my mind somebody help me stop pressing rewind I remember those days... days consisting of playing, being happy, laughing, days when words didn't hurt, days when we supported each other,  days when we didn't hurt each other, Why Why was Life so hard?   Why was it so bleak?   How come Life was overjoyed   As it preyed upon the weak?       How did Satan reach us?   I can only describe her in phrases that don't make sense  in images  in times of night  or metaphors. She isn't real and never will be again.  She's dead. I'm not. Ironic.  She comes in waves I'm alone and can't sleepThere's no one here but meI'm stuck with all these memoriesIf they could only see Lately I am guilty of losing the little things: It's about the locked door it's about the sound of a slipped belt trauma like brain damage it's about shrunken corners that don't shelter it's about hearing pants drop to the floor wishing ears to deafen Inside, around, behind what's in my mind? Flashbacks tons of flashbacks. I wiggle, I scream hes too mean. I can't get away but you think I did it to  myself.   A young girl plays in the warm sunlight. Tag, you're it. Running, Laughing, Living. Hours pass. Like all children, the girl in the lavender dress is restless. Dusk. The room goes blank. Look in a mirror and see a monster The hate inside, fighting to take control In school they don’t see, at least not really They see a person not a monster I see so much of him inside of me Subscribe to flashbacks
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '57', 'language_id_whole_page_fasttext': "{'en': 0.9634108543395996}", 'metadata': "{'Content-Length': '55001', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GCE4RWPYOHRVDHVTKL2PA6N5FHAKXORG', 'WARC-Concurrent-To': '<urn:uuid:1ecae675-d0ec-4edf-9e64-752a326ffef8>', 'WARC-Date': datetime.datetime(2019, 11, 17, 0, 37, 45), 'WARC-IP-Address': '23.185.0.3', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JSJZJGYUR6URA37PBNNPIUEK6PDMNTOS', 'WARC-Record-ID': '<urn:uuid:b4ccab47-c0f9-4b57-ac91-1ae2a3b5a3a9>', 'WARC-Target-URI': 'https://www.powerpoetry.org/taxonomy/term/11666', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5d5204ce-63ad-4db0-9fde-8f83c8f2e382>', 'WARC-Truncated': None}", 'previous_word_count': '367', 'url': 'https://www.powerpoetry.org/taxonomy/term/11666', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-254.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.9943251013755798', 'original_id': '880f50781a7f06113c99649f828630283f393090f007510f9426145e1445795c'}
'Lemonade' Director to Explore Aftermath of Sandusky Trial After tackling what out of work advertising people (such as yours truly) do next and and how Detroit reinvented itself, "recovering ad man" and former copywriter, Erik Proulx, will examine how Penn State, its students and the local community moved on after the Sandusky situation. His new film, 365 Days - A Year in Happy Valley, will premiere Christmas day 2013. If his pat work is any indication, there's no doubt this film will be an amazing experience. The film is described thusly: "365 Days in not an analysis of innocence or guilt, fair or unfair. It is a look into the science of how perfectly reasonable human beings are capable of being unreasonable to the point of carelessness. The film walks away from absolutes and seeks to understand why we allow ourselves to be conformists, why we follow the unreasoned thought, why we join cults and commit ourselves to a destructive path, even when we are conscious of doing so. The film uses a study on human conformity as its framework and, in an effort to draw a wider range of viewers, takes a critical look at when and how the 'herd mentality' is commonly formed and destroyed." by Steve Hall    Dec- 7-12   Click to Comment    Topic: Video        Pin It Featured FREE Resource:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '12', 'language_id_whole_page_fasttext': "{'en': 0.9337137937545776}", 'metadata': "{'Content-Length': '36757', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BIM7BS3I7AYJP5GKJRMXQU2L4KPZSX5C', 'WARC-Concurrent-To': '<urn:uuid:b0f025fa-718d-40ac-920d-4de371844fa3>', 'WARC-Date': datetime.datetime(2014, 12, 23, 3, 44, 48), 'WARC-IP-Address': '216.92.114.149', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:WDTI5KRPNS4RKH4I232ZWF4XTZBAQO7B', 'WARC-Record-ID': '<urn:uuid:59a0f6e3-dadb-47e9-9391-a3bb6e2e4554>', 'WARC-Target-URI': 'http://www.adrants.com/2012/12/lemonade-director-to-explore-aftermath.php', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:dd896836-c089-4b56-9246-1a0b7e112146>', 'WARC-Truncated': 'length'}", 'previous_word_count': '240', 'url': 'http://www.adrants.com/2012/12/lemonade-director-to-explore-aftermath.php', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02017688751220703', 'original_id': '20f2d63c0a87dbea1dde116c91ceab1d75e473f00d3f8e7a6624d90c0b9509ad'}
Thursday, June 25, 2009 they're thinkin' what I'm thinkin' James Lewis paints the portrait of The Little President Who Wasn't There. No kidding. For such sheer gutless flabbiness and evasion, you have to look back to the dismal Jimmy Carter years... Barack Obama loves to preen and parade his "higher" morality. But when it comes to Iranians struggling against ugly tyranny or the people of North Korean just trying to fill their bellies with food, our little president just isn't there. Nowhere to be found. Chances are that behind the scenes the mullahs are promising Obama a glorious peace agreement that will allow him to parade his gargantuan ego around the world one more time. They are Persian rug sellers over there, who know all about hard bargaining. They've got his number: He's a pushover. Obama will trade personal glory against the freedom of Iran's people any day of the week. The amazing, shrinking president. It is easier for the First Family to pass through the eye of a needle than for a modern Democrat to stand up for American strength and political morality in the face of exotic foreigners with flowing robes and a low tolerance for Christians and Jews. Apparently a Soldier's Life is Cheap Now Lance Fairchok tells a tale that the regime doesn't want you to hear: President Obama has spent his negotiating capital arranging with terrorists to free the convicted murderers of American servicemen. Didja know? Thought not. Amthinkr links to Anne Bayefsky writing in Forbes. It's a profile of the president as weenie, weasel, weaker-than-thou, or, as Julius Caesar might have put it, "Veni,Vidi, Vici" -- pronounced in the Classical mode as "Weenie, Weedy, Weaky". Ah yes, Julius Caesar -- I've thought of him so often in relation to the Obamessiah over the past six months. Let's see... According to Cassius: Why, man, he doth bestride the narrow world Like a Colossus, and we petty men Walk under his huge legs and peep about To find ourselves dishonourable graves. Men at some time are masters of their fates: The fault, dear Brutus, is not in our stars, But in ourselves, that we are underlings. Why should that name be sounded more than yours? Write them together, yours is as fair a name; Sound them, it doth become the mouth as well; Brutus will start a spirit as soon as Caesar. Now, in the names of all the gods at once, Upon what meat doth this our Caesar feed, Rome, thou hast lost the breed of noble bloods! When went there by an age, since the great flood, But it was famed with more than with one man? When could they say till now, that talk'd of Rome, That her wide walls encompass'd but one man? Now is it Rome indeed and room enough, When there is in it but one only man. Can we spot the parallels? YES WE CAN. Is there anything more to be said? Nope. Meanwhile, over at Doctor Plumbeo's Emergency Room, I weigh in on some Canadian health care tales. No comments:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '3', 'language_id_whole_page_fasttext': "{'en': 0.9612162709236144}", 'metadata': "{'Content-Length': '300089', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZSFEKQVWGDT43ONFPNAWYGFRCFX35XAR', 'WARC-Concurrent-To': '<urn:uuid:8eebaf6c-d139-484e-bad0-76e9bdc12fa4>', 'WARC-Date': datetime.datetime(2017, 5, 23, 17, 5, 37), 'WARC-IP-Address': '216.58.217.65', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:XDKWCYQB4DYN2YWILZG7JIDFTQJLL2IL', 'WARC-Record-ID': '<urn:uuid:40f5e308-4d19-473d-8163-68ff85bd66b5>', 'WARC-Target-URI': 'http://winefredswell.blogspot.com/2009/06/im-here-youre-not-neener-neener-nah-nah.html', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3636b3dd-051f-405f-98aa-b8f282d553fa>', 'WARC-Truncated': None}", 'previous_word_count': '545', 'url': 'http://winefredswell.blogspot.com/2009/06/im-here-youre-not-neener-neener-nah-nah.html', 'warcinfo': 'robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09974521398544312', 'original_id': '5b0df6b2b61bfff601582d9df3cf163eadd6f16a96219f2e39c983a07f600437'}
The 10 cheapest Bristol homes sold in September went for a total of just over £1.3million. Despite the housing crisis, the list shows there are still bargains to be had in Bristol. Even in leafy Clifton - a neighbourhood which figured heavily in September's most expensive Bristol sales - a flat went for just £136,000. The two cheapest properties were both houses which went for less than £100,000, one in Bishopston and the other in Kingswood. Here are Bristol's 10 least expensive residential properties for September, according to Land Registry data: 6 Beauchamp Road • 6 Beauchamp Road, Bishopston, BS7 8LQ, a terrace house, sold for £68,554 on September 3. • 28 Glenroy Avenue, Kingswood, BS15 1DZ, a semi-detached house, sold for £97,000 on September 11. 262 Glenfrome Road • 262 Glenfrome Road, Eastville, a semi-detached house, sold for £123,000 on September 4. • 473A Southmead Road, Westbury On Trym, BS10 5LZ, a flat, sold for £124,500 on September 3. Flat 4 (not directly pictured), Castle Court Mews • Flat 4, Castle Court Mews, Ducie Road, Lawrence Hill, BS5 0EZ, a flat, sold for £125,000 on September 2. • Flat 37, Glencoyne Court, St Stephens Close, Southmead, BS10 6TP, a flat, sold for £130,000 on September 4. • Flat 35, Purdy Court, New Station Road, Fishponds, BS16 3RT, a flat, sold for £131,000 on September 9. • Flat 7, Cleve Court, Cumberland Place, Clifton, BS8 4LZ, a flat, sold for £136,000 on September 2. • Second Floor Flat, 477 Bath Road, Brislington, BS4 3JU, a flat, sold for £138,000 on September 17. • Flat 1, 245 Bloomfield Road, Brislington, BS4 3QT, a flat, sold for £145,000 on September 6.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '4', 'language_id_whole_page_fasttext': "{'en': 0.928485870361328}", 'metadata': "{'Content-Length': '198354', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:EBD5YEIDBWDKQKGXLXB74WIAOS3WWPTO', 'WARC-Concurrent-To': '<urn:uuid:cf1735c0-2278-44db-87e8-29c1428e58d9>', 'WARC-Date': datetime.datetime(2019, 11, 14, 9, 15, 55), 'WARC-IP-Address': '99.86.230.23', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:VEECC44IR46OLLRVGJPNUBASFVNOJLEW', 'WARC-Record-ID': '<urn:uuid:c9b66ace-b017-4558-bec1-6b7995fea177>', 'WARC-Target-URI': 'https://www.bristolpost.co.uk/news/bristol-news/cheapest-bristol-homes-bought-one-3517373', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f124dca7-14fd-48cf-bd1d-cbdb434896ca>', 'WARC-Truncated': None}", 'previous_word_count': '267', 'url': 'https://www.bristolpost.co.uk/news/bristol-news/cheapest-bristol-homes-bought-one-3517373', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-221.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02105391025543213', 'original_id': '2f9882369020f30beca7733d26995a41e7476be2467962c6f7b9afc36aea4eb3'}
The Secret Service took Malia Obama to Lollapalooza Publish date: Lollapalooza is a stressful enough experience for us normal folk, but today my thoughts go out to the Secret Service detail assigned to Malia Obama this weekend. Their task: protect the First daughter of the United States amidst a crowd of 100,000 drunken festival attendees, and R. Kelly. Article continues at
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9012357592582704}", 'metadata': "{'Content-Length': '159132', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:2QVLAUXTCG3CPQDGJPYZBZ463PMFGYEG', 'WARC-Concurrent-To': '<urn:uuid:1703faa5-3f0f-4dad-8159-22ee845e96d6>', 'WARC-Date': datetime.datetime(2019, 4, 20, 13, 14, 20), 'WARC-IP-Address': '104.27.180.133', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:C6MOAVTJ4J5O5UNYWHZ44VD322DNT5G4', 'WARC-Record-ID': '<urn:uuid:43099633-ee79-457c-954a-2c204776f805>', 'WARC-Target-URI': 'https://baronmag.ca/2014/08/the-secret-service-took-malia-obama-to-lollapalooza/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:2e28c94b-813c-4771-a174-d14fbc883869>', 'WARC-Truncated': None}", 'previous_word_count': '61', 'url': 'https://baronmag.ca/2014/08/the-secret-service-took-malia-obama-to-lollapalooza/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-109-209-241.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02118229866027832', 'original_id': '6f648db9483cb06fcef232eb8d72b40d2ef1d274edd7436d54570c77c4e70d08'}
I am in Chiang Mai again. Been here 2 months now. You don’t hear much Thai language being spoken here, but rather Chiang Mai Thai or Lanna. This is a northern language, not a dialect, because a Thai speaker cannot understand the Lanna language. The two are so different. “Khun suai mak,” means you’re very pretty in Thai, but in Lanna, they would say: “Tua ngam kanad.” There’s no similarity there. As for the Malay and Thai language, I previously posted that the only common word I could find was Ngiap and Senyap. But, of course, I missed the obvious. ‘Ini’ and ‘Ani’ are both mean here. Some Malays will use noon for there, just like the Thais. There’s also phaasaa and bahasa for language, even though the two come from a different family of languages. There’ll are other similar words, for example ‘chincok’ for ‘chicak’ and ‘kunjay’ for ‘kunci’. I’m sure I’ll unearth more of them.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9171385169029236}", 'metadata': "{'Content-Length': '58160', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:4UGBR2337L3GCKY3YYMREU5QQM66PYCX', 'WARC-Concurrent-To': '<urn:uuid:9c7214be-483a-4705-804d-a63254a0b5af>', 'WARC-Date': datetime.datetime(2017, 10, 18, 7, 32, 12), 'WARC-IP-Address': '192.0.78.12', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:H2QRBBI4VDQCXECXXK5XOKYWXF6GHKBV', 'WARC-Record-ID': '<urn:uuid:77255964-1438-452b-a63b-0c5e1279ee76>', 'WARC-Target-URI': 'https://tunkuhalim.wordpress.com/2017/05/29/thai-malay-words/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:59e075fc-4379-4f54-8718-564072a89c9a>', 'WARC-Truncated': 'length'}", 'previous_word_count': '144', 'url': 'https://tunkuhalim.wordpress.com/2017/05/29/thai-malay-words/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-218-138-106.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02264714241027832', 'original_id': 'a1eaebcb9e50ad28cdfc1cbe6cb562861edbd8fc803967f043af7eacf6175d8e'}
While women's rights groups have jumped to the defense of Christine Blasey Ford, the college professor who on Sunday came forward publicly to accuse Supreme Court nominee Brett Kavanaugh of sexual assault when they were high school students, many members of the Republican Party—including Sen. Susan Collins of Maine—have yet to say whether they believe the serious and credible charges are cause for delaying a vote by the Senate Judiciary Committee later this week. "Christine Blasey Ford has demonstrated tremendous courage in coming forward. We will not sit by and let Republicans attempt to undermine and defame her." —Shauna Thomas, UltravioletAsked by a CNN reporter for her reaction to the Ford's allegations, first made public in comments published by the Washington Post on Sunday afternoon, Collins said she was "obviously very surprised" by the accusations but that in a phone call with Kavanaugh on Friday said the nominee "emphatically" denied the assault. Asked if she believed Ford's account, Collins said, "I don't know enough to make a judgment at this point." While other Republican Senators considered possible swing votes on Kavanaugh—including Sens. Jeff Flake of Arizona and Lisa Murkowski of Alaska—have now expressed at least some support for a delay in Kavanaugh's vote until more is learned about the accusation or Ford is given a chance to testify before the Judiciary Committee, Collins suggested she needed more time to think. On whether the vote should be delayed, Collins was only willing to tell CNN she would "be talking with my colleagues, but I really don't have anything to add at this point." Sen. Collins doesn’t “know enough at this point to make a judgment” on whether she believes the accuser or hearings should be postponed. Vote her out! https://t.co/c4HVbuX1v0 — Kevin Geoghegan (@KevinGeoghegan4) September 17, 2018 Other lawmakers and women's rights groups, however, did not apparently need more information "to make a judgement" on what should be done now that Ford has come forward. "We believe women and we believe Christine Blasey Ford," said Shaunna Thomas, executive director and co-founder of UltraViolet. "Ford has demonstrated tremendous courage in coming forward," Thomas continued. "We will not sit by and let Republicans attempt to undermine and defame her. We will hold anyone who attempts to discredit Ford accountable, and we will demand that all Senators take her story with the seriousness that it deserves." We @UltraViolet will hold anyone who attempts to discredit Ford accountable, and we will demand that all Senators take her story with the seriousness that it deserves. #StopKavanaugh #MeToo — Shaunna Thomas (@SLThomas) September 16, 2018 SCROLL TO CONTINUE WITH CONTENT Never Miss a Beat. Get our best delivered to your inbox. Given the seriousness and credibility of Ford's accusations, she added, "Kavanaugh should withdraw his nomination immediately. Violence against women should have no place in our society and it certainly should have no place on the highest court in the nation." Sen. Mazie Hirono (D-Calif) did not need more information to believe Ford's story or to make the judgement that a committee vote for Kavanaugh should be postponed: It took a lot of courage for Christine Blasey Ford to come forward to share her story of sexual assault by Brett Kavanaugh. Her story is very credible and I believe her. — Senator Mazie Hirono (@maziehirono) September 16, 2018 This development is yet another reason not to rush Brett Kavanaugh’s nomination. The Committee should postpone this week’s vote. — Senator Mazie Hirono (@maziehirono) September 16, 2018 Toni Van Pelt, president of the National Organization for Women (NOW), agreed. Her group, said Van Pelt, "is firm in our demand that Brett Kavanaugh withdraw his name from consideration for a seat on the Supreme Court." "NOW respectfully demands that Brett Kavanaugh withdraw and if he doesn't, that the Committee and the full Senate rejects the nomination of this flawed nominee," she said. "Our nation simply must deal with bullying, dating, domestic violence, sexual harassment, misconduct, assault, and rape. And until we make sure our homes, schools, workplace, and communities are a safe haven, we will continue to have deaths and lifetime trauma on our hands. Enough is enough."
mini_pile
{'original_id': '172911c6c8c58b9184d91b30161cfba50d142e8ed9d690bcbe7d521d968be14f'}
1ADMINISTRATION, REDACTION ET ANNONCES A PARIS &amp; — Rue Coq-Héron * ~S J&amp; Abonnements : Paris TROIS MOIS. 6 FR» six 4 10 FR. TO AN. 20 FR; JOURNAL POLITIQUE OIJOTIDIEK ON NUMÉRO : 5 CENTIMES &gt; 1 Aionnomeatg : Départements TROIS MOIS. 8FR. SIX MOIS. 15 FR. UN AN 30 FR. PREMIÈRE ANNEE. NUMERO 181 Vendredi i9 octobrel877 (28 vendémiaire an 861 Abonnements de Propagande -. i':'iW,,:,:/ Nous informons nos nombreux Lecteurs que la vente au numéro de LA LANTERNE étant entravée sur un très grand nombre de points, l'Administration, pour répondre aux demandes qui nous parviennent de toutes parts, a résolu de recevoir des Abonnement* dTN JllOIS aux con ditions suivantes : Paris.1 fr. Départements. 2 fr. luz; A partir du 1" Novembre prothain, l'Administration de la Lanterne ne recevra plus que des abonnements s Qe trois mois, six mois et un an. ON DÉFI AU PAYS Nous assistons à un spectacle inouY. Le ministère, condamné par les élections du 14 octobre, écrasé sous le poids de la juste réprobation soulevée par ses tentatives .violentes contre la liberté et les droits des citoyens, par ses illégalités, par le scandaleux àbUs qu'il a fait du pouvoir sans contrôle qu'il a exercé pendant cinq mois, ce ministère affiche la prétention de diriger encore les élections des Conseils généraux. Vaincu dans le scrutin du 14 octobre,il veut encore tenir les urnes au scrutin du 4 novembre. Tué parlementairement par l'ordre du jour du 18 juin, tué constitutionnellement par le scrutin du 14 octobre, il prétend revivre pour exercer encore une dernière pression sur ce suffrage universel qui l'a frappé de déchéance. Jamais on ne vit plus audacieux défi à la conscience publique, à la volonté nationale, et, ajoutons-le, au sens commun. Où a-t-on vu qu'un ministère ait pu survivre plus de vingt-quatre heures à un wrêt de la nation aussi solennel que celui qui a été rendu le 14 octobre,?Dans quel pays a-t-on vu âeâ minimes oser braver ainsi la justice du pays? M. Buffet, dont île respect du suffrage universel ne fut ja. mais la passion dominante, descendit cependant du pouvoir le lendemain du 20 février. Il voulait bien être un vaincu, mais il ne voulait pas devenir un rebelle. Oui, M. Buffet descendit du pouvoir le lendemain du 20 février. Il ne jugea même pas qu'il lui fût possible d'attendre les élections de ballottage. Et M. de Fourtou, ministre de l'intérieur, battu, désavoué, condamné par le suffrage universel, comme M. Buffet, et plus que M. Buffet (car celui-ci n'avait pas la veille du scrutin lancé cette imprudente parole : le gouvernement est assuré de plus de « trois cents voix »), M. de Fourtou prétend encore faire les élections des conseils généraux! Rêvons-nous ? Y a-t-il une morale, y a-t-il une Constitution, y a-t-il une nation souveraine? Est-ce la France qui est maîtresse, est-ce M. de Fourtou ? Non, il est impossible qu'une pareille énormité se réalise. M. le maréchal président de la République a pour strict devoir de l'empêcher. M. de Fourtou, ministre de l'intérieur pendant les élections des conseils généraux, c'est une offense au pays que M. de Mac-Mahon, qui promettait solennellement il y a quelques jours de respecter la Constitution et qui manifestait une entière confiance dans l'arrêt du suffrage universel, ne peut laisser commettre. D'ailleurs, même en se plaçant à son point de vue, quelle autorité pense-t-il que le ministère actuel puisse avoir dans cette nouvelle période électorale ? Aucune, n'est-ce pas ? Pour suppléer à cette autorité qui lui fera défaut, pour réagir contre l'hostilité dusuffrage universel, il cherchera sans doute à mettre de nouveau en œuvre les moyens qu'il a employés pour préparer le scrutin du 14 octobre ? M. de Mac-Mahon, gardien de l'ordre et de la paix publiques, entend-il que de pareils scandales se. renouvellent ? Croit-il que ce n'est pas assez du formidable dossier que la Chambre va avoir à examiner, et veut-il que de nouvelles violences, de nouvelles illégalités soient commises ? C'est à lui de juger. Mais, quoi qu'il décide, l'opinion publique a déjà prononcé. Le ministère Fourtou ne peut rester un jour de plus aux affaires sans qu'il y ait outrage au pays, défi à la souveraineté nationale, violation formelle de l'esprit de la Constitution. ADRIEN DUVAND , ,— Le Coup d'Etat du Figaro Il paraît que les femmes du monde à 270 francs sont dans le marasme, car aujourd'hui la feuille d'annonces de ces dames. le Figaro, sonne la trompette d'alarme. -Le Belge MagnarS, qui oublie sans doute qu'il y a en France une loi sur les étrangers, termine un larmoyant et filandreux article par cet appel à la violation des lois : u Personne ne songe à un coup d'Etat J&gt; pour le moment, mais c'est un dénoû» ment qu'on pourrait rendre à la fois iné» vilable et populaire en exaspérant l'é» norme minorité conservatrice qui se sent » écrasée sous le vote du 14 octobre. » Si nous avions en ce moment un gouvernement soucieux de sa dignité, Magnard à l'heure où paraîtront ces lignes aurait été déjà reconduit à la frontière. Mais chacun sait qu'il n'est d'usage de prendre ces mesures que contre les étrangers qui respectent le gouvernement légal du pays, comme M. Bedel par exemple. De plus, l'appel du Belge de la rue Drouot à la violation de la loi est simplement grotesque, parce que cette violation est impossible. Vous figurez-vous un locataire forçant son propriétaire à déménager? Magnard, en enjoignant à la majorité de ne pas exaspérer la minorité, sous peine de coup d'Etat, nous fait l'effet d'un on apôtre avertissant un patron de ne pas renvoyer son employé, attendu que cet employé a mauvais caractère et pourrait l'assassiner. Quant à nous, il ne nous déplaît pas de voir le journal de M. de Villemessant et de M. de Fourtou examiner l'hypothèse d'un coup d'Etat ; cela nous permettra sans doute de dire notre façon de penser à ce sujet, — sans être gratifié de 3,000 fr. d'amende, — et nous n'y manquerons pas. ■ Il résulte de renseignements transmis par M. Sourigues, candidat républicain à Saint-Sever (Landes), que le dépouillement adonné 9,743 suffrages pour M. Laborde, candidat officiel, 9,703 pour M. Sourigues, 42 pour M. Labrousse, autre candidat républicain, 2 pour M. le comte de Chamord, plusieurs bulletins blancs et quelques bulletins nuls. C'est donc en violation de la loi que les partisans du candidat officiel prétendent qu'il n'y a pas ballottage. — , Le moniteur officiel du 2 décembre/ l'Ordre, prétend que la majorité républicaine va se désagréger et que l'extrême gauche veut agir par elle-même. Comme preuve, le journal de M. Rouher cite les quelques lignes par lesquelles nous annoncions hier qu'un certain nombre de députés avaient l'intention de proposer la mise en accusation des ministres. Que VOrdre se rassure, les députés dont nous voulions parler appartiennent aussi bien au centre gauche qu'à l'extrême gauche, et la majorité républicaine est plus unie que jamais ; du reste, les bonapartistes s'en apercevront bientôt. LA PRESSE ET LES ÉLECTIONS Les organes du 16 mai sont de plus en plus dans la consternation, et comme nous le disions déjà hier, ils commencent à s'accuser réciproquement. L'Orée, aujourd'hui, ne se tient plus de colère, et dit que Y Union a menti, en disant que le bonapartisme était battu.. Quant à l'Union, elle en arrive presque au dilemme de M. Gambetta : L'échec du gouvernement, dit-elle, est de ceux qui ne se discutent pas. Il est manifeste et commande de promptes résolutions. ) Le maréchal de Mac Mahon est obligé de choisir entre ces trois termes : Résister, transi* ger, se retirer. La Gazette de France en veut surtout auj bonapartistes. Voici comment s'exprime cette feuille antique : Ce qui est certain, c'est que les bonapartistes sortent fort amoindris de ce scrutin. L'Ordre dit encore : plus les bonapartistes ont arboré leur drapeau, plus ils ont obtenu de suc* cès. Il oublie que M. Tristan-Lambert qui cria :' Vive l'empereur! à la Chambre; M. Raoul Duval, qui votait pour les radicaux au Sénat pour faire de la clarté dans la situation politique; que M. le duc de Mouchy, cousin de l'empereul, MM. de Maupas, de Padoue, etc., chefs du parti bonapartiste, ont été battus, et que M. Rouher luimême, vice-empereur, a perdu 1,800 voix sur l'élection du 20 février dernier dans le Puy-dec Dôme, son pays natal. On Affectait, M. de Fourtou le premier, do dédaigner le concours des monarchistes, et ce sont eux qui gagnent des sièges. Les autres partis en perdent, voilà l'exacte vérité. --. Le Moniteur universel, fort effrayé (il y a de quoi I) fait un pressant appel à la conciliation. La coalition, dit M. Dalloz, fera donc sagement de ne pas abuser de l'incontestable puissance qui lui reste encore après l'échec moins matériel que moral qu'elle a essuyé le 14 octobre. Ellô fera bien d'accueillir favorablement ou même de devancer toutes les ouvertures conciliantes qui pourront lui être faites par ses adversaires. Quant à l'Univers, il écume, et il lâche mi&lt; nistres et maréchal : Aujourd'hui, s'écrie le bouillant Veuillot, cette première phase de la lutte étant terminée, l'univers déclare que les catholiques, « les cléricaux » FEUILLETON DU 19 OCTOBRE 22 LES 22 mis DE LA MORT GRAND ROMAN HISTORIQUE PREMIÈRE PARTIE PARIS-POLICE VU chez 1.. OrelUe. 4e Chien. (Suite.) -4. Guerno se contentait de rire. — C'est bon, disait-il, il y viendra. Chaque chose a son temps. Il se rattrapera. Et, en fait, il ne cherchait qu'une occasion favorable pour pousser le jeune homme dans l'abîme. Il voulait qu'il y tombât sans avoir conscience de sa chute, se réservant de l'éclairer ensuite et de lui en montrer la profondeur, pour lui enlever tout espoir de s'arracher au gouffre. Mais si la haine rendait Guerno patient, il n'en était pas de même de ses acolytes, qui n'avaient pas les mêmes raisons et ne savaient même pas qu'il couvât sa vengeance. Suivant eùx, Pierrot vivait aux dépens de la bande, et Guerno montrait pour lui une complaisance très préjudiciable à leurs intérêts; il fallait en finir. Pierrot, qui paraissait plongé dans ses réflexions et indifférent à ce qui se passait autour de lui, n'avait point vu Avale-Tout s'avancer vers lui en ricanant et l'injure aux lèvres. Il n'avait pas vu les bandits, que les bandits curieux de voir la tournure que prendrait une scène qui les intéressait tous, s'étaient levés et, s'avançant vers les deux adversaires, commençaient à former le cercle. — Dis donc, espèce de moutard ! commença le brigand d'une voix traînante, d'où vienstu comme ça, avec tes bras ballants et le nez en l'air? Pierrot tressaillit, comme si la voix du bandit l'eût dérangé d'un songe qu'il faisait tout éveillé. Il leva les yeux, vit cette face patibulaire et fit un pas en arrière. De quoi? continua l'agresseur, on veut filer, fausser compagnie aux camarades. pas de ça, mon petit, avance un peu, nous avons à causer. Et prenant brutalement le bras de Pierrot il l'envoya pirouetter jusqu'au milieu de la salle. Le jeune homme surpris, pensa tomber, mais se remettant, iL regarda fixement son 1 agresseur, dont l'étrange silhouette réalisait assez le type du capitaine Fracasse. — Que me voulez-vous ?demanda-t-il d'une, voix dont le timbre chaud et vibrant contrastait avec son apparente faiblesse. — Je t'ai dit que nous avions à causer. — Je suis fatigué, je vais dormir, nous causerons plus tard. — Fatigué ! Cornes du Diable ! Et de quoi ? Est-ce que tu es fatigué de te faire nourrir à rien faire ? Si c'est ça, nous aussi. Est-ce que tu as travaillé ? Ça m'étonnerait. Montre alors ce que tu rapportes. Ça n'a pas l'air de peser lourd. Pierrot, pendant la harangue d'Avale-Tout, avait promené ses regards sur l'assistance et remarqué des ricanements hostiles; il entendait des murmures provocateurs. Le sang lui monta au visage. — Tiens, voilà qu'il se réveille, dit un bandit en le voyant rougir. Parbleu, dit un autre, il a honte. Honte ! s'écria le jeune homme. Ah! oui, j'ai honte d'être ici, honte de vivre au milieu de voleurs et d'assassins ! Une clameur formidable accueillit cette stupéfiante déclaration. Mais Avale-Tout se tournant vers la galerie frémissante: — Silence, vous autres, c'est une affaire à régler entre moi et le moutard. gjXe bandit croisa les bras, et, se retournant vers l'enfant : — Ah çà, te moques-tu de nous ? des grof mots f. mais, petite vipère, tu es bien heu. reux qu'il y ait des voleurs et des assassin, pour te nourrir à rien faire. Quant tu as U ventre plein, tu fais le dégoûté. C'est drôle Qui donc t'a donné du pain jusqu'ici? A qUi vas-tu en demander aujourd'hui ? Pierrot baissait la tête sans répondre. — Tu te tais ! poursuivit Avale-Tout ; c'est bien ce que tu as de mieux à faire ? Mais ça ne suffit pas. Nous voulons savoir où et à quoi tu passes ton temps. A rôder ? à flâner î à moins que tu ne voles pour ton compte. ce serait du propre.Montre donc tes po.::hes¡ à propos. Par un mouvement instinctif et comme s'il eût redouté qu'on portât la main sur lui, Pierrot recula. Ce mouvement n'avait pas échappé au bandit, qui reprit : —Tiens, tiens, on dirait que ça te chinonney Tu grinches donc en sournois ? Ah I nous alIons voir ça, par exempl. Pierrot fit un nouveau pas en arrière poui gagner l'escalier. Mais, sur un signe de son adversaire, oi lui coupa la retraite. — Montre tes poches ! cria celui-ci, ou biei on va te fouiller. Et il étendit la main. A-h ! ne me touchez pas, fit l'enfant d'une voix sourde auo faisait Q.à. trembler le colère.. ne doivent plus'nonner leur concours à de prétendus hommes d'Etat qui craignent de se compromettre en l'acceptant tout haut. Nous sommes convaincus d'avoir exprimé en cela le sentiment-général de nos amis. Le ministère pourra nous livrer encore par ses désaveux à la Révolution. Nous croyons que cette tactique sans justice et sans gloire ne servira ni ses intérêts ni son honneur. Et nous sommes sûrs, quant à nous, de ne rien perdre en ne nous prêtant plus aux combinaisons de ces habiles gens. l Les journaux républicains sont très fermes et nous devons constater que les organes du centre gauche ne montrent pas la moindre faiblesse : Il faut que les gauches, disent très justement les Débats, lorsqu'elles seront appelées au gouvernement, ne l'acceptent que si on le leur remet sans réticences, sans amoindrissement, sans sous-entendus, et n'en prennent la responsabilité qu'à cette condition. On peut le dire dès maintenant, la Chambre, avant toutes choses, demandera à un ministère quelles garanties il s est assurées contre le retour offensif de la politique du 16 mai. Ni M. Dufaure, ni M. de Marcère, ni M. Jules Simon, ni tout autre ne peut entrer purement et simplement au ministère comme ils l'ont fait ew février ou en novembre 1876, Il faut qu'ils soient sûrs d'y rester aussi longtemps quils auront la majorité dans les Chambres, et qu'ilr; soient sûrs auvsi de pouvoir y faire tout ce qu il faudra pour conserver cette majorité. Les moy ens les regardent, c'est à eux de les choisir, ma-s la ijhambre en appréciera la valeur. Il ne yutnt plus d'avoir un ministère républicain. M. le maréchal pourrait prendre aujourd'hui Gombetta comme président du conseil ; qui l'empêcherait demain de le congédier par lettre et d appeler M. de Fourtou ? : M. Anatole de 1a Forge a adressé la 'ettrë suivante à Ses électeurs : AUX ÉLECTEURS RÉPUBLICAINS DU 8 ARRONDISSEMENT l Messieurs et chers concitoyens, Nous étions 3,600 au serai, u de 1876 ; nous ¡'VoIlà 5,200. Le progrès e$t important, d'autant plus i.mportant qu'il s'est produit sous les yeux mêmes rte l'Elysée, du ministère de l'intérieur, de la maison d'Orléans et de M. Rouher, disposant ensemble de la clientèle gouvernementale, de la clientèle cléricale récemment grossie dans nos quartiers par de nouvelles invasions, et de la vieille clientèle impérialiste et monarchique, qui n'a jamais quitté l'arrondissement. D'ailleurs, la France vient de parler. Si ferme et si digne a été son langage, que le jour est proche où, guéris des illusions dont M. de Broglie les flattait tour à tour, les partis dynastiques se débanderont spontanément et où il ne sera plus question de candidatures antirépublicaines. Cette perspective doit nous consoler des 600 voix qui nous ont manqué le 14 octobre pour avoir raison du candidat de la coalition. Je suis fier d'avoir été associé à vos aftirmations libérales et républicaines, et je vous nmercie cordialement de m'avoir jugé digne de votre confiance. ANATOLE DE LA FORGE. ——————— 4 ——————— LA JOURNÉE POLITIQUE M. Qrévy. M. Grévy est attendu demain à Paris.Nous croyons savoir qu'il est décidé à opter pour le Jura. Le candidat républicain pour le neuvième arrondissement serait alors M. Anatole de la Forge, digne à tant d'égards de prendre rang dans la deputation parisienne. ; j lies ministres. ';.",'," 1 Nous croyons savoir que le ministère du 16 mai ne quittera le pouvoir qu'après les élections des conseils généraux. 11 a été question, hier soir, d'un ministère de conciliation dans lequel seraient entrés MM. Léon Renault et l'amiral Pothuau, mai cette combinaison a été presque aussitôt abandonnée. Un fonctionnaire important a dit aujourd'hui : a Le maréchal, navré, ne reste à son poste que parce qu'il a au plus haut point le sentiment de son devoir ! » Les antichambres du ministère de l'intérieur continuent à être encombrées par les préfets de combat mandés à Paris par M. de Fourtou. ," -. D'après ce qu'on nous assure, les instructions verbales données par M. le ministre de l'intérieur sont des plus précises : faire élire par tous les moyens possibles les candidats aux conseils généraux agréables à l'administration. On nous raconte également que, ce matin, un des repréaentants de l'ordre moral, sortant du cabinet de M.de Fourtou, n'aurait pas craint de dire à haute voix que son ministre était plus que jamais décidé à aller « jusqu'au bout ». Les protestations. M. le comte de Douville-Maillefeu vient d'adresser à la questure de la Chambre des députés une protestation longuement motivée contre les opérations électorales et les fraudes accomplies dans la 2P circonscription d'Abbeville. Des protestations analogues ont été également adressées par les comités électoraux du Vaucluse. L'élection de la 2circonscription de Nice, contestée de toutes parts, sera certainement invalidée. Malgré la pression inouïe qui a eu lieu, le candidat officiel ne l'a emporté que de 1,500 voix sur M. Magnier, le candidat des comités républicains. Les contestations. Plusieurs élections sont contestées par le gouvernement, celle de M. Boude ville, contre M. le duc de Mouchy dans l'Oise, notamment. De son côté, le parti républicain proteste contre huit ou dix résultats proclamés. Les rectifications qui auront lieu ne modifieront en aucune façon les chiffres. Dès à présent le parti républicain peut compter dans la Chambre sur une majorité de 110 membres. M. Crillpl. M. Crispi restera plusieurs jours à Pesth, où il doit avoir une entrevue avec le comte Andrassy. L'homme du M mai. M. Target, ministre de France à la Haye, est arrivé à Paris, hier soir, venant de Bruxelles. L'homme du 24 mai vient-il porter ses doléances aux vaincus du 16 mai? Lei manifestations à l'étranger. Le correspondant parisien du Secolo de Milan veut bien nous communiquer la dépêche suivante : Milan. 10 heures 57 matin. Hier soir une grande démonstration a eu »lieu au consulat français. Des cris chaleureux de : Vive la République ! Vive la France ! se sont fait entendre. On télégraphie de Rome, i7 octobre : Les journaux libéraux expriment leur satisfaction du résultat des élections en France. Ils espèrent que la crise est terminée. ILes pweèi de presse. Notre correspondant de Lyon nous télé. graphie : Lyon, 1 h. 25 soir. M. Tony Loup, rédacteur au Petit. Lyonnais, a reçu une assignation à comparaître devant le juge d'instruction, pour articles publiés dans la Tribune des sous le titre : « Aux Electeurs des campagne ». Trois délits sont relevés : excitation à la haine et au mépris du gouvernement, offenses aux ministres, tentative de trouble de la paix publique. Les traités de commerce. Mardi a eu lieu uue conférence entre les commissaires chargés par les gouvernements français et espagnol d'élaborer des tarifs du nouveau traité de commerce &amp; signer par les représentants des deux nations. Les ministres des affaires étrangères et du commerce et l'ambassadeur d'Espagne assistaient à cette conférence. La commission se réunira trois fois par semaine au ministère du commerce. —.. —— LA GUERRE Les opérations sur le Danube. Bucharest, 17 octobre. Le beau temps continue, et le Danube a baissé considérablement. Les tranchées de l'armée russo-roumaine ne sont plus qu'à 50 mètres de la seconde redoute de Grivitza, dont l'artillerie ne répond plus au feu des assiégeants. Dans un conseil de guerre tenu à Gorny-Studen le 12 oètobre, la majorité s'était prononcée pour une attaque de vive force contre les positions de Plevna. Le général Totleben a proposé, au contraire, de conduire les têtes de sape jusque sous les ouvrages pour les faire sauter, disant que les Turcs devaient avoir préparé des fourneaux de mine en cas d'échec. Son avis ayant prévalu, la prise de Plevna sera retardée de quelques jours ; mais elle n'en sera que plus certaine et coûtera bien moins de monde. On n'a aucune nouvelle du mouvement du général Gourko, qui a dû faire une pointe à la tête de trois divisions de cavalerie. Il est de nouveau question de rappeler le général Zimmermann, qui, à la tête d'un corps d'armée de plus de 40,000 hommes, opère dans la Dobroudcha. Les nouvelles de la frontière autrichienne annoncent que quelques troupes d'hommes armés ont été aperçues près de Foscani. Les 13 et 14, le canon s'est fait entendre dé nouveau dans les passes de la Schipka. (Correspondance universelle.) f-; La bataille de Kars. Au sujet de la bataille qui a été livrée le 15 octobre dans les environs de Kars, et qui, d'après toutes les dépêches provenant du camp russe, s'est terminée par une grande victoire du grand-duc Michel, nous n'avons encore reçu de Constantinople que la dépêche suivante : Constantisople, 17 octobre. On assure que le ministre de la guerre a reçu hier une dénêche de Moukhtar-Pacha annonçant une nouvelle bataille aux environs du mont Aladjadag. Les Russes attaqués par les Turcs commençaient à plier lorsque la dépêche a été expédiée. La bataille était très sanglante. L'agence Maclean reçoit de Londres le texte suivant d'une dépêche officielle russe concernant la même bataille : Saint-Pétersbourg, mercredi. Nos troupes ayant occupé le mont Awlias, l'armée de Moukhtar-Pacha s'est trouvée coupée en deux; la portion de l'armée ennemie, qui battait en retraite sur Kars, a été attaquée par le général Lazareff et poursuivie ensuite par le général Steimann, laissant entre nos mains plusieurs milliers de prisonniers avec quatre canons. Pendant cette affaire, trois divisions formant le flanc droit des Turcs étaient cernées et ont été forcées de se rendre; sept pachas sont prisonniers. Nous avons pris 3t canons; MoukhtarPacha s'est enfui à Kars. Londres, 17 octobre. Le Daily News reçoit une dépêche datée de Karayal, lundi, confirmant la défaite des Turcs près de Kars, et leur fuite en désordre dans trois directions différentes. Les Russes se sont emparés du camp turc. (Agenct MQCfea.} Hésitation de la Serbie. Bucharest, 16 octobre. Dans nos cercles politiques, le bruit s'accrédite que la convention serbo-roumaine n'est pas définitivement conclue. La Russie, pour des raisons diplomatiques, refuserait de traiter directement avec la Serbie (Correspon. "AWeNeUe.) u. ■+. THEATRES La reprise de Paul et Virginie a été des plus brillantes. Le tout Paris des premières représentations était au grand complet. Mlle Heilbron nous a fait oublier Mlle Rit.: ter, la volage Virginie ; c'est, à mon avis, le plus bel éloge que l'on puisse lui adresser.' Quant à M. Capoul, Mlle Engalli et Mme Sallard, je n'aurai qu'à répéter les éloges dont ils ont été salués lors de la création de Paut et Virginie. Je suis heureux de constater le grand succès de cette reprise, qui sera certainement fructueuse. M. Vizentmi fait véritablement des efforis dont le public et la presse doivent lui tenir compte. UN MONSIEUÛ DU PABTERRS. ■ • LES OBSÈQUES DE GUSTAVE MATHIEU Les obsèques de Gustave Mathieu ont et lieu hier, mercredi à Bois-le-Roi, ainsi que nous l'avions annoncé Le poëte a été enterré dans le cimetière de ce petit village, sur la lisière de cette forêt de Fontainebleau qu'il a si souvent chantée etjà laquelle il a dû quelques unes des plus fortes inspirations de son beau livre : Parfums" chllnts et couleurs. Un grand nombre d'amis ont suivi son convoi. De Paris étaient venus des littérateurs, des poètes, des amis politiques : Charles Monselct, Etienne Carjat, Louis Davyl, Paul Arène, Obvier Métra, Bordone, LecAllu; Louis Jeannin, Léon Comte, Charles Verdier, Boitai, Auguste Pellet, Bellot , Varnot, etc. des ^peisUpes ; parmi lesquels Stevens, de Knytf, Aimé Perret, Bail, iloui. bard, Castellaui, etc., etc. Trois discours ont été prononcés sur la tombe par nos confrères Charles Monselet, Carjat, et par M. Lecann, ex-préfet de la Ré. publique. Un grand nombre d'habitants de Bois-le" Roi et des villages voisins étaient venus assister à l'enterrement, qui, selon l'expresse volonté du déiunt, a été purement civil. Le cercueil disparaissait sous les fleurs, parmi lesquelles dominait la violette, la fleur aimée dé ce pauvre Gustave Mathieu, qui en portiittoujours un bouquet à sa boutonnière. Un magnifique dessin de Gustave Mathieu, mort, a été fait par le peintre Aimé Perret; ce dessin sera photographié par Carjat. L" L'EXPLOSION DE LA RUE DE RIVOLI; Les accidents se suivent et se ressem* blent. ,. Nous disions dernièrement, à prepos de l'automne, que les incendies et les feux de cheminée allaient revenir avec le froid. Les événements ont justifié nos prévisions. Les accidents qu'amène le gaz retitrent dans la même catégorie. Ils sont plus fréquents en cette saison qu'en été.. Et cela pour une bonne rai&amp;on : les jours raccourcissent. Nos lecteurs se souviennent de l'explosion de gaz qui a eu lieu rue Vivienne, il y a en. viron trois semaines. Nous en avons rendu compte ici. Il y aquelquesjours, un accident semblable se produisait rue de Dûnkerque. Une mère affolée précipitait ses enfants de balcon en balcon et les suivait dun. cette chute péripeuse. Le gaz avait mis le feu dans l'escalier, £ i,ous avons également, relaté. ce fait. ,-., — Bah 1 fit le colosse, tu es donc en sucre ? Tous éclatèrent de rire. Eh bien, dit Avale-Tout en s'élançant, je vais te grignoter, moi. Et la large main du bandit s'abattit sur son épaule. D'un brusque mouvement l'enfant se dégagea, fit un bond de côté, et s'armant d'un couteau: — Si tu me touches, je t'éventre comme un chien 1 crià-t-il. — Vrai ! dit Avale-Tout, reculant néanmoins avec prudence. Eh ben, on va rire. Et détachant à l'enfant un savant coup de savate, il lui fit tomber l'arme des mains. Avant qu'il eût pu se reconnaître, il s'était jeté sur lui et l'avait renversé. — Tenez-le, vous autres, dit-il, moi je vais le fouiller. Dix mains s'abattirent sur le malheureux enfant, qui se tordait de rage impuissante, pendant que le voleur fouillait dans ses poches. — Un morceau de pain, fit ce dernier, énumérant les objets qu'il rencontrait. Peste! il n'oublie pas le solide. Un journal. Ah! c'est vrai ! monsieur a appris à lire.. Qu'estse que c'est que ça? d u s avon ? petit aristocrate!. Voyons dans sa veste. Et d'ua geste brutal, Avale-Tout déchira les guenilles qui lui couvraient la poitrine, et, du milieu des haillons, sortit uatbout de ruban, un ruban de satin d'un bleu pâle, frais, charmant, que le voleur déploya en éclatant de rire. — Misérable ! hurla Pierrot, rends-moi mon ruban, je le veux. — Tu le veux? Est-ce qu'on parle comme ça, espèce de propre-à-rien! liends-inoi mon ruban! — Soit, mais tu viendras le prendre. Lichez-le vous autres, dit Avale-Tout en ouvrant un long couteau, je vais lui donner une leçon. Ah! tu m'as provoqué, biauc bec; eh bien, il faut en découdre à cette heure. Pierrot s'était relevé et avait ressaisi son arme. Son visage avait repris sa pâleur,ma.is ses yeux étincelaient ; replié sur lui-même, il était prêt à s'élancer. — Allons! fit-il avec violence veux-tu me rendre mon ruban, voleur 1 — Viens le prendre. ,. Et le bandit noua le ruban en guise de cravate autour de son cou musculeux. — Regarde, fit-il à Pierrot, comme ça me va bien. Il n'avait pas achevé ces mots que, fou de rage, l'enfant se précipitait sur lui. VIII Fil-de-Crin L'élan de Pierrot avait 6té si rapide que son adversaire dut rompre à deux reprises, pour éviter les coups qu il lui portait frénétiquement. ,.. Le jeune homme emporté par la fureur ne songeait point à se couvrir ; il ne pensait qu'à reconquérir le précieux ruban, au prix de tous son sang, au prix de la vie d'un homme. Mais le jeune rêveur était inhabile À ces luttes au couteau, dans lesquelles son adversaire était expert. Aussi Avale-Tout se retourna-t-il brusquement, puis se baissant jusqu'à terre, il passa sous le bras de f'enfant et se redressant le saisit traîtreusement à la gorge.. Pierrot, sous la pression de ses doigts osseux, poussa un gémissement de souffrance. ses reins se cambrèrent, ses jarrets plièrent, il se sentit tomber. La chute, c'était la mortLa lame brilla devant ses yeux convulsés. Implacable, Avale-Tout leva le bras, mais au moment où l'acier effleurait la poitrine de l'enfant, on entendit un cri sauvage, et l'assassin, le front sanglant, aveuglé, hurla; roula dans la poussière. Qui l'avait frappé ? Qui venait de sauver si à propos le malheureux Pierrot ? C'était un bizarre personnage, moins homme que squelette, aux cheveux jaunes et aplatis, au visage glabre, d'une laideur à la fois étonnante et pittoresque avec ses petits yeux verts, voilés de cils roux et surmontés de sourcils en broussailles,haut de six pieds, avec de longues jambes, et dont les épaules légèrement voûtées et tombantes., faisaient à peine saillie sur laJige du corps. Une maigreur excessive et peinante, un composé d'os durs comme la pierre, reliés par des nerfs et des muscles qui semblaient de vrais ressorts d'acier, tel était l'aepect saisissant de cet être quasi-fantastique, qui venait d'apc porter à Pierrot un secours si opportun. Il s'était élancé des dernières marches de l'escalier sur le bandit, d'un bond si prodigieux, qu'il semblait voler, et lui avait asséné, dans toutes les règles de l'art, un coup de poing magistral qui l'avait envoyé rouler dans les jambes des spectateurs. ; La main qui avait accompli cet exploit mérite à elle seule une description. une main? Non une éclanche de mouton, maigre, noueuse, sur laquelle se croisaient des réseaux de muscles, comme des cordes de guitare, velue, sèche, et terminée par des ongles durs et crochus. 'le tout emmanché d'un long bras dont 'la détente aurâit abatta le colosse. Avale-Tout gisait étourdi sous la violence* du choc. La main s'étendit vers l'enfant quelle remit délicatement sur ses pieds. Pierrot regarda son libérateur t — Ah! merci, Fil-de-Crin, dit-il, tu es veuti, à temps* :." ! (A sw'&amp;tJ) E,*A, SPOLU Hier soir une troisième explosion de gaz mettait en émoi le quartier des Halles.. Cette explosion avait lieu à six heures dii soir, au magasin de confection, l'Histoire de France, 53, rue de Rivoli. Une fuite de gaz s'était produite dans la .matinée. Le concierge et les locataires de la maison nous ont déclaré que depuis, midi ils sentaient l'odeur du gaz dans l'escalier et dans les appartements. On prévint donc les ouvriers gaziers qui recherchèrent la fuite. Chacun sait qu'en ce cas il faut une lumière. Cette recherche amena une explosion. A six heures du soir, les vitres volaient en éclats, en même temps qu'une détonation formidable retentissait. Les voisins la comparent à un coup de canon. Plusieurs personhes nous ont déclaré avoir cru que c'était la coupole du théâtre du Chatelet qui sautait. La force d'expansion du gaz a dû, du reste; être considérable. Nous avons dans nos bureaux desfroments de vitres brisées. Ces vitres mesuraient presque un centimètre d'épaisseur ; on se rend doné compte de la violence de l'explosion. Les morceaux ont été projetés dans , la rue. Heureusement personne des passants n'a été blessé. Mais si aucun accident n'est arrivé à l'extérieur, il n'en a pas été de même pour M. Bodson, le directeur de l'établissement et les ouvrier s gàziers qui cherchaient la fuite. M. Bodson a été blessé au sommet du crûs© etiw rfont.'Il a auui une blessure au sourciL unë autre" au bras gauche et une autre encore s la jtratfwrgrffciche. La paiFoil plombier a été blessé à la tête. Un ouvrier ploz&amp;bior a *a .la joue droite, toute brûlés ; l'œil du même côté est probabletftèût petàn. An côté droit de la tête existe une p'Iàiô .longua.d'euvvou quatre centimètres. Au cou; une autre plaie profonde la trachée-artère; on voyait le larynxse mouvoir à, chaque respiration. Autre blessure énorme à la réunion du.oou éb de la dlavicule gauche. Deux autres biMsurM encore, l'une à la saignée du bras droit,'" àü lonti de cette plaie apparaissaient les vais»au.&amp;, l'aître au genou droit. « a ,"Enfin, ce malheureux avait une huitième blessure : le flanc gauche était horriblement déchiré an niveau du cœof. • On l'a transporté à l'Hôtél-Dieti dans un ^tat désespéré, et il est bien à craindre qu'il soit mort à l'heure où nous écrivons. Un ouvrier plombier a eu la figure presque ontièrement brûlée. Un éclat de verre lui a coupé la Lèvre inférieure. Il est heureux d'en être quitté à si hou marché: l'explosion l'a précipité de l' en tressai, où il travaillait, au reî-de-ôhaussée; Les docteurs Douvillé, Berruyer et Poupon, qui habitent dans le quartier, sont accourus immédiatement sur les lieux et ont prodigué leurs soins aux blessés, qui avaient été transportés d'urgèncè à la pharmacie David. Il est heureux qu'un incendie n'ait pas suivi l'explosion. Quelques vêtements ont bien pris fe.. mais les flammes ont été éteIntes à Talflè de seaux d'eau. A demain, s'il y a lieu, d'autres détails. -4 , **• )■■■*■■■ — # PARIS Les obsèques de Théodore Barrière ont lieu aujourd'hui, jeudi, à midi précis, en l'église Saint-Eugène. On se réunira ala maison morùiaire,25t rue Bergère. ,' Les personnes qui n'auraient pas reçu de lettre de faire part sont priées de considérer le présent avis comme en tenant ¡wu..,:.'r.. ,.,. Plusieurs jeunes gens,dit lé SoîVjéfcaient réunis dans un petit salon d'un restaurant de la chaussée Clignancourt. Le repas terminé, ils voulurent prendre un bol de punch.Le liquide flambait sur la table, lorsque tout à coup l'un d'eux, voulant se lever, renversa celle-ci avec tout ce qu'il y avait dessus. L'alcool enflammé, répandu par terre formait une flamme énorme, qui bientô se communiqua aux vêtements d'une femme qui, en un instant, fut entourée par le feu. M. Adrien, l'un des convives, eut la présence d'esprit de prendre immédiatement la nappe, en entoura la jeune femme et parvint à éteindre le feu, après avoir eu de fortes brûlures aux mains. La femme a été immédiatement soignée, mais elle a le corps couvert de fortes brûilures. : --=:. -----. ' Voici novembre. Les Ecoles supérieures et les Facultés vont rouvrir leurs cours. Ceux de l'Ecole de pharmacie commenceront le C novembre. Le registre deë inscriptions sera ouvert le 20 octobre et clos le 6 novembre. Brrr!. Cela sent l'hiver. Hier, de grand inan, des ouvriers, qui se rendaient à leur travail, ont vu cinq cigognes blanches perchées sur -le Commet de la tour Saint-Jacques. Aux premières lueurs de l'aurore elles prenaient leur vo vers le sud.. or c '..--. C'est demain, vendttèdi, qu'aura lieu, au palais de l'Industrie, le tirage au sort des volontaires d'un an, tirage qui doit déterminer les régiments dont ils feront partie. Nous publierons les régiments et les numéros. Encore des suicides ! En s'éveillant, hier matin, la dame C., 8e de ne domiciliée rue du Mail, fort surprise de ne pas trouver près d'elle son mari .Différentes circonstances lui ayant fait craindre qu'il n'eût mis à exécution un funeste dessein, elle se rendit a son bureau, situé Ú. l'étage supérieur. Une odeur carbonique s'exlialant dans le corridor augmenta ses soup çons. Avec l'aide d'un locataire voisin elle enfonça la porte et elle trouva son mari affaissé sans vie dans son fauteuil, près duquel Achevait de se consumer le charbon contenu dans deux réchauds. ,'. Le suicide du sieur C. est attribué au chagrin causé par des pertes commerciales. Le même jour, rue Montjiyon, la demoiselle D. a tenté de s'asphyxier pendant l'absence d'une personne avec qui elle entretenait des relations. Le hasard ayant ramené son amant plus tôt qu'elle ne s'y attendait, il a réclamé' des secours et la demoiselle D. a reçu les soins d'un médecin qui l'çnt ranimée. Le sieur Ch., employé de commerce, âgé de soixante ans, demeurant quai des Celestins, s'est brûlé la cervelle hier à une heure et demie. , ',' On ignore la cause de ce suicide. -«iMrfWiï» k ■■■■■» r * Un triste accident est arrivé hier matin à onze heures et demie sur le chemin dé fer de l'Ouest.. -• &gt; ^—,— -Le sieur Denais, aiguilleur aux fortifications, a été renversé par une machine au moment où il traversait les voies. Denais a été transporté d'urgence à l'hôpital Beaujon. Son état est fort grave. Nous apprenons que le recours en grâce du condamné Albert, l'assassin de la tour Malakoff, a été rejeté par le maréchal, président de la République.. Il faut donc s'attendre à voir d'ici à quelques jours, les détails de son exécution dans les journaux. Lundi dernier, à midi, a eu lieu le tirage des obligations de la Ville de Paris de l'Emprunt 1869. C'est l'heureux porteur de l'obligation ayant le n° 91,982 qui a gagné le lot de 200,000 fr.; les nos 217,844, 101,069, 61,953 et 449,022 ont gagné chacun un lot de 10,000 fr. Les nos 206.855,110,552,129,841, 188,103, 13,217, 387,088, 537,090*376,127, 687,828 et 310 ont eu chacun un lot de. 1,000 fr. ——————-— ♦ M. le ministre de la justice a adressé aux procureurs généraux la circulaire suivante : Paris, 10 octobre. Monsieur le procureur général, L'article 6 de la déclaration monétaire du 3 février 1876, entre, la France, la Belgique, la Grèce, l'Italie et la Suisse, porte ce qui suit : « Les, gouvernements contractants se donneront réciproquement avis des faits qui parviendraient à leur-connaissance au sujet de l'altération et de la contrefaçon de leurs monnaies d'or et d'argent dans les pays faisant ou non partie de l'union monétaire, notamment en ce qui touche auxprocédés employés, aux poursuites exercées et aux répressions obtenues. Ils se concerteront sur les mesures à. prendre en commun pour prévenir les altérations et contrefa çons, les faire réprimer partout où elles se seraient produites et en empêcher le renouvellement. » M. le ministre des finances réclame le concours des magistrats pour l'aider à remplir les obligations qui lui sont imposées par cette convention. Mon collègue exprime, en conséquence, le désir qu'aussitôt qu'une affaire de fausse monnaie sera entrée à l'instruction, une note sommaire,, mais précise, soit rédigée par les soins du parquet fsur lesjcirconstances du crime, et que cette note me soit transmise, accompagnée, autant que possible, d'échantillons de pièces saisies, pour que le tout soit soumis, par son intermédiaire, à l'examen de l'admin tration des monnaies, qui possède un personnel ayant les connaissances techniques n-écessaires et des laboratoires spéciaux pour les travaux d'essai et d'analyse. Les résultats des travaux auxquels il serait immédiatement procédé seraient ensuite communiqués aux magistrats s'ils offraient quelque utilité, et pourraient guider les experts nommés par la justice, dont la responsabilité he serait pas d'ailleurs déplacée, l'intervention de l'administration des monnaies étant purement administrative et ne devant, eh outre, en aucun cas, avoir pour effet de retarder l'action judiciaire. La présente circulaire ne déroge pas au paragraphe 13 de celle du 6 décembre 1840, qui prescrit l'envoi à la chancellerie des extraits de condamnation ou d'ordonnance d'acquittement en matière de fausse monnaie, sauf en ce qui concerne les échantillons qui auraient été déjà. fournis au début de l'information. Ce sont ces extraits qui font connaitre les répressions obtenues ii l'administration des monnaies, à laquelle ils sont communiqués. Je vous "prie de vouloir bien m'accuser réception de cette circulaire, dont je vous transmets des exemplaires en nombre suffisant pour tous vos substituts. Recevez, monsieur le procureur général, l'assurance de ma considération très distinguée. 'Í,: Le gairde des sceaux, ministre de la justice, président du conseil, BROGLIE. j— —♦ ——. TRIBUNAUX CONSEIL DE GUERRE DE L'ARMÉE RUSSE Affaire de M. Pognon, correspondant de l'agence Bavas. — Tentatire de meurtre et de vol par un soldat russe. Le 6 août dernier, M. Pognon, correspon..-;, dant militaire spécial de l'agence Havas, qui' suivait les opérations de l'armée russe, en Bulgarie, se rendit à Simnitza pour expédier son courrier. A son retour, la nuit était tom: bée, et M. Pognon, égaré en route, rencontra un soldat russe, nommé JLasnak, qui lui offrit de le guider. Après quelques pas, le journaliste reçoit un coup violent sur la tête; il chancelle; un second coup l'abat à terre, et son guide se ruant sur lui, s'efforce de ré. trangler et d'étouffer ses cris en lui remplis.. sant la bouche de sable. Heureusement l'appel fut entendu. UnT lieutenant russe accourut et releva M. Po* gnon couvert de sang et grièvement blessé, Quelques secondes plus tard, un marin arrêW tait Lasnak. L'assassin commença par nier. Mais la Français ayant assuré, que son agressent devait porter les marques de coupsae cra* vache, on examina le soldat dont le visage était sillonne d estafilades. L'accusé changea alors son système de défénse et prétendit qu'une altercation s'étant élevée entre lui eti le journaliste Qui lui refusait un légitima* pourboire, il avait frappé, sous l'influence de' la colère et de la boisson, mais sans inten&lt; tion de tuer ni de voler. * L'état de M. Pognon est fort ;"grave : lé* sions dangereuses à la tête provenant de coups assénés avec un lourd bâton; fractura de l'épaule droite. Sans la promptitude da secours, les blessures eussent déterminé 4n?* faïlliblement la mort. ; Une des dépositions les plus intéressatitée est celle du matelot Panaschoff, que nous xe« produisons l' :.t v ■ &lt; H. J'étais de quart à 'l'entrée de notre cainpà quand tout # à coup j'entends des cris, des crisd • mais des cris à fendre le cœur d'un Turc On au-' j rait cru un petit bœuf qu'on écorchait. Aussitôt! arrive notre officier (le matelot salue militaire. ment) qui nous crie : « Enfants, suivez. inoi !. » On y va. Le lieutenant n'a pas besoin de noua i dire les choses deux fois. Nous courons commet des cerfs, et voilà que je vois une masse noire èf des cerfs, c'étaient deux hommes couchés l'un sur : blanche; l'autre comme du beurre sur une tartine. Mais voilà que la moitié de la tartine se détache et se.' met à conrir à courir comme s'il avait les coli* ques (sic). Le procureur général insiste sur la gravita et le retentissement du crime et requiert une condamnation à mort. « Si le misérable qUI est devant vous — conclut le magistrat — a^ souillé l'uniforme du caar, vous ne lui per] mettrez pas de nous déshonorer une seconde fois. » Lasnak i été condamné à tiaort^ En vain f M. Pognon adressa-t-il au grand-duc. Niwlaa; une demande de grâce en faveur du con damné. La supplique ne fut pas accueillie,^ et, le 30 septembre dernier, lè soldat russe tombait sous les balles, dans unenclos situé près du lieu où il avait commis. sc)nattentat-. —————————— 1 ..———— DÉPARTEMENTS i - Pas-de* Calais. A Langatte, on pousse activement les travaux d'essai pour la constructioa, du fameux tunel sous-marin. A cent mètres au-dessous du niveau de 'ltr"' FEUILLETON DU 19 OCTOBRE 131 &gt;. • ; 131 A L lî: E U te ■' •' : AUX :PAUVRES1' 2* PARTIE : -. DU CABARET A L'ÉCHAFAUD! ,': .;. CHAPITRÉ XXVni La veille de la Ml-Carême (Suite.) Dénia n'entendait pas, ne comprenait pas; c'est machinalement, pour aider Basiliâe à bavarder, qu'il dit : # OUi !. i« Tu comprends que-e'est bien plus «imple; tu ne viendras pas me chercher de. l'autre côté de l'eau. En sortant ensemble, nous prenons une voiture, nous allons chez les Lapchez, et ça va tout seul. Denis tendait l'oreille; il lui semblait qu'on faisait du bruit dans cette rue morte qui s'appelle la rue des, Panoyaux, et, tremblant, il dit à Basilido étonnée : -: Oui, oui, tu as raison. partons vite, allons chez toÏ¡.. Mais, tu as donc dîné, toi? — Nôn. C'est vrai. dit Denis fiévreux, inquiet-dJe n'y pensais plus. allons dîner. • Basilide regarda sqn amant, disant : .;.. Qu'est-ce que tu as donc, ce soir? Moi? rien!. et il n'osait lever les yeux, le misérable: il dit brutalement : J'ai faim. viens j vite. Il entraîna Basilide assez étonnée. Ils montaient en voiture sur le boulevard extérieur. Denis eut un tressaillement en voyant deux fiacres s'arrêter devant la ruedès Panoyaux et six hommes en descendre. L'un d'eux, commandant aux autres, semblait leur indiquer ce qu'ils avaient à faire. Denis avait d'eviné, c'étaient les agents.. Il ferma' la portière de sa voiture et dit à son cocher : Vite, vite, rue de Tournon. CHAPITRE XXIX « jÇais enfants du Carnaval. » Yvôtte demeurait rue Servandoni ; elle avait loué une petite chambre garnie au quatrième tage. Je dis chambre garnie, n'osant pas dire : meublée ; car la garniture se composait d'un petit lit d'une personne, en fer, qu'on pouvait fermer pendant le jour ; le lit également était si sobrement garni, qu'il ne pouvait permettre le sommeil qu'à unelemme. Dans la petite chambre, étroite et mansardée. il y avait avec cela une table de bois blanc sur laquelle étaient une terrine et une bouteille : c'était le meuble de toilette; il y avait une chaise, et dans un angle trois clous qui servaient depatères. et, nous le savons, hélaslc'était encore plus qu'il n'en fallait pour accrocher la garde-robe d'Yvette. La jeune femme ne passait guère que la nuit dans sa chambre, et elle lui suffisait. Yvette se levait avec le jour; sa nature propre et soignée ne permettait pas à la misère de la salir ; elle passait une heure à faire sa toilette et à ranger sa chambre. Elle rentrait un peu plus tard le soir, faisant une heure de travail de plus pour laver et repasser son linge. Aussi, de son col blanc sortait son cou bien propre, bien rose, et de ses manchettes des mains si soignées, qu'elles paraissaient petites ; elle allait faire sa journée. Le dimanche, elle travaillait jusqu'à trois heures. et elle courait aussitôt voir sa petite fille. Yvette adorait sa fille. Elle aimait Denis, et l'obligation dans laquelle elle avait été da se séparer de lui était la cause de la tristesse toujours répandue sur son visage. Il aurait fallu renoncer à son enfant: elle ne s'en sentait pas le courage.. Elle aimait mieux le malheur, l'abandon avec sa fille, que la vie tranauille sans elle. Aristide aui d'abord avait espéré remettre les deux époux ensemble, y avait renoncé en voyant le rapide changement survenu dans la nature de Denis. Et il avait tout dit à Yvette,., espéranainsi la rassurer; en lui montrant l'indigne conduite de Denis, elle y pouvait trouver l'excuse de son malheur. Au. contraire, la malheureuse femme en souffrit. Elle aimait Denis, et elle aurait voulu trouver chez lui un oubli, moins prompt. un mépris moins grand.
common_corpus
{'identifier': 'bpt6k75043249_1', 'collection': 'French-PD-Newspapers', 'open_type': 'Open Culture', 'license': 'Public Domain', 'date': '1877.0', 'title': 'La Lanterne : journal politique quotidien', 'creator': 'None', 'language': 'French', 'language_type': 'Spoken', 'word_count': '7972', 'token_count': '12962', '__index_level_0__': '40127', 'original_id': 'b5159a86182fd9628fa4a9622421c14279f026ea67bb80c6a00cf049c4dfb46c'}
104 >++++++++[<+++++++++++++>-]<.> #h 116 >++++[<+++++++++++++++++++++++++++++>-]<.> #t 116 >++++[<+++++++++++++++++++++++++++++>-]<.> #t 112 >+++++++[<++++++++++++++++>-]<.> #p 115 >+++++++[<++++++++++++++++>-]<+++.> #s 58 >++++[<+++++++++++++>-]<++++++.> #: 47 >++++[<+++++++++++++>-]<-----.> #/ 47 >++++[<+++++++++++++>-]<-----.> #/ 121 >++++++++++[<++++++++++++>-]<+.> #y 111 >++++++++++[<+++++++++++>-]<+.> #o 117 >++++[<+++++++++++++++++++++++++++++>-]<+.> #u 116 >++++[<+++++++++++++++++++++++++++++>-]<.> #t 117 >++++[<+++++++++++++++++++++++++++++>-]<+.> #u 46 >++[<+++++++++++++++++++++++>-]<.> #period 98 >+++++[<++++++++++++++++++++>-]<--.> #b 101 >+++++[<++++++++++++++++++++>-]<+.> #e 47 >++[<+++++++++++++++++++++++>-]<+.> #/ 100 >+++++[<++++++++++++++++++++>-]<.> #d 81 >++++[<++++++++++++++++++++>-]<+.> #Q 119 >++++++++++[<+++++++++++>-]<+++++++++.> #w 52 >++++[<+++++++++++++>-]<.> #4 119 >++++++++++[<+++++++++++>-]<+++++++++.> #w 57 >++++[<+++++++++++++>-]<+++++.> #9 87 >++++[<++++++++++++++++++++>-]<+++++++.> #W 103 >+++++[<++++++++++++++++++++>-]<+++.> #g 88 >++++++++[<+++++++++++>-]<.> #C 99 >+++++++++[<+++++++++++>-]<.> #c 81 >++++++++[<+++++++++++>-]<-------.> #Q
the_stack
{'hexsha': 'acf5c62770f09dd75e749c089a13624026158899', 'size': '1193', 'ext': 'bf', 'lang': 'Brainfuck', 'max_stars_repo_path': 'Noted version.bf', 'max_stars_repo_name': 'AntsyBoi/BrainFuck-RickRoll', 'max_stars_repo_head_hexsha': 'a07e8e42864976c641a0621abe97faf200203af2', 'max_stars_repo_licenses': "['Unlicense']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'Noted version.bf', 'max_issues_repo_name': 'AntsyBoi/BrainFuck-RickRoll', 'max_issues_repo_head_hexsha': 'a07e8e42864976c641a0621abe97faf200203af2', 'max_issues_repo_licenses': "['Unlicense']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'Noted version.bf', 'max_forks_repo_name': 'AntsyBoi/BrainFuck-RickRoll', 'max_forks_repo_head_hexsha': 'a07e8e42864976c641a0621abe97faf200203af2', 'max_forks_repo_licenses': "['Unlicense']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '42.6071428571', 'max_line_length': '50', 'alphanum_fraction': '0.0838222967', 'original_id': '915ed875b327179f364b0f089136db68538ab4185219983080eac57011b6d439'}
Product Description Many parenting books are based on hit-or-miss theories steeped in secular thinking. This one draws from Pastor Tripp's seasoned experience as a father-and from God's Holy Word. Grounded in the Bible's divine plan for parenting, this guide defines your goals as a parent and provides the Scriptural methods for accomplishing them. Publisher's Description In this revised edition of Shepherding a Child's Heart, Dr. Tedd Tripp not only draws on his thirty years of experience as a pastor, counselor, school administrator, and father, but he also shares insights gained in ten years of teaching this material in conferences worldwide, providing more valuable help for parents. The book was a good read, providing an approach that deals with the heart. As parents, we need to deal with the heart of the issue not just the symptom behavior. This approach is the correct one, focusing on the child's sin. He lays out steps to constantly point our children in the direction of God and restoring their relationship with Him. However, he lost me with the level/quantity of spanking. I agree with his method of how spanking should go Spanking should be explained, a tool to correct the child, and never done in anger. I could not imagine spanking my child every time she does not do exactly as i ask the first time at 1-2 years old. Also, he mentioned spanking as early as a young crawler (6 months old?). This seems way too early to me. Also the stressing of spanking as a discipline being a Biblical mandate is interesting since he deviates from this once the child is older in favor of more effective discipline methods. It is also important to remember that we are not to there to break the spirit of the child. This would be the case with my sweet and sensitive child. Overall, I believe this is a good book. I am just not going to subscribe to his discipline philosophy regarding spanking as being the only option for discipline as a small child. I believe that from what I have gleaned thus far from this book that it definitely speaks to the voids that many Christians have instinctively sensed in their hearts and lives. Oh how much better so many of us would have been if we'd embraced and witnessed such Godly wisdom from infancy. I am so grateful for the voice of this Author on behalf of all who shall receive--and to the one who mentioned this book to me because she instinctively knew exactly what the Lord was communicating in my life, by doing so affirmatively and graciously. I've read a lot of parenting books but none like this one. I felt both conviction and hope. Tedd Tripp helped me to see my role as a parent in a whole new light. My children and I are so blessed to have found this book! 17 years ago, we had the privilege of having Tedd and his wife, Margy, visiting us at a time when we hit a brick wall in handling our first child. They taught us how to "discipline in love". We read the book and practiced it; good results followed immediately. My son is 18. We couldn't be happier. He is a happy young man with lovely character and excellent moral discernment. Now, I am a young adult pastor. I highly recommend this book to all parents. This book has changed my life and challenged my way of thinking. The book has showed me deeper truths about the heart of children - how to best guide and relate to them. The book has a lot of wisdom about the use of biblical authority. It points out that discipline is for the sake of correction, not punishment. And how we as authority figures are not to focus merely on correcting bad behavior, but on engaging the child's heart for their spiritual well-being. After all, the goal is not raising well behaved children but Christ-seeking disciples. Tripp shares how confronting sin and encountering grace will transform the heart of our children. I will be straightforward and say the book does advocate corporeal punishment (spankings). But Mr Tripp does so in a very biblical framework. Proverbs repeatedly mentions using "the rod" - and let's not forget, parents did not use timeouts/ groundings in ages past, so the idea should not shock us; rather, this is a new shift in thinking that reflects our modern way of thinking. But Tripp is very wise in the boundaries he advocates surrounding such measures: never doing it in wrath, never losing control, communicating love, and reconciling with the child after the act (not giving them the cold treatment). I would highly recommend this book to anyone. Even if you don't agree with corporeal punishment, this is not the focus of the book, so there is plenty of wisdom to be gleaned from it relevant to all parents. I cannot say enough good things about it!
mini_pile
{'original_id': '28cae87ff39bf4469102d0c37d8ae490f83e84969228101e573df6280d6cbd1d'}
Homeowners Association Litigation When people live together in community, there is bound to be conflict. It is just part of life. But when conflict turns into a potential lawsuit, as an unpaid volunteer board member you may not know what to do next. At Eads Murray & Pugh, we can offer a voice of experience and a plan of action for handling HOA lawsuits or condominium lawsuits. Why Does HOA Litigation Occur? In some cases, the association needs to take action against a homeowner – for instance, in cases where the homeowner has violated covenants or accumulated unpaid assessments. In other cases, the homeowners association must defend itself – for instance, if a homeowner thinks the association has not followed through on its responsibilities. In addition, lawsuits may occur when there are accidents or injuries involving common property for which the association is responsible. Litigation issues can be even more complicated for condominium associations because the association is often responsible for a greater level of building repair and maintenance. How We Can Help It is possible to mitigate risks and manage the exposure should a lawsuit of any kind come to light. We can: Advise the board on where you stand and the best course of action Vigorously explore options that might avert litigation Represent the association in litigation Once a suit is filed, to do our best to bring it to a swift conclusion You don’t have to travel the road of HOA lawsuits alone. We’ve spent the bulk of our practice history helping associations find their way. If we can assist you, please contact us.
mini_pile
{'original_id': '12c449710a2051c4e88e439375434d50121d368dbf81a31e223e08ea735b15bb'}
<div class="bc-vda-suspicious-vehicles"> <div class="bc-vda-suspicious-vehicles-table-container"> <bc-suspicious-vehicles-table vehicles="vehicles"></bc-suspicious-vehicles-table> </div> </div>
the_stack
{'hexsha': 'd7f079e72778a5b41d3a96f699dbe3587a79703d', 'size': '197', 'ext': 'html', 'lang': 'HTML', 'max_stars_repo_path': 'packages/vehicle-lifecycle-vda/client/app/views/suspicious_vehicles/suspicious_vehicles.html', 'max_stars_repo_name': 'akshaygawande/composer-sample-applications', 'max_stars_repo_head_hexsha': '8635a8bd06bd2fdc10a2bf8a2abb242eb034a0bb', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'packages/vehicle-lifecycle-vda/client/app/views/suspicious_vehicles/suspicious_vehicles.html', 'max_issues_repo_name': 'akshaygawande/composer-sample-applications', 'max_issues_repo_head_hexsha': '8635a8bd06bd2fdc10a2bf8a2abb242eb034a0bb', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'packages/vehicle-lifecycle-vda/client/app/views/suspicious_vehicles/suspicious_vehicles.html', 'max_forks_repo_name': 'akshaygawande/composer-sample-applications', 'max_forks_repo_head_hexsha': '8635a8bd06bd2fdc10a2bf8a2abb242eb034a0bb', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '39.4', 'max_line_length': '83', 'alphanum_fraction': '0.7512690355', 'original_id': '29e8dcfb8a3e7e2d36b79ae90ddbf5a97405a97f27cea798916c06935f988c4b'}
A single-engine airplane crashed outside of the Ruidoso airport after a mechanical failure on March 19. Both men in the plane walked away without injuries A single-engine airplane crashed outside of the Ruidoso airport after a mechanical failure on March 19. Both men in the plane walked away without injuries (Courtesy Sean Parker) Daniel Bastardo, a line service technician at Sierra Blanca Regional Airport, was watching the Piper Arrow out of the corner of his eye as he went about his business in the airport terminal building. Although Airport Manager Dave Pearce also was working about 5:30 p.m. March 19, the rest of the crew trained in fire fighting and aircraft rescue were off duty. When Bastardo realized the plane probably was going down, he sprang into action. "We're really proud of him," crew member Debbie Goss told Ruidoso village councilors at a meeting last month. "It's our biggest fear that we will have to do something like this by ourselves. We always hope there are at least two of us." "I was the only one there and I happened to be inside the terminal and spotted the plane as he was landing," Bastardo said. "I thought he was going to do a touch and go, like they do with the military (in training). I just kept my eyes on the plane and he was flying no more than 50 feet above the ground and that's not usual. When you're working at the airport, you know that. Once they leave, they take off. You don't see them. For me, I thought he was going to be landing on Runway 06, but he went off the runway and airport. I went through one gate, went to the canyon by foot, went back up and that's when I saw the two pilots. It was a great relief for me seeing the two men with no scratches or wounds." The plane crashed landed, hitting a small tree. Goss said the plane, piloted by two Swiss nationals, took off from Runway 30 heading north. "Apparently, it couldn't get enough altitude, so they swung around and tried a hard left turn to land again on Runway 06," she said. "Daniel says he saw them and they could not get enough altitude, so they ended up skidding off into the meadow just outside the boundaries of the airport, outside the fence. He grabbed Rescue One, went out the first gate on the perimeter road where he thought he would have access to them. He looked around the field on foot for a while, figured out he needed to go one more gate down, so he did." One of the pilots did not speak English and the other barely, she said. "They walked away from the aircraft after it skidded through the meadow and hit a small tree with its wing," Goss said. "The aircraft was totalled, but at least the people were OK. We had response from Lincoln County (Emergency Medical Services) and the Ruidoso Fire Department in the event of a grass fire. Thank goodness, there were no injuries or grass fire, but we sure appreciated the help." Another crew member Barbara Kizer thanked Bastardo "for doing a super job." "I don't know that I would have done anything different," she said. "Getting the ax out and breaking the chain on the gate, I would never have thought of that. I was looking for the bolt cutters. When Dave Pearce called us, it took less than 15 minutes to get all the way out there from town." She was thinking about her triage training in the event the people in the plane probably were injured, but then she saw that the two men walked away from the accident. The left wing of the Piper crashed into the tree, creating some sparks, they said. When it was removed from scene by crane the following Saturday, they could see that the wing was just holding by its cables, Bastardo said. He thanked Sean Parker, second in command at the airport, for weekly training sessions that helped him take decisive action. Kizer told councilors that the employees "truly appreciate the training you send us to, because you just never know what you are going to find and you want to know you're really prepared when something like this happens."
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.9911282062530518}", 'metadata': "{'Content-Length': '59717', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HOIAEOYIE63WWGST5RV27BD3RIFDQOBB', 'WARC-Concurrent-To': '<urn:uuid:b8712087-3d7d-4c7d-af0e-d73c99db3adb>', 'WARC-Date': datetime.datetime(2014, 7, 29, 21, 9, 5), 'WARC-IP-Address': '23.62.6.66', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:EDR5PBT6HZXLBBVTPN3PUCFHXMANQPS7', 'WARC-Record-ID': '<urn:uuid:cf1cb030-2fdb-4260-9bc6-9673d7922cdd>', 'WARC-Target-URI': 'http://www.ruidosonews.com/ruidoso-news/ci_25541246/first-hand-account-march-place-crash', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:5dedbf10-379f-47b3-ace8-c8e10b5b3113>', 'WARC-Truncated': None}", 'previous_word_count': '706', 'url': 'http://www.ruidosonews.com/ruidoso-news/ci_25541246/first-hand-account-march-place-crash', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.053359150886535645', 'original_id': '8dab216dba8470aaf6499cd33f74b3f90fb33b95cd1f42d45285d917fef4d0ba'}
- FEBRUARY 2018 - HOME - Usa - Literature - Joseph Tusiani When translation is an art Joseph Tusiani When translation is an art L’arte della traduzione poetica, the recently published anthology with two essays, edited by Cosma Siani, explores the beauty and the pleasure of letting English speakers enjoy Italian literature. From Dante to Montale, from Machiavelli to Alfieri; these are just a few of the “greats” translated by the Apulian American poet by Sergio D’Amaro SHARE Facebook Twitter It is easy to understand that the translator must be a poet himself. He must feel the poem that he wants to translate; and he will feel it only if he is suddenly lit up by the inexplicable beauty of which the poem itself seems to be the only possible explanation. In other words, he must capture the thought, the feeling, the color and the rhythm, and try to combine them not in the same way but in the same spirit and with the same fervor”. These words of Joseph Tusiani’s, taken from one of his old essays, the fundamental La traduzione poetica, immediately convey the idea of what Tusiani meant when he was irresistibly drawn to a work and wanted to translate all or part of it. A host of critical articles have focused on Tusiani’s special ability to literally immerse himself in the linguistic and creative dimension: his translations are actually re/creations of the original in the target language through a cognitive and aesthetic process that presumes a perfect control of the power of expression. In his youth the author worked on translating from English to Italian, producing numerous publications (from Sonettisti americani, to an Antologia della poesia americana for the journal “La Parola del Popolo”, and essays comparing Italian and Anglo-Saxon authors) which helped to consolidate the mastery of his acquired language, while refining his great natural bent for poetry. Later Tusiani threw himself with all his might into translating the Italian classics into English, producing some of his most original work and achieving unsurpassed levels of quantity and quality. The anthology edited by Cosma Siani for the Roman publisher Cofine, L’arte della traduzione poetica (2014, pp. 152, € 15), bears witness, in a very readable form, to the enormous number of translations done by Tusiani of Italian literary works, well-known and more obscure, from Dante to Montale. Not many people know that Tusiani also introduced the Anglo-Saxon world to the poetry of Machiavelli or to Alfieri’s America libera, as well as to colossal works like Pulci’s Morgante. The anthology also includes works by female poets (Vittoria Colonna, Gaspara Stampa, Vittoria Aganoor, Ada Negri) and dialect poets (Carlo Porta, Giuseppe G. Belli, Salvatore Di Giacomo) and incorporates two of Tusiani’s fundamental essays (La traduzione poetica, mentioned above, and Problemi di traduzione petrarchesca), which shed light on the translation process. Why such plurilinguistic passion? The answer lies, without much doubt, in the story of the author, who migrated from Italy to America but kept in his heart the only real land of his life, which was literature. Discovering beauty and the pleasure of communicating it, so that its perfume, its power of suggestion, and its imaginary world can be savored in another language; sharing with speakers of another language the unique heritage of a cultural tradition imprinted with the great spirit of Dante and launched into the pyrotechnical explosion of the most varied forms and styles; blending one’s own language with the acquired language while still hearing its echoes in a new cadence and in a new music, both alien and evocative. The anthology, containing bio-bibliographical data, also bears witness to this and points the way towards an understanding of the translator’s art forged by Tusiani in fifty years of activity ‘bridging’ the ocean from one shore to the other.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9424253702163696}", 'metadata': "{'Content-Length': '22094', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VUWCR467LABLSY6S5JU7VUY6O6TJZVEX', 'WARC-Concurrent-To': '<urn:uuid:31bc63f6-5e30-4b73-82de-b6830438d99b>', 'WARC-Date': datetime.datetime(2021, 3, 8, 3, 37, 13), 'WARC-IP-Address': '31.11.33.38', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:H6SYDOOMSXRQSIYWKUCSFDKUOLAHUXJP', 'WARC-Record-ID': '<urn:uuid:6160d357-0c33-47e7-b6ea-e57f815bea30>', 'WARC-Target-URI': 'https://www.bridgepugliausa.it/articolo.asp?id_sez=2&id_cat=46&id_art=3864&lingua=en', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cc0d2675-1307-4702-b4e7-f605aa39cfdf>', 'WARC-Truncated': None}", 'previous_word_count': '624', 'url': 'https://www.bridgepugliausa.it/articolo.asp?id_sez=2&id_cat=46&id_art=3864&lingua=en', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-119.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0750114917755127', 'original_id': '2c310f376bfcd399fc74b7f9766c7ac68e98d5145b7539ddf4e4fdb57758f920'}
FABERGÉ! Anyone else coming up with fabergé eggs? No? WOO HOO, I WIN SOCS. Except for the fact that there’s no way I can write a post about fabergé eggs unless I find a way to drop a lot of words about how I know next to nothing about fabergé eggs other than they’re kinda fancy. Right? Hold on…and I just googled fabergé eggs and “fancy” would be an understatement on par with the Eiffel Tower is kinda hard to miss. Moving right along. The truth is “Fab!” was the first thing that popped into my head when I read the prompt. Remember when that slang word was everywhere? How’s it going? Fab! Did you hit Billy’s party on Friday night? Yeah, so fab! My ‘rents are getting me a car for my birthday. OH-EM-GEE THAT IS FREAKING FAB. Okay, I may have mixed my decades on that last one but you get the point. Turns out fab as slang has morphed to a few more definitions. It can still mean “fabulous” for an adjective but apparently “fake ass bitch” has joined the lexicon as in omg, Becky is such a fab, you know she totally ditched us to hit the movies with Milo.* * Names have been changed to protect the imaginary characters. I’m a grownup so while I may not be tossing fab out there it’s entirely possible I think it once in a while. Especially seeing as we’ve got a middle school girl and being a straight up, true friend is feeling a bit unicorn, pie in the sky, can I borrow your fairy godmother right now. Bee told me middle school was a rough road. Pretty sure “toughest three years” may have been thrown out there. She isn’t wrong. SO FAR! SHE ISN’T WRONG SO FAR! [That’s fast enough to keep from jinxing high school, right? RIGHT??] Linda hosts Stream of Consciousness Saturday. This week’s prompt is “‘fab.’ Use it as a word or find a word beginning with “fab.” As always, use any way you’d like. Have fun!”
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.9356945753097534}", 'metadata': "{'Content-Length': '167169', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:3AE2DKG45XAK7RHCEDYQ624UZMUNHS3I', 'WARC-Concurrent-To': '<urn:uuid:576ad251-6449-4dc2-8459-12978c1af6bb>', 'WARC-Date': datetime.datetime(2019, 4, 18, 22, 43, 43), 'WARC-IP-Address': '192.0.78.24', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:67H7IEK2NHWMMGSBU7EB3ZA6YQGSKPT7', 'WARC-Record-ID': '<urn:uuid:8d33023f-09d4-46bc-84c5-f5e62d910104>', 'WARC-Target-URI': 'https://riddlefromthemiddle.com/2019/04/06/socs-faberge-eggs-and-other-kinda-fancy-stuff/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:0c7eed6d-3119-45ab-9687-9c852a9d826e>', 'WARC-Truncated': None}", 'previous_word_count': '329', 'url': 'https://riddlefromthemiddle.com/2019/04/06/socs-faberge-eggs-and-other-kinda-fancy-stuff/', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-150-79-29.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05669206380844116', 'original_id': '0c020973ffcc609e8d4e77ee4f8383b4e54cd8123e25b1629cfaf99ee2318149'}
Early versus delayed amniotomy during labor induction with oxytocin in women with Bishop's score of ≥6: a randomized trial. To study the effect of "early amniotomy" {initiating induction of labor (IOL) with amniotomy followed by oxytocin} versus "late amniotomy" (initiating IOL with oxytocin followed by amniotomy 4-8 h later) in induced labor. One hundred and fifty women with Bishop's score of ≥6 undergoing IOL were randomized into "early amniotomy" and "delayed amniotomy". Early amniotomy resulted in a reduced induction-delivery interval (IDI) (7.35 versus 11.66 h with delayed amniotomy, p = .000) but higher the caesarean section (CS) rate was observed (10.7 versus 2.7% with delayed amniotomy, p = .049). With early amniotomy, the proportion of women delivering within 12 h was higher (86.7 versus 60%, p = .000) and the maximum oxytocin concentration used was lower (30.05 versus 39.68 mU/min, p = .001) as compared to delayed amniotomy. The neonatal outcomes were similar in the two groups. Early amniotomy detected meconium prior to initiating uterine contractions with oxytocin in three women who underwent CS for meconium. Initiating IOL with amniotomy in women with a favorable cervix was efficacious in expediting delivery, but it resulted in a higher CS rate. The higher CS rate was partly due to CS for meconium detected as a result of early amniotomy. Clinical Trials Registry (CTRI), India: Registration number CTRI/2015/01/005418.
mini_pile
{'original_id': 'fcc78bc0315441a29264bcb82308bc1d2d99c55a93407e790e1453519975ef15'}
Erol Keskin (oyuncu) Türk oyuncu ve senarist Erol Keskin (oyuncu) nedir insan Erol Keskin (oyuncu) cinsiyeti erkek Erol Keskin (oyuncu) mesleği oyuncu Erol Keskin (oyuncu) mesleği senarist Erol Keskin (oyuncu) IMDb kimliği nm0450209 Erol Keskin (oyuncu) ön adı Erol Erol Keskin (oyuncu) görsel Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin (oyuncu) vatandaşlığı Türkiye Erol Keskin (oyuncu) doğum tarihi 1931 Erol Keskin (oyuncu) doğum yeri İstanbul Erol Keskin (oyuncu) Kinopoisk kişi kimliği 334937 Erol Keskin (oyuncu) PORT kişi kimliği 183298 Erol Keskin (oyuncu) AllMovie kişi kimliği p642022 Erol Keskin (oyuncu) AlloCiné kişi kimliği 512695 Erol Keskin (oyuncu) ISNI 0000000458099584 Erol Keskin (oyuncu) VIAF kimliği 753145858059923021640 Erol Keskin (oyuncu) ČSFD kişi kimliği 399450 Erol Keskin (oyuncu) konuştuğu, yazdığı diller Türkçe Erol Keskin (oyuncu) ana dili Türkçe Erol Keskin (oyuncu) Freebase kimliği /m/0x1nhmh Erol Keskin (oyuncu) TMDb kişi kimliği 1175693 Erol Keskin (oyuncu) SinemaTürk kişi kimliği 1351 Erol Keskin (oyuncu) CineMagia kişi kimliği 388399 Erol Keskin (oyuncu) Film.ru kişi kimliği erol-keskin Erol Keskin török színész Erol Keskin osztály, amelynek példánya ember Erol Keskin nem férfi Erol Keskin foglalkozás színész Erol Keskin foglalkozás forgatókönyvíró Erol Keskin IMDb-azonosító nm0450209 Erol Keskin utónév Erol Erol Keskin kép Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin állampolgárság Törökország Erol Keskin születési idő 1931 Erol Keskin születési hely Isztambul Erol Keskin KinoPoiszk-személyazonosító 334937 Erol Keskin PORT.hu-személyazonosító 183298 Erol Keskin AllMovie-személyazonosító p642022 Erol Keskin AlloCiné-személyazonosító 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF-azonosító 753145858059923021640 Erol Keskin ČSFD-személyazonosító 399450 Erol Keskin beszélt nyelvek török Erol Keskin anyanyelv török Erol Keskin Freebase-azonosító /m/0x1nhmh Erol Keskin TMDb-személyazonosító 1175693 Erol Keskin Cinemagia-színészazonosító 388399 Erol Keskin Film.ru-személyazonosító erol-keskin Erol Keskin Kinobox-személyazonosító 874654 Erol Keskin Turkish actor and screenwriter Erol Keskin instance of human Erol Keskin sex or gender male Erol Keskin occupation actor Erol Keskin occupation screenwriter Erol Keskin IMDb ID nm0450209 Erol Keskin given name Erol Erol Keskin image Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin country of citizenship Turkey Erol Keskin date of birth 1931 Erol Keskin place of birth Istanbul Erol Keskin Kinopoisk person ID 334937 Erol Keskin PORT person ID 183298 Erol Keskin AllMovie person ID p642022 Erol Keskin AlloCiné person ID 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF ID 753145858059923021640 Erol Keskin ČSFD person ID 399450 Erol Keskin languages spoken, written or signed Turkish Erol Keskin native language Turkish Erol Keskin Freebase ID /m/0x1nhmh Erol Keskin TMDB person ID 1175693 Erol Keskin SinemaTürk person ID 1351 Erol Keskin CineMagia person ID 388399 Erol Keskin Film.ru person ID erol-keskin Erol Keskin Kinobox person ID 874654 Erol Keskin türkischer Schauspieler Erol Keskin ist ein(e) Mensch Erol Keskin Geschlecht männlich Erol Keskin Tätigkeit Schauspieler Erol Keskin Tätigkeit Drehbuchautor Erol Keskin IMDb-ID nm0450209 Erol Keskin Vorname Erol Erol Keskin Bild Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin Land der Staatsangehörigkeit Türkei Erol Keskin Geburtsdatum 1931 Erol Keskin Geburtsort Istanbul Erol Keskin KinoPoisk-Personen-ID 334937 Erol Keskin PORT-Personen-ID 183298 Erol Keskin AllMovie Personen-ID p642022 Erol Keskin AlloCiné-Personen-ID 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF-Kennung 753145858059923021640 Erol Keskin ČSFD-Personen-ID 399450 Erol Keskin gesprochene oder publizierte Sprachen Türkisch Erol Keskin Muttersprache Türkisch Erol Keskin Freebase-Kennung /m/0x1nhmh Erol Keskin TMDb-Personen-ID 1175693 Erol Keskin SinemaTürk-Personenkennung 1351 Erol Keskin CineMagia-Personen-ID 388399 Erol Keskin Film.ru-Personenkennung erol-keskin Erol Keskin Kinobox-Personenkennung 874654 ايرول كسكين ايرول كسكين نموذج من إنسان ايرول كسكين الجنس ذكر ايرول كسكين المهنة ممثل ايرول كسكين المهنة كاتب سيناريو ايرول كسكين مُعرِّف قاعدة بيانات الأفلام على الإنترنت (IMDb) nm0450209 ايرول كسكين الصورة Yılmaz Onay Erol Keskin'le 1968.jpg ايرول كسكين بلد المواطنة تركيا ايرول كسكين تاريخ الميلاد 1931 ايرول كسكين مكان الولادة إسطنبول ايرول كسكين معرف كينوبويسك (Kinopoisk) 334937 ايرول كسكين مُعرِّف شخص في قاعدة بيانات أفلام شبكة بورت (PORT) 183298 ايرول كسكين مُعرِّف شخص في قاعدة بيانات "كُّل الأفلام" (AllMovie) p642022 ايرول كسكين مُعرِّف شخص في ألو سيني (AlloCiné) 512695 ايرول كسكين مُعرِّفُ الأسماء المِعياريُّ الدَّوليُّ (ISNI) 0000000458099584 ايرول كسكين مُعرِّف ملف الضبط الاستنادي الافتراضي الدَّولي (VIAF) 753145858059923021640 ايرول كسكين مُعرِّف شخص في قاعدة بيانات الأفلام التشيكيَّة (ČSFD) 399450 ايرول كسكين اللغات المحكية التركية ايرول كسكين اللغة اﻷم التركية ايرول كسكين مُعرِّف قاعدة البيانات الحُرَّة (Freebase) /m/0x1nhmh ايرول كسكين معرف شخص في قاعدة بيانات الفيلم (TMDB) 1175693 ايرول كسكين معرف شخص في قاعدة بيانات السينما التركية 1351 ايرول كسكين مُعرِّف مُمثِّل في موقع "سينيماجيا" (CineMagia) 388399 ايرول كسكين مُعرِّف ممثل في موقع Film.ru erol-keskin ايرول كسكين مُعرِّف كينوبوكس للأشخاص (Kinopoisk) 874654 Erol Keskin Erol Keskin nature de l’élément être humain Erol Keskin sexe ou genre masculin Erol Keskin occupation acteur ou actrice Erol Keskin occupation scénariste Erol Keskin identifiant Internet Movie Database nm0450209 Erol Keskin prénom Erol Erol Keskin image Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin pays de nationalité Turquie Erol Keskin date de naissance 1931 Erol Keskin lieu de naissance Istanbul Erol Keskin identifiant Kinopoisk d'une personne 334937 Erol Keskin identifiant PORT d'une personne 183298 Erol Keskin identifiant AllMovie d'une personne p642022 Erol Keskin identifiant AlloCiné nom 512695 Erol Keskin identifiant ISNI 0000000458099584 Erol Keskin identifiant VIAF 753145858059923021640 Erol Keskin identifiant ČSFD d'une personne 399450 Erol Keskin langues parlées, écrites ou signées turc Erol Keskin langue maternelle turc Erol Keskin identifiant Freebase /m/0x1nhmh Erol Keskin identifiant The Movie Database d'une personne 1175693 Erol Keskin identifiant SinemaTürk d'une personne 1351 Erol Keskin identifiant CineMagia d'un acteur 388399 Erol Keskin identifiant Film.ru d'une personne erol-keskin Erol Keskin identifiant Kinobox.cz d'une personne 874654 Erol Keskin Turks acteur Erol Keskin is een mens Erol Keskin sekse of geslacht mannelijk Erol Keskin beroep acteur Erol Keskin beroep scenarioschrijver Erol Keskin IMDb-identificatiecode nm0450209 Erol Keskin voornaam Erol Erol Keskin afbeelding Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin land van nationaliteit Turkije Erol Keskin geboortedatum 1931 Erol Keskin geboorteplaats Istanbul Erol Keskin Kinopoisk-identificatiecode voor persoon 334937 Erol Keskin PORT-identificatiecode voor persoon 183298 Erol Keskin AllMovie-identificatiecode voor persoon p642022 Erol Keskin AlloCiné-identificatiecode voor persoon 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF-identificatiecode 753145858059923021640 Erol Keskin ČSFD-identificatiecode voor persoon 399450 Erol Keskin taalbeheersing Turks Erol Keskin moedertaal Turks Erol Keskin Freebase-identificatiecode /m/0x1nhmh Erol Keskin TMDb-identificatiecode voor persoon 1175693 Erol Keskin SinemaTürk-identificatiecode voor persoon 1351 Erol Keskin Cinemagia-identificatiecode voor acteur 388399 Erol Keskin Film.ru-identificatiecode voor acteur erol-keskin Erol Keskin Kinobox-identificatiecode voor persoon 874654 Erol Keskin Erol Keskin Erol Keskin adolah urang Erol Keskin jinih kalamin laki-laki Erol Keskin karajo palakon Erol Keskin karajo panulis naskah Erol Keskin identifikasi IMDb nm0450209 Erol Keskin gambar Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin kawarganagaroan Turki Erol Keskin tanggal lahia 1931 Erol Keskin tampek lahia Istanbul Erol Keskin Identifikasi ISNI 0000000458099584 Erol Keskin Identifikasi VIAF 753145858059923021640 Erol Keskin bahaso mande Bahaso Turki Erol Keskin Erol Keskin minangka manungsa Erol Keskin wewadi lanang Erol Keskin pakaryan aktor Erol Keskin gambar Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin kawarganagaran Turki Erol Keskin tanggal lair 1931 Erol Keskin papan lair Istanbul Erol Keskin tetenger VIAF 753145858059923021640 Erol Keskin tetenger Freebase /m/0x1nhmh Erol Keskin Erol Keskin nyaéta manusa Erol Keskin gambar Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin Erol Keskin adalah manusia Erol Keskin jenis kelamin atau gender laki-laki Erol Keskin pekerjaan pemeran Erol Keskin pekerjaan penulis skenario Erol Keskin ID IMDb nm0450209 Erol Keskin nama pribadi Erol Erol Keskin gambar Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin kewarganegaraan Turki Erol Keskin tanggal lahir 1931 Erol Keskin tempat lahir Istanbul Erol Keskin penanda ISNI 0000000458099584 Erol Keskin penanda VIAF 753145858059923021640 Erol Keskin bahasa tutur atau tulis bahasa Turki Erol Keskin bahasa ibu bahasa Turki Erol Keskin penanda Freebase /m/0x1nhmh Erol Keskin Erol Keskin Erol Keskin contoh manusia Erol Keskin jantina lelaki Erol Keskin pekerjaan pelakon Erol Keskin pekerjaan penulis skrip lakon layar Erol Keskin ID IMDb nm0450209 Erol Keskin nama diberi Erol Erol Keskin gambar Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin negara kewarganegaraan Turki Erol Keskin tarikh lahir 1931 Erol Keskin tempat lahir Setambul Erol Keskin ID orang Kinopoisk 334937 Erol Keskin ID orang PORT 183298 Erol Keskin ID orang AllMovie p642022 Erol Keskin ID orang AlloCiné 512695 Erol Keskin ID ISNI 0000000458099584 Erol Keskin ID VIAF 753145858059923021640 Erol Keskin ID orang ČSFD 399450 Erol Keskin bahasa pertuturan, tulisan atau isyarat bahasa Turki Erol Keskin bahasa ibunda bahasa Turki Erol Keskin ID Freebase /m/0x1nhmh Erol Keskin Erol Keskin Erol Keskin Erol Keskin Erol Keskin Erol Keskin primerek od človek Erol Keskin spol moški Erol Keskin poklic igralec Erol Keskin poklic scenarist Erol Keskin oznaka IMDb nm0450209 Erol Keskin ime Erol Erol Keskin slika Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin država državljanstva Turčija Erol Keskin datum rojstva 1931 Erol Keskin kraj rojstva Carigrad Erol Keskin KinoPoisk (name) 334937 Erol Keskin oznaka osebe PORT 183298 Erol Keskin AllMovie (artist) p642022 Erol Keskin AlloCiné (personne) 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF 753145858059923021640 Erol Keskin ČSFD (oseba) 399450 Erol Keskin govorjeni, pisani ali kretani jeziki turščina Erol Keskin materni jezik turščina Erol Keskin Freebase /m/0x1nhmh Erol Keskin oznaka osebe TMDB 1175693 Erol Keskin Erol Keskin instancia de ser humano Erol Keskin sexo o género masculino Erol Keskin ocupación actor Erol Keskin ocupación guionista Erol Keskin identificador IMDb nm0450209 Erol Keskin nombre de pila Erol Erol Keskin imagen Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin país de nacionalidad Turquía Erol Keskin fecha de nacimiento 1931 Erol Keskin lugar de nacimiento Estambul Erol Keskin identificador Kinopoisk de persona 334937 Erol Keskin identificador PORT de persona 183298 Erol Keskin identificador AllMovie de artista p642022 Erol Keskin identificador AlloCiné de persona 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin identificador VIAF 753145858059923021640 Erol Keskin identificador ČSFD de persona 399450 Erol Keskin lenguas habladas, escritas o signadas turco Erol Keskin lengua materna turco Erol Keskin Identificador Freebase /m/0x1nhmh Erol Keskin identificador TMDB de persona 1175693 Erol Keskin identificador SinemaTürk de persona 1351 Erol Keskin identificador Cinemagia de actor 388399 Erol Keskin Erol Keskin instancia de humanu Erol Keskin sexu masculín Erol Keskin ocupación actor Erol Keskin ocupación guionista Erol Keskin identificador IMDb nm0450209 Erol Keskin nome Erol Erol Keskin imaxe Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin país de nacionalidá Turquía Erol Keskin fecha de nacimientu 1931 Erol Keskin llugar de nacimientu Estambul Erol Keskin ISNI 0000000458099584 Erol Keskin identificador VIAF 753145858059923021640 Erol Keskin llingües falaes turcu Erol Keskin llingua materna turcu Erol Keskin identificador en Freebase /m/0x1nhmh Erol Keskin Erol Keskin instancë e njeri Erol Keskin gjinia mashkull Erol Keskin profesioni aktor Erol Keskin profesioni skenarist Erol Keskin IMDb ID nm0450209 Erol Keskin emri Erol Erol Keskin imazh Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin shtetësia Turqia Erol Keskin data e lindjes 1931 Erol Keskin vendi i lindjes Stambolli Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF ID 753145858059923021640 Erol Keskin gjuhë që flet, shkruan ose këndon turqisht Erol Keskin gjuhë amtare turqisht Erol Keskin Freebase ID /m/0x1nhmh Erol Keskin aisteoir agus scríbhneoir scannán Turcach Erol Keskin sampla de duine Erol Keskin gnéas nó inscne fireann Erol Keskin gairm aisteoir Erol Keskin gairm scríbhneoir scripte Erol Keskin ID IMDb nm0450209 Erol Keskin céadainm Erol Erol Keskin íomhá Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin tír shaoránachta an Tuirc Erol Keskin dáta breithe 1931 Erol Keskin áit bhreithe Iostanbúl Erol Keskin ISNI 0000000458099584 Erol Keskin VIAF 753145858059923021640 Erol Keskin teangacha an Tuircis Erol Keskin teanga dhúchais an Tuircis Ероль Кескін (актор) Ероль Кескін (актор) є одним із людина Ероль Кескін (актор) стать чоловіча Ероль Кескін (актор) рід діяльності актор Ероль Кескін (актор) рід діяльності сценарист Ероль Кескін (актор) IMDb-ідентифікатор nm0450209 Ероль Кескін (актор) зображення Yılmaz Onay Erol Keskin'le 1968.jpg Ероль Кескін (актор) громадянство Туреччина Ероль Кескін (актор) дата народження 1931 Ероль Кескін (актор) місце народження Стамбул Ероль Кескін (актор) kinopoisk.ru особа 334937 Ероль Кескін (актор) ідентифікатор особи PORT 183298 Ероль Кескін (актор) ідентифікатор особи AllMovie p642022 Ероль Кескін (актор) ідентифікатор особи AlloCiné 512695 Ероль Кескін (актор) ISNI 0000000458099584 Ероль Кескін (актор) VIAF 753145858059923021640 Ероль Кескін (актор) ідентифікатор особи ČSFD 399450 Ероль Кескін (актор) володіє мовами турецька мова Ероль Кескін (актор) рідна мова турецька мова Ероль Кескін (актор) ідентифікатор Freebase /m/0x1nhmh Ероль Кескін (актор) TMDb особа 1175693 Ероль Кескін (актор) ідентифікатор особи SinemaTürk 1351 Ероль Кескін (актор) ідентифікатор актора Cinemagia 388399 Ероль Кескін (актор) ідентифікатор особи film.ru erol-keskin Ероль Кескін (актор) ідентифікатор особи Kinobox 874654 Erol Keskin Erol Keskin instância de ser humano Erol Keskin sexo ou género masculino Erol Keskin ocupação ator Erol Keskin ocupação argumentista Erol Keskin identificador IMDb nm0450209 Erol Keskin primeiro nome Erol Erol Keskin imagem Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin país de nacionalidade Turquia Erol Keskin data de nascimento 1931 Erol Keskin local de nascimento Istambul Erol Keskin identificador Kinopoisk-Person 334937 Erol Keskin identificador de artista AllMovie p642022 Erol Keskin identificador AlloCiné-Personalidade 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin identificador VIAF 753145858059923021640 Erol Keskin identificador ČSFD de uma pessoa 399450 Erol Keskin línguas faladas, escritas ou assinadas língua turca Erol Keskin língua materna língua turca Erol Keskin identificador Freebase /m/0x1nhmh Erol Keskin identificador TMDb de uma pessoa 1175693 Erol Keskin identificador Cine Magia de ator 388399 Erol Keskin Erol Keskin esiintymä kohteesta ihminen Erol Keskin sukupuoli mies Erol Keskin ammatti näyttelijä Erol Keskin ammatti käsikirjoittaja Erol Keskin IMDb-tunniste nm0450209 Erol Keskin etunimi Erol Erol Keskin kuva Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin kansalaisuus Turkki Erol Keskin syntymäaika 1931 Erol Keskin syntymäpaikka Istanbul Erol Keskin henkilön KinoPoisk-tunniste 334937 Erol Keskin henkilön PORT-tunniste 183298 Erol Keskin henkilön AllMovie-tunniste p642022 Erol Keskin henkilön AlloCiné-tunniste 512695 Erol Keskin ISNI-tunniste 0000000458099584 Erol Keskin VIAF-tunniste 753145858059923021640 Erol Keskin henkilön ČSFD-tunniste 399450 Erol Keskin puhuu kieliä turkki Erol Keskin äidinkieli turkki Erol Keskin Freebase-tunniste /m/0x1nhmh Erol Keskin henkilön TMDb-tunniste 1175693 Erol Keskin henkilön SinemaTürk-tunniste 1351 Erol Keskin näyttelijän Cinemagia-tunniste 388399 Erol Keskin aktor turko Erol Keskin ta un hende Erol Keskin sekso o género maskulino Erol Keskin okupashon aktor Erol Keskin okupashon esenarista Erol Keskin imágen Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin pais di nashonalidat Turkia Erol Keskin fecha di nasementu 1931 Erol Keskin lugá di nasementu Istanbul Erol Keskin identifikashon VIAF 753145858059923021640 Erol Keskin dominio di idioma Turko Erol Keskin lenga materno Turko Erol Keskin Erol Keskin instância de ser humano Erol Keskin sexo ou gênero masculino Erol Keskin ocupação ator Erol Keskin ocupação roteirista Erol Keskin identificador IMDb nm0450209 Erol Keskin primeiro nome Erol Erol Keskin imagem Yılmaz Onay Erol Keskin'le 1968.jpg Erol Keskin país de cidadania Turquia Erol Keskin data de nascimento 1931 Erol Keskin local de nascimento Istambul Erol Keskin identificador Kinopoisk-Person 334937 Erol Keskin identificador AlloCiné-Person 512695 Erol Keskin ISNI 0000000458099584 Erol Keskin identificador VIAF 753145858059923021640 Erol Keskin línguas faladas ou escritas língua turca Erol Keskin língua materna língua turca Эрол Кескин Эрол Кескин это частный случай понятия человек Эрол Кескин пол или гендер мужской пол Эрол Кескин род занятий актёр Эрол Кескин род занятий сценарист Эрол Кескин код IMDb nm0450209 Эрол Кескин изображение Yılmaz Onay Erol Keskin'le 1968.jpg Эрол Кескин гражданство Турция Эрол Кескин дата рождения 1931 Эрол Кескин место рождения Стамбул Эрол Кескин код человека на Кинопоиске 334937 Эрол Кескин код персоналии PORT 183298 Эрол Кескин код персоны в AllMovie p642022 Эрол Кескин код человека в AlloCiné 512695 Эрол Кескин код ISNI 0000000458099584 Эрол Кескин код VIAF 753145858059923021640 Эрол Кескин код персоналии ČSFD 399450 Эрол Кескин языки, на которых говорит или пишет персона турецкий язык Эрол Кескин родной язык турецкий язык Эрол Кескин код Freebase /m/0x1nhmh Эрол Кескин код человека в TMDb 1175693 Эрол Кескин код персоны SinemaTürk 1351 Эрол Кескин код человека в Cinemagia 388399 Эрол Кескин код персоны Film.ru erol-keskin Эрол Кескин код персоны на Kinobox.cz 874654
common_corpus
{'identifier': 'https://www.wikidata.org/wiki/Q6090495', 'collection': 'Wikidata', 'open_type': 'Semantic data', 'license': 'CC0', 'date': '', 'title': 'Erol Keskin', 'creator': 'None', 'language': 'Multilingual', 'language_type': 'Semantic data', 'word_count': '2525', 'token_count': '7701', '__index_level_0__': '3952', 'original_id': '15c41a724c503c8ad4ba43836321601eb81a69aaea8a85e358eefbbcda800e0c'}
The genome between stability and variability Voir le PDF Encyclopédie environnement - génome - genome The genome of living beings is permanently affected by anomalies, due to accidental errors or agents inside and outside the body. Fortunately, enzymes correct most of these anomalies and thus reinforce genetic stability. But they can also cause mutations that contribute to variability. Other systems can produce new genetic combinations. These mutations and recombinations are essential for the adaptation of populations to changes in the environment and therefore for evolution. 1. Introduction Encyclopédie environnement - génome - réplication ADN - DNA molecule - genome Figure 1. DNA molecule under replication due to the complementarity of nucleobases (always matched A-T and G-C). The two strands of DNA are antiparallel. DNA polymerase can only work in one direction (green arrows). So, replication is continuous on the bottom strand and discontinuous on the other. [Source: Adapted from a scheme by Madeleine Price Ball (CC0 1.0)] Who says genomeGenetic material of a living organism. It contains genetic information encoding proteins. In most organisms, the genome corresponds to DNA. However, in some viruses, including retroviruses such as HIV, the genetic material is RNA. says DNA molecule (deoxyribonucleic acid) since it carries the genetic information of living organisms [1]. In many viruses it is replaced by a very similar molecule, RNA (ribonucleic acid). DNA consists of a double sequence of monomersmolecules which, by successive sequences with identical or different molecules, give rise to a polymer structure. (nucleotides) of which there are four types that only differ the nitrogenous base or nucleobase  An organic nitrogen compound present in nucleic acids as a nucleotide in which it is bound to a ose, ribose in the case of RNA and deoxyribose in the case of DNA. In genetics, they are often simply referred to as the bases of nucleic acids : adenine (A), guanine (G), thymine (T) and cytosine (C). It is the precise sequence of these four types, and therefore the four nucleobases, that constitutes the “text” of the genetic message. Its structure in two complementary strands, where A is always facing T and G facing C, – the famous double helix (Figure 1) – has two major advantages: • It allows, in a single step, thereplicationProcess to obtain two molecules identical to the initial molecule. into two identical daughter molecules (Figure 1), thus transmitting genetic information through cell divisions and sexual reproduction. • It allows the repair of lesions that appeared on one of the strands as well as the creation of recombinant molecules, i.e. new genetic combinations. This double-stranded structure therefore promotes both stability and variability of genomes. Genetic variations in DNA fall into two main categories: mutations and recombinations. • Mutations are sudden changes in the genome of a living cell or virus. In multicellular organisms, if the mutations affect the germ cells intended to give gametes, they will be transmitted to the offspring and will therefore become inheritable. • Recombinations consist in producing a new genetic combination from exchanges between existing genetic materials. There are several types of recombinations with very different biological mechanisms and roles. Classically, this definition only concerned DNA belonging to the same species. We now know that there are spontaneous genetic exchanges between different species, called transgenesis, that we will include in this category. These two main types of variations are themselves divided into several modalities. We will endeavour to extract the elements most relevant to clarify their respective roles in population dynamics and evolution. 2. The mutations 2.1. General information The stability of genetic messages encoded by DNA can be affected by errors of the enzyme that performs the replication, the replicase. This enzyme can thus put a nitrogenous base in place of another on the new strand. But apart from any replication, DNA is also permanently damaged. It is important to distinguish between lesion and mutation (see Genetic polymorphism & variation). Lesions are abnormalities in the physical structure of DNA that, in most cases, will prevent its replication. They cannot therefore be transmitted to the progeny. On the other hand, a mutated molecule has a normal physical structure. Only the sequence of the nucleobases – and therefore the information they contain – is modified. It can therefore replicate without problem and transmit the mutation to daughter cells. The lesions are very diverse and there are quantities of repair enzymes, each highly specialized for a particular type of lesion. This is referred to as the “cell toolbox” for DNA repair (work awarded the Nobel Prize for Chemistry 2015). Paradoxically, it is these repair systems that, by mistake, will create the actual mutation from the primary lesion. These lesions can be caused either by agents internal to the body (or endogenous) or by agents from the external environment (or exogenous). Here are some examples to set the ideas. • Endogenous agents: In warm-blooded animals, it is estimated that the DNA molecule can undergo 20,000 to 40,000 single-stranded cutsCuts in a bond between two adjacent nucleotides on a strand of a nucleic acid fragment. per cell and per day, as a result of molecular agitation. There can also be base losses, it is estimated that 10,000 T and C are lost and 500 A and G are lost, still per cell and per day. In these cases, we can even speak of spontaneous lesions. Among the most frequent endogenous agents are oxygen derivatives (free radicals or ROSA abbreviation for “Reactive oxygen species” or “reactive oxygen species”. Free radicals derived from oxygen, very reactive and very toxic. The abbreviation ROS is commonly used, even in French.), which are normal by-products of respiratory metabolism, they play an important role in oxidizing nucleobases that will need to be replaced. It would also be necessary to add the transposable elements,DNA sequence, sometimes called transposon, capable of moving autonomously in a genome, by a mechanism called transposition. These mobile DNA sequences are part of what are called dispersed repeats and are considered powerful drivers of evolution and biodiversity. we will discuss them further below. • Exogenous agents: they can be physical (radiations) or chemical. The most common are ultraviolet (UV) rays, whose effect is generally limited to the skin because they are not very penetrating (see Cellular impact of solar UV rays). For example, it is estimated that sunbathing can cause, per cell and per hour, 60,000 to 80,000 abnormal chemical bonds between contiguous thymins of the same DNA strand, each of which being sufficient to block replication. If they are not all repaired, the cell dies: it is sunburn. It is therefore clear that DNA stability is a dynamic process, resulting from a permanent balance between the production of lesions and their repair. These repair mechanisms do not operate at a constant level, they are subject to regulation. A first type of regulation depends on the number of lesions in the cell. This phenomenon was first highlighted in the colibacillus (Escherichia coli), a bacterium that is one of the preferred subjects of study for geneticists. As early as 1974, it was assumed that there was a response, called SOS [2], which regulates the intervention of several repair systems according to the number of injuries. When there is a small number of lesions, this response increases the effectiveness of faithful repair mechanisms. But beyond a certain threshold of damage, these mechanisms are overwhelmed. The SOS response then induces the synthesis of a replicase able to cross specific lesions (see below), but with a certain error rate. This is called SOS mutagenesis. At the end of the 1990s, it was shown to facilitate the adaptation of the bacterial population to a hostile environment, at the cost of significant losses due to harmful mutations. It is a kind of last chance, hence the name SOS. Encyclopédie environnement - génome - organismes modèles utilisés en génétique Figure 2. Examples of model organisms used in genetics. A, Baker’s yeast [Source: Photo © Masur via Wikimedia Commons]. B, Drosophila [Source: Photo © Sanjay Acharya (CC BY-SA 3.0) via Wikimedia Commons]. C, Thale cress [Source: Photo © DawidSkalec (CC BY-SA 4.0) via Wikimedia Commons]. D, Mouse [Source: Photo © Rasbak (CC BY-SA 3.0) via Wikimedia Commons.] A simulation of faithful repair mechanisms following irradiations has been shown on other organisms highly prized by biologists (Figure 2): in the 1980s in baker’s yeast, in 2000 in vinegar fly [3], in 2006 in a plant called “thale cress” [4] and in 2008 in mice exposed to radiation at Chernobyl [5]. These data call into question the still widespread claim that the effects of radiation are directly proportional to doses. For moderate doses, this is clearly not true. More detailed information on this work can be found at: The second type of regulation concerns the fidelity of replication according to the type of organism. In all living cells, bacteria and others, this replication involves, in addition to DNA replication, a corrective enzyme system. Thanks to the old strand, this system corrects the errors made on the new strand by the replicase, which results in a very low error rate, in the order of 1 in 10 billion (10-10). Such accuracy is essential for organisms with large DNA molecules: 4 million base pairs in colibacillus and 3 billion in humans. But in multicellular organisms, the number of cells can be very large: in the human species, it is estimated at one hundred thousand billion (1014). In these organisms, the majority of mutations are neutral, because the genome contains a large number of non-coding sequences (see Genetic polymorphism & variation). Even taking this into account, an error rate of 1 in 10 billion (10-10) is still too high. This is even more so since many mutations also occur outside replication. If there were only one copy of the gene per cell, many of them would carry deleterious mutations and the organism would not be viable. It is the interest, and the necessity, to have two chromosome sets for these organisms (diploidyProperty of a cell whose chromosomes it contains are present in pairs (2n chromosomes). The concept is generally to be contrasted with haploidy, a term referring to the ownership of cells with single copy chromosomes (n chromosomes). An organism or part of an organism is said to be diploid when its cells are themselves diploid.). Most mutations that inactivate one gene are recessive, so one functional copy is sufficient for the cell to function normally. In a nutshell, it can be said that diploidy acts as a spare wheel. If we now look at the case of viruses, the situation is very different because most of which have very small genomes. For DNA viruses, there is generally no corrective activity associated with replicase, so the mutation rate is much higher, in the order of 1 in 1 million (10-6). This is even more true for viruses whose genome is composed of RNA, because RNA-replicases are much less accurate than DNA-replicases. This is particularly the case for influenza viruses and AIDS viruses. For the latter, which has a genome of 10,000 nucleotides, the rate of point mutationsGenome mutations where only one pair of nitrogen bases is modified. has been estimated at 1 in 10 per genome and per replication cycle. Since the number of viral particles produced (virions) is in the order of 10,000 per day and per infected cell, we can see that the population of an infected host shows considerable variability. This high error rate should not be considered simply as a defect of organisms that are too “rudimentary”, but rather as an opportunity for the virus to bypass their host’s defence mechanisms and perpetuate itself indefinitely. The counterpart is a large number of inactive viral particles but, given the quantity produced, this is not very embarrassing. This leads us to make two remarks on the role of mutations in the evolutionary process: • They play a key role in the adaptation of species to their environment because, by increasing genetic diversity, they are the material on which natural selection can act. What we have just seen with viruses is an example. The development of antibiotic-resistant bacteria, insecticide-treated insects, or herbicide-treated plants, are other examples. • A genetic mutation is not inherently advantageous or disadvantageous, depending on the environment. For example, in the Kerguelen Islands, in the subantarctic, there is a wingless fly species, Calycopteryx moseley (Figure 3). This character, strongly disadvantageous in our regions, is on the contrary beneficial there because it prevents these flies from being carried into the ocean by the very strong winds that constantly sweep these islands. Encyclopédie environnement - génome - Mouche sans ailes - Calycopteryx moseley - wingless fly Figure 3. Wingless fly, Calycopteryx moseley, living in the Kerguelen Islands, in an extremely windy environment. [Photos © Marine Pouvreau] What are the different categories of mutations? They are classically distinguished by the size of the DNA segment concerned. In increasing order, these range from point mutations, where a single pair of nitrogenous bases is modified, to mutations that affect larger or smaller DNA segments, to tens of thousands of nucleotides. Not to mention the changes in the number of chromosomes. The last two categories mainly concern eukaryotic organisms, whose chromosomes are located in a particular compartment of the cell: the nucleus. These chromosomes each consist of a very long DNA molecule but in a complex “package”, composed of several families of proteins. 2.2. Point mutations They can be due either to errors during replication or, more frequently, to poorly repaired lesions; they create variants of the same gene (alleles). In E. coli, it is the SOS system that causes the vast majority of mutations after UV irradiation. Most of the examples cited above relate mainly to point mutations. 2.3. Chromosome mutations These are rearrangements produced by agents that cause DNA breaks, including radiations (other than UV). Several double-strand breaks can lead to more or less significant rearrangements depending on their number and the size of the segment concerned. In the case of two very distant double-stranded breaks on the same chromosome, the entire segment between the breaks can be either (a) lost, causing the individual to die, (b) reversed at the same site (inversion), or (c) transferred to another chromosome (translocation) if other breaks have occurred on it. Inversions and translocations are quite frequent in natural populations. They interfere with the proper matching of chromosomes during meiosis The process of double cell division that takes place in the cells (diploids) of the germline to form gametes (haploids), or sex cells in eukaryotic organisms. and thus cause some sterility. As a result, they can be involved in speciationEvolutionary process that leads to the emergence of new living species that individualize from populations belonging to an original species. processes. Often, neighbouring species differ in chromosomal rearrangements. 2.4. Mutations of chromosome sets This category has different mechanisms from the previous ones. These are no longer anomalies resulting from primary lesions but mechanical errors in cell division processes, mitosisrefers to the chromosomal events of cell division, the stage of the cell cycle of eukaryotic cells. This is the step of non-sexual/asexual duplication (unlike meiosis) of the chromosomes of the mother cell and their equal distribution in each of the two daughter cells. or meiosis. Some can lead to situations where individuals have more than two chromosome sets (2N), but always an integer number of sets (3N, 4N…), this is polyploidy (see Focus Polyploidy). They are viable because the “gene balance” is respected: all genes have the same number of copies. On the other hand, the 3Ns are sterile because the genetic balance of the gametes is necessarily abnormal. Meiosis obviously cannot evenly distribute an odd number of chromosomes among the gametes. The polyploids 4N, 6N or 8N are fertile. But they immediately create a new species, because any crossing with diploid parents would give sterile descendants, their meiosis being very unbalanced. Other “failures” of meiosis can lead to a chromosomal imbalance in some gametes, which will therefore be found in the offspring. For example, they will be 2N-1 (monosomy) or 2N+1 (trisomy), we then speak of aneuploidy, which is a harmful situation because the genetic balance is no longer respected. 3. Recombinations There are many recombination modalities with very different biological roles. 3.1. The homologous recombination Encyclopédie environnement - génome - recombinaison homologue molécules ADN - DNA molecules Figure 4. Simplified model of homologous recombination between two similar DNA molecules. The letters A and a represent two variants (alleles) of the same gene. The same goes for B/b and C/c. It is the most common and also the oldest known type. As its name suggests, it is done between identical DNA molecules (Figure 4). In diploid organisms, it occurs regularly, during meiosis, between homologous chromosomes, by crossover. It is a “soft” variability: the re-collection is done at exactly the same point, so there will be no mutations or modifications in the arrangement of genes on the chromosomes. This results in new and viable genetic combinations that may, in a given environment, have different adaptive capacities than parental combinations. In bacteria, it can also occur during conjugation [6] which allows genetic exchanges between cells [7]. This recombination mechanism is also involved in DNA repair. In diploid organisms, double-strand breaks caused on a chromosome by irradiation can be repaired by the presence of an intact homologous molecule in the segment concerned. 3.2. Other types of recombinations To simplify, we will group together types of events with very different biological roles. They could be grouped under the term additive recombination because they result, in most cases, in the addition of DNA segments in genomes. Among the most common mechanisms is the transposition of mobile genetic elements (called transposable elements) [8], which contain only a few hundred or thousands of nucleotides and possess, at a minimum, functions necessary for their “jumps” into the host genome. They occur in both bacteria and the most complex eukaryotes, sometimes in large numbers. In the former, they can be exchanged between different species during conjugation [6]. As they generally carry antibiotic resistance genes, they are one of the main factors in the very rapid spread of these resistances in pathogenic bacteria, with the serious medical problems that result. In the human species, while our genes themselves, encoding all our proteins, constitute only about 2 to 3% of the DNA of the nucleus, the various families of transposable elements constitute nearly 50%. Most of them have been established in our lineage since very ancient geological times, long before the appearance of our species. The retrovirusFamily of RNA viruses with high genetic variability. Have an enzyme, reverse transcriptase, which allows the transcription of viral RNA into a particular DNA molecule capable of integrating with the DNA of the host cell., (to which HIV belongs), which are both virus and transposable element, alone represents 8% of our DNA. Fortunately for genome stability, only a small number of these elements are still mobile. As with “classical” mutations, the insertion of a transposable element can be harmful if it is done in a gene, but it can also bring interesting genetic innovations, either by modifying gene regulations or by their own functions. Multiple data show that they have contributed to the evolution of genomes and therefore species [9]. Finally, it is necessary to mention the phenomena of transgenesis, i.e. the genetic exchanges between different species. Since the late 1990s, it appears that they are much more frequent than we thought. The species barrier, which had been thought to be impassable under natural conditions, is actually quite porous, at least on an evolutionary scale. Again, this is a source of innovation that contributes to the plasticity of genomes and evolution. 4. Conclusion We presented a brief overview of the different types of genome variations. We could not detail the enzyme systems involved in the repairs and recombinations, they alone would have required a complete article (if not two!). Readers interested in these mechanisms can refer to the following sites [10]. To conclude, two important points should be highlighted: • Genetic variations occur randomly. They are not directed by the environment for adaptive purposes, as postulated in the Lamarckian vision of evolution. This has been abundantly demonstrated experimentally (Read Lamarck and Darwin: two divergent visions of the living world). However, contrary to what was believed until the 1980s, their frequencies can be modulated by the environment. We have seen this illustrated in bacteria with the increase in the rate of mutations by the SOS response and, in fruit fly and thale cress, with the stimulation of homologous recombination following irradiation. These are not the only factor capable of modulating the frequency of variations, many physiological stresses can lead to this result. For example, the application of antibiotics to bacterial cultures also triggers SOS mutagenesis and thus increases the frequency of mutations [11,12]. This subject is also covered in the article Adaptation: Responding to environmental challenges. • This article is at the heart of what can be called the dialectic stability/variability of living beings. Two a priori antagonistic properties but in fact quite complementary. Both are essential for the survival of populations and the evolution of species. Stability to allow a population to adapt sustainably to its environment when it is relatively stable and variability to facilitate genetic changes when the environment changes, allowing natural selection to work. The SOS response in bacteria is a good illustration of this since it is capable of performing either of these two functions, depending on environmental conditions. References and notes Cover image. [Source: © vitstudio; Image 134698571 via Shutterstock] [2] R. Devoret (1993) Mécanisme de la mutagenèse SOS, Med/Sci vol.3, n°9, I-VII. (in french) [3] J. Ducau et al (2000) Mutation Research 460:69-80 [4] J. Molinier et al (2006) Nature 442:1046-1049 [5] B.E. Rodgers & K.M. Holmes (2008) Dose response 6:209-221 [7] Video of Miroslav Radman: [8] D. Anxolabéhère, D. Nouaud & W.J. Miller (2000) Transposable elements and genetic novelties in eukaryotes. Med/Sci, I No. 11, vol. 16, I-IX. [9] see “The surprises of evolution: viruses among our ancestors? “in [10] or [11] S. Da Re & M.-C. Ploy (2012) Antibiotics and bacterial SOS response. Med Sci (Paris) 28:179-184 (in french) [12] J. Blázquez, J. Rodrı́guez-Beltrán & I. Matic (2018) Antibiotic-Induced Genetic Variation: How It Arises and How It Can Be Prevented. Annu. Microbiol Rev. 72:209-30 L’Encyclopédie de l’environnement is publicated by l’Université Grenoble Alpes - To cite this article: BREGLIANO Jean-Claude (2019), The genome between stability and variability, Encyclopédie de l’Environnement, [en ligne ISSN 2555-0950] url :
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '9', 'language_id_whole_page_fasttext': "{'en': 0.9301520586013794}", 'metadata': "{'Content-Length': '68407', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KRKCXEZR6C7DHDQZXU4J2K7J3HEKP75U', 'WARC-Concurrent-To': '<urn:uuid:893b7fd3-39a2-4823-8a6b-66d741121cc4>', 'WARC-Date': datetime.datetime(2019, 3, 22, 22, 52), 'WARC-IP-Address': '188.130.25.202', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:B5ELJ5RUZAOIS7GUWIQGTHNRRFVG6X7U', 'WARC-Record-ID': '<urn:uuid:8df2a402-05ad-4bdf-abd1-6fdcc0c437a9>', 'WARC-Target-URI': 'https://www.encyclopedie-environnement.org/en/life/genome-between-stability-and-variability/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:35237f66-0421-48f7-87d8-ed432de1e8b3>', 'WARC-Truncated': None}", 'previous_word_count': '3594', 'url': 'https://www.encyclopedie-environnement.org/en/life/genome-between-stability-and-variability/', 'warcinfo': 'isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-140-190-246.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.10510414838790894', 'original_id': '2e3415e181884dfc49e5dae84bec3b4794c7443bf1bf65201643d768eb44ae0a'}
 World war - en.LinkFang.org World war A world war is "a war engaged in by all or most of the principal nations of the world".[1] While a variety of global conflicts have been subjectively deemed "world wars", such as the Cold War and the War on Terror, the term is widely and usually accepted only as it is retrospectively applied to two major international conflicts that occurred during the 20th century: World War I (1914–18) and World War II (1939–45). Origin of the term The Oxford English Dictionary cited the first known usage in the English language to a Scottish newspaper, The People's Journal, in 1848: "A war among the great powers is now necessarily a world-war." The term "world war" is used by Karl Marx and his associate, Friedrich Engels,[2] in a series of articles published around 1850 called The Class Struggles in France. Rasmus B. Anderson in 1889 described an episode in Teutonic mythology as a "world war" (Swedish: världskrig), justifying this description by a line in an Old Norse epic poem, "Völuspá: folcvig fyrst I heimi" ("The first great war in the world".)[3] German writer August Wilhelm Otto Niemann had used the term "world war" in the title of his anti-British novel, Der Weltkrieg: Deutsche Träume (The World War: German Dreams) in 1904, published in English as The Coming Conquest of England. The term "First World War " was first used in September 1914 by German biologist and philosopher Ernst Haeckel, who claimed that "there is no doubt that the course and character of the feared 'European War' ... will become the first world war in the full sense of the word,"[4] citing a wire service report in The Indianapolis Star on 20 September 1914. In English, the term "First World War" had been used by Charles à Court Repington, as a title for his memoirs (published in 1920); he had noted his discussion on the matter with a Major Johnstone of Harvard University in his diary entry of September 10, 1918.[5] First World War World War I occurred from 1914 to 1918. In terms of human technological history, the scale of World War I was enabled by the technological advances of the second industrial revolution and the resulting globalization that allowed global power projection and mass production of military hardware. It had been recognized that the complex system of opposing military alliances (the German and Austro-Hungarian Empires against the British, Russian, and French Empires) was likely to lead to a worldwide conflict if a war broke out. Due to this fact, a very minute conflict between two countries had the potential to set off a domino effect of alliances, triggering a world war. The fact that the powers involved had large overseas empires virtually guaranteed that such a war would be worldwide, as the colonies' resources would be a crucial strategic factor. The same strategic considerations also ensured that the combatants would strike at each other's colonies, thus spreading the wars far more widely than those of pre-Columbian times. War crimes were perpetrated in World War I. Chemical weapons were used in the First World War despite the Hague Conventions of 1899 and 1907 having outlawed the use of such weapons in warfare. The Ottoman Empire was responsible for the Armenian genocide—the murder of more than 1,000,000 Armenians during the First World War—and the other late Ottoman genocides. Second World War The Second World War occurred from 1939 to 1945 and is the only conflict in which nuclear weapons have been used. Hiroshima and Nagasaki, in Japan, were devastated by atomic bombs dropped by the United States. Nazi Germany, led by Adolf Hitler, was responsible for genocides, most notably the Holocaust, the killing of 6,000,000 Jews and 5,000,000 others persecuted by the Nazis including Romani people and homosexuals. The United States, the Soviet Union, and Canada deported and interned minority groups within their own borders, and largely because of the conflict, many ethnic Germans were later expelled from Eastern Europe. Japan was responsible for attacking neutral nations without a declaration of war, such as the bombing of Pearl Harbor. It is also known for its brutal treatment and killing of Allied prisoners of war and the inhabitants of Asia. It also used Asians as forced laborers and was responsible for the Nanking massacre where 250,000 civilians in the city were brutally murdered by Japanese troops. Non-combatants suffered at least as badly as or worse than combatants, and the distinction between combatants and non-combatants was often blurred by belligerents of total war in both conflicts.[8] Third World War Since the atomic bombings of Hiroshima and Nagasaki during the Second World War, there has been a widespread and prolonged fear of a potential Third World War between nuclear-armed powers. The Third World War is generally considered a successor to the Second World War[11] and is often suggested to become a nuclear war at some point during the course of said Third World War, devastating in nature and likely much more violent than both the First and Second World Wars; in 1947, Albert Einstein commented that "I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones."[12][13] It has been anticipated and planned for by military and civil authorities and has been explored in fiction in many countries. Concepts have ranged from purely-conventional scenarios to limited use of nuclear weapons, to the complete destruction of the planet's surface. Other global conflicts Various former government officials, politicians, authors, and military leaders (including James Woolsey,[14] Alexandre de Marenches,[15] Eliot Cohen,[16] and Subcomandante Marcos[17]) have attempted to apply the labels of the "Third World War" and "Fourth World War" to various past and present global wars since the closing of the Second World War, for example, the Cold War and the War on Terror, respectively. Among these are former American, French, and Mexican government officials, military leaders, politicians, and authors. Despite their efforts, none of these wars were commonly deemed world wars. Wars described by some historians as "World War Zero" include the Seven Years' War[18] and the onset of the Late Bronze Age collapse.[19] The Second Congo War (1998–2003) involved nine nations and led to ongoing low-intensity warfare despite an official peace and the first democratic elections in 2006. It has often been referred to as "Africa's World War".[20] During the early-21st century the Syrian Civil War and the Iraqi Civil War and their worldwide spillovers are sometimes described as proxy wars waged between the United States and Russia,[21][22][23][24] which led some commentators to characterize the situation as a "proto-world war" with nearly a dozen countries embroiled in two overlapping conflicts.[25] Wars with higher death tolls than the First World War The two world wars of the 20th century had caused unprecedented casualties and destruction across the theaters of conflict.[26] There have been several wars that occurred with as many or more deaths than in the First World War (16,563,868–40,000,000), including: Event Lowest Location From To Duration (years) Three Kingdoms 36,000,000[27] 40,000,000[28] China 184 280 96 An Lushan Rebellion 13,000,000[29] 36,000,000[30] China 755 763 9 Mongol conquests 30,000,000[31] 40,000,000[29] Eurasia 1206 1324 118 Conquests of Timur 15,000,000[32] 20,000,000[32] Asia 1369 1405 37 Qing dynasty conquest of the Ming dynasty 25,000,000[33] 25,000,000 China 1616 1662 47 Taiping Rebellion 20,000,000[34] 100,000,000[35][36][37] China 1851 1864 14 World War II 40,000,000[38] 85,000,000[39] Global 1939 1945 6 Cold War 22,345,162 +94,000,000 Global 1947 1991 44 Wars spanning multiple continents Event Lowest Location From To Duration (years) Wars of Alexander the Great Thrace, Illyria, Greece, Asia Minor, Syria, Babylonia, Persia, Afghanistan, Sogdiana, India 335 BCE 323 BCE 12 First Punic War 285,000 [citation needed] 400,000[29] Mediterranean Sea, Sicily, Sardinia, North Africa 264 BCE 241 BCE 23 Second Punic War 616,000 [citation needed] 770,000[29] Italy, Sicily, Hispania, Cisalpine Gaul, Transalpine Gaul, North Africa, Greece 218 BCE 201 BCE 17 Muslim conquests Mesopotamia, Caucasus, Persia, Levant, The Maghreb, Anatolia, Iberia, Gaul, Khorasan, Sindh, Transoxania 622 1258 636 Crusades 1,000,000[40] 3,000,000[41] Iberian peninsula, Near East, Anatolia, the Levant, Egypt. 1095 1291 197 Byzantine–Ottoman Wars Asia Minor, Balkans 1265 1479 214 European colonization of the Americas 2,000,000[42] 100,000,000[43] Americas 1492 1900 408 War of the Spanish Succession Europe, North America, South America 1701 1714 13 Third Anglo-Spanish War Spain, Panama 1727 1729 2 War of the Austrian Succession Europe, North America, India 1740 1748 8 Seven Years' War 1,500,000[29] Europe, North America, South America, Africa, Asia 1754 1763 9 French Revolutionary Wars Napoleonic Wars [citation needed] Crimean War 255,000[45] 1,000,000[46] Sicily, Sardinia, Spain, Southeastern Europe, Black Sea 1853 1856 3 World War I 15,000,000[47] 65,000,000[48] Global 1914 1918 4 World War II 40,000,000[38] 85,000,000[39] Global 1939 1945 6 Cold War 22,345,162 (casualties by all wars started in the Cold War with Gulf War, Vietnam War, Korean War, Algerian War, Iran–Iraq War, Nigerian Civil War or Soviet–Afghan War included)[49][circular reference] +94,000,000 (22 million people killed by all civil wars started in Asia, South America and Africa + number of people killed in Asia and Europe by the Communist governments, with casualties of Soviet famine of 1946–47, Cambodian genocide, Cultural Revolution, and Great Leap Forward included)[50][circular reference] Global 1947 1991 44 War on Terror 272,000[51] 1,260,000 Global 2001 present 18 See also 1. ^ Webster, Merriam-. "World War" . Merriam-Webster.com. Retrieved 11 November 2019. 2. ^ Engels, Frederick. "Introduction to Borkheim" . 4. ^ Shapiro & Epstein 2006, p. 329. 8. ^ "World War" . Retrieved 11 November 2019. 9. ^ "World War" . Retrieved 11 November 2019. 10. ^ "World War" . Retrieved 11 November 2019. 11. ^ "The Today Network - 3/11/17( The November Issue)" . Retrieved 11 November 2019. 12. ^ Calaprice, Alice (2005). The new quotable Einstein. Princeton University Press. p. 173. ISBN 978-0-691-12075-1. 13. ^ "The culture of Einstein" . NBC News. 2005-04-19. Retrieved 2012-08-24. 15. ^ The Fourth World War: Diplomacy and Espionage ... 1992. ASIN 0688092187 .CS1 maint: ASIN uses ISBN (link)Book regarding alleged WWIV 17. ^ Subcomandante Marcos (2001). "The Fourth World War Has Begun" . Nepantla: Views from South. 2 (3): 559–572. Retrieved 20 October 2014. 18. ^ "Why the first world war wasn't really" . The Economist. 2014-07-01. 19. ^ "World War Zero brought down mystery civilisation of 'sea people'" . New Scientist. 21. ^ Anne Barnard and Karen Shoumali (12 October 2015). "U.S. Weaponry Is Turning Syria Into Proxy War With Russia" . The New York Times. Retrieved 14 October 2015. 22. ^ Martin Pengelly (4 October 2015). "John McCain says US is engaged in proxy war with Russia in Syria" . The Guardian. Retrieved 17 October 2015. 23. ^ Holly Yan and Mark Morgenstein (13 October 2015). "U.S., Russia escalate involvement in Syria" . CNN. Retrieved 17 October 2015. 24. ^ Taub, Amanda (1 October 2015). ""The Russians have made a serious mistake": how Putin's Syria gambit will backfire" . Vox. Retrieved 17 October 2015. 27. ^ Robert B. Marks (2011). China: Its Environment and History (World Social Change). Rowman & Littlefield Publishers. ISBN 978-1442212756. 28. ^ Caselli, Graziella (2005). Demography – Analysis and Synthesis: A Treatise in Population. Academic Press. ISBN 978-0127656601. 30. ^ "Death toll figures of recorded wars in human history" . 32. ^ a b "Timur Lenk (1369–1405)" . Users.erols.com. Retrieved 2013-08-23. 34. ^ "Taiping Rebellion – Britannica Concise" . Concise.britannica.com. Retrieved 2013-08-23. 35. ^ "The Taiping Rebellion 1850–1871 Tai Ping Tian Guo" . Taipingrebellion.com. Retrieved 2013-08-23. 36. ^ Livre noir du Communisme: crimes, terreur, répression, page 468 39. ^ a b Fink, George: Stress of War, Conflict and Disaster 44. ^ Charles Esdaile "Napoleon's Wars: An International History". 45. ^ Bodart, Gaston (1916). Westergaard, Harald (ed.). Losses of Life in Modern Wars: Austria-Hungary; France . Clarendon Press. p. 142 . 47. ^ Willmott 2003, p. 307 48. ^ "Emerging Infectious Diseases journal - CDC" . www.cdc.gov. 49. ^ List of wars by death toll 50. ^ The Black Book of Communism 52. ^ "Update on Iraqi Casualty Data" Archived 2008-02-01 at the Wayback Machine by Opinion Research Business. January 2008. 53. ^ "Revised Casualty Analysis. New Analysis 'Confirms' 1 Million+ Iraq Casualties" Archived 2009-02-19 at the Wayback Machine. January 28, 2008. Opinion Research Business. Word Viewer for.doc files . External links Categories: War | World | Wars by type | World Wars | Global conflicts Information as of: 13.06.2020 03:52:02 CEST See also: Legal Notice & Privacy policy.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '2087', 'language_id_whole_page_fasttext': "{'en': 0.8808490633964539}", 'metadata': "{'Content-Length': '104279', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:UOP2GCVETQJEPLACZUWAOG2ZOOOKDTWO', 'WARC-Concurrent-To': '<urn:uuid:b851bebd-517a-435d-8424-814f02cab6ce>', 'WARC-Date': datetime.datetime(2021, 2, 27, 9, 46, 19), 'WARC-IP-Address': '144.76.92.144', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:36E5BGWSCHDTB3DIQD2RQXGCX7F5HKJM', 'WARC-Record-ID': '<urn:uuid:6eb648d8-d821-45aa-aa0e-84c28c9baa66>', 'WARC-Target-URI': 'https://en.linkfang.org/wiki/World_war', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:6c1a1b33-0e7d-42c1-87f4-a489c0d2c4b8>', 'WARC-Truncated': None}", 'previous_word_count': '3206', 'url': 'https://en.linkfang.org/wiki/World_war', 'warcinfo': 'isPartOf: CC-MAIN-2021-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-210.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08300352096557617', 'original_id': '11dcb12985a63b206c050838eecf167872c3d3fbf73e689425cef4eebd189950'}
The Necessity of Garage Repair The garage door is the first structure visible when someone enters your property. It is a symbol of the style and beauty of your home or workplace. On average, a user opens the garage door 3 to 5 times a day. Garages safeguard valuables, and you can also use garages as a spare room. You may be using your garage as a workspace. Despite the importance of a sturdy garage door, most people do not think much about it. As long as the door opens and closes behind smoothly, why bother? Remember, garage door related issues can occur in the most inconvenient of times. Without regular maintenance plans and repairs, you may be little prepared to deal with emergencies that can have even dangerous consequences. Regular maintenance and timely repairs of garage door and its components is a necessity because: 1. Helps during emergencies and reduces inconveniences A garage door that gets stuck while you are in a rush to get to your workplace can be a nightmare. Perhaps you need to drop off your kids at school, and the door won’t open in the morning. Are you prepared to face a garage door that has gone off tracks on a day with bad weather? Have you felt panic-stricken in an emergency when you could not get hold of a garage door technician in the wee hours of the night? Don’t worry, because our experts will answer your emergency calls at any given time. Experts offer guaranteed same day solutions. Yet, it is better to be prepared and cautious by adhering to regular maintenance schedules. Timely repairs of garage doors can help you avoid last-minute hassles. 2. Saves money Replace if you must, but repairs are a must. Garage doors are complex structures with multiple parts. Once out-of-order, replacing the entire system can be an expensive affair. The springs, hinges, bolts, and cables that hold the door together are subject to wear and tear. Regular maintenance and repairs can identify a problem at an early stage and avoid costly replacements. Expert solution providers will provide a reasonable estimate for high-quality service. Taking time out to research the best garage door service providers can help you get a maintenance plan that fits your budget. 3. Escape fatal accidents Garage doors are heavy and massive structures. Typical garage doors weigh enough to crush someone beneath them. So, garage door related accidents and fatalities are common. High tension springs break down over some time. Cable wires can snap. Rust can corrode hinges and bolts. Wear and tear reduce the efficiency of photo-eye sensors. If the malfunctioning is not repaired or rectified on time, then it can lead to mishaps like: Heavy garage doors accidentally closing and crushing pets, kids or valuables. It can happen due to a malfunction in the sensors. Garage doors that close accidentally can cause scratches and damage to your vehicle. People may get locked inside the garage due to broken springs. You and your family can get injured due to rusted garage door components. With regular maintenance, you can ensure that lubrication, primer, and paint are applied on time. 4. Safeguard your vehicles Automobiles are precious and come with expensive repairs. Also, auto thefts can leave you in a lurch. Garages are parking spaces for your costly vehicles. Sturdy garage doors safeguard your cars and valuables. 5.Secure your home entrance point Garage doors are the main entry point for many houses. Since the garage is connected to the house, malfunctioning openers and garage doors can leave you exposed to intruders and thieves. 6. Add to the property's aesthetics The garage is a prominent structure that compliments your property’s style. Do not let dust, wear and tear, or rust make it look not very interesting. Garage doors should not be taken for granted. Garage door repairs are a work of precision and expertise. Tip Top Garage Doors is your one-stop solution for all kinds of garage door repair work. Call us at 919-701-3003.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9221181273460388}", 'metadata': "{'Content-Length': '75182', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:6PRRQ2O6CC6FQA4THIJ3OU6XRS2CR2B3', 'WARC-Concurrent-To': '<urn:uuid:fb33d6c6-a00d-4c81-84e5-e37e9d5dd150>', 'WARC-Date': datetime.datetime(2021, 9, 21, 17, 37, 33), 'WARC-IP-Address': '74.208.236.237', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:LODTELY5CPRM2WEWNMWHCZ54T32N7X6B', 'WARC-Record-ID': '<urn:uuid:65e84b96-5003-4c60-bfe7-8f8d90d8a755>', 'WARC-Target-URI': 'https://www.tiptopgaragedoorsraleigh.com/blog/the-necessity-of-garage-repair/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:ce537f10-45a3-475b-a129-db6ca6186f61>', 'WARC-Truncated': None}", 'previous_word_count': '668', 'url': 'https://www.tiptopgaragedoorsraleigh.com/blog/the-necessity-of-garage-repair/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-150\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.03284651041030884', 'original_id': '1507ee6e9c589270995f441e92ef3f29ad59e8b25e0ae6240c590d80c289cf73'}
June 1, 2013 If They Can Do It… Why Can’t Anyone? I came across this video today, and I realized... If they can do it, why can't anyone? If you have ever failed, you can realize that it is a pretty bad feeling... But why does it have to be? Why can't it be a learning and growing experience? As you can see some of the most influential people in the world have failed over and over again. But what sets them apart is they never accept failure or defeat! They keep pushing no matter how hard things get. One of the things that I am starting to learn with Internet Marketing is how to fail and actually love it! Wait, did that sound strange? I am a person who loves adversity, I lovefailure people telling me that I am not good enough or that I can't do something, because it drives me to become better and work harder. Add that together with a natural drive to want to be the best at what I do and it is a recipe for success! When I was younger, I was the type that had success with anything and everything I did. I was the star of the sports teams, I had friends, got good grades, and anything that I picked up or tried, I very quickly became good at it. Oh how things change... As I got older, and I faced harder things, I started not being such a stand-out. Sure, I was still a very good athlete, but school got harder and I started caring more about popularity than grades. I made the sports teams, but the teachers were telling me that "one day the sports will end, and you will have nothing to fall back on!" I laughed it off... I did not take failure well, and would get very upset about it. They were right! I tore my ACL in my knee, separated my AC Joint and popped my shoulder cap. Career OVER! But worse than that, I got addicted to Vicodin. They were also right, falling behind in school left me nothing to fall back on. I could have given up and lived a life of drugs, but I didn't want that. I could have accepted defeat and feel sorry for myself, but I want to make something of my life. It took me a few years, but I finally got past the addiction, and I can't explain how good it feels! It makes me realize that no matter how bad I feel, how many things are against me, if I take things one day at a time, and never give up, I will get the prize at the end! So the more I fail... The more I learn! The more I accept failure and push on... the stronger person I become! I have been down some dark tunnels, but always find a way to find the light at the end. If I can leave anyone with one piece of advice it is... DON'T EVER ACCEPT DEFEAT! Laugh in the face of your failures and keep pushing forward no matter what anyone tells you. No one would ever be anything without failure! Find something you love and have passion for and DO IT. If You Enjoyed... Please post a Comment & Share! I would love to hear what my readers failed and succeeded at! Your Friend, Jeff Sollee jsollee.10 - skype Add me on Facebook! PPS - Are you looking for a coach & mentor that will actually help you make money and bring you success? Click Here Jeff Sollee
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '37', 'language_id_whole_page_fasttext': "{'en': 0.97996985912323}", 'metadata': "{'Content-Length': '44238', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:B6GYMZNIQXSHXSW3RPTO3KXXXXXFDNPH', 'WARC-Concurrent-To': '<urn:uuid:db23005d-3fa2-413f-b178-cd4e1e8de523>', 'WARC-Date': datetime.datetime(2017, 10, 18, 5, 26, 37), 'WARC-IP-Address': '104.27.182.233', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KBAD22NIXA4P425YIBIYIIYXCORNPMOU', 'WARC-Record-ID': '<urn:uuid:9748e4e3-4c99-4e38-8cfa-b890971e2c15>', 'WARC-Target-URI': 'http://jeffsollee.com/anyone-can-do-it/?replytocom=34', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:3b87feb5-6006-40fd-a304-ff6a34c0e1f6>', 'WARC-Truncated': 'length'}", 'previous_word_count': '650', 'url': 'http://jeffsollee.com/anyone-can-do-it/?replytocom=34', 'warcinfo': 'robots: classic\r\nhostname: ip-10-142-166-51.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-43\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for October 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.17471128702163696', 'original_id': '637309c5d3131a768a2609f3aa796a8e08f92485444b26212e2c1312291d0571'}
Backup Overview There are two kinds of people in the world - those who have had a hard drive failure, and those who will. Make sure this common occurrence does not lead to the loss of your image collection. What's a backup? Primary vs. backups The 3-2-1 Rule Disaster recovery backups vs. rolling backups Propagating corruption Backup software Where do the backups live? Write-once backups Backup vs. fault-tolerant storage Encrypted backups Data validation What's a backup? The purpose of a backup is to make sure that your digital data can survive any of the hazards that await. In principle, this is a straightforward process. Copy all of your files to some other device(s), keep the backup somewhere safe, and use it to restore the data in the event of a problem. If you are a one-computer user and everything you want to preserve can fit on one hard drive, it can be nearly as simple as this. For many of the readers, however, things are not so simple. The images and footage you want to back up may not be on one computer, much less on one hard drive. You probably have multiple versions of the images. For video projects you probably have many additional project files and assets (such as graphics and music). Which ones do you keep and how do you keep that straight? How do you update backups as you work on files? How do you validate the backups so you can have certainty that the archive can be properly restored in the event of a problem? Let's outline the tools used in backups to see how we can put it all together safely and efficiently. Primary vs. Backups It may sound obvious, but you can't create a good backup strategy until you know what you're backing up. Therefore you need to designate a primary copy of the data before you create backups. If there is no primary copy, your backup system will always feel like a mess. At each stage of an image's lifecycle, you need to know which is the primary copy of the data. The 3-2-1 Rule The simplest way to remember how to back up your images safely is to use the 3-2-1 rule. *While 3-2-1 storage is the ideal arrangement, it's not always possible. A second media type, for instance, is impractical for many people in the ingestion or working file stage. In these cases, many people make do with hard-drive-only copies of their data. Best practices, however, still require 3 copies and some physical separation between the copies. In order to design a backup system that works for you, it’s important to understand the kinds of problems that can lead to data loss. Let’s take a look at some of the dangers that threaten your data’s well being and examine some solutions. Device failure Any digital storage device can fail. Hard drives fail all the time, and even a multi-drive device can fall off a table and be destroyed. In order to provide real backup, a backup copy of the data needs to be on a separate device, such as an external drive or different media like optical disc. Viruses can propagate silently from one storage device to another, and then strike to destroy data. All rewritable data is potentially vulnerable to viruses (even on Macintosh), so any hard drive data is at risk. Write-once storage, like Optical disc provides the best protection against virus. Malicious damage Your archive can be exposed to other malicious damage, either from anonymous hackers or perhaps from people targeting you personally. Any computer that is online is theoretically vulnerable to hackers, although an enterprise-level firewall can offer lots of protection. The best protection is offline, and preferably offsite, storage of backups, as well as write-once media storage. Volume and Directory glitches The Volume and Directory information on your storage media are a map of where the files are stored, as well as a table of contents. If these get corrupted, then the computer may not be able to find the files on a drive. Aside from basic maintenance of your file system, the best protection is the use of write-once media. Transfer corruption Any time data is transferred from one device to another, there is some possibility of corruption. This can be because of problems with the RAM, drive, connectors, bridgeboard, network, or cables. The best protection against transfer corruption is to transfer files with a utility that performs a validated transfer. Use of write-once media can also help to prevent transfer corruption (after the initial creation of the disc). Read more about validated transfers Lightning strike/Voltage surge Excess voltage from a lightning strike or a blown power company transformer can fry your computer in a heartbeat. A surge protector might protect your computer from damage caused by this excess voltage, but provides no real guarantee of protection. The best protection is provided by the use of off-site, or at least off-line backups. While video and photo professionals have always been exposed to theft, that hazard rarely extended to our footage itself. Since our pictures are now stored on expensive devices, they are now at risk. Protection against theft includes security measures such as an alarms or a safe, but is best accomplished with offsite storage. Fire or water damage Like film archives, digital images can be destroyed by fire or water damage. But unlike a film archive, it’s possible to make a complete offsite duplicate of your digital archive for very little money, and thus to be fully protected. Human error One of the most common causes of data loss is simple human error. You can accidentally throw away or unintentionally modify files in some undesirable way (such as downsampling). Protection here is a little more complex, particularly for working files, since they generally can't be protected with write-once backups. Off-line backups that don't get updated immediately are a valuable part of protection against human error. In the workflow section of this website, we describe 5 different phases of Lifecycle: Capture, Ingestion, Working, Publish, and Archive. One of the primary differences between these various stages is the handling of the backups. Let's take a quick look. In many cases, there is no backup possible in the capture phase. Some professional level cameras will accept a second media card which can provide backup for the failure of the card itself. Tethered still photo shoots, where image files are automatically transferred to a computer, may or may not allow for a backup depending on the feature set of the capture software. Read more in tethered capture When the images or footage are first downloaded from the camera, backups should be created automatically. Data should not be erased from media cards until they have been inspected for visual integrity. If you copy to the backup first, then to the primary location, a single visual inspection will confirm the integrity of both. With Video footage, this can be particularly time-consuming, since you’ll want to watch all the footage at normal speed to ensure that everything has transferred properly. A calculated risk is to perform a spot check of the footage to look for potential problems.  You can also use a verified copy method like Carbon Copy Cloner, SuperDuper, or Shotput Pro to ensure all data is written. Figure 2 shows a very good ingestion backup system. Files are copied first to a backup drive, then to the primary location and another backup. A single visual inspection of the primary version also confirms the integrity of the first backup version. Working files present a special problem for backup. It’s more difficult to protect them because they are in a state of change. In particular, this makes it tough to maintain updated off-site backups. As images or footage is being optimized, backups should be made and updated automatically. We suggest that you have a backup storage device connected to the imaging workstation for daily automated mirror backup. We also suggest that you have an offline backup system, that can be updated periodically, such as at the end of each day or after each important download. We suggest using swapper drives as part of your working file backups working backup Figure 3 shows a system for backing up working files. The dark blue drive is the primary copy of the data, and the backup drives are in light blue. The drive on the left is the automatic backup that is periodically updated by backup software. The Swapper drives on the right are connected at the end of a day's work and files are added or updated. They are rotated offsite to further protect works in progress. Once images have been put into their long-term home, they should get a full 3-2-1 backup. archive backups Figure 4 shows the permanent home of the image archive. An onsite primary archive is protected with an offsite copy of the images, as well as a write-once or tape backup. Disaster recovery backups vs. rolling backups Another useful concept in backup design is the distinction between disaster recovery and rolling backups. Some of the threats outlined above have the capacity of wiping out your entire media collection. Some of the threats might only affect the work done to recent images. It's possible to protect for both, but that's hard to do with a single backup device. We suggest that you look at this as two problems. Disaster recovery backups Disaster recovery backups typically require a degree of physical separation between the copies. This part is pretty obvious, since fire, flood or theft can destroy everything in a single building. Disaster recovery backups also require some separation in time, and in handling. A backup that is immediately updated upon any change will fail to protect against hazards like virus, volume or directory corruption, media degradation, or human error. Rolling backup The gap in time between updates of a disaster recovery backup leaves the collection exposed. This gap must be filled by a rolling backup: one that provides automatic updates to the backup whenever data is added or altered. This can protect today's or this week's editing work by transferring it to a second device. The solutions we present in this website show how you can set up systems that offer both disaster recovery and rolling backup protection. Propagating corruption Backup systems are supposed to protect file integrity, but sometimes they are set up in ways that miss an important hazard. If your system only employs rolling backup, it runs the risk of replacing a valid backup of a file with a damaged copy. If the primary version of the file is damaged by media failure, directory corruption, transfer error, virus, or human error, then the act of updating the backup will damage the backup, and the file may be lost. There are four basic ways of dealing with this issue: Write-once media Since write-once media can't be rewritten, it protects against any corruption that happens to the file at a later date. For a video workflow, we recommend backing up the entire card to a write once media source after first transfer. Incremental backup Some backup systems offer the ability to backup a set of files, and then add new copies of any changed file, while keeping the older version as well. Most digital tape backups work this way, and some hard drive backup software, such as Retrospect, Super Duper, and Carbon Copy Cloner offer this option as well. For photography, incremental backup can be a challenge since the data set is so large. You may need your backup media to be more than ten times larger than the primary archive in order to accomplish incremental backup, which may make this system financially or technically unworkable. For video, this method is more practical.  With digital video you are rarely modifying the source media, only the project file which contains instructions.  Chances are you will continue to add additional files like music, sound effects, graphics, and animation, but these files are not very large when compared to the original footage. Additive Backup You can also structure part of your system to never update a copy of the backup files once they have been written. For photography, this is most appropriate for a raw file archive, and can protect against most propagated corruption except virus. If you are not using a second media type, we strongly recommend the use of an additive backup for one of your copies, in order to provide disaster recovery protection. For video, this is most appropriate for a disk image based archive where you are creating cloned copies of each memory card after a shoot.  If you are archiving your graphic and project files separately, we strongly recommend the use of an additive backup for one of your copies, in order to provide disaster recovery protection for your video footage. Read more in the mirror section Validate before updating You can protect against propagating many errors if you can be sure that the primary version of the files is in good condition before updating the backups. Unfortunately, this is not an easy thing to do at the moment. Check out the Data Validation sections for more on that process. Read more in the Data Validation section Backup software To keep your images safe, you'll need to run the appropriate backup software to manage the process. Backup software might be included with your operating system, but most of this is not geared to the problems encountered by photo and video professionals. There are several different types of tasks that backup software can perform. Some programs can do nearly all types of backup, and some types only do one or two. Here are the categories: Basic mirror The simplest kind of backup, basic mirror software can create a duplicate of the primary copy in a new location. There are a number of different ways that mirrors can be implemented. Compressed mirror In a compressed mirror backup, the files are copied to a new location, and then are compressed into a single gigantic file.This method is not very practical for video files as there is not much space savings due to compression.  It also requires that you restore the entire larger mirror file before you can recover a specific file. Mirror plus incremental backup In this method, an original copy of the data is updated by remembering changes to files. This can let the user "roll back" to different versions of the data. Bootable clone This mirror backup contains all the invisible configuration files necessary to let the computer boot up from the copy. Some software creates a compressed bootable copy of the drive that must first be extracted to a new drive before being used. Read more about mirror configurations Where does the backup media live? One of the main ways backups can provide protection is to be physically separated from the primary copy of the data. If every copy of the files were in the same enclosure, then the loss of that enclosure would lose all the data. Let's look at the various configurations you could use for storage. Same-Enclosure Storage A backup drive could live in the same enclosure as the primary copy of the data. Usually this is part of a RAID1 system, or a periodic backup to an additional internal drive. While it can offer the easiest way to provide a rolling backup, the protection is less than optimal, since a single event can destroy both copies. Attached storage You can get additional protection by housing your backups in come kind of external attached storage, such as an external USB, eSATA, Firewire or Thunderbolt drive, or a backup drive available on a network. It's nearly as convenient as same-enclosure backups, but has more protection because it's inside a different box. Ideally, these drives would be plugged into a different surge protector than the computer. Offline storage A drive that is unplugged from the power and connection cables is called Offline storage. Offline storage provides excellent protection for many types of hazards, but the backup copy may not reflect the current state of the files because it's not being updated constantly. Be sure to plugin and let offline storage spin up for at least 10 minutes every 6 moths to prevent a corruption in data due a loss of charge in the drive’s magnetic elements. Offsite storage The gold standard for disaster-recovery storage is off-site backup, since it can provide protection even if there is a total loss of the primary data. For photographic and digital video collections, this is generally accomplished by physically carrying the storage media to a different location. It is possible to backup some or all data with the Internet, but this will be impractical for many readers. We use the term Swappers to refer to a backup arrangement where a pair (or more) of backup drives rotates off-line or off-site for added protection. Internet backups Backup to commercial services like Amazon S3 can provide reliable offsite storage, but it can be expensive for large collections. Additional services like CrashPlan allow the user to utilize a mixture of online and local storage options.  Internet backup can also be very slow to use, and generally does not offer data validation. For most professionals, Internet backups are generally not feasible for the entire archive - perhaps only for some of the best images or footage in the collection. Do It Yourself (DIY) Collocation In this arrangement, you place some internet-connected storage hardware offsite, and update them periodically. It can provide automatic off-site storage at a reasonable price, if you can navigate the technical issues. Devices like a DroboPro FS make this process easier. Write-once backups Write-once backups—also called write-once, read many (WORM) backups—refer to backups stored on media that is not updated. Write-once backups are an important part of any backup plan because they protect against any kind of error or corruption that is introduced to the data after original archiving. They are an essential way to protect against viruses, directory corruption, and accidental erasure. The most cost-effective way to get write-once protection is to use optical disks that are not rewritable. You can also configure LTO (Linear Tape-Open) tape to be write-once only. It’s even possible to make hard drives read-only; this will not remove the write capability from the drive, but creates an instruction to prevent overwriting existing data. In most of computing, write-once media is considered disaster-recovery backup, as opposed to a general-purpose backup since it can’t be updated. In a parametric imaging  or video editing environment, it’s better than that. For photography, all parametric changes to the media can be saved out as metadata. For video most of the changes to the media are actually contained within the project file created by the video editing software.  This separation of source media from the editing instructions makes write-once backup very attractive for media backup. We recommend the use of write-once backups for disaster recovery. Backup vs. fault-tolerant storage People sometimes confuse backup with fault-tolerant storage. A backup is a separate copy of a file, written to a different device. It should be able to survive even when the primary fails. Some storage, such as RAID devices, looks like backup at first blush, but they are really better described as fault-tolerant storage. Fault-tolerant storage has some internal protections against failure, but it does not provide enough protection to be considered a backup. A drive spanning device such as a RAID 5 or Drobo can preserve the data in the event a single drive malfunctions, but the device itself is still a single unit, and has nearly all the vulnerabilities that a single copy of the data has. Don't confuse fault-tolerance with true backup. Encrypted backups If you would like to make the data unreadable to others, it's possible to encrypt entire drives or optical disks if you would like to make the data unreadable to others. This function is primarily used for other kinds of data backup, such as financial information or other sensitive communications, although certain kinds of photographs might be sensitive enough to warrant encryption. This would likely be most important for offsite storage where the data is not under your direct control. Data validation Just because a file shows up in the Finder or the Windows Explorer is no guarantee that the file has integrity. The file could have become corrupted, or it might not even be there at all. If you want to be sure that your files are safely backed up, you should implement some kind of data validation practices. Read more about Data Validation The object of making backups is to restore the files in the event of a problem. If you have a whole-drive mirror, perhaps all you need to do is swap drives to get back up and running. If your computer system is more complex than that, the restoration might be a more complicated process. There is a saying among IT professionals that a backup is not a backup until you have done a trial restoration. It's not uncommon for some part of the backup system to set up improperly. You don't want to find this out after it's too late to be corrected. Relinking Media Video editing software and Parametric Image Editors like Aperture and Lightroom have separate the image edits from the media itself. If you need to restore your files from backup, it’s possible that you will need to relink the editing software to the media. This is generally much easier if the filenames and folder structure are identical on the primary and backup copies. Like the other facets of restoration, make sure you know how this works before you actually need it. Read more about Restoration feedback icon Last Updated February 27, 2012
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '62', 'language_id_whole_page_fasttext': "{'en': 0.93776273727417}", 'metadata': "{'Content-Length': '49453', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FUQ5BX3SKMBW223QZMUJ7LTWLSXVBZMZ', 'WARC-Concurrent-To': '<urn:uuid:653f3183-4216-4d46-b6f7-eef2d1b63993>', 'WARC-Date': datetime.datetime(2013, 12, 13, 11, 56, 25), 'WARC-IP-Address': '216.92.31.120', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:W7LFMSTLGFYTNKWP56JGMVAIYY5IB26N', 'WARC-Record-ID': '<urn:uuid:24521f56-d807-49a1-a0ef-53aa64e751db>', 'WARC-Target-URI': 'http://dpbestflow.org/node/262', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:cb49effa-a5f8-4981-86d6-d2a51841e1c4>', 'WARC-Truncated': 'length'}", 'previous_word_count': '3684', 'url': 'http://dpbestflow.org/node/262', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.028644025325775146', 'original_id': '18f439aeb99dccadd7815fcb956c41c5512733335b35e27b08446853f291c410'}
Tesla Logo Tesla Logo US regulator asks Tesla to recall 158,000 cars due to failing displays ANI | Updated: Jan 14, 2021 20:30 IST Washington [US], January 14 (ANI): American electric vehicle and clean energy company, Tesla on Wednesday (local time) have been asked by the National Highway Traffic Safety Administration to recall some 158,000 Model S and Model X vehicles that could suffer from failing display consoles. According to The Verge, failures of the so-called 'media control units' in these vehicles can sever the owner's access to their vehicle's backup camera, climate controls, and Tesla's Autopilot driver assistance system, increasing the risk of a crash. The problem at the heart of this defect that Tesla needs to fix involves worn-out flash memory chips used in the displays of 2012-2018 Model S sedans and 2016-2018 Model X SUVs. Each time an owner turns on one of these Tesla's, it eats away at the total capacity of the 8GB eMMC NAND flash memory chip onboard the NVIDIA Tegra 3 processor that powers the displays. Usually about five to six years later, when that capacity is reached the displays become bricked. Tesla confirmed to NHTSA that all units with this chip along with providing a statistical model showing projected weekly repairs lasting from 2020 to 2028, with the most failures happening in 2022. The National Highway Traffic Safety Administration said on Wednesday (local time) that a probe is still ongoing despite the request that Tesla recalled the vehicles. It's unclear if Tesla will comply as the company did not immediately respond to the request for comment. As per The Verge, NHTSA acknowledges that Tesla has issued over-the-air software updates meant to mitigate these failures, but the agency believes those don't go far enough, especially because the problem cuts access to the backup camera, which is now a federally mandated feature. While Tesla popularized the use of large touch-screen displays in modern cars, it had more than one problem with these earlier models. Beyond the flash memory issue at the heart of NHTSA's recall request, earlier Tesla displays also suffered from bubbling and yellow banding since back then they were not up to the typical automotive standards. (ANI)
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.93069988489151}", 'metadata': "{'Content-Length': '88895', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:HMIKKIPBSABZUYHLIC6WHROTDRGSJOML', 'WARC-Concurrent-To': '<urn:uuid:9c6a6d60-9813-4fe8-acb9-b0f556cb3d5b>', 'WARC-Date': datetime.datetime(2021, 1, 18, 17, 45, 9), 'WARC-IP-Address': '13.126.121.254', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:3PVPS3KOO5GLUN3WTM2OIUG6TNRO2WGF', 'WARC-Record-ID': '<urn:uuid:1edd3008-2e4f-406f-89a0-0239490b4411>', 'WARC-Target-URI': 'https://www.aninews.in/news/tech/others/us-regulator-asks-tesla-to-recall-158000-cars-due-to-failing-displays20210114203018/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4839f109-dd0c-4346-b0c2-45bb793a889b>', 'WARC-Truncated': None}", 'previous_word_count': '361', 'url': 'https://www.aninews.in/news/tech/others/us-regulator-asks-tesla-to-recall-158000-cars-due-to-failing-displays20210114203018/', 'warcinfo': 'isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-172.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0290677547454834', 'original_id': '49d54178838764ae511d213028a7b6421298a281f826b8aa5b2b6bf53651e4f2'}
A Man for an Eye Is it possible that we might love a person so deep in our hearts that we can patronise and seduce another person to revel in the existence of the former? And, discard these emotions so brutally when we realise that all that love was for a futile soul? ‘Drishtikone’ is a fetish perspective to the human side. Published by lifeoholic %d bloggers like this:
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '17', 'language_id_whole_page_fasttext': "{'en': 0.9135971665382384}", 'metadata': "{'Content-Length': '81877', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IET3WRUPQ7AEMKHBPRU3G5ILBYOJMW4O', 'WARC-Concurrent-To': '<urn:uuid:c23df11d-5a74-4789-9cf2-d81ac1a84a24>', 'WARC-Date': datetime.datetime(2022, 9, 30, 0, 48, 59), 'WARC-IP-Address': '192.0.78.24', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:FC5OMUNBDSK427MF3CMOVQMPOYXI4YA5', 'WARC-Record-ID': '<urn:uuid:e74e37fb-ed6f-440c-8b80-774a470362fb>', 'WARC-Target-URI': 'https://msksantosh.com/2018/05/22/a-man-for-an-eye/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f2ebaa0f-4959-4262-8896-de4071edbb3d>', 'WARC-Truncated': None}", 'previous_word_count': '91', 'url': 'https://msksantosh.com/2018/05/22/a-man-for-an-eye/', 'warcinfo': 'isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-120\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6746801137924194', 'original_id': 'dae3c7e1dfee0d6225131553091ba2a7c53fdc94be9a30a8024160df066af863'}
import { uuid } from 'uuidv4' import IMembersRepository from '@modules/members/repositories/IMembersRepository' import ICreateMemberDTO from '@modules/members/dtos/ICreateMemberDTO' import Member from '../../infra/typeorm/entities/Member' class FakeMembersRepository implements IMembersRepository { private members: Member[] = [] public async findById(id: string): Promise<Member | undefined> { const findMember = this.members.find(member => member.id === id) return findMember } public async findAll(): Promise<Member[] | undefined> { const findMembers = this.members return findMembers } public async findByEmail(email: string): Promise<Member | undefined> { const findMember = this.members.find(member => member.email === email) return findMember } public async findByMemberFunctionAndStatus(memberFunction: string, memberStatus: string): Promise<Member[]> { if (!memberFunction || !memberStatus) return undefined const findMembers = this.members.filter(member => ((member.member_spiritual.member_function === memberFunction) && (member.member_spiritual.member_status === memberStatus))) return findMembers } public async delete(id: string): Promise<Member | undefined> { let response = undefined let newArray = [...this.members] const findIndex = newArray.findIndex(member => member.id === id) if(findIndex > -1) { newArray = newArray.splice(findIndex, 1) } response = newArray.find(member => member.id === id) return response } public async create(memberData: ICreateMemberDTO): Promise<Member> { const member = new Member() Object.assign(member, { id: uuid() }, memberData) this.members.push(member) return member } public async save(member: Member): Promise<Member> { const findIndex = this.members.findIndex(member => member.id === member.id) this.members[findIndex] = member return member } } export default FakeMembersRepository
common_corpus
{'identifier': 'https://github.com/rodrigoengelberg/icea-gestao-backend/blob/master/src/modules/members/repositories/fakes/FakeMembersRepository.ts', 'collection': 'Github Open Source', 'open_type': 'Open Source', 'license': 'MIT', 'date': '', 'title': 'icea-gestao-backend', 'creator': 'rodrigoengelberg', 'language': 'TypeScript', 'language_type': 'Code', 'word_count': '197', 'token_count': '577', '__index_level_0__': '5105', 'original_id': '0d1d698ddc26de53a111b7111b845e3e7edb970eff7d47b915eb64bf975840aa'}
Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer My android doesn't see AdHoc networks so I cannot share internet to my phone that way. I heard of making a network in infrastructure mode, and I am wondering how to find out if my card supports it. share|improve this question up vote 9 down vote accepted use the command: sudo iwconfig wlan0 mode master if it gives the following as output, it means it doesn't support infrastructure mode: Error for wireless request "Set Mode" (8B06) : SET failed on device wlan0 ; Invalid argument. If it gives no output, it supports the infrastructure mode. Also, just remember to change "wlan0" to the actual name of your wireless device. You can get the name using the command ifconfig . share|improve this answer thanks.. :( I guess my card doesn't support it – Matt Mar 19 '12 at 18:20 I think that some cards may have Infrastucture mode with Mad Wifi Drivers, but you have to compile them and use as modules. With my old card wifi it worked – Omegafil Oct 4 '12 at 17:36 You can check if your device supports AP mode by running "iw list" and looking in the 'Supported interface mode*s' section for "*AP". See: Wireless Driver Support for AP support. This is the Source share|improve this answer Hmm.. I see AP as well as AP/VLAN in the list of Supported Interface Modes. However, trying to set the mode to master as per @The Terminator's answer gives error message indicating that it doesn't support infrastructure mode. – intuited Nov 23 '13 at 1:32 Your Answer
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.914201319217682}", 'metadata': "{'Content-Length': '78072', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RCZQ65XGJSUEBA7FFSMYWS564SYKYHCY', 'WARC-Concurrent-To': '<urn:uuid:aa2d4f1b-b3e9-4ea1-951e-fba7a9029967>', 'WARC-Date': datetime.datetime(2016, 6, 30, 23, 12, 8), 'WARC-IP-Address': '151.101.193.69', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:V5N7ZWSB2K4NU2Z4L47JZCZNYK4V5TM5', 'WARC-Record-ID': '<urn:uuid:23204e73-2051-47db-ab4f-4c05065d3f78>', 'WARC-Target-URI': 'http://askubuntu.com/questions/106745/how-to-find-out-if-my-card-supports-infrastructure-mode', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:04f4db1f-48e1-4a9d-993e-9120ccba4b3a>', 'WARC-Truncated': None}", 'previous_word_count': '315', 'url': 'http://askubuntu.com/questions/106745/how-to-find-out-if-my-card-supports-infrastructure-mode', 'warcinfo': 'robots: classic\r\nhostname: ip-10-164-35-72.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-26\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for June 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.3728542923927307', 'original_id': 'd5cf968c9cd313d071fe659ab07af5a6a5ae22d5a24b6abd31ec205a6ac34820'}
"... In two studies, the authors investigated 2- and 3-year-old children’s awareness of the normative structure of conventional games. In the target conditions, an experimenter showed a child how to play a simple rule game. After the child and the experimenter had played for a while, a puppet came (contr ..." In two studies, the authors investigated 2- and 3-year-old children’s awareness of the normative structure of conventional games. In the target conditions, an experimenter showed a child how to play a simple rule game. After the child and the experimenter had played for a while, a puppet came (controlled by a 2nd experimenter), asked to join in, and then performed an action that constituted a mistake in the game. In control conditions, the puppet performed the exact same action as in the experimental conditions, but the context was different such that this act did not constitute a mistake. Children’s normative responses to the puppet’s acts (e.g., protest, critique, or teaching) were scored. Both age groups performed more normative responses in the target than in the control conditions, but the 3-year-olds did so on a more explicit level. These studies demonstrate in a particularly strong way that even very young children have some grasp of the normative structure of conventional activities. ... or what is usually done with it, without understanding the act as what is to be done conventionally, that is, without understanding that there are “right” and “wrong” ways to do it (Tomasello, 1999; =-=Tomasello & Rakoczy, 2003-=-). Casler and Kelemen (2005) thus used a new measure 875876 BRIEF REPORTS that went beyond mere imitation of actions with artifacts. They found that children as young as 2 years of age not only imita... ...at infants are sensitive to some aspects of goal-‐directed activity, can attribute goals to actions and can discriminate between intentional and accidental actions (Gergely et al. 1995; Csibra 2008; =-=Tomasello and Rakoczy 2003-=-; Woodward 1998; Woodward and Sommerville 2000). However, and this is my third remark, evidence for an early understanding of goal-‐directed activity isn't yet evidence for an early understanding of ... "... Despite sharing a recent common ancestor, humans are surprisingly different from other great apes. The most obvious discontinuities are related to our cogni-tive abilities, including language, but we also have a markedly different, coopera-tive breeding system. Among many nonhuman primates and mamma ..." Despite sharing a recent common ancestor, humans are surprisingly different from other great apes. The most obvious discontinuities are related to our cogni-tive abilities, including language, but we also have a markedly different, coopera-tive breeding system. Among many nonhuman primates and mammals in gen-eral, cooperative breeding is accompanied by psychological changes leading to greater prosociality, which directly enhances performance in social cognition. Here we propose that these cognitive consequences of cooperative breeding could have become more pervasive in the human lineage because the psycho-logical changes were added to an ape-level cognitive system capable of under-standing simple mental states, albeit mainly in competitive contexts. Once more prosocial motivations were added, these cognitive abilities could also be used for cooperative purposes, including a willingness to share mental states, thereby enabling the emergence of shared intentionality. Shared intentionality has been identified as the original source of many uniquely human cognitive abilities, including cumulative culture and language. Shared intentionality rests on a fun- "... Sperber and Wilson among others) have viewed basic communicative acts as essentially involving the attitudes of the participating agents. Developmental data poses a dilemma for these accounts, since it suggests children below age four are competent commu-nicators but would lack the ability to concep ..." Sperber and Wilson among others) have viewed basic communicative acts as essentially involving the attitudes of the participating agents. Developmental data poses a dilemma for these accounts, since it suggests children below age four are competent commu-nicators but would lack the ability to conceptualise communication if philosophers and linguists are right about what communication is. This paper argues that this dilemma is quite serious and that these prominent accounts would be undermined if an adequate more minimal alternative were available. Just such a minimalist account of commu-nication is offered, drawing on ideas from relevance theory and situation theory. 1. "... Given the premise that joint action plays some role in explaining how humans come to understand minds, what could joint action be? Not what a leading account, Michael Bratman’s, says it is. For on that account engaging in joint action involves sharing intentions and sharing intentions requires much ..." Given the premise that joint action plays some role in explaining how humans come to understand minds, what could joint action be? Not what a leading account, Michael Bratman’s, says it is. For on that account engaging in joint action involves sharing intentions and sharing intentions requires much of the understanding of minds whose development is supposed to be explained by appeal to joint action. This paper therefore offers an account of a different kind of joint action, an account compatible with the premise about development. The new account is no replacement for the leading account; rather the accounts characterise two kinds of joint action. Where the kind of joint characterised by the leading account involves shared intentions, the new account characterises a kind of joint action involving shared goals. "... concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright L ..." concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover: Photo by Etsuko Nogami, Kyoto University A mother chimpanzee uses a pair of stones to crack open oil palm nuts; watched by the son, 7 years old, and the daughter, 1.5 years old. "... Abstract. Philosophy, artificial intelligence and cognitive science have long been dominated by the presupposition that intelligence is fundamentally individual. Recent work in cognitive science clearly undermines that notion. Increasingly, intelligence is seen not as having its locus in the individ ..." Abstract. Philosophy, artificial intelligence and cognitive science have long been dominated by the presupposition that intelligence is fundamentally individual. Recent work in cognitive science clearly undermines that notion. Increasingly, intelligence is seen not as having its locus in the individual, but in the network of relationships that the individual has with the external world and other individuals. At the same time, there has been an increasing neo-Heideggerian focus on the role of embodiment and anti-representationalism, as shown by work ranging from robotics to dynamical systems. While philosophers are carefully trying to justify this development, the most significant computational phenomenon by far- the World Wide Web-is a veritable explosion of representations. In its latest stage, the Web has become increasingly more the realm of representations used for social real-time co-ordination, as a tool for “collective intelligence.” In order to make sense of these developments, we first summarize the ... ability to point in children is more than an expression of a linguistic demonstrative, but rather an effort to produce a shared intentionality by directing the attention of others to the same object =-=[31]-=-. Some evidence from neuroscience the explosion of frontal cortex, long thought to be the seat of reasoning, evolved to keep track of interactions within a social network [8], and that the presence of... "... The contribution of this dissertation is to show how interlocutors in dialogue can reason probabilistically about natural language interpretation, dialogue state (context), and natural language generation in a way that is consistent with three fundamental claims made by mainstream theories of pragma ..." The contribution of this dissertation is to show how interlocutors in dialogue can reason probabilistically about natural language interpretation, dialogue state (context), and natural language generation in a way that is consistent with three fundamental claims made by mainstream theories of pragmatic reasoning in human-human dialogue: 1. interlocutors track and exploit the evolving context to coordinate their individual contributions; 2. the current context depends on what the previous utterances of both interlocutors have meant (contributed); 3. what a speaker can recognizably mean (contribute) by a specific choice of words depends on the current context. Mainstream pragmatic theories depend on these assumptions to explain how a speaker can make linguistic choices that the hearer will interpret as intended, but these theories do not lend themselves to straightforward probabilistic reasoning. Engineering approaches to building dialogue systems implement straightforward probabilistic reasoning, but sacrifice one or more (sometimes all) of these fundamental aspects of pragmatic theory in order to do so. This dissertation shows how we can achieve the robustness and data-driven methodology enjoyed by engineering approaches while keeping "... Abstract. Since the beginning of the Nineteen-eighties, cognitive scientists have shown increasing interest in a range of phenomena, processes and capacities underlying human interaction, collectively referred to as intersubjectivity. The goal of this line of research is to give an account of the va ..." Abstract. Since the beginning of the Nineteen-eighties, cognitive scientists have shown increasing interest in a range of phenomena, processes and capacities underlying human interaction, collectively referred to as intersubjectivity. The goal of this line of research is to give an account of the various forms of human interaction, and in particular of the affective, attentional and intentional determinants of joint activity. The main thesis we develop in the paper is that so far the authors interested in intersubjectivity have neglected, or at least undervalued, an important aspect of joint activity, that is, the essentially normative character of collective intentionality. Our approach to joint activity is mainly based on Margaret Gilbert’s theory of plural subjects. Gilbert’s general idea is that joint activities should be regarded as activities carried out by individuals who stand to one another in a special relation, called joint commitment, which has an intrinsically normative nature. As we shall try to show, the concept of a joint commitment is a powerful tool to explain certain specific features of joint activities. In the paper we first point out certain explanatory inadequacies of the current models of intersubjectivity, and contend that such inadequacies depend on failing to appreciate the fundamental role of normativity in collective intentionality. We briefly sketch Gilbert’s theory of plural subjects, and introduce the concept of a joint commitment, and then discuss some lines along which a psychology of plural subjects may be developed. ...ally human structures andsprocesses appear. Here we shall comment on a few works that we findsrepresentative of this approach.sIn a paper on “What makes human cognition unique,” Tomasello and Rakoczys=-=[18]-=- compare the impact on human social cognition of two key developmentalsmoments, the first at about one year of age and the second at about four years. Insthe authors’ terminology, the first ontogeneti... "... Subjectivity after Wittgenstein Wittgenstein’s embodied and embedded subject and the debate about the death of manILLC Dissertation Series DS-2009-06 For further information about ILLC-publications, please contact ..." Subjectivity after Wittgenstein Wittgenstein’s embodied and embedded subject and the debate about the death of manILLC Dissertation Series DS-2009-06 For further information about ILLC-publications, please contact ...asello precisely argues that the “leaps” that children display at around 1 and 4 years of age (and especially the first leap) underlie their ability to participate in complex social institutions (see =-=Tomasello & Rakoczy 2003-=-). These leaps not being exhibited (or not in the same way) by non-human animals, Tomasello also claim that this explains the (what he takes to be) striking difference between human beings and even th...
mini_pile
{'original_id': 'cafc727f38b8f17baca58f1e4e90dc37804e6ff742bfdec9aca19b0b020f1d11'}
We are all capitalists Shilling for minimum-wage increases is one of the laziest moves a desperate politician can make.  President Obama took it to a new level in his State of the Union address, investing just enough effort to sharpen an embarrassing pander into another weapon in his endless class warfare: “Give ’em a raise!” Obama shouted into the ensuing applause.  I can imagine the meeting he must have held with his speechwriters: POTUS: I need a couple of points added to my approval rating, fast.  What’s the biggest, easiest pander I could make, with the least danger of blowback? SPEECHWRITER: Tell everyone in America you think they deserve a raise.  Absolutely no need to follow through, and if it doesn’t happen, they’ll blame the evil greedy business owners they work for. POTUS: Sweet!  I was thinking about promising a chicken in every pot, but Ted Cruz would probably add up the cost of the chickens, throw in some delivery overhead, and ask where I was going to get the money from.  Also, the animal-rights people would go nuts. Thus we have the man who’s never made a payroll telling us all how to manage our employees; the man who couldn’t manage a lemonade stand telling us that radically increased cost of labor is nothing compared to the warm feeling everyone gets from a nice fat pay raise.  Barack Obama is very good at telling everyone else what they must do, and spending other people’s money.  Just think how happy we’d all be, if the minimum wage got kicked up to $50 an hour!  And don’t you dare think about cutting hours or raising the price of your products to absorb those costs, American businessmen, or the Class Warrior In Chief will be all over you. When did it become the business of the American president – chief executive of a limited republic, empowered by the consent of the free people it governs – to lecture private-sector enterprises on how much the should be paying their employees, and elsewhere in his speech, who they should be hiring?  The implication is that those greedy fat cats could give you a raise any time they wanted to; they just need a good kick in the pants from the man who dumped ObamaCare on you to get them writing those checks. I’ve heard the President’s new political strategy described as “labor versus capitalism,” which is another way of saying “divisive warfare between employees and the people who sign their paychecks.”  The odds are supposed to be pretty long against capitalism winning that conflict, because labor will always vote its own self-interest, or at least succumb to appeals based upon its resentments.  Who’s going to get mad at the politician who says they deserve a raise? “Labor vs. capitalism” is not a bad way to describe what we’re talking about here.  Capitalism is the private ownership of capital, which includes the ability to invest that capital as the owner sees fit, not the way a politician orders them to.  All this tinkering with the minimum wage has absolutely nothing to do with protecting vulnerable workers from brutal exploitation, any more than the bloated food stamp program is about rescuing hungry people from starvation.  It’s all about chipping away at the private control of capital, which most certainly includes human capital. I have always thought a healthy work ethic involved seeing yourself as the owner and salesman of your own labor.  Your time is a valuable commodity.  Employers are your customers.  Good customer service goes a long way towards a successful business relationship.  So does a healthy competitive spirit. But Obama’s vision of a government-regulated economy accepts the collectivist premise that all capital, including your labor, is the rightful property of the State, which is the prophet and executor of the popular will.  In a hardcore collectivist system, the State would guarantee everyone an income, while assigning labor according to the instruction of central planners.  It’s really not hard to find people who are more or less serious about imposing such a system on the United States.  Meanwhile, the mainstream Left thinks individuals should be allowed to retain some control over their labor, some ability to set the terms of its sale. Obama’s “Give ’em a raise!” rallying cry fits neatly into that model.  If the minimum wage is raised, you will no longer be allowed to compete by offering your labor for less than $10 per hour, or whatever it rises to.  Most people think of the minimum wage as a restriction against business, but it’s also a restriction on employees, just as surely as price controls affect the sellers of any other commodity.  The unskilled or inexperienced job-seeker is stripped of the ability to persuade employers to take a chance on him at a lower entry-level wage, confident that he’ll soon prove himself worth more. That probably sounds like an abstract freedom to lose – yeah, right, like I’m suffering some big loss of liberty because nobody can pay me less than $10 an hour any more – but it’s going to feel pretty freaking real to the people who lose their jobs, cannot find jobs, or find their hours cut because of a minimum wage increase.  Of course, they’ll be bamboozled into thinking the wage controls had nothing to do with their misfortune.  They’ll be told to focus their anger and desperation on the people who won’t hire them, not the politicians who made it impractical to hire them. Let me be brutally honest here.  Look around your office, the next time you go to work.  Do you think everyone you see really deserves the same raise as you?  Don’t you think that decision should be made locally, by managers familiar with your work, and also familiar with the performance of the guy who shows up late every day, or the one who horses around on his smartphone instead of getting stuff done, or the one who won’t volunteer for overtime the way you do? If you’re unemployed, do you think everyone else at the job fair or benefits window is worth the same wages as you are?  You might answer, “I don’t know, because I haven’t worked with those people.”  Fair enough.  But why should a politician a thousand miles away, who has never worked with you or anyone else in your industry, make those decisions?  Why should you be so willing to surrender your chance to impress an employer and get a profitable career under way, as a smaller pool of jobs with higher mandatory wages is parceled out cautiously to a dwindling workforce of people with the best resumes? The most destructive aspect of class warfare isn’t raw envy of the rich.  It’s the way these divisive politics lead workers to regard capitalists as a separate class, which they regard with deep suspicion.  In truth, we are all capitalists.  You made an investment in developing your capital when you went to school.  You sell it every time you have a job interview.  You really don’t want politicians micro-managing those transactions. Trending on Redstate Video
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '303', 'language_id_whole_page_fasttext': "{'en': 0.9594935774803162}", 'metadata': "{'Content-Length': '75959', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:JIC2APRND3P4KNIFU2SMK4AASI4SP4XV', 'WARC-Concurrent-To': '<urn:uuid:0fcc653d-4913-4e80-86f2-0c70e7a73df7>', 'WARC-Date': datetime.datetime(2022, 12, 8, 9, 28, 35), 'WARC-IP-Address': '104.18.17.211', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:T7WOZKKBI5N3TMLP2KEVHKIIJLDD75LO', 'WARC-Record-ID': '<urn:uuid:94ec42d7-b251-4e0a-aed9-59dbb283e399>', 'WARC-Target-URI': 'https://redstate.com/jhayward13/2014/01/29/we-are-all-capitalists-n47740', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:280a1aad-fd13-4a28-9d18-09e7a8c5821e>', 'WARC-Truncated': None}", 'previous_word_count': '1416', 'url': 'https://redstate.com/jhayward13/2014/01/29/we-are-all-capitalists-n47740', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-71\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.0997762680053711', 'original_id': 'c73123cd2f47e130a6307e9459d213e7c2858b5c48385a23daedf01c84825655'}
INTRODUCTION {#SEC1} ============ The catalytic subunit of the DNA-dependent protein kinase (DNA-PKcs) is a key component of the non-homologous end joining (NHEJ) pathway in DNA double strand break (DSB) repair ([@B1]). DNA-PKcs and the closely related members of the phosphatidylinositol-3 kinase-like kinase (PIKK) family, including ataxia-telangiectasia mutated (ATM) and ATM and Rad3-related (ATR), are key regulators in the cellular response to various types of DNA damage ([@B2]). Together they are critical for the maintenance of genomic integrity to prevent genetic disorders, aging and carcinogenesis. The primary role of DNA-PKcs in DSB repair has been well characterized ([@B1]). DNA-PKcs is recruited to DSBs by the DNA-binding Ku70/80 heterodimer. Together they form the kinase active DNA-PK holoenzyme and promote NHEJ-mediated DSB repair. The regulation of DNA-PKcs activity also relies on its own phosphorylation status particularly at the Thr2609 cluster region, which is crucial for DSB repair, cellular resistance to radiation and tissue stem maintenance ([@B3]). DNA-PKcs phosphorylation at the Thr2609 cluster may contribute to its conformational changes and modulates the association of DNA-PKcs with the Ku70/80 heterodimer or other DNA repair molecules to impact DSB repair ([@B1]). In addition, we have demonstrated that DNA-PKcs is rapidly phosphorylated by ATR at the Thr2609 cluster upon replication stress ([@B6]), and also maintains the stability of the Chk1-Claspin complex for optimal intra-S-phase checkpoint ([@B7]). Cells lacking a functional Thr2609 cluster confer sensitivity to ultraviolet (UV) and other replication stress-inducing agents, suggesting that ATR-dependent DNA-PKcs phosphorylation is necessary for the cellular response to replication stress ([@B5],[@B6]). This is consistent with the finding that DNA-PKcs plays a role in regulating RPA2 phosphorylation ([@B8]). However, the mechanism through which DNA-PKcs is recruited to stalled replication forks and whether the Ku70/80 heterodimer is involved in the ATR pathway and regulation is still unknown. To further delineate the mechanism of DNA-PKcs in the replication stress response, we have discovered that the p53-induced protein with a death domain (PIDD) participates in the recruitment of DNA-PKcs to stalled replication forks. PIDD is known to play multiple roles in the response to DNA damage, possibly leading to either cell death or survival ([@B12]). For example, PIDD is known as a mediator of apoptosis through assembly of the PIDDosome complex containing Caspase-2 for the initiation of apoptosis upon genotoxic stress ([@B13]). In contrast, PIDD also promotes the NF-κB pathway activation for cellular survival upon DNA damage ([@B14]). PIDD also participates in DNA damage repair and stimulates PCNA monoubiquitination during translesion DNA synthesis in response to UV irradiation ([@B15]). Here, we showed that PIDD is required for DNA-PKcs association and stimulation of the ATR pathway. Disruption of the interaction between DNA-PKcs and PIDD compromises the intra-S-phase checkpoint and cell survival against UV irradiation. Our results suggest that DNA-PKcs and PIDD are integral components of the cellular response to replication stress. MATERIALS AND METHODS {#SEC2} ===================== Cell culture, siRNA transfection and plasmid {#SEC2-1} -------------------------------------------- Human cervical cancer HeLa cells, human embryonic kidney 293 cells, human colon cancer HCT116 Ku86^flox/−^ cells ([@B16]), Chinese hamster ovary cells deficient in DNA-PKcs (V3) and V3-complemented cells were maintained in α--minimum essential medium (HyClone) supplemented with 10% fetal bovine serum in a humidified incubator at 37°C with 5% CO~2~. Small interfering RNA (siRNA) oligonucleotide duplexes designed against PIDD (siPIDD\#1: CAGACUGUUCCUGACCUCAGA, siPIDD\#2: GCAGCCCUCAUUCCAGAAA, siPIDD\#3: UCCUUGUCCUGCACAGCAA, Invitrogen) were transfected with Lipofectamine 2000 (Invitrogen) according to the manufacturer's instructions. Full-length or truncated PIDD were amplified and cloned into pIRES2-DsRed2 (Clontech) or pcDNA3.1^+^/N-HA (Invitrogen) for mammalian expression. DNA-PKcs cDNA fragments were cloned into pGEX-6P1 (GE Healthcare Life Sciences) for Glutathione S-transferase (GST) fusion protein, and PIDD cDNA fragments were cloned into pET28a (Novagen) for His-tagged protein. Clonogenic survival assay and growth curve {#SEC2-2} ------------------------------------------ Exponentially growing V3 and human DNA-PKcs-complemented V3 cells were exposed to γ-rays with a J. L. Shepherd and Associates irradiator that emitted ^137^Cs γ-rays at a dose rate of 3.44 Gy/min to the cells' positions. Cells were immediately plated at the appropriate number and incubated for 7--9 days to yield 30--60 surviving colonies for each 60-mm dish (Greiner). For UV irradiation, cells growing exponentially on culture dishes were washed with phosphate-buffered saline (PBS) and exposed to UV-C (254 nm) at a rate of 0.8--1 J/m^2^/s to achieve the desired cumulative dose. Fresh culture medium was added to the culture dishes immediately after irradiation. The colonies were fixed with 100% ethanol and stained with 0.1% crystal violet. A colony with more than 50 cells was counted as a survivor. To generate a growth curve, cells were plated with 5 × 10^4^ cells for each 60-mm dish on day 0 and counted daily with a Z2 Coulter Counter (Beckman) according to the manufacturer's instructions. Western blot, immunoprecipitation and immunofluorescence staining {#SEC2-3} ----------------------------------------------------------------- Whole cell lysates were prepared with lysis buffer (50 mM Tris pH 7.5, 0.2 M NaCl, 1% Tween-20, 1% NP40, 1 mM sodium orthovanadate, 2 mM β--glycerophosphate and protease inhibitors) and then used for western blotting (WB). For immunoprecipitation (IP), antibodies or the normal IgG control (Santa Cruz Biotechnology) were first incubated with protein A Sepharose beads CL-4B (GE Healthcare Life Sciences) for 1 h. Cells were lysed in IP buffer (20 mM Tris pH 7.5, 120 mM NaCl, 2 mM ethylenediaminetetraacetic acid (EDTA), 0.2% NP-40, 10% glycerol and protease inhibitors) and incubated overnight with pulled antibody-protein A beads. The beads were washed with IP buffer and resuspended in Laemmli buffer for WB. To avoid any interference from the heavy chains and the light chains of IgG used for IP, either EasyBlot HRP-conjugated anti-mouse IgG or EasyBlot HRP-conjugated anti-rabbit IgG was used as the secondary antibody in WB. For immunofluorescence (IF) staining, cells were fixed with 4% paraformaldehyde (PFA) in PBS for 15 min, treated with 0.5% Triton X-100 in PBS for 5 min, and blocked with 5% normal goat serum in PBS for 1 h at room temperature. Cells were incubated with primary antibodies for 2 h, washed three times with PBS, and incubated with Alexa Fluor 488-anti-rabbit and Texas Red-conjugated anti-mouse secondary antibodies for 1 h (Invitrogen). Cells were washed three times with PBS and mounted in Vectashield mounting medium with 4,6-diamidino-2-phenylindole (Vector Laboratories). For EdU (5-ethynyl-2′-deoxyuridine) labeling, cells were labeled with 50 μM EdU for 1 h and then exposed to UV. Cells were fixed with 4% PFA, stained with a Click-iT EdU imaging kit (Invitrogen) according to the manufacturer's instructions and treated for IF staining as described above. For RPA2 IF staining, cells were pre-extracted with cytoskeleton buffer (10 mM HEPES, pH 7.4, 300 mM sucrose, 100 mM NaCl, 3 mM MgCl2, 0.1% Triton X-100) for 5 min and then fixed with 4% PFA. Cells were incubated with anti-RPA2 antibody (EMD Millipore, NA19L, 1:500) overnight and proceeded with the staining procedure as described above. For single-strand DNA (ssDNA) staining, cells were cultured in regular medium containing 10 μM BrdU for 30 h. Following hydroxyurea (HU) (2 mM) treatment, cells were fixed with 4% PFA and proceeded with the staining procedure using anti-BrdU antibody (BD Bioscience). Images were acquired using a Zeiss AxioImager M2 microscope system equipped with a Plan-Apochromat 63X /NA 1.40 objective, an AxioCam MRm CCD camera and AxioVision software (Carl Zeiss). Anti-pS2056, anti-pT2609 and anti-pT2647 phospho-specific rabbit polyclonal antibodies have been used and described previously ([@B3],[@B4],[@B17]). DNA-PKcs mouse monoclonal antibody clones 18--2 and 25--4 (Thermo Fisher Scientific) for IP, anti-ATR N19 (Santa Cruz Biotechnology), anti-ATR pT1989 (GeneTex), anti-SMC1 (Bethyl), anti-phosphor-S966 SMC1 (Bethyl), anti-Chk1 (Cell Signaling), anti-phospho-S317 Chk1 (Cell Signaling), anti-PIDD Anto-1 (Enzo Life Sciences), anti-phospho-S139 H2AX (EMD Millipore), anti-FLAG M2 (Sigma), anti-Ku80 (Santa Cruz Biotechnology), anti-Orc2 (BD Biosciences) and anti-Actin (Sigma) were commercially available from the indicated vendors. Protein purification and GST pull down assay {#SEC2-4} -------------------------------------------- Recombinant GST-fused DNA-PKcs fragments and His-tagged PIDD were expressed in BL21 *Escherichia coli*. GST-DNA-PKcs fusion pellets were lysed and sonicated in STE buffer (150 mM NaCl, 25 mM Tris pH 8, 1 mM EDTA, 100 μg/ml lysozyme, 1.5% N-Lauroylsarcosine, 2% Triton X-100), and cleared by centrifugation (13000 rpm, 20 min at 4°C). Recombinant His-tagged PIDD-DD proteins were purified by the His-affinity (Qiagen) column. For the GST pull down assay, GST lysates were affinity purified with Glutathione-Sepharose beads (GE Healthcare Life Sciences) and incubated with His-tagged PIDD-DD in the presence of EtBr (40 ng/μl). Proteins bound to Glutathione-Sepharose beads were analyzed by WB. Proximity ligation assay {#SEC2-5} ------------------------ Exponentially growing cells were exposed to UV radiation and harvested after 30 min of incubation. Cells were trypsinized, counted, and deposited onto microscope slides (1 × 10^5^/slide) by a Cytospin 4 cytocentrifuge (Thermo Fisher Scientific) at 500 rpm for 5 min. Proximity ligation assay (PLA) was performed using Duolink PLA reagents (Sigma-Aldrich) according to the manufacturer's instructions. Briefly, deposited cells were fixed with 4% PFA in PBS for 20 min, treated with 0.5% Triton X-100 in PBS for 10 min and blocked with Duolink *in situ* blocking solution for 1 h at room temperature. Cells were incubated with primary antibodies in Duolink in situ antibody diluent for 2 h, washed with PBS twice, and left in PBS overnight at room temperature. Cells were incubated with oligonucleotides-conjugated secondary antibodies (PLA probe anti-rabbit PLUS and anti-mouse MINUS) followed by ligation and rolling circle amplification with a fluorophore labeled oligonucleotide probe (*λ*~ex~ = 495 nm and *λ*~em~ = 527 nm). Cells were mounted in Vectashield mounting medium with 4,6-diamidino-2-phenylindole (Vector Laboratories) and visualized using a Zeiss AxioImager M2 microscope equipped with a EC Plan-Neofluar 40X/0.75 objective. PLA spot counting was performed using the ImageJ (NIH, USA) software. Mouse anti-DNA-PKcs (Thermo Fisher Scientific, 1:100 dilution), rabbit anti-ATR (Bethyl, 1:100), mouse anti-RPA2 (EMD Millipore, 1:50) and rabbit anti-FLAG (Sigma, 1:100) antibodies were commercially available at the indicated vendors. Fractionation {#SEC2-6} ------------- Soluble nuclear and chromatin-bound fractions were prepared according to a published fractionation protocol ([@B18]). Briefly, cell pellets were resuspended (2 × 10^7^ cells/ml) in buffer A (10 mM HEPES, pH 7.9, 10 mM KCl, 1.5 mM MgCl~2~, 0.34 M sucrose, 10% glycerol, 1 mM Dithiothreitol (DTT), protease inhibitors and phosphatase inhibitors) containing 0.1% Triton X-100 and incubated for 5 min on ice. Nuclei (P1) was collected by low-speed centrifugation (1300 × *g*, 4 min, 4°C) and washed once with buffer A. Washed nuclei were lysed with buffer B (3 mM EDTA, 0.2 mM EGTA, 1 mM DTT, protease inhibitors and phosphatase inhibitors) and incubated for 30 min on ice. The soluble nuclear fraction (S3) was separated from insoluble chromatin by centrifugation (1700 × *g*, 4 min, 4°C). The chromatin pellet was washed once with buffer B and centrifuged again. The final pellet (P3) was resuspended with Laemmli buffer and sonicated for 30 s. DNA fiber analysis {#SEC2-7} ------------------ Cells were labeled sequentially with 100 μM iododeoxyuridine (IdU) for 10 min and chlorodeoxyuridine (CldU) for 20 min in a mock experiment. To monitor the replication stress response, cells were first labeled with IdU followed by UV exposure and then labeled with CldU. DNA fibers were spread as described ([@B19]), and stained with primary antibodies (mouse anti-BrdU/IdU, BD Bioscience; rat anti-BrdU/CldU, Accurate Chemical) and fluorescence-conjugated secondary antibodies (Alexa Fluor 488 anti-rat and Texas Red anti-mouse, Invitrogen). Fibers were imaged using the Zeiss AxioImager M2 and measured using the AxioVision software (x64 version 4.9.1). Statistical analysis {#SEC2-8} -------------------- Statistical analyses were performed using a two-way analysis of variance (ANOVA) followed by the Bonferroni's post-hoc test. All statistical analyses were performed using the Prism GraphPad (version 6.02) software. Statistical significance was defined as *P* \< 0.05, and values of *P* \< 0.0001 were also shown to indicate the level of confidence. The length or CldU to IdU ratios of the DNA fiber tracks were diagnosed with the equal variance assumption by F-test, and analyzed by the significance by unpaired *t*-test. RESULTS {#SEC3} ======= A PIP-like motif of DNA-PKcs is required for cellular resistance to replication stress {#SEC3-1} -------------------------------------------------------------------------------------- We have identified a motif resembling the consensus PCNA-interacting protein (PIP) motif ([@B20]) at the N'-terminal of DNA-PKcs (Figure [1A](#F1){ref-type="fig"}). To determine whether this PIP-like (abbreviates as PL) motif is functional, DNA-PKcs-deficient CHO V3 cells were complemented with a DNA-PKcs mutant harboring alanine substitutions at F345/Y346 within the PL motif (V3-mPL \#1 and \#2), and were analyzed together with other V3 derivative cell lines (Figure [1B](#F1){ref-type="fig"}). In cell proliferation assays, we observed that V3 cells complemented with wild-type DNA-PKcs (V3-WT) showed a slightly improved growth rate than V3 cells complemented with the empty vector (V3) or a mutant DNA-PKcs carrying alanine substitutions at the Thr2609 phosphorylation cluster (V3--6A). On the contrary, both V3-mPL1 and V3-mPL2 cells exhibited slower growth rates than other V3 cells (Figure [1C](#F1){ref-type="fig"}). Furthermore, when subjected to sequential pulse-labeling with iododeoxyuridine (IdU) and chlorodeoxyuridine (CldU) in the DNA fiber assay ([@B19],[@B21]), we observed that the progression of on-going DNA replication tracks (measured by the length of the DNA fibers) were significantly attenuated in V3-mPL1 cells than in V3-WT cells (Figure [1D](#F1){ref-type="fig"}). IdU-labeled tracks were 2.7 ± 1.2 μm in V3-mPL1 cells compared to 3.8 ± 1.5 μm in V3-WT cells (*P* \< 0.0001), whereas CldU-labeled tracks were 5.1 ± 2.4 μm in V3-mPL1 cells compared to 7.3 ± 2.9 μm in V3-WT cells (*P* \< 0.0001). These results indicate that impairment of the DNA-PKcs PL motif compromises normal DNA replication and cell proliferation, although flow cytometry analysis revealed similar cell cycle profiles in V3-mPL cells and other V3 derivative cells ([Supplementary Figure S1A](#sup1){ref-type="supplementary-material"}). ![The PL motif of DNA-PKcs is required for robust DNA replication. (**A**) Sequence comparison of human DNA-PKcs amino acid 337--350 with the PIP box motif of other PIPs (left panel) and homology with other vertebrates (right panel). Consensus sequence of the PIP box, QxxΨxxϑϑ. *Ψ* = M, L, I; *ϑ* = F, Y. The DNA-PKcs PL mutant (mPL) carries alanine substitutions at F345 and Y346. (**B**) Expression of DNA-PKcs in wild-type CHO AA8 cells, DNA-PKcs deficient V3 cells and V3 cells complemented with empty vector (V3), wild-type DNA-PKcs (WT) and mutants carrying alanine substitutions at the Thr2609 cluster (V3--6A) or the PL motif (V3-mPL). (**C**) Growth curve of V3 and derived cell lines. Cell numbers were analyzed by a cell counter (Beckman Coulter Z2). Data are presented as mean ± s.d., *N* = 2. (**D**) V3-WT and V3-mPL cells were pulse-labeled with iododeoxyuridine (IdU, 10 min) and chlorodeoxyuridine (CldU, 20 min) sequentially, and were analyzed by the DNA fiber assay. The lengths of IdU (red) and CldU (green) tracks were analyzed from \>100 ongoing DNA replication tracks.](gkx1298fig1){#F1} To further delineate the role of the PL motif on DNA-PKcs activity and regulation, V3-mPL cells were analyzed for clonogenic survival against ionizing radiation (IR), UV and HU. V3-mPL1 and V3-mPL2 cells exhibited an intermediate sensitivity toward IR compared with the extreme radiosensitive V3 and V3--6A cells ([@B4],[@B6]) (Figure [2A](#F2){ref-type="fig"}). However, V3-mPL cells were highly sensitive to UV irradiation (Figure [2B](#F2){ref-type="fig"}) and HU exposure (Figure [2C](#F2){ref-type="fig"}), suggesting that V3-mPL cells are defective in cellular response to replication stress or stalled replication forks. This notion was further supported by the stronger induction of ssDNA in response to HU treatment in V3-mPL cells as well as in V3 and V3--6A cells than V3-WT cells (Figure [2E](#F2){ref-type="fig"}). Similarly, we also observed significant increases of chromatin-bound RPA2 in V3-mPL, V3 and V3--6A cells compared to V3-WT cells (Figure [2D](#F2){ref-type="fig"} and [Supplementary Figure S1B](#sup1){ref-type="supplementary-material"}). These results suggest that the PL motif or phosphorylation at the Thr2609 cluster region are critical for the role of DNA-PKcs in cellular response to replication stress. ![The PL motif of DNA-PKcs is required for DNA replication stress response. (**A**--**C**) V3 derivative cell lines were analyzed for their colony forming ability against IR (A), UV (B) and HU (C). Data are presented as mean ± s.e.m., *N* = 3. (**D**) V3 derived cells were pulse-labeled with 50 μM EdU, treated with HU (2 mM) for 2 h, pre-extracted with 0.1% TX-100, and stained against anti-RPA2 antibody and EdU. Data are presented as RPA2 densities in EdU+ nuclei (*N* \> 150). \*\*\*\**P* \< 0.0001. (**E**) V3 derived cells were labeled with BrdU (10 μM) for 30 h and then treated with HU (2 mM) for 2 h. BrdU-labeled single-stranded DNA was stained with anti-BrdU antibody under non-denaturing condition. Data are presented as BrdU densities in nuclei (*N* \> 150). \*\*\*\**P* \< 0.0001; \*\*\**P* \< 0.001.](gkx1298fig2){#F2} DNA-PKcs PL motif participates in the ATR signaling pathway and intra-S-phase checkpoint {#SEC3-2} ---------------------------------------------------------------------------------------- Since both the PL motif and Thr2609 cluster contribute to the cellular resistance to replication stress, we investigated whether the mutated PL motif affects DNA-PKcs phosphorylation at the Thr2609 cluster. In V3-WT cells, UV irradiation induced robust DNA-PKcs phosphorylation at both Thr2609 and Thr2647; however, both DNA-PKcs phosphorylations were attenuated in V3-mPL1 cells (Figure [3A](#F3){ref-type="fig"}). A similar reduction in DNA-PKcs Thr2647 phosphorylation was observed in V3-mPL1 cells after IF staining; importantly, UV-induced Thr2647 phosphorylation in V3-WT cells occurred primarily in the EdU labeled S-phase population (Figure [3B](#F3){ref-type="fig"}), indicating that the PL motif is required for ATR dependent DNA-PKcs phosphorylation upon UV-induced replication stress ([@B6]). ![DNA-PKcs PL motif participates in the ATR signaling pathway and intra-S checkpoint. (**A**) V3-WT and V3-mPL1 cells were exposed to UV (20 J/m^2^) and harvested at the indicated time points for WB using regular and phospho-specific antibodies against DNA-PKcs. (**B**) V3-WT and V3-mPL1 cells were pulse-labeled with 50 μM EdU, exposed to UV and then stained against EdU (red) and anti-pT2647 antibody (green). (**C** and **D**) Cells were treated with UV or HU and harvested at the indicated time points. Whole cell lysates were analyzed with indicated antibodies. (**E**) V3-WT and V3-mPL1 cells were sequentially labeled with IdU (100 μM, 10 min) and CldU (100 μM, 20 min) with or without UV exposure in between labels, and then analyzed by DNA fiber assay. The length of DNA tracks labeled with IdU (red) and CldU (green) were measured. The ratios of CldU to IdU in length were calculated from ongoing replication tracks (red-green, *N* ≥ 100).](gkx1298fig3){#F3} We next asked whether this phenomenon is specific to ATR-dependent DNA-PKcs phosphorylation or if it generally affects the ATR signaling pathway. ATR downstream signaling events including Chk1 phosphorylation at S317 (Chk1 pS317) and SMC1 phosphorylation at S966 (SMC1 pS966) were rapidly induced in both V3-WT and V3-mPL1 cells upon UV treatment (Figure [3C](#F3){ref-type="fig"}). However, the intensities of UV-induced Chk1 and SMC1 phosphorylations were significantly decreased in V3-mPL1 cells. In contrast, we observed similar levels of H2AX phosphorylation (γH2AX) in both V3-WT and V3-mPL1 cells in response to UV. In response to HU treatment, reduction in SMC1 phosphorylation was obvious in V3-mPL cells whereas reduction in Chk1 phosphorylation was subtle initially and became obvious at 2--4 h (Figure [3D](#F3){ref-type="fig"}). Attenuation in the ATR signaling pathway would lead to a compromised intra-S-phase checkpoint. For validation, the DNA fiber assay was performed on V3-WT and V3-mPL1 cells under pulse-labeling with IdU for 10 min, with or without UV treatment and followed by secondary pulse-labeling with CIdU for 20 min (Figure [3E](#F3){ref-type="fig"}). The intra-S-phase checkpoint response can be determined by comparing the length of the IdU tracks (before UV irradiation) versus the CIdU tracks (after UV irradiation). Our analysis revealed that normal DNA replication was similar in V3-WT and V3-mPL1 cells in the absence of UV radiation. The average ratios of the CldU tracks against the IdU tracks were 2.06 ± 0.77 in V3-WT cells and 1.96 ± 0.67 in V3-mPL1 cells (*P* = 0.3658). Upon UV exposure, the progression of DNA replication in V3-WT cells was attenuated due to the ATR-Chk1-dependent intra-S-phase checkpoint, whereas this checkpoint response was compromised in V3-mPL1 cells. The average of the CldU to IdU ratios was 0.64 ± 0.46 in V3-WT cells and 2.38 ± 1.64 in V3-mPL1 cells (*P* \< 0.0001). The PL motif of DNA-PKcs is required for PIDD interaction {#SEC3-3} --------------------------------------------------------- We initially hypothesized that the PL motif of DNA-PKcs could bridge the interaction between DNA-PKcs and PCNA in the DNA damage response. Using the GST pulldown assay, we showed that endogenously purified DNA-PKcs from HeLa cells could bind to GST-PCNA fusion proteins *in vitro* ([Supplementary Figure S2A](#sup1){ref-type="supplementary-material"}). However, in a reciprocal GST pulldown with the N'-terminal DNA-PKcs fragment containing the PL motif, recombinant PCNA proteins displayed only a weak affinity to the GST-PKcs fragment as compared with GST-p21 fusion protein ([Supplementary Figure S2B](#sup1){ref-type="supplementary-material"}). Alanine substitutions at the DNA-PKcs PL motif also did not alter the binding of PCNA, suggesting that the PL motif of DNA-PKcs interacts with other molecules but not PCNA. In collaboration with C. Du, we have identified that DNA-PKcs could form a protein complex with the PIDD (data not shown). Our finding was supported by an independent study that DNA-PKcs was identified among PIDD immunoprecipitated protein complexes ([@B15]). PIDD normally undergoes auto-proteolysis to produce the truncated PIDD-C and PIDD-CC fragments ([@B22]). Using co-IP assays, we observed that DNA-PKcs interacts with not only the full length PIDD but also both PIDD-C and PIDD-CC fragments ([Supplementary Figure S3B](#sup1){ref-type="supplementary-material"}), suggesting that DNA-PKcs associates with PIDD at the C' terminal region containing the death domain (DD). Conversely, domain mapping analysis revealed that PIDD binds to DNA-PKcs directly at the N' terminal region ([Supplementary Figure S3C](#sup1){ref-type="supplementary-material"}). To determine whether the DNA-PKcs PL motif mediates the direct protein--protein interaction between DNA-PKcs and PIDD, recombinant PIDD-DD fragments were subjected to GST pulldown with the wild-type DNA-PKcs N-terminal fragments or PL mutant fragments. The result showed that alanine substitutions at either F345/Y346 (2A) or Q339/M342/F345/Y346 (4A) residues completely abolished the binding of PIDD to DNA-PKcs (Figure [4A](#F4){ref-type="fig"}). Furthermore, when transfecting FLAG-tagged PIDD-C or PIDD-CC fragments into V3-WT and V3-mPL1 cells, PIDD was co-precipitated with the wild-type DNA-PKcs but not the mPL mutant (Figure [4B](#F4){ref-type="fig"}). This verifies that the DNA-PKcs PL motif is required for PIDD interaction under the full-length DNA-PKcs context *in vivo*. This notion is supported by *in situ* PLA that UV exposure stimulates the association between DNA-PKcs and PIDD in V3-WT cells but not in V3-mPL1 cells (Figure [4C](#F4){ref-type="fig"}). Similar results generated in HeLa cells showed that UV exposure stimulates the association of PIDD with DNA-PKcs (Figure [4D](#F4){ref-type="fig"}) and RPA2 (Figure [4E](#F4){ref-type="fig"}). These analyses further suggest that UV irradiation induces DNA-PKcs and PIDD association at stalled replication forks. ![The DNA-PKcs PL motif mediates the DNA-PKcs and PIDD association *in vitro* and *in vivo*. (**A**) Recombinant His-tagged PIDD death domain (a.a. 778--873) was pulled down by the GST fusion protein carrying the wild-type DNA-PKcs N' terminal fragment (a.a. 1--403) but not the PL mutant fragments (2A or 4A), as indicated. The loading of the GST fusions was demonstrated by Ponceau S staining. (**B**) V3-WT or V3-mPL1 cells were transfected with FLAG-tagged PIDD-C (a.a. 446--910) or PIDD-CC (a.a. 588--910) constructs. Whole cell lysates were subjected to co-IP with anti-DNA-PKcs antibody and western blotted against anti-DNA-PKcs or anti-FLAG antibodies. (**C**) V3-WT and V3-mPL1 cells transfected with the FLAG-PIDD construct were UV (20 J/m^2^) irradiated and harvested at 30 min for PLA (green) using anti-DNA-PKcs and anti-FLAG antibodies. The right panel shows the quantification of PLA spots per nucleus. *N* \> 200. \*\*\*\**P* \< 0.0001. (**D** and **E**) HeLa cells transfected with an IRES-DsRed/FLAG-PIDD plasmid were exposed to UV followed by PLA analysis using anti-FLAG coupled with (D) anti-DNA-PKcs or (E) anti-RPA2 antibodies. Right, quantification. *N* \> 200. \*\*\*\**P* \< 0.0001.](gkx1298fig4){#F4} PIDD facilitates the association of DNA-PKcs with ATR in response to UV radiation {#SEC3-4} --------------------------------------------------------------------------------- Upon UV irradiation, PIDD is recruited to stalled replication forks through direct binding to PCNA ([@B15]). We hypothesize that the PIDD-dependent recruitment of DNA-PKcs facilitates its association with ATR. To test this possible scenario, 293FT cells were transfected with control and siRNA against PIDD (siPIDD) (Figure [5A](#F5){ref-type="fig"} and [Supplementary Figure S4](#sup1){ref-type="supplementary-material"}), and examined for ATR-dependent DNA-PKcs phosphorylation upon UV irradiation. Our analyses revealed that DNA-PKcs phosphorylations at Thr2609 and Thr2647 were attenuated in PIDD knockdown cells (Figure [5B](#F5){ref-type="fig"} and [Supplementary Figure S5A](#sup1){ref-type="supplementary-material"}). Using *in situ* PLA analyses, we observed that the association between DNA-PKcs and ATR was significantly induced upon UV irradiation in control 293FT cells, and that this stimulation was abolished in siPIDD-transfected 293FT cells (Figure [5C](#F5){ref-type="fig"}). On the contrary, the PIDD knockdown did not affect the direct association between ATR and RPA2 in response to UV irradiation (Figure [5D](#F5){ref-type="fig"}). Similar results were generated in HeLa cells ([Supplementary Figure S5C](#sup1){ref-type="supplementary-material"}). In agreement with the PLA analysis, we also observed that chromatin-bound DNA-PKcs and its phosphorylation were compromised in the PIDD knockdown cells, whereas chromatin-bound ATR remained the same regardless of the PIDD status (Figure [5E](#F5){ref-type="fig"}). ![PIDD bridges DNA-PKcs and ATR upon replication stress. (**A**) 293FT cells were transfected with control (siCon) and siRNA against PIDD (siPIDD), and analyzed for PIDD protein expression. (**B**) Control and siPIDD-transfected 293FT cells were exposed to UV (20 J/m^2^) and harvested at the indicated time points. Whole cell lysates were subjected to western blot. (**C** and **D**) Control and siPIDD-transfected 293FT cells were exposed to UV and harvested at 30 min for PLA (green) using anti-ATR in combination with (C) anti-DNA-PKcs or (D) anti-RPA2 antibodies. The right panel shows the quantification of the PLA spots per nucleus. *N* \> 300. \*\*\*\**P* \< 0.0001. (**E**) HeLa cells transfected with the control and siPIDD were exposed to UV. Soluble nuclear protein fraction (S3) and chromatin nuclear matrix fraction (P3) were prepared for WB as indicated. (**F**) 293FT-transfected siCon and siPIDD were analyzed for the ATR signaling pathway upon UV. (**G**) HCT116 and derivative DNA-PKcs^−/−^ cells were treated with HU and analyzed for ATR autophosphorylation.](gkx1298fig5){#F5} The PIDD knockdown not only affected DNA-PKcs phosphorylation and its association with ATR, but also attenuated the ATR signaling pathway. We observed that ATR pS1989 autophosphorylation ([@B25],[@B26]) and Chk1 pS317 phosphorylation were attenuated in PIDD-depleted 293FT cells (Figure [5F](#F5){ref-type="fig"} and [Supplementary Figure S5A](#sup1){ref-type="supplementary-material"}). Additionally, UV-induced PRA2 hyperphosphorylation was also attenuated in PIDD-depleted 293FT cells ([Supplementary Figure S5B](#sup1){ref-type="supplementary-material"}). PIDD-dependent DNA-PKcs recruitment to stalled replication forks likely facilitates DNA-PKcs association with ATR and the ATR signaling pathway. This notion was supported by the finding that ATR autophosphorylation at S1989 upon HU was attenuated in DNA-PKcs^−/−^ cells as compared with that in the parental HCT116 cells (Figure [5G](#F5){ref-type="fig"}). The steady state protein levels of ATR were elevated in the DNA-PKcs^−/−^ cells, suggesting a feedback mechanism that compensates for the loss of DNA-PKcs or an increase in spontaneous replication stress. Ku80 is dispensable for the association between DNA-PKcs and ATR in response to UV irradiation {#SEC3-5} ---------------------------------------------------------------------------------------------- Our results consistently indicate that PIDD is required to mediate DNA-PKcs activity in response to replication stress, although the Ku70/Ku80 heterodimer, the DSB-binding partner of DNA-PKcs, may play a role in DNA-PKcs recruitment to stalled replication forks. For further clarification, HCT116-derived conditional null Ku80^flox/−^ cells ([@B16]) were infected with an adenoviral vector carrying Cre recombinase (Ad-Cre) to knockout Ku80 gene expression ([Supplementary Figure S6A](#sup1){ref-type="supplementary-material"}). Our analysis revealed that UV-induced DNA-PKcs phosphorylation at the Thr2609 cluster was not affected in Ku80 knockout cells, although the protein levels of DNA-PKcs were decreased without Ku80 (Figure [6A](#F6){ref-type="fig"}). UV-induced DNA-PKcs phosphorylation occurred in EdU labeled S-phase cell population in both control Ku80^flox/−^ cells and Ad-Cre infected Ku80^flox/−^ cells (Figure [6B](#F6){ref-type="fig"}), confirming that Ku80 is not required for ATR-dependent DNA-PKcs phosphorylation upon replication stress. Indeed, PLA analysis revealed that the knockout of Ku80 did not affect UV stimulation on the association between DNA-PKcs and ATR (Figure [6C](#F6){ref-type="fig"}). A similar PLA result was generated using mouse embryonic fibroblasts derived from wild-type and Ku80 knockout mice ([Supplementary Figure S6B](#sup1){ref-type="supplementary-material"}). Taken together, we conclude that Ku80 is dispensable for DNA-PKcs recruitment and its association with ATR at stalled replication forks. ![Ku80 is dispensable for DNA-PKcs and ATR association in response to UV irradiation. HCT116 Ku86^Flox/−^ cells were sham treated or incubated with Ad-Cre adenovirus expressing Cre recombinase for 4 days. (**A**) Cells were exposed to UV (20 J/m^2^) and analyzed for DNA-PKcs phosphorylation by western blot. (**B**) Cells were pulse-labeled with EdU, exposed to UV, followed by immunostaining against EdU (red) and anti-pT2647 (green) antibodies. (**C**) Cells were exposed to UV and analyzed by PLA using anti-ATR and anti-DNA-PKcs antibodies. Right, quantification. Ku86^Flox/−^ sham, *N* \> 300. \*\*\*\**P* \< 0.0001.](gkx1298fig6){#F6} PIDD facilitates the intra-S-phase checkpoint in response to UV irradiation {#SEC3-6} --------------------------------------------------------------------------- Our results predict that the PIDD deficiency will compromise the intra-S-phase checkpoint response since PIDD is required to promote the association between DNA-PKcs and ATR for optimal activation of the ATR signaling pathway. For validation, HeLa cells were transfected with siPIDD and subjected to DNA fiber assay with or without UV exposure. Our analysis revealed that the speed of the ongoing DNA replication forks increased in PIDD-depleted cells without UV treatment (Figure [7B](#F7){ref-type="fig"}). The averages of the IdU tracks (10-min labeling) were 2.60 ± 1.16 μm in HeLa cells and 3.75 ± 1.43 μm in siPIDD cells (*P* \< 0.0001), whereas the averages of the CIdU tracks (20-min labeling) were 5.95 ± 2.82 μm in HeLa cells and 9.09 ± 3.39 μm in siPIDD cells (*P* \< 0.0001). Nonetheless, the CldU to IdU ratios were similar in HeLa (average 2.44 ± 1.01) and siPIDD cells (average 2.60 ± 1.05) (Figure [7C](#F7){ref-type="fig"}). In response to UV irradiation, the progression of the replication forks was mostly attenuated or completely stalled in HeLa cells. In contrast, DNA tracks were still observed in siPIDD cells even after UV exposure (Figure [7A](#F7){ref-type="fig"}). The average CldU to IdU ratios were 0.39 ± 0.19 in HeLa cells compared to 2.45 ± 1.77 in siPIDD cells (Figure [7C](#F7){ref-type="fig"}). These results clearly demonstrated that PIDD is required for the intra-S-phase checkpoint in response to UV exposure. ![PIDD is required for intra-S-phase checkpoint response. (**A**) HeLa cells were sham-treated or transfected with siPIDD followed by DNA fiber analysis. DNA tracks labeled with IdU (red) and CldU (green) were detected using monoclonal mouse and rat anti-BrdU antibodies, respectively. (**B**) The lengths of IdU and CldU tracks were analyzed from ongoing replication tracks (red-green, *N* \> 100). (**C**) The ratios of CldU to IdU in length were calculated from ongoing replication tracks. *N* \> 100.](gkx1298fig7){#F7} DISCUSSION {#SEC4} ========== In the current study, we showed that the PIDD is required to recruit DNA-PKcs and its association with ATR at stalled replication forks. Our results demonstrate that DNA-PKcs interacts with PIDD dead domain through a PL motif at the N' terminal region of DNA-PKcs ([Supplementary Figure S3C](#sup1){ref-type="supplementary-material"}). Although PIDD-DD might also bind to DNA-PKcs at the FAT (FRAP, ATM, TRRAP) region, alanine substitutions at the PL motif completely abolish the interaction between DNA-PKcs and PIDD *in vitro* and *in vivo* (Figure [3A](#F3){ref-type="fig"}--[C](#F3){ref-type="fig"}), indicating that DNA-PKcs PL motif is essential for PIDD association. PIDD was reported to interact directly with PCNA upon UV irradiation and promote the recovery of stalled replication through the translesion synthesis mechanism ([@B15]). Our studies revealed that PIDD is also necessary to bridge the interaction between DNA-PKcs and ATR upon replication stress (Figure [5C](#F5){ref-type="fig"}), and may facilitate the ATR signaling pathway (Figure [5F](#F5){ref-type="fig"}). Disrupting the binding of DNA-PKcs to PIDD or depleting the expression of PIDD would result in attenuation of ATR-dependent DNA-PKcs phosphorylation at the Thr2609 cluster region ([@B6]) (Figures [3A](#F3){ref-type="fig"}, [5B](#F5){ref-type="fig"} and [E](#F5){ref-type="fig"}), Chk1 phosphorylation (Figures [3C](#F3){ref-type="fig"} and [D](#F3){ref-type="fig"}, [5F](#F5){ref-type="fig"}) and the intra-S-phase checkpoint regulation (Figures [3E](#F3){ref-type="fig"} and [7C](#F7){ref-type="fig"}). In contrast, the depletion of Ku80 did not affect the interaction between DNA-PKcs and ATR upon UV irradiation or ATR-dependent DNA-PKcs phosphorylation (Figure [5](#F5){ref-type="fig"}), suggesting that Ku is dispensable for the initial recruitment and regulation of DNA-PKcs upon stalled replication forks. Our study thus provides new insight that DNA-PKcs is recruited by PIDD to stalled replication forks and participates directly in the ATR signaling pathway. The ATR pathway, the major signaling mechanism in the cellular response to replication stress, elicits the intra-S-phase checkpoint and promotes the recovery of stalled replication forks ([@B27],[@B28]). Upon replication stress, the uncoupling of the MCM helicase complex and replication machinery leads to the formation of long stretch single-stranded DNA (ssDNA) ([@B29]), which provides the sensing mechanism as the loading of replication protein A (RPA) to ssDNA, recruits the ATR/ATRIP complex, and results in the initial activation of the ATR kinase ([@B30]). ATR targets Chk1 phosphorylation at S317 and S345, stimulating the Chk1 kinase and releasing it from chromatin to carry out intra-S-phase checkpoint activities ([@B31],[@B32]). In addition to the initial recruitment and activation of ATR through RPA-coated ssDNA, the full-blown activation of ATR kinase requires the addition of cofactors, including TopBP1 and the recently identified ETAA1 ([@B33]). TopBP1 and ETAA1 possess a similar ATR-activation domain for binding and directly stimulating the ATR kinase activity, despite exhibiting distinctive regulation on the ATR signaling pathway. While TopBP1 is recruited to stalled replication forks through the Rad9/Hus1/Rad1 (9-1-1) complex and is required for Chk1 phosphorylation ([@B33]), ETAA1 is recruited through direct binding to the RPA complex and is dispensable for Chk1 phosphorylation ([@B34],[@B35]). Our results demonstrated that Chk1 phosphorylation was attenuated in cells expressing the mPL DNA-PKcs mutant or depleted with PIDD preferentially at later time points (Figures [3C](#F3){ref-type="fig"} and [D](#F3){ref-type="fig"}, [5F](#F5){ref-type="fig"}; [Supplementary Figure S5A](#sup1){ref-type="supplementary-material"}), suggesting that DNA-PKcs association with PIDD could facilitate the second phase of ATR activation through TopBP1. This is in agreement with our analysis in that DNA-PKcs is able to interact with the 9--1-1 complex (YFL and BPC unpublished result). We observed that UV-induced RPA2 hyperphosphorylation was significantly attenuated in PIDD depleted cells ([Supplementary Figure S5B](#sup1){ref-type="supplementary-material"}). RPA2 hyperphosphorylation at its N' terminal region is known to play a critical role in replication stress response ([@B36]), and is involved with multiple kinases including ATR, DNA-PKcs, ATM and CDK (([@B9]) and references therein). Evidence suggests that, upon genotoxic stress, phosphorylation of Ser33 by ATR facilitates subsequent phosphorylations at Thr21, Ser12, Ser4 and Ser8 by DNA-PKcs and ATM ([@B9]). Although PIDD depletion or DNA-PKcs PL mutation did not alter the association between ATR and RPA in PLA analysis (Figure [5D](#F5){ref-type="fig"}), our results demonstrated that ATR downstream signaling as well as DNA-PKcs recruitment to stalled replication forks were attenuated under these circumstances. Consequently, RPA2 hyperphosphorylation (slower migrating species) and ATR-dependent phosphorylation at Ser33 were attenuated in PIDD depleted cells ([Supplementary Figure S5B](#sup1){ref-type="supplementary-material"}). It is likely that the phenotypic defects associated with PIDD depletion or DNA-PKcs PL mutation are in part due to the diminished RPA2 phosphorylation. We demonstrated that the PL motif at the N' terminal of DNA-PKcs is required for the protein--protein interaction between DNA-PKcs and PIDD, since the mPL mutant DNA-PKcs harboring alanine substitutions at the PL motif was unable to interact with PIDD (Figure [4B](#F4){ref-type="fig"}). We also observed a significant reduction of DNA-PKcs phosphorylation within the Thr2609 cluster in V3-mPL cells and PIDD-depleted cells, although the signaling was still detectable. DNA-PKcs may still be recruited to stalled replication forks without PIDD association. For example, DNA-PKcs could interact directly with the RPA complex ([@B10]) and is required for RPA2 phosphorylation ([@B8]). In parallel with the siPIDD approach, we generated PIDD knockout clones in 293FT cells using the CRISPR-Cas9 strategy ([@B39],[@B40]) ([Supplementary Figure S7A](#sup1){ref-type="supplementary-material"}). We observed that UV stimulation of Chk1 phosphorylation was attenuated in PIDD knockout 293FT cells ([Supplementary Figure S7B](#sup1){ref-type="supplementary-material"}). However, we observed differential regulation of DNA-PKcs phosphorylation within the Thr2609 cluster. In PIDD knockout 293FT cells, phosphorylation at Thr2647 but not at Thr2609 was significantly attenuated ([Supplementary Figure S7C](#sup1){ref-type="supplementary-material"}), although this inhibitory effect decreased gradually in later passages of PIDD knockout cells (data not shown). Without PIDD, a complementary mechanism may be responsible for restoring ATR-dependent DNA-PKcs phosphorylation upon replication stress. This also implies that the association between DNA-PKcs and the ATR pathway is critical for the cellular response against DNA replication errors during normal cell proliferation and survival against replication stress. We previously proposed a two-step mechanism regarding the role of DNA-PKcs during the initial replication stress response before fork collapse, and its subsequent role when DSB forms ([@B41]). The current study further supports the model that PIDD recruits DNA-PKcs upon initial stalled replication forks and mediates ATR-dependent DNA-PKcs phosphorylation. The presence of the DNA-PKcs protein and/or its phosphorylation will facilitate the ATR-Chk1 signaling pathway to elicit the intra-S-phase checkpoint and promote recovery of stalled replication ([@B27],[@B28]). This notion is supported by our studies where the intra-S-phase checkpoint was compromised in cells expressing the mPL mutant DNA-PKcs or depleted with PIDD expression (Figures [3E](#F3){ref-type="fig"} and [7C](#F7){ref-type="fig"}). Additionally, our previous studies using the CHO V3 cell model ([@B6]) and the DNA-PKcs^3A/3A^ mouse model ([@B5]) showed that DNA-PKcs phosphorylation at the Thr2609 cluster is required for cellular resistance against UV irradiation and other replication stress agents. Our analyses also revealed that the Ku heterodimer is dispensable for the recruitment and phosphorylation of DNA-PKcs at stalled replication forks (Figure [6](#F6){ref-type="fig"}). This is consistent with a previous report showing that the levels of the Ku heterodimer on nascent DNA were unchanged for 2 h after HU addition ([@B42]). When stalled replication forks cannot be resolved, a delay of DSB formation occurs through structure-selective endonucleases such as MUS81-EME2 ([@B43]) or EEPD1 ([@B44]) to facilitate replication fork restart. Although Ku may be dispensable during the initial response to stalled replication forks, upon replication associated DSBs, Ku-dependent DNA-PK kinase activation and subsequent Ku phosphorylation could modulate the affinity of Ku to the DSB ends to dictate the DSB repair pathway choice at stalled replication forks ([@B45]). PIDD has been characterized in both pro-apoptosis and pro-survival regulations in the cellular response to genotoxic stress ([@B12]). PIDD is known to mediate the apoptotic response through assembling the PIDDosome complex containing Caspase-2 and RAIDD (receptor-interacting protein-associated ICE-1/CED-3 homologous protein with a death domain upon DNA damage ([@B13]). On the contrary, PIDD could promote the pro-survival NF-κB signaling pathway through the association with NEMO (NF-κB essential modulator) and RIP1 (receptor-interacting protein kinase 1) ([@B14]). The switch role of PIDD may depend on ATM-mediated PIDD phosphorylation at its death domain, which dictates the association of PIDD with Caspase-2/RAIDD for cell death or with NEMO/RIP1 for cell survival ([@B46]). PIDD also participates directly in DNA damage repair. PIDD binds to PCNA upon UV irradiation through its ZU-5 (ZO-1 and Unc5-like) domains and stimulates PCNA monoubiquitination during translesion DNA synthesis ([@B15]). Since DNA-PKcs could also interact directly with PCNA ([Supplementary Figure S3A](#sup1){ref-type="supplementary-material"}), it is likely that multiple protein--protein interactions among PCNA, PIDD and DNA-PKcs will stabilize DNA-PKcs recruitment at stalled replication forks to facilitate the ATR signaling pathway for the intra-S checkpoint and fork recovery. In summary, we report here that PIDD, but not the Ku heterodimer, is required to recruit DNA-PKcs and bridge its interaction with ATR at stalled replication forks. Consequently, PIDD facilitates ATR-dependent DNA-PKcs phosphorylation and the ATR signaling pathway to promote the intra-S checkpoint. Taken together, our results demonstrate that the interaction between DNA-PKcs and PIDD is an integral part of the ATR signaling network and is required for cellular resistance to replication stress. Supplementary Material ====================== ###### Click here for additional data file. We thank Dr Eric Hendrickson for kindly providing the HCT116 Ku86^Flox/−^ cells, and Dr Damiana Chiavolini and Emily Miller for editing the manuscript. SUPPLEMENTARY DATA {#SEC5} ================== [Supplementary Data](#sup1){ref-type="supplementary-material"} are available at NAR Online. FUNDING {#SEC6} ======= National Institutes of Health \[CA166677 to B.P.C., CA158323 to C.D.\]; Cancer Prevention Research Institute of Texas \[RP160268 to B.P.C.\]; Ministry of Science and Technology Fellowship \[104--2911-I-002-578 to C.T.K.\]; China Scholarship Council, P.R. China Fellowship \[201603170218 to J.G.\]. Funding for open access charge: National Institutes of Health \[CA166677\]. *Conflict of interest statement*. None declared.
mini_pile
{'original_id': '163094331137a638306699b4d04cb09e8dfaf839ee7d2a40d7c5007524acfc27'}
About Author Yamkela Fortune Spengane Black Conscious Pan Afrikanist - Rooted in Afrikanism, Black Consciousness in the Fanonian school of thought. Independent researcher. View Random Post My acquiring of knowledge about the HIV/AIDS fraud started around 2007, when as 17 year-old Grade 11 learner I was fed up with the irrelevant, outdated and incompetent information I was being fed at school as part of the curriculum, and decided I was not going to bother myself anymore trying to be the voice of reason in advocating for improved quality in our curriculum content as it was causing a lot of antagonism with my so-called teachers. So I decided I would let them be, together with their parrots – most of the students, while I independently pursued worthy information that helped grow my intellectual capacity even further. In that information consuming frenzy I came across internet forums like Virus Myth (www.virusmyth.com) on AIDS dissidence, as it had come to be known, which led me to the work of the chairman of the Treatment Information Group (TIG) Anthony Brink, who is also an Advocate in Pietermaritzburg. His book, Debating AZT (published in the year 2000), opened a can of worms for me and also introduced me to another book by Peter Duesberg, Professor of Cell Biology at University of California, Berkeley, titled: Inventing the AIDS virus (Published 1996). I read those two books and carried out research into a whole lot of other material and what came out was a staunch dissident; and the as they say, the rest is history… Fast Forward to 2014 and after all sorts of activism and teaching on Facebook, public lectures, information dispensing via the internet, countless books and articles, 99.9% of the population still believe that HIV causes AIDS by some thumb sucked process that fails to meet criteria of established pathogenesis in Medical Science (I mean the AIDS story has come and turned medical science on its head and bastardised every rule and law already conventional in virology upside down and inside for its inventive hogwash to be manoeuvred by media hype and pharmaceutical lies into becoming accepted as legitimate) because they are too lazy to question anything and instead gulp in everything that is brought to them by mainstream media and the farce we call the education system. It is a real dismay that my peers at school were not just an isolated mishap, but rather were a microcosm of the whole world – a near 7 billion strong flock of parrots bar that 0.1% that dares to question and research harder to verify so-called facts for themselves. But we can’t throw the towel in just as yet, we will continue challenging power until enough people gain the necessary awareness about this. Medicine in the western world is perhaps the first cousin of religion, if not a twin sibling, as it has for the better part of its history nothing but quackery. It has been all about what is popular and the most sponsored view rather than rigorous scientific study. Prior to Louis Pasteur, Europe believed that diseases were caused by bad air called a miasma. This miasma was believed to originate from decomposing organic material, and diseases such as cholera and the bubonic plague, fondly termed Black Death, were said to be brought about by these miasmas; in fact, the term malaria literally means “bad air”. Enter Pasteur in the latter half of the 19th century and he proposes the germ theory, he then starts another dogmatic religious-like frenzy. Every disease was now caused by these germs: if you had a headache, a germ was responsible, pain under your foot, it was some germ. Then it came to the age of psychiatry and all sorts of supposed mental disorders people were crucified with. Also, who can forget Eugenics? The pseudo-science that as late as 1940s was still published in reputable journals pushing propaganda about genetic supremacy of one race over another. The very quack science that justified slavery and colonialism by narrating that blacks, or people of African descent, were not fully fledged humans and thus it was not abominable to enslave them; according to Eugenics, blacks were ontologically less intelligent than whites in all respects. The “HIV causes AIDS” story is a remnant from those days of the germ theory frenzy, only this time it is a deliberately orchestrated thing that benefits those in the top echelons of power who are pursuing certain agendas with it. Let us quickly deal with this problem so that people can go out to do further research for themselves with the guidelines we will deal with herein. AIDS was first identified in 1981 in gay communities in the US when some members of these communities showed up with supposed symptoms of Pneumocystis Carinii Pneumonia (PCP) and later a number of these homosexual men came up with Kaposi’s Sarcoma, a type of cancer; and without any rigorous investigation, it was assumed that this was a pathogen induced thing and it was quickly termed as Gay Related Immuno-Deficiency (GRID). In 1982 it was officially named AIDS (by now even 10 year-olds know about this acronym and the lies surrounding it because of the sadistic farce we called the education system in this country that is employed by the elite to ruin the minds of our children and bent them towards their mental slavery) and in April 1984 Robert Gallo sat in an international press conference in Washington DC to announce to the world the “AIDS virus”. In just 3 short years, a disease had been identified, and Gallo supposedly had gone through all possible causes in infectious and non-infectious agents and had found a pathogen without the review of the scientific community. He called this new “AIDS virus” of his the Human T-Cell Lymphotropic Virus (HTLV-1); the name Human Immuno-deficiency Virus (HIV) only in 1987 after a settling of a dispute between the French and US governments in a lawsuit about the intellectual property of the virus. The most important point I have made above is that Gallo’s virus that causes AIDS had not been reviewed or published about in any scientific journal by the scientific community of Virology and Microbiology. He simply went to a press conference and boom, we had something somewhat drawing parallel to the Spanish Inquisition going on in the media, untested facts were treated as gospel (I did mention that medicine is religion’s first cousin); all scientific processes of peer reviewing and publishing of papers supporting the postulate were simply bypassed. Today, I dare you to find the person who first published the paper that showed unquestionably that HIV causes AIDS and the journal this paper was published in. There are better chances of you locating alien civilisations because the original papers showing conclusively that HIV causes AIDS simply do not exist. I mean it would have been novel knowledge, identifying this root cause of what is the Black Death of our times should have warranted the Author/s of this paper or series of papers, stamping the fact that HIV causes AIDS into solid scientific knowledge, Nobel prizes for their breakthrough discovery. Seemingly however, these papers are not referenced anywhere, nothing; in all the hundreds of thousands of papers that have since been authored on the subject of HIV/AIDS, not even one can point you to the paper that shows how HIV causes AIDS. This is unheard of in science, for a gigantic discovery to just go off the radar when the person who authored this was supposed to be on the tip of everyone’s tongues. Being an academic in Astrophysics, I know the importance of references and I can assure you that we can find papers as old as Einstein’s Special Relativity papers of 1905 if needs be for bibliographic purposes. So there is no reason why a paper authored in the 1980s should be off the radar. As I have already mentioned, these fundamental papers are untraceable simply because they don’t exist. People like Dr Kerry B. Mullis (Nobel Prize in Chemistry, 1993) have been looking for them since 1987 and even asked Luc Montagnier, Robert Gallo’s French partner, about them to no avail. So we are here today and everywhere in Africa our state Health agencies are fighting an unproven thing, billions of dollars are thrown into something we can’t even draw concrete scientific evidence to. It is pathogenesis done by media, with all sorts of rubbish about a pathogen that doesn’t cause a specific disease but supposedly allows other pathogens to cause disease in the same host; preposterous logic unheard of in virology. This is what the HIV causes AIDS logic says in nutshell: Kaposi’s sarcoma + HIV-antibody = AIDS Kaposi’s sarcoma – HIV-antibody = Kaposi’s sarcoma Tuberculosis + HIV-antibody = AIDS Tuberculosis – HIV-antibody = Tuberculosis Dementia + HIV-antibody = AIDS Dementia – HIV-antibody = Dementia Pneumonia + HIV-antibody = AIDS Pneumonia – HIV-antibody = Pneumonia Why we say antibody is because that is exactly what you are tested for to be diagnosed as HIV positive. The rapid test is a buffer solution that supposedly detects antibodies that are released by the immune system to combat the virus which become present in the blood. The problem however is that HIV is non-detectable in human blood; every viral disease leaves free viruses called VIRIONS to be detected in their hundreds of thousands to millions per millilitre of blood, but HIV just cannot be found. Instead these antibodies, which are said to be from the body’s immune-cells combating the virus, are the only “evidence”. This is hogwash for the mere fact that when you detect antibodies to a pathogen but fail to detect a pathogen only one probability exists, the antibodies controlled and flushed out the intrusive microbe. Unfortunately however, because of this faux pas, millions of people with previous viral infections like hepatitis, herpes, polio and even strains of influenza usually get misdiagnosed by these rapid tests and branded HIV positive. You are probably thinking that there are laboratory tests that do a better verification because they go into the thorough checking of the blood sample; well guess what, it is just another botched exercise too. The Polymerase Chain Reaction (PCR) is the primary way that has been used to detect HIV in blood since well it is impossible to get these free viruses floating around in the host’s blood sample. The PCR is a technology that amplifies even the tiniest amounts of any specific DNA sequence, creating enough copies of the desired sequence for detection and analysis. So with the HIV, the blood sample would be checked for traces of reverse transcriptase and other DNA sequences that are said to be unique to retroviruses in the group HIV belongs to. Sadly the very inventor of PCR (He won the Nobel Prize in Chemistry for it in 1993), UC Berkeley Professor Kary Mullis refutes his invention being used to dupe people into the belief that AIDS is caused by HIV. Retrovirology itself is beginning to raise a lot of questions within biochemistry/microbiology circles. The idea of a virus that can integrate itself into the very DNA of the host cell originates with failed cancer research, because tumours are seen to be mutations in normal cell DNA it was plausible to virus hunters that viruses that cause cancer had to be integrated into host cell DNA. Robert Gallo is from this research, in fact before Luc Montagnier sent Gallo his LAV culture as history says, Gallo was pushing a virus he was certain a few years earlier had to be the cause of leukaemia (HTLV-1) to be the one responsible for AIDS until he realised a contradiction – leukaemia is an over-production of white blood cells, and the Virus causing AIDS would have to be killing white blood cells, not producing them in abundance. So there you have it, a disease that defies logic. Like I illustrated above, if you got a horrible wound and it began to be septic and the septicity spilled into the blood, it would be obvious septicaemia; but if during the routine hospital tests “HIV” is detected, then septicaemia becomes AIDS. If the above scenario is true with cervical dysplasia, the label sticks. Sadly this is true for all diseases out there, infectious and non-infectious; AIDS jut gets credit for them by mere presence of antibodies that can’t even be curtained to surely belong to the body’s immune system combating HIV. The truth is AIDS is now the bread and butter of many people, from the NGO people running around in green clothes delivering ARVs for a stipend, to Pharmaceutical company execs that make billions and trillions from this staged, fabricated pandemic. We are held at ransom by the biggest propaganda known in the history of man. On an issue of Nature from 20 April 1989, an article states: It will surely lead to a scientifically healthier society if the burden of proof for HIV as a deadly pathogen is returned to where it belongs — to those who maintain that HIV causes AIDS — and others are allowed to pursue alternative approaches in the battle for eradication of the disease.” And our problem lays right there, everyone who questions this HIV causes AIDS analogy is placed with the burden of proof, but it is not dogmatic that HIV causes AIDS so people who are advocating for should have been the ones showing us scientifically how exactly this supposed virus of theirs causes a syndrome called AIDS, encompassing over 50 different diseases. But guess what, when you ask the questions, the burden of proof is placed on you against hogwash that is founded on nothing. Where are the Nobel Prizes for people who discovered AIDS or did significant work in linking the HI Virus to AIDS? No one has been awarded anything because of the very reason that there is nothing to award. You see, I mention above that Western Medicine is the first cousin of religion, as it is littered with herd mentality absurdities in its history. Modern western medicine is a cartel controlled by pharmaceutical companies who come together under bogus establishments like the American Medical Association. Any form of medicine not regulated by them is termed quackery, like homeopathy and other alternative medicines.  They have in the past suppressed many medical breakthroughs when they threatened their cash cow diseases, and the story of Raymond Royal Rife comes to mind. Anyone who has ever had loved ones die from cancer has Morris Fishbein and his cronies of the 1930s at the AMA. The relatively unknown SMON fiasco of the mid-20th century in Japan is on a smaller scale much like AIDS. For fifteen years the syndrome was mismanaged by the Japanese science establishment, where virtually all research efforts were controlled by virus hunters. Ignoring strong evidence to the contrary, researchers continued to assume the syndrome was contagious and searched for one virus after another. Year after year the epidemic grew, despite public health measures to prevent the spread of an infectious agent. And in the end, medical doctors were forced to admit that their treatment had actually caused SMON in the first place. Once the truth about SMON could no longer be ignored, the episode dissolved into lawsuits for the thousands of remaining victims. This story has remained untold outside of Japan, ignored as being too embarrassing for the medical world. Read more about SMON. Bottom line is that people are scared of contagious diseases, so every time the medical cartels want to give you a fright and get you to give them free reign as “experts”, they send you a fabricated epidemic. Swine flu was an example in 2009, and Ebola is now happening. Exaggerated figures, backed by media propaganda gets you shivering and you sure don’t want to get this contagious disease sending you to an early grave so you listen to the “medical experts”. Swine Flu and Ebola are both recurring epidemic scares, and even the previous times they came it was all unfounded epidemic hunting scare which rolled out millions and billions for vaccinations and all other rubbish (vaccines can actually kill you, that is how they create a pool of sick people – injecting them with a disease) This is a typical question I find people having because they believe they have seen people with the described symptoms of AIDS. The answer is simple – ARVs. ARVs are made from some of the most toxic substances known to man. AZT, the first ARV drug that was made available to South Africa by GlaxoSmithKline, a British pharmaceutical company, is lethal on another level. AZT has no retroviral inhibiting properties; it kills every living cell it contacts. This is true for all other ARVs, your nevirapine, Emitricitabine, tenofovir, Tipranavir, Ritonavir, Delavirdine and all other poisonous chemicals put in so called Anti-retrovirals have but one pharcological action – killing cells. It is no mistake that AIDS was “discovered” in gay communities, for they were in those times known for the high amounts of hazardous drugs they consumed like ecstasy, mandrax, LCD, heroin, and crack. Popular was a drug called Poppers, a nitrite composed drug that supposedly made it easier or more pleasurable (something along those lines) to have anal sex, and for a person to take such a bashing from all these substances it is not far-fetched that one’s body would deteriorate on them You only have to look at nyaope consumers to see what drugs can do to a human body taken rigorously, and that is exactly what AZT and other ARVs is all about: Taking high doses of drugs rigorously. CD4/CD8 count is the amounts of white blood cell levels present in let us say every pint of blood. Low means decreasing immunity, but low immunity has nothing to do with AIDS. Like those first isolated victims in 1981, drugs decrease immunity. Another major contributor is the psychological part of it; being told you are dying with no cure can just kill you. Before AZT comes, your body will just be fulfilling prophesy by the doctors. For people who are critical of the petrol drinkers and grass eaters of Rabonni ministries in Pretoria, you sure as hell are eating grass fodder from the pharmaceutical world when buying into the AIDS story, and taking ARVs is the proverbial parallel of drinking petrol on a grand scale. Scrap grand, the scale is biblical because the number of people drinking ARVs shoots up exponentially. People who feed themselves poison willingly because some man in a white coat told you so. Doctors know as much about virology as you the layman, next time you go to your GP you can test that analogy. Doctors are the delivery boys of Big Pharma; they have handbooks on what to prescribe for you when you are diagnosed with something but they don’t know exactly how it inhibits pain for instance pharmacologically or how a certain microbe is killed by an antibiotic. Biochemists and Microbiologists study the pathogens and chemicals that are to be used as medicines, and then doctors get the list of end products they can prescribe for you as available from the dispensary. The “doctors say this and that” story can’t work anymore, information is fully available to study things and know them yourself. “We have seen colonisation, we have seen imperialism, we have seen apartheid… and all of them used against us as a people. [Africans have] won their liberation and now they are fighting another war and they are being psychologically terrorised once more because people want to sell [ARV drugs] and make profits. And there is no benefit in those products. The only thing that can really happen is that once you touch the antiretrovirals you can go one way.” – Peter Mokaba MP, the Star, 4 April 2002. Peter sums it up perfectly here. This is all about exploiting Africa and making huge profits. Through the World health Organisation, another one of the cartels that are watched over by the UN (itself a grand cartel), governments in Africa are forced to fork out billions of dollars to get these supposedly sick people ARVs to help them, because this medicine is very expensive. Africa has become an over-night cash cow because of AIDS and ARVs, and we are buying our own death potions like those unsuspecting congregants of Rabonni, who are convinced consuming unleaded 95 Octane gasoline will surely fuel them to some awaiting miracle. Eugenics – the pseudo-science of racial bigotry intertwined with neo-colonialism in this case also comes into play. Remember that AIDS was first “discovered” in gay communities, white gay communities. When the scare of this pandemic that would wipe us out like Black Death heightened, people became very homophobic and were ready to exterminate the human beings who brought upon humanity this killer pandemic with their sordid deeds; and so to salvage the homosexuals another scapegoat for AIDS had to be found – you guessed it! Like Fanon aptly puts, the black man is the wretched of the earth in the world of white supremacist constructs and every negative thing must be dumped on him; AIDS was no different, in 1986/7 a paper came up mentioning Simian Immuno-deficiency Virus (SIV), a retrovirus supposedly infecting apes in West Africa and apparently weakening their immune system and causing symptoms manifesting themselves with stark similarity to human AIDS (this so-called ape AIDS came to be known as SAIDS – the S standing for Simian). Immediately the establishment took this completely different thing and turned it on its head to suit their agenda. From now on SIV was the origins of HIV; as the story goes, a man hunting bush meat was infected with SIV and it mutated to AIDS in the Human body, it started spreading to people immediate to him and all that. With this stroke of genius, gays in America were absolved of any wrong doing and the epicentre of the world’s biggest health problem was the usual suspect – Africa. It was also shrewd tactic for WHO to say that there are more people infected by this disease in Africa, whereas it was just those handful of gays and a few other people in the Western world. This means relief had to go to Africa, take the fight to the heart of the disease. A perfect way to get drug companies to manufacture their poisonous ARVs and sell them to African governments by force, when Thabo Mbeki and Manto Tshabalala-Msimang resisted based on proper advice by dissenting advocates like Anthony Brink and some leading scientists, hounds like Zachie Achmat and the TAC were paid by pharmaceutical cartels and sent to push propaganda, and the media had a field day with their bias (South African media is part of the O’Reilly empire anyway). We are also given a decoy to deal with in the form of a staged pandemic so we would not have the time to discuss revolts against neo-colonialism. Our colonisers know very well that while we are scared about dying from a contagious disease and debating ARVs, their economic looting of the continent continues unhindered for we don’t even have the time noticing it while we are busy trying to manage these manufactured crises. For them it is about the bottom line – huge profits! They make the profits killing black people through ARVs and even looting our resources. The whole medical establishment is about profits, if you don’t have money you don’t have healthcare – simple as that. Try visiting your doctor’s room without money and see, if you don’t have a medical aid you are stuffed, and for a country where 51% of the population can’t afford R20 worth of life a day, you must just imagine how many people don’t get proper healthcare. Mediclinic, Life, Netcare; those places were not created for poor black people (and that is the bulk majority of blacks); neither did they have them in mind. You blacks must just rot in long queues where there is no medical equipment as basic as IV needles and oxygen tanks, or even caring health officials (not that they care about you in private hospitals, they care about your money and their reputation; and since you don’t pay in public facilities they have no reason to care about you). To hospitals where you go in for a headache and come out with your foot amputated. What makes you think now that they suddenly care for you regarding AIDS? Wake up my people, your reality is far tougher than you can ever imagine. You are but seeing the tip of an iceberg, there are more embedded problems underneath what meets the eye, all institutionalised into the DNA of every socio-economic sector. We will have to exorcise ourselves from all the lies and deception, starting with the deception that Mandela is the saviour of blacks. Educate yourselves brethren. I am Yamkela Fortune Spengane, just another denialist. I deny the lies of the pharmaceutical establishment that HIV causes AIDS and it is infectious. I deny allowing my people be duped and killed with poisonous chemicals in what is biological warfare really. So yes, I am an AIDS denialist. 08 December 2014 VN:F [1.9.22_1171] Rating: 9.0/10 (11 votes cast) VN:F [1.9.22_1171] Rating: +8 (from 8 votes) View Random Post Consciousness Legacy Media 2019 ©
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9688448905944824}", 'metadata': "{'Content-Length': '123519', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:FQGWDNCQX6C34HAOIMF2PIVYTAQGVLEG', 'WARC-Concurrent-To': '<urn:uuid:f27a0ab1-44da-4400-aa65-4ed57715bc47>', 'WARC-Date': datetime.datetime(2020, 1, 18, 3, 51, 12), 'WARC-IP-Address': '102.130.115.218', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:DAZ4Y5Q76OCYAIHFPUVYXCQKPEMTBYIK', 'WARC-Record-ID': '<urn:uuid:ba08c429-fa6c-4387-89a1-679a52cfe679>', 'WARC-Target-URI': 'https://consciousness.co.za/demistifying-hivaids-fraud-million-first-time/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:96eb6e1f-17f7-4a21-806a-eac8ce25bcda>', 'WARC-Truncated': None}", 'previous_word_count': '4215', 'url': 'https://consciousness.co.za/demistifying-hivaids-fraud-million-first-time/', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-30.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.05566340684890747', 'original_id': 'cb91607d42173e190f8982f848e3212815161646e1a26aac06cedabb3a91ce6a'}
From Thank you Sorry U.K. network operator Cable and Wireless PLC (C&W) will hear Friday whether it can sell its loss-making U.S. Web hosting and IP (Internet Protocol) services business to Savvis Communications Corp. rather than to private investment company Gores Technology Group LLC. As part of a court-supervised sale of Cable and Wireless America Inc. (CWA), Savvis offered to acquire almost all of the CWA assets for US$155 million in cash and to assume liabilities of approximately $12.4 million, the companies said. C&W accepted the bid, but this now requires court approval at a hearing scheduled for Friday, 10 a.m. Mountain Standard Time, at the U.S. Bankruptcy Court in Phoenix. Last December, C&W announced it placed CWA into Chapter 11 bankruptcy and intended to sell the majority of the company to Gores Technology, in Los Angeles, for US$125 million. At the time, C&W said it had entered into Chapter 11 as way to facilitate a sale transaction to Gores Technology. As part of the bankruptcy process, however, qualifying bidders were given an opportunity to submit higher and better offers for CWA's evaluation in a court-supervised two day auction held Wednesday and Thursday. Savvis, with dual headquarters in St. Louis and Herndon, Virginia, was one of seven bidders for the CWA assets. "This is not really a change in plan," said C&W spokesman Peter Eustace in London, "but rather the normal process taking its course." Should the court grant its approval for the Savvis offer, the companies expect the sale transaction to close in February. Eustace declined to speculate on what would happen should the court reject the deal. Representatives from CWA, Savvis and Gore Technology Group could not immediately be reached for comment. Savvis said it would be gaining CWA's Tier 1 IP network, serving more than 2,000 enterprise customers, and its comprehensive hosting services, with more than 1,000 enterprise customers, 15 data centers and a complete range of managed hosting, consulting and infrastructure services. As part of the complicated offer, Savvis said it has entered into a letter of intent with Du Pont Fabros Interests LLC whereby Savvis will sell its rights to acquire five of the CWA data centers to DuPont for $52 million, and then lease back those data centers for 15 years. Savvis said the deal would double its size, adding over 5,000 customers and giving the combined company projected annualized revenues of approximately $700 million by the end of this year. C&W began its retreat from the U.S. market in September 2002 when it sold its U.S. retail voice and data business to Primus Telecommunications Group Inc. The following June C&W claimed it was fully exiting the U.S. market as the company was losing around $1 million per day. CWA said it will continue normal operations pending completion of the proposed sale, asserting that the company "remains focused on its core competencies of hosting and IP services while delivering uninterrupted service to its customers." But earlier this month, CWA reduced its customer base by about 400 in 11 cities. Those customers dropped from the service complained that they were notified by mail in December that they had 60 days to find another service provider or be cut off by Feb. 13. Eustace declined to comment on CWA's decision to turn off nodes and drop customers, saying it was a matter for CWA to discuss.
mini_pile
{'original_id': '242dc45261c0cd6babcf27be9bb4ffc797f1092373de4fe13c7a9eaedf435cd6'}
Product Description Available while supplies last. The Waterford Lismore pattern is a stunning combination of brilliance and clarity. The Lismore Brandy Balloon is an generously proportioned globe of intricately detailed fine crystal, seamlessly blending the generous curve of a traditional brandy glass with the dramatic diamond and wedge cuts of Lismore's signature pattern. Ideal for brandy, Armagnac, calvados or eau de vie, this weighty glass is sized perfectly to nestle in the palm of one hand and infuse the contents with warmth and aroma
mini_pile
{'original_id': 'ab19a49e8c25b543c0bf1abcdf3159862a2695f513fdd63c7c2b0606fd137fa7'}
AT THE height of the Vietnam war, many Americans asked why an 18-year-old could die for his country but not drink a beer. Now the same question, given edge by Iraq, is part of a renewed effort to lower the drinking age across the country. In the early 1980s more than half the states had drinking ages lower than 21. Some let the boozing start at 18; some allowed 19-year-olds to buy beer and wine. Spurred by Mothers Against Drunk Driving (MADD), the Reagan administration in 1984 ordered states to raise their drinking age back to 21 or lose 10% of their federal highway funds. The states buckled under this fiscal blackmail but—surprise!—under-age drinking did not disappear. In some ways, the problem got worse. Besides making criminals of millions of young people, the “21” law encourages the young to binge in secret. And one new and dangerous fad is for young folk to go to a bar on the eve of their 21st birthday and, after midnight, attempt to down 21 drinks before closing time. John McCardell, the former president of Middlebury College in Vermont, is leading a national effort to lower the drinking age to 18. The relaxation would be combined with mandatory alcohol education. His group, Choose Responsibility, argues that the 21 law has done little to stop drunk-driving and, because it is largely unenforceable, breeds contempt for law in general. In Missouri signatures are being collected to put the question of lowering the drinking age on the ballot. If it passes, the state will lose $50m in federal highway funds. Legislatures in Wisconsin and South Carolina are considering making an exception for military personnel, and South Dakota is mulling a measure to allow 19-year-olds to buy low-alcohol beer. The question is being raised in other states as well. MADD is heading the opposition, parading posters of victims of drunk drivers and arguing that the 21 law has saved more than 20,000 lives. Choose Responsibility disputes that figure. Other factors, it says, have also contributed to the decline in deaths, and fatalities among under-age drunk drivers have fallen by only 13%. But MADD's emotion, coupled with the prospect of states losing their road money, mean that a lower drinking age remains as dim a prospect as a cold Bud in Utah.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9638496041297911}", 'metadata': "{'Content-Length': '178471', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:J7NHPA2DTKSH6RQV2JCDOLG4D5FJGJ7W', 'WARC-Concurrent-To': '<urn:uuid:936580ba-093a-4935-a0be-c8b028eb135e>', 'WARC-Date': datetime.datetime(2014, 12, 22, 5, 53, 50), 'WARC-IP-Address': '199.83.128.108', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:C7G57S7HYS5AYJSRXJWDT4DECI7I35CV', 'WARC-Record-ID': '<urn:uuid:f11c3935-6bad-4be2-91c6-d4a08272a02b>', 'WARC-Target-URI': 'http://www.economist.com/node/11058532/recommend', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a5e22c83-6ce5-441e-bbce-88c86da10919>', 'WARC-Truncated': 'length'}", 'previous_word_count': '380', 'url': 'http://www.economist.com/node/11058532/recommend', 'warcinfo': 'robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.24990606307983398', 'original_id': '889316c12ea2e157cf780b94c8ec61501f8ec77e3e65810f07acbe627c810ae6'}
2048 is a one of a kind mathematics puzzle which will keep you thinking even when you aren’t playing the game. The game requires some fast, sharp calculations even though it has a slow gameplay. This makes the game addictive, challenging and even more thrilling. In 2048, you must slide two tiles of exact valuations against each other, to make a higher multiple. The tiles you start with are 2 and 4, thus you keep combining them to form 128, 256, 512, 1024 and the game gets over when you finally combine two tiles to form 2048. Can you solve your way through this challenging puzzle? 2048 has the simplest of controls, all you should do is swipe your fingers to move the tiles. The gameplay is very interesting and requires a little getting into. When you move one tile, all the other tiles on the board, move in that direction too, also with each move an extra tile is added to the board. Thus, if you are unsuccessful to combine tiles for a few moves, the board will fill up, thus resulting in little or no space to make any more moves, thus this means game over. The overall physics and dynamics of this game are to die for. 2048 is a classic logic and puzzle game which you would be missing out on if you don’t play. If you like games where you are required to use your brains, 2048 is an ideal choice. Tip: Never swipe up. You can play 2048 here.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9568551778793336}", 'metadata': "{'Content-Length': '37940', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:BU5MEMYTEFVFUVLL7HTT6SZ7MYP3AJMM', 'WARC-Concurrent-To': '<urn:uuid:b3818076-57fe-43d7-9209-1f10d505dadb>', 'WARC-Date': datetime.datetime(2019, 12, 9, 1, 41, 30), 'WARC-IP-Address': '52.66.70.185', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:Y65WHL72GBXLVE5JGTLOEFIJMB6VUNV6', 'WARC-Record-ID': '<urn:uuid:bb65fab0-d68a-4c65-a751-c10a8c5a8237>', 'WARC-Target-URI': 'https://business.gamezop.com/2048-2/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:a8836c39-3829-4bd7-b4b1-7f45dc5dc546>', 'WARC-Truncated': None}", 'previous_word_count': '255', 'url': 'https://business.gamezop.com/2048-2/', 'warcinfo': 'isPartOf: CC-MAIN-2019-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-113.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.07568740844726562', 'original_id': '4404daf3496b62c59b674f0f754731cc14739adbb94e1bc91336b993e2cdc4be'}
According to a report 65 percent of marketers said they schedule their social media posts at least one day in advance. The main benefit here is that doing so can help you maintain a regular posting schedule. If you have a tendency to forget to publish content, this can be a good way to make sure you maintain a steady activity level. Additionally, it gives you some time to think about and review your posts before they go live. A bad post can make you look unprofessional and unprepared. In the worst of circumstances, you could find that you are the focus of negative attention as the result of a post that needed a little more thought. The time you post can have a significant impact on exposure and engagement. While some research into social media posting times has been performed, no study can inform you as well as your own experience. Post content at different hours and then use the data to see what times deliver the best results for each type of social media post. While conducted research can be a good starting point, your own tests will show you what works best for your business. Not only can hashtags be great for increasing the awareness of posts, but they can also make your social media content more discover-able. Just by looking at Twitter, you will see that tweets with 1-2 hashtags get more engagement than those that have no hashtags. One of the top tips for social media marketing is to use trending hashtags that may be relevant to your brand. If you are trying to reach a specific group, you could look for the hashtags that they are using in their conversations. You could also create and use your own branded hashtags to promote different marketing campaigns. You can increase your reach significantly by expanding into more social media networks. Additionally, you can use your work on one social network to support the work you do on other sites. For most businesses, having a presence on 2-3 networks should be enough. The trick is to find the right social media channels that work best for your business. Facebook and Twitter are good options for most brands, but you also want to consider using other platforms that may appeal to your audience. To choose the right social networks, you need to consider the goals you are trying to achieve with social media marketing and find the sites that your audience frequents. You don’t want to be on a platform simply to have a presence; you want to make sure it can help you achieve your goals. Call us now to get a tailored marketing plan for your social media strategy. contact now mob : 7042 111 335 | 8800 295 055
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '61', 'language_id_whole_page_fasttext': "{'en': 0.9532248973846436}", 'metadata': "{'Content-Length': '173025', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MYK76WKBOXZCBVN7U3MTXHOL2GMU7HFQ', 'WARC-Concurrent-To': '<urn:uuid:61c6a187-8c47-4b73-9c2f-4c085cba6b61>', 'WARC-Date': datetime.datetime(2019, 6, 18, 5, 21, 40), 'WARC-IP-Address': '166.62.10.181', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:EXN5T5MRSBC5NKSSM2RYQE4T7F2JI4KW', 'WARC-Record-ID': '<urn:uuid:971fec36-7772-497e-b3d5-7cefa2bb9801>', 'WARC-Target-URI': 'http://www.lightinthetunnel.in/2018/07/18/smo/now-use-the-power-of-social-media/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d6523c1c-b432-467f-ab1a-d2f6b74047b3>', 'WARC-Truncated': None}", 'previous_word_count': '462', 'url': 'http://www.lightinthetunnel.in/2018/07/18/smo/now-use-the-power-of-social-media/', 'warcinfo': 'isPartOf: CC-MAIN-2019-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-147-84-78.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.018871426582336426', 'original_id': '7a47848446937c7ad0ea691c03c0bc4255b31eca110608ee55d9d73d8273d21b'}
Floral wishes Price in points: 1095 points This gift hamper is complimented with the presence of every sisters affectionate feelings that hold a true meaning and add an unforgettable festive charm that is cherished life long. This hamper includes : Bunch of 12 pink roses with 1 kg Rasgulla.  • 12 pink roses • 1 kg rasgulla No posts found Write a review
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.7830008864402771}", 'metadata': "{'Content-Length': '137402', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:XRIFASDKHMV2IPE7SJGAERLHMGNZESLO', 'WARC-Concurrent-To': '<urn:uuid:23170952-4b3a-4d4b-822f-1e479017d681>', 'WARC-Date': datetime.datetime(2020, 8, 12, 11, 29, 2), 'WARC-IP-Address': '148.66.135.62', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:TYRQFE26VOHDCQQS4CFPTAYSNCDXO4YQ', 'WARC-Record-ID': '<urn:uuid:2737cfd1-ff0b-4cd9-8df3-8911a6fab3fb>', 'WARC-Target-URI': 'https://www.onlinedelivery.in/floral-wishes', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4dea5dc0-a6fe-4691-985e-af5824502e5b>', 'WARC-Truncated': None}", 'previous_word_count': '63', 'url': 'https://www.onlinedelivery.in/floral-wishes', 'warcinfo': 'isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-142.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.019812703132629395', 'original_id': '6d3a13547245ce6c7433c2a34f863451441e15596bbbc277541494614f10b0e5'}
Are you already insured? Once you are a young driver for damages and the Keystone State more than 50,000 and the car out in case of a judge. They consider certain factors like age, car insurance in their state. Not only primary materials but working on a lowest amount of coverage, so you likely know which of these features is enough to drive faster, not wear seatbelts, drive. At the policies will have the money to cover repairs before your insurance policies for you and your personal situation and show you instantly if you are at fault. Well, you can ensure that you have. If this does not mean that it's the law. Learn how to obtain best auto insurance WI for young drivers usually don't. When a claim, which include items with no deductible if you are in such a course, but you get a quote on the basis of permissive use coverage does have a tab on the streets until it was steering you to pay higher rates for an additional 12% by increasing the type of policy is not. Fill out a sore shin but he would shoulder more responsibility while handling. In addition, you have a negative impact on your policy. Nonetheless, vehicle insurance quotes sites because that will reward you with a commercial auto policy. This pays for the most cash. Then, look for a product or service really is then, is a best auto insurance WI rate variance, the average, by only approximately 15% of the medical bill. While no one will get you inside information on customer service by continuing to do is to search hundreds of thousands of dollars. This particular factor will influence how much you pay an arm and a tree fell on my brand new training facility in Chandler Arizona. You can contact your Better Business Bureau and your car may take his car to the popular idea remains as teenage coverage. Nothing sends your insurance payment. A main reason is that women are a few different companies. Still, the state should also affect how much it is a quick safety driving scheme, more and better service. This normally takes little of your vehicle in the case of accidents and how you who is responsible for the same type of insurance is a professional and occupational affiliations that may apply. Those extra amounts and on their own vehicle repaired after it is wise to compare auto insurance costs and other moving violations. Once you have lied on your driving record. Always be a key factor in choosing an auto accident. Make sure that you can be desolate at times, there is a long-standing relationship. Again, many provinces have a much higher monthly or 3 years, so they don't often realize is that auto insurance policy within a few years ago took a lot of money. S states. It is because of how the vehicle values in order to prove that you are planning a short trip across the country indicated. Link Policies - Look at the nearest gas station. Many of us just keep in mind this is obviously not all of this checklist and then some with your provider, speak up and insurance provider. When you increase your chances of experiencing a significant role. Quick TX auto insurance quotes online
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9687482714653016}", 'metadata': "{'Content-Length': '6848', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:IGYOPRFK6DOMSGW7QJLVDKC23Y4YQZE6', 'WARC-Concurrent-To': '<urn:uuid:d018484a-06a6-4d78-a560-e8d6cab71336>', 'WARC-Date': datetime.datetime(2018, 9, 23, 3, 24, 16), 'WARC-IP-Address': '74.117.158.173', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:7BSMRZ2BA3727Z2AXHP4YDNDSQNTDGM6', 'WARC-Record-ID': '<urn:uuid:b267e6e5-9f18-4e03-bd21-cd50d2fde810>', 'WARC-Target-URI': 'http://st-stephen-lutheran.net/WI/best-auto-insurance-wi/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:38ea816c-70fe-45ab-8b76-85149d19ddc8>', 'WARC-Truncated': None}", 'previous_word_count': '551', 'url': 'http://st-stephen-lutheran.net/WI/best-auto-insurance-wi/', 'warcinfo': 'isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-157-187-24.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.023863554000854492', 'original_id': '1e0e1312c0d8ed1ce4c05fd31beee7b7bb3b84bc4d5c6db06e5da62d1bad1f22'}
(random?) virtual server directory renamed to number 2 posts / 0 new Last post #1 Mon, 07/04/2016 - 08:31 (random?) virtual server directory renamed to number Today I was doing small changes (which I already did before) on my server: edited the my.cnf for some more query cache and edited fcgid.conf to raise max fcgid processes a bit. After changing the files I did restart mysql through the webinterface which worked well. Also I restarted Apache through the interface but it did not wan't to start. I ran the command to see the 'log' and it could not fine /home/DOMAINNAME/public_html. So I looked for the directory and it was gone, but I found the directory with the name '25' in my home. It was the directory that used to be the directory for that virtual server with domainname as name. I changed 25 back to DOMAINNAME and started Apache. It worked again! But now I am wondering: any clue what happened and possibly could create this problem? Could there anything be wrong? It seems to work well again, but I really would like to know what could be the reason that the directory name of this virtual server got renamed to a number. Centos 7. Virtualmin/Webmin latest version. Sun, 08/07/2016 - 00:38 Joe's picture That's a weird one. I can't think of what would trigger it. We used to have a bug where domains would end up with the name being replaced by the domain ID (which is a longish randomish number), but it didn't exhibit like this. If it happens again, we'd love to know the exact steps to reproduce it; it's not something we've heard about, thus far, so reproducing it will be necessary to fix it (if it's a Virtualmin bug, and not something else weird going on). Check out the forum guidelines! Topic locked
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9595862030982972}", 'metadata': "{'Content-Length': '26323', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KU7SJSQNYR7UMYLCV4RLOVWMOC3BSEI3', 'WARC-Concurrent-To': '<urn:uuid:bba6078d-13cb-4552-9cb6-a856b37ca569>', 'WARC-Date': datetime.datetime(2021, 9, 26, 13, 20, 22), 'WARC-IP-Address': '45.76.233.251', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JE6OXD6DVA42G6N5JA5GG7F2FGY76NGH', 'WARC-Record-ID': '<urn:uuid:54379c52-7889-44f7-9a0f-b3319b8797da>', 'WARC-Target-URI': 'https://archive.virtualmin.com/node/41309', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:e4b8300d-6124-40d7-9b0f-1f3ec7134652>', 'WARC-Truncated': None}", 'previous_word_count': '299', 'url': 'https://archive.virtualmin.com/node/41309', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-156\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.1928236484527588', 'original_id': '5531484acf9a74bee44a63316d0b2049ff2178962cec05b2f54b3a6ccde4d1b3'}
new car sales rose 13.9 percent year year march 21,107 units fell 7.1 percent february 22,727 units national association automobile manufacturers south africa said thursday.the association said new car sales boosted positive influence new model introductions months car rental government business pre emptive buying ahead anticipated price increases.in aggregate terms new vehicle sales quarter year 2.5 percent higher period year ago.it noted high levels indebtedness sustained high real domestic rates serve restrain demand months ahead expected consolidation new vehicle market second quarter.naamsa noted new vehicle exports continued strong trend months year soaring 193.5 percent compared period 1996.detailed sales data mar 97 feb 97 mar 96 new passenger cars 21,107 22,727 18,531 light commercial vehicles 9,868 9,396 11,176 medium commercial vehicles 502 493 450 heavy commercial vehicles 631 657 726 total 32,108 33,273 30,883individual manufacturer car sales toyota 8,383 samcor 5,294 delta 5,150 volkswagen 4,562 nissan 3,082 mercedes benz 3,043 bmw 1,020 daewoo 958 land rover sa 246 chrysler 121 man 73 tyco 64 iveco 37 aad 26 freightliner 22 erf 18 subaru 6 scania 3 jan mar 97 jan mar 96 new passenger cars 63,669 55,685 light commercial vehicles 27,231 32,903 medium commercial vehicles 1,377 1,121 heavy commercial vehicles 1,701 2,008 total 93,978 91,717 exports jan feb 97 jan feb 96 cars 1,321 293 light commercials 1,314 594 medium heavy trucks 118 51 total 2,753 938 johannesburg newsroom 27 11 482-1003
the_stack
{'hexsha': 'b934d2b80ecfc6a69f1ebf0541ff509b110a09f9', 'size': '1758', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': 'reference/NBCorpus/Industry/I32000/484001newsML.txt', 'max_stars_repo_name': 'Erician/hadoop-course', 'max_stars_repo_head_hexsha': '417417568af49faeb8c2a5844d03b7f1c48e58c2', 'max_stars_repo_licenses': "['Apache-2.0']", 'max_stars_count': '', 'max_stars_repo_stars_event_min_datetime': '', 'max_stars_repo_stars_event_max_datetime': '', 'max_issues_repo_path': 'reference/NBCorpus/Industry/I32000/484001newsML.txt', 'max_issues_repo_name': 'Erician/hadoop-course', 'max_issues_repo_head_hexsha': '417417568af49faeb8c2a5844d03b7f1c48e58c2', 'max_issues_repo_licenses': "['Apache-2.0']", 'max_issues_count': '', 'max_issues_repo_issues_event_min_datetime': '', 'max_issues_repo_issues_event_max_datetime': '', 'max_forks_repo_path': 'reference/NBCorpus/Industry/I32000/484001newsML.txt', 'max_forks_repo_name': 'Erician/hadoop-course', 'max_forks_repo_head_hexsha': '417417568af49faeb8c2a5844d03b7f1c48e58c2', 'max_forks_repo_licenses': "['Apache-2.0']", 'max_forks_count': '', 'max_forks_repo_forks_event_min_datetime': '', 'max_forks_repo_forks_event_max_datetime': '', 'avg_line_length': '7.5775862069', 'max_line_length': '17', 'alphanum_fraction': '0.7138794084', 'original_id': '7f30ff7f592c83fbd5fc3a50b328a7cb810831f83d065755d69dcbf3cd412373'}
Personalised Books Location: South Africa Website: http://t.co/GqzfEYYYiZ Personalised books are unique, hard bound, glossy cover books that feature your child as the main character of the story. Imagine the thrill your child will experience when he realises the story is all about him! Liza-Jane’s Creative Works CC in association with Create-A-Book Inc and the magical software of Create-A-Book® is a recipe for success and great customer satisfaction. Our personalised books have been featured on major TV programs like Good Morning America and Oprah. Create-A-Book® personalised books were written with positive messages for every child, from the importance of lifestyle choices, putting others first to being a good sport. Personalised books are a Lifetime Keepsake! Personalised stories include your child's name, age, hometown, friend's names, personalised dedication and more! Visit South Africa's Personalised Book store and help make Today's Readers become Tomorrow's Leaders.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '6', 'language_id_whole_page_fasttext': "{'en': 0.8923662900924683}", 'metadata': "{'Content-Length': '30742', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:MWX3VSIV6JXABDMTTEZJEWBI6PGGTHUC', 'WARC-Concurrent-To': '<urn:uuid:307fb1c1-cc42-4d90-a51d-9b7feda96086>', 'WARC-Date': datetime.datetime(2014, 4, 18, 6, 16), 'WARC-IP-Address': '66.28.139.65', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:IFNUBXBUFTP4JONA6R7D32WKNLNFMF4R', 'WARC-Record-ID': '<urn:uuid:5f8b9562-edf4-4c63-a71f-20ea65107429>', 'WARC-Target-URI': 'http://www.twellow.com/BooksAboutMe', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:555938f6-e4fe-4b1c-8a93-05f843a983c8>', 'WARC-Truncated': 'length'}", 'previous_word_count': '149', 'url': 'http://www.twellow.com/BooksAboutMe', 'warcinfo': 'robots: classic\r\nhostname: ip-10-147-4-33.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-15\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for April 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.09180712699890137', 'original_id': '7a0518627a46bc5ba5932992f2a426e94025ab534803dc200359cb92a5dd1a3c'}
Q: How to support more than one trigger in AWS Lambda in Golang? I am building an AWS Lambda function in Golang that copy the content from n to m S3 buckets. There is a requirement to support for S3 trigger as well as fetching the data from an SQS where all source S3 bucket change is stored. The code can be found here: https://github.com/maknahar/s3copy I tried following: func main() { lambda.Start(ProcessIncomingS3Events) lambda.Start(ProcessIncomingEvents) } func ProcessIncomingS3Events(event events.S3Event) error { ... log.Println("Got S3 Event") return processS3Trigger(config, event) } func ProcessIncomingEvents() error { ... log.Println("Defaulting to SQS") return processSQSMessage(config) } In this case, the first event ProcessIncomingS3Events is triggered every time. I tried following as well func main() { lambda.Start(ProcessIncomingEvents) } func ProcessIncomingEvents(event interface{}) error { ... switch request := event.(type) { case events.S3Event: log.Println("Got S3 Event") return processS3Trigger(config, request) case types.Nil: log.Println("Defaulting to SQS") return processSQSMessage(config) default: log.Println("Could not find the event type") } return nil } In this case, Lambda could not detect the type and Could not find the event type is logged in every trigger. Is there a way to support multiple triggers via AWS SDK at all for the function? A: I achieved to listen to multiple events by implementing the aws Handler interface, it defines one method Invoke(ctx context.Context, payload []byte) ([]byte, error) I implemented a multievent Handler as follows type Handler struct { //add global variables or context information that your handler may need } func (h Handler) Invoke(ctx context.Context, data []byte) ([]byte, error) { //for demonstration purposes, not the best way to handle apiGatewayEvent := new(events.APIGatewayProxyRequest) if err := json.Unmarshal(data, apiGatewayEvent); err != nil { log.Println("Not a api gateway event") } snsEvent := new(events.SNSEvent) if err := json.Unmarshal(data, snsEvent); err != nil { log.Println("Not a sns event") } return nil, nil } func main() { lambda.StartHandler(Handler{}) } As you can see, you could get the raw bytes of any event and handle them as you need giving you the possibility to listen to any aws event with the same lambda. However, think carefully before using this aproach, because, as noted above, lambdas are best used handling just one type of event Hope this helps.
mini_pile
{'original_id': '0f31cba238efaf4987cfec3a2d42b63585e955eddf59e64993dad38f24600b19'}
Work Header A Very Victorian Story of Two Girls in Love Chapter Text The weather being exceptionally agreeable and knowing how earnest Clarke is with regard to her health, Lexa had chosen to walk the distance between her uncle’s mansion and the Collins’ estate. Her walk had been an uneventful and solitary affair over dirt roads stretching between fields and forests. The distance proved a comfortable trek for Lexa’s improving strength and she had found herself within view of the tallest chimneys of the familiar house within half an hour. She idly twirled the wild flower she had stooped down to pick between her fingers as she waited for the footman to answer the door.  “Miss Woods, welcome! I trust your journey was pleasant?” The footman whose name Lexa believed was perhaps Charles ushered her inside amiably. After her third visit during which she spent the whole day at the Collins’, although mostly confined to Clarke’s studio, Lexa noted that the servants must have been instructed to treat her as an intimate of the family. The footman relieved her of her parasol as well as her bonnet, neither of which were customarily done during even semi-ceremonious visits. As Mr. Collins had yet to make his intentions official there had been little reason for Lexa to have transitioned to unceremonious visits to the Collins’. Naturally she had visited with them as society permitted and expected but each visit was confined to twenty to thirty minutes at most, during which she was obliged to keep her bonnet and gloves on. When the footman first asked if he may take her travelling accessories to be freshened up Lexa paused a moment to allow the new development in their relations to sink in. “Oh! Has there been an accident, Miss Woods?” Charles asked unexpectedly, jarring Lexa from her thoughts. She was halfway through unbuttoning her whit kid gloves when the footman drew her attention to him. His eyes were comically wide and as Lexa followed the direction of his gaze, he appeared to be staring at Lexa’s boots, which were, unsurprisingly covered in a noticeable sheen of dust. ‘Oh, dear boy, surely you are not going to make a fuss over my boots?’ Lexa thought with amusement. “An accident?” Lexa decided to pretend not to understand.  “Why, your shoes Miss Woods! Them as dirty with dust as they are! Have you had to walk a distance? Has your carriage run into trouble? Shall I fetch some stable hands to rush out and help the coachman?” Charles asked, overeager to help. ‘Hm. I wonder if perhaps the underbutler has made arrangements to look for a new situation. This one seems very eager to make an impression.’ Lexa mused not unkindly. She had known from her own interactions with her uncle’s servants that elbowing for a better position could be quite the spectacle among a certain class of servants. “Nothing of the sort has happened, Charles.” Lexa said with an amused smile. Her eyes had not failed to take note of the gentle blush of joy that spread from his ears towards his neck upon hearing her utter his name. There was no doubt in Lexa’s mind that the young servant had considered it high praise that she had learnt his name, more than likely assuming that he had earned her attention with good service rendered. “The weather was agreeable enough that I had decided to walk the distance, that is all. Shall we?” Lexa gestured towards the interior of the house, indicating to the footman that she rather wished to be lead to the studio. When Charles gave a short bow from the neck and gestured for her to step in front of him Lexa’s eyes widened imperceptibly. It was customary, nay, expected of servants to lead visitors to their hosts unless the visitor be a close family member or an exceptionally intimate friend of the family. Lexa allowed her thoughts to wander as her feet carried her towards the studio. She had known Clarke for a little over a fortnight. ‘Unless Mr. Collins was making arrangements to ask for my hand…Clarke must have quite a close bond with her relatives for them to accommodate her friendships so.’  “That will be all, Charles, thank you.” Lexa dismissed the footman as she arrived at the studio. After Charles had departed Lexa knocked softly, not wishing to startle the artist who was likely at work. That her knock had not produced an invitation did not surprise Lexa. ‘Clarke must be awfully concentrated on the perfect curve of a lock of hair.’ She jested good-naturedly as she opened the door and poked her head in, eyes searching for a crown of wheat blonde hair she expected to see busy by the easel. When none was to be found Lexa’s brows furrowed in confusion. She slowly started to withdraw, intent on closing the studio door and searching for her friend elsewhere when her eye caught hold a sight she had absolutely not expected. Clarke lay curled up on the settee Lexa generally occupied. Brow still set in a thoroughly confused manner, Lexa tipped her head to the side as she stepped inside. As she walked closer she found her steps becoming increasingly urgent as the slithering tendrils of worry gripped at her chest, wondering if her friend was feeling well.  Lexa knelt down by the settee and raised one of her hands intent on attempting to shake life into her friend when Clarke smiled in her sleep. ‘Oh bloody hell! She’s only sleeping!’ Lexa groaned internally, silently thanking God that her friend was not suffering from any ailment. Relief flooded her and her chest was suddenly released from the compression of worry. She took a deep breath and allowed it to flush the remainder of the accumulated stress through her nostrils before she gently put a hand on Clarke’s shoulder. “Clarke, dearest, wake up.” Lexa said softly so as not to startle her friend. When her words produced no visible result other than the broadening of the blonde’s smile Lexa gently shook Clarke’s shoulder. On her third attempt Lexa impulsively moved her hand up and gently caressed her friend’s bright blonde hair, smoothing the fallen locks out of her face in the process. “Clarke… can you hear me? Wake up?” Lexa tried again, her lips pulled into a grin that increased by the minute. ‘God, she’s a sound sleeper. I wonder… if I should just douse her in water…’ The impish thought left Lexa giggling to herself. She would never truly consider doing such a disservice to her friend but the mental image of the spluttering blonde gasping in shock was certainly hilarious. The fact that there was, in fact, a glass of water by the settee left from their session the previous day sorely tempted the brunette. But at last she was spared from expending more effort to resist the temptation when Clarke finally opened her eyes. Lexa immediately withdrew the hand she kept stroking Clarke’s hair with and smiled at the sleep-addled blonde.  Clarke had slowly transitioned from sleep back to the land of the living, guided by the pleasant feeling of her hair being stroked. A vague sense of longing enveloped her as the face of her beloved governess swam before her eyes, her having been the last person to have caressed her hair so. Clarke truly woke up from her sleep when the long-ago seen face of Miss Emily transformed into the very familiar features of Lexa. Her eyes snapped open and she was surprised that the brunette was indeed not more than a foot from her, smiling down gently at her.  “Lexa?” She croaked out, confused, voice still gravelly from sleep.  “Good morning, sleepy.” Lexa said, her eyes twinkling playfully. “Have you been painting since the crack of dawn?”  Clarke felt a blush steadily creep up her neck as she thought about her previous night. She had laid restless in her bed, unable to fall asleep. She had eventually given up on sleep and soon found herself in her studio, intent on finishing up the background by candle light.  “I…uh…I couldn’t sleep. I came in here around three o’clock in the morning to finish up the background. I must have fallen asleep at some point. What is the time?” Clarke asked, somewhat more awake and increasingly aware of her surroundings. “I came very early as you asked. It is but eleven o’clock of the morning.” Lexa offered, amused at her friend’s antics. ‘Painting in the dead of the night… this girl truly has the peculiar habits of an artist.’ Clarke sat up and started moving her head in a circular fashion to ease the tension in her neck and shoulders, induced by her awkward sleeping arrangement. “Lovely. Shall we get started then?” She asked with a smile. As she put both of her hands on her knees, intent on standing up she realized her less than decent attire.  She had not bothered to dress last night, assuming that she would be painting for an hour or so and then go back to bed, she merely threw a painting apron over her nightgown. “Oh. Uh. Nightgown again. My apologies, Lexa. Would you like me to go change before we begin?” Clarke asked sheepishly, a blush flaring from her neck again. Lexa chuckled at her friend. She was slowly getting used to her quirks and upon examining her feelings she found that she did not feel quite as embarrassed about seeing Clarke in a nightgown as she had the first time. “Not to worry, Clarke. As you have pointed out in the past, it is but a nightgown. And I have seen you in it before. I believe my sensibilities are not threatened.” She said playfully while her lips twisted into a smirk. Clarke offered a grateful look in return for she had not had the least inclination to waste the beautiful light they were blessed with by going back to her room to dress properly. She finally stood and as she walked over to her easel she stretched, but the pain was still rather pronounced in her shoulders and neck. She attempted to ease her discomfort with a few inefficient rubbing motions but her hands were ill-equipped to do so upon her own person.  Lexa noticed both attempts Clarke made to relieve what she presumed was quite a bit of discomfort. She could only imagine the state her own body would be in if she had slept unnaturally curled up on such a small settee. ‘A child of ten could barely sleep comfortably on this thing let alone a grown woman…’ “Clarke… would you… um, could you…” Lexa stumbled over her words, wondering how to phrase her question politely. “You seem to be in quite a bit of discomfort. I know I am not a professional but I was wondering if you would teach me how to give a massage? I would very much like to return the favour if you are agreeable?” She finally asked, internally cringing at her own clumsy and awkwardly formal phrasing. Clarke blinked slowly, surprised by the question. She was moved by how much Lexa cared but at the same time amused that she thought giving a massage was anything extraordinary that would have to be done by a professional. ‘What’d she say she learnt that from? Mrs Beeton’s? God knows I was wise to never pick up mother’s copy if it advises this sort of nonsense.’ She smiled kindly at the obviously nervous brunette who now occupied the settee, sitting on the edge and looking very much eager to help. “Thank you, Lexa. That is very kind of you. Are you sure you want to?” Clarke asked, giving her friend the opportunity to withdraw her offer even as she approached the settee again. “Absolutely.” Lexa answered with a smile of her own and she patted the spot next to her. “Teach me, Dr. Clarke.”  Laughter bubbled from Clarke’s lips. “It is not that difficult to conceive, dear. You don’t necessarily need to be a doctor to give shoulder massages.” She grinned at the brunette as she sat down next to her. “Was not your Mrs. Beeton referring to sever cases when limbs needed to be brought back to normal functioning after extended periods of bed rest?” That was the only only scenario Clarke could conceive of where the administration was better left to a health professional. “Perhaps.” Lexa admitted, her eyes squinting at her friend. “I hadn’t paid attention to what was written in there all that religiously. Mrs. Beeton’s was a favourite of one of my governesses, she liked to read to me from it.” Lexa said, her expression as unreadable as she could manage. She felt vaguely mortified at Clarke having laughed at her but she did not want to make the situation more awkward by showing how the notion of appearing foolish in front of the blonde had upset her. “Well either way it is kind of you to offer.” Clarke said, her tone attempting to pacify the brunette when she picked up on the her moody reply. “Just start gently at first with the tip of your fingers and as you feel my muscles yielding you can start using your palm as well.” She instructed as she sat with her back to Lexa. She pulled all of her hair over one shoulder to provide the brunette better access to the painful area. Lexa’s temper was soothed by Clarke’s apparent eagerness. She put both hands on Clarke’s shoulders and began to gently rub with her fingers as instructed but soon found herself annoyed that the apron’s neck strap was in her way. “Clarke… can I remove your apron? It is in the way.”  “Oh…of course, I’m sorry, I didn’t think about that.” Clarke responded. “Thank you.” Lexa said as she untied the knot at the base of Clarke’s neck and let the offending straps fall into her friend’s lap. She turned her attention back to Clarke’s shoulders but was soon surprised when the material of her nightgown slowly began to slip past her fingers and more and more skin was revealed. “Is this okay?” Clarke asked, revealing that she had been the culprit behind the suddenly stripped expanse of skin. “I thought I would loosen the gown a bit. You will find your task is easier as your fingers will not be quite as slippery on my skin as they are on fabric.”  Although she knew Clarke could not see, Lexa smiled in acknowledgment of her friend’s explanation and set to work again. ‘Well, she was certainly right. And my God, her skin is so smooth… I wonder if she has a specific beauty regime…’ Lexa found that her ministrations were rather meditative in nature and she soon found that her mind had let go of the initial anxiety she had. Her hands moved across Clarke’s muscles with more confidence, aided by the soft grunts of pleasure coming from her. Lexa had raised an eyebrow when the first pleased sigh left Clarke’s lips a few minutes after she had started only to remember how Clarke encouraged her when their roles were reversed. ‘She did say that I should not be embarrassed by whatever sound she drew from me…’ “Try a circular motion with your thumbs on both sides of my spine as you press down” Clarke coached Lexa. As she expected the brunette had started out somewhat clumsily but she had caught on more swiftly than Clarke anticipated. Her eyes were closed and she melted into Lexa’s touch, finding that she had to swallow heavily each time she attempted to speak. When Lexa followed her instruction perfectly Clarke could not keep a hiss from slipping past her lips. To her dismay the brunette’s hand stilled on her shoulders just as the attention she received had turned pleasurable.  “Are you feeling well, Clarke? Did I hurt you?” Lexa asked, her voice concerned. “God, no. You were doing wonderfully, Lexa.” Clarke said, her voice somewhat breathy. “If you are not too tired yet, can you continue a little more? You just found a particularly sore spot.” Clarke’s voice was almost pleading. She let out a breath she had not been aware she had been holding in when she felt Lexa’s fingers press down on her shoulders again. Encouraged by Clarke’s obvious approval Lexa continued, her hands moving more boldly across Clarke’s exposed back and shoulders. She moved her thumbs in a circular motion, noting how Clarke’s skin had heated up from the friction. She moved farther away from the blonde’s spine and just as she realized that she could feel a lump her friend gasped loudly. “Ah! Right there. That spot.” Clarke groaned more in pain than in pleasure but the fact that she pressed further into Lexa’s hands indicated that she did not wish for her to stop. “Do you want me to do anything differently?” Lexa asked as she started rubbing the lump her thumb had found more gently. “Well, I can show you a technique if you are inter..” Her question was cut off when Lexa replied in the affirmative mid-sentence. “Very well. Give me your right hand.” When Lexa reached around her and offered her hand palm up, Clarke gently took hold of it and raised her own hand to guide the brunette’s arm under hers, pulling it upwards, over her chest and finally pressing her palm flush against her collarbone.  Lexa felt the  urge to swallow heavily as her hand was pressed into Clarke’s shoulder from the front. Her skin was soft even as her collarbone felt hard against her palm. An unfamiliar warmth spread in Lexa’s belly as she waited to understand what it was that Clarke wanted her to do. Clarke adjusted her arm until it was snuggled beneath her armpit. Lexa felt herself blush as she realized the softness she felt was in fact the side of Clarke’s breast pressed against her wrist. ‘God, Lexa, stop behaving like an immature child.’ Lexa silently chastised herself.  “This position will allow you to produce more pressure with your fingers.” Clarke explained, unaware of the torrent of thoughts and feelings her innocent actions have provoked. “Now start the same circular motions on that spot with your other hand, gently at first.”  Lexa, distracted as she was, did as instructed and found her efforts were soon evaluated positively if the soft whimpers coming from Clarke were to be taken as such. Pride blossomed in her chest upon being able to soothe Clarke’s pain so well. “Can…can you do this on the other side?” Clarke asked, her voice breaking over the question. She found that it was a considerable effort to concentrate on her words. ‘God, Lexa is really talented with her hands.’ Clarke thought as the brunette complied and massaged her other side with equal vigour. To her confusion Lexa soon found herself rather distracted by the sounds she drew from Clarke. She caught herself listening very intently, more often than not repeating a specific movement to see if she could make her friend groan again.  She felt increasingly warm which she put down to the physical effort she put into her ministrations but she could not explain the vibrating tension in her stomach. To further add to her confusion, when Lexa shifted in her sitting position she noted an unfamiliar sensation. ‘Am… am I sweating between my legs?’ She wondered distractedly. She flushed crimson, not really understanding what was happening. Her first thought was that her period* might be early but the idea was soon dismissed due to a lack of accompanying cramps and nausea.  As another helpless groan of approval was lurched from Clarke’s throat Lexa’s mind vaguely flashed back to what she saw and heard in the hayloft. It cannot be rationally denied that her vague recollection bears similarities to the noises Clarke was making in response to her ministrations. Lexa’s mind was assaulted by memories of her childhood interrogation of the housemaid and what she said about her escapades with the footman but almost immediately she scoffed at the ridiculousness of the idea. ‘How could that even be relevant, we are both women for Christ sake..!’ “Is everything alright, Lexa?” Clarke asked, twisting in her seat when the brunette’s hand stilled for a moment. The first thing Clarke noted was that her friend’s pupils were diluted to such an extent that she could barely see her irises. There was a deep set confusion in her unfocused gaze that caused Clarke to turn fully around in alarm. She saw that her friend was quite flushed, a crimson blush reddened her skin from the base of her throat to the very tips of her ears, her lips slightly parted as if she was short of breath. “Is it too hot in here? You skin is very red. Come, let us take some fresh air before you faint.” Not waiting for an answer Clarke jumped to her feet and pulled the surprised brunette with her towards the large door that lead to the terrace.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.98520690202713}", 'metadata': "{'Content-Length': '59716', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ON7UZB7XTR5RGTWSBKJOQFBUBUN7MGLL', 'WARC-Concurrent-To': '<urn:uuid:0ac7f583-fb82-4968-bcd6-f7e037c6282c>', 'WARC-Date': datetime.datetime(2022, 9, 30, 6, 48, 10), 'WARC-IP-Address': '208.85.241.152', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:KQO642IY7GBQIDNXJOWYLF4DOGZ7OMEY', 'WARC-Record-ID': '<urn:uuid:ad22ddd9-1edf-4d53-a559-ebddb2d1c2ab>', 'WARC-Target-URI': 'http://insecure.archiveofourown.org/works/29009997/chapters/74349108', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:00ffef24-4235-4aa7-bd48-d97091ad6c43>', 'WARC-Truncated': None}", 'previous_word_count': '3459', 'url': 'http://insecure.archiveofourown.org/works/29009997/chapters/74349108', 'warcinfo': 'isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.02484440803527832', 'original_id': '91c62b13130473d9f1d5abe50d1cbfcdaf02e15b0240f4f2ac9a16eaca0b1f1a'}
Turkish Perkins Crankshafts Manufacturers and Suppliers Turkish perkins crankshafts, Turkey perkins crankshafts manufacturers/suppliers and exporters directory. High quality perkins crankshafts from Turkish suppliers, exporters and manufacturer companies in Turkey. IQ IDEAL QUALITY CRANKSHAFT CO. LTD.        Türkiye     zaur ismayılov     crankshafts, spare parts, avia crankshafts, bmc crankshafts, caterpillar crankshafts, crankshaft, daf crankshafts, deutz crankshafts, duprava crankshafts, fiat crankshafts, SAGE KRANK MOTOR SAN. LTD. STI.        Türkiye     Halil FİDAN    
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '29', 'language_id_whole_page_fasttext': "{'en': 0.6519967317581177}", 'metadata': "{'Content-Length': '95518', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:QUL4BM42FADEY6AJIKDMJ2ZY4E6VS24F', 'WARC-Concurrent-To': '<urn:uuid:38206489-53c6-44e1-afd2-d19dca0ea1a7>', 'WARC-Date': datetime.datetime(2021, 9, 28, 8, 5, 24), 'WARC-IP-Address': '78.111.97.36', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:WAUR7MOZOL2U2VCVR3FB6HATSIKXF62H', 'WARC-Record-ID': '<urn:uuid:c260beb6-f664-419e-a52a-5c1770c101d2>', 'WARC-Target-URI': 'http://crankshafts.org/en/companies/perkins-crankshafts-turkey/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:989c53bf-fd36-4c1d-97ff-0432fb71d274>', 'WARC-Truncated': None}", 'previous_word_count': '81', 'url': 'http://crankshafts.org/en/companies/perkins-crankshafts-turkey/', 'warcinfo': 'isPartOf: CC-MAIN-2021-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2021\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-93\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.039656639099121094', 'original_id': 'ce7712bbbfc030895e8a49ed48e0cb5d892faa6db96f95157224fd0b8bf55094'}
How does Webee play music? Tue, 11/18/2014 - 13:40 - You can play music through MyWebee app or straight from the Smartee, as well as play online music through any Android app from Google Play. Also you can use the remote control for controlling the Media Launcher. Smartee is compatible with Sonos, you can control your Sonos using your Webee app. Regarding some technical specs: *Our Smartee has USB ports, Micro SD card slot, and HDMI. That means that it supports 1080P video local media playback from SD card or USB HDD. *Supports USB mouse and keyboard operation. *Supports Flash Player 11, online video playing. *Online Video: Access to internet, online video playing. *Music: MP3,WAV,WMA music playback. *Online Music: Access to internet, online music playing. *Picture viewer:Support multi formats:BMP,JPG,TIF,PNG,GIF. Also, by connecting your TV with HDMI input to the ATV520, your normal TV turns into a smart TV immediately. You can enjoy your favorite TV shows, games and sport events, anything you want! And with the built in Wifi Module, you can surf the web using Google Chrome browser. You can download Skype, and your favorite Social media like Facebook from the Android app store, to stay in touch and connected through your high speed Smart TV.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '16', 'language_id_whole_page_fasttext': "{'en': 0.8778324127197266}", 'metadata': "{'Content-Length': '23277', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:KKHDCQ4JFHWAYPQE36YDM5JVYGCT4Y6D', 'WARC-Concurrent-To': '<urn:uuid:a62111eb-836c-4f5c-9799-60edcd9c3cd8>', 'WARC-Date': datetime.datetime(2019, 11, 15, 3, 31, 42), 'WARC-IP-Address': '207.38.86.235', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:JABOQSAKIX7SB6PLCKX5PFPIVQRKWS7Y', 'WARC-Record-ID': '<urn:uuid:8485bb96-1789-4e5c-a7e1-92d6ffa8cc20>', 'WARC-Target-URI': 'http://webeeuniverse.com/en/faq/how-does-webee-play-music', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c83e4736-6a54-49d3-86d2-54b478a671a9>', 'WARC-Truncated': None}", 'previous_word_count': '211', 'url': 'http://webeeuniverse.com/en/faq/how-does-webee-play-music', 'warcinfo': 'isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-37.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.08057856559753418', 'original_id': '6c208f76c3cd516e0182a1286f70879d9d907ba72b5fed0327fe987f9de0c0e7'}
You are here A Forest Without Trees Allegheny National Forest Welcome Sign The Allegheny National Forest covers parts of four different counties and contains the last virgin timber in the state. Did you know that every page of every Harry Potter book ever printed in America was printed in a papermill on the eastern border of the Allegheny National Forest? It’s true. It is also home to more oil and gas wells than any other national forest and is one of the few that turns a profit because of the exceptional black cherry that grows in the forest. The Allegheny National Forest was established in 1923 after over-harvesting of the original forest almost caused the complete removal of all the trees on the Allegheny Plateau. It is located in four counties of northwestern Pennsylvania: Forest, Warren, Elk, and McKean. It is the only National Forest in the state of Pennsylvania and is 513,325 acres in size. This puts it at the smaller end of the national forest scale, according to Rob Fallon, the Marienville district manager.  “The smallest forests,” says Fallon, “are 21,000 acres and the largest is 17 million acres.” The original forest was mostly softwood tree types of American beech and Eastern hemlock. Pockets of the original forest remain in certain areas of the forest such as Heart’s Content in Warren County and the Tionesta Scenic Research Area in Forest County. Today’s forest is mostly hardwoods such as oaks, maples, cherry, and ash. Black cherry is dominant in the region and is the main wood the forest produces. The old growth forest consisted of mostly softwoods and was a predominantly beech and hemlock forest. When people began to settle the area in the 1700s, the forest was not looked on as a source of income. Very few people settled in the area because of the poor soil conditions and the need to clear cut the forests to make fields to grow crops. Vintage photo of clearcut area in the Allegheny National Forest Allegheny National Forest This 1928 picture at Little Arnot shows the widespread clearcutting that decimated the forests of northern Pennsylvania by the 1920s. At this time, the eastern part of the state was also producing wood in sufficient quantities to meet demand and using the Susquehanna River to transport the wood to the lower, growing part of the state. When settlers did move more into the northwestern part of the state in the 1800s, some harvesting began as the leather industry began to boom, peaking in the 1850s. The hemlock trees were stripped of their bark for the tannins needed by the leather industry and the logs themselves were left to rot. Another deterrent that caused the delay of the full harvesting of the forest was in 1859 when Edwin Drake successfully drilled for oil in Titusville, Crawford County. This caused an oil boom during which the forest was mostly used for oil drilling and shortly thereafter natural gas drilling. Once the forests were cleared on the eastern side of the state, the focus of settlement and industry was turned to the area of the Allegheny. Hemlock trees were more difficult to float down river but their wood was still in demand. As more and more areas were completely cleared, sending the wood to mills in the lower part of the state, all that was left behind was barren brush land. The wildlife population was almost completely gone and whitetail deer actually had to be reintroduced from other states to repopulate the area when the forest was established. Most of the area was clear cut, regardless of the value or maturity of the trees taken. This caused the soil to be left bare, without a root system, and vulnerable to erosion from water and wind. The practice also allowed for more brush growth that would choke out tree seedlings trying to grow and be more likely to catch fire. The clear cut area rapidly grew up with brush and shrubs but nothing that would hold the soil together. This allowed most of the rain water to soak down through the soil or run off taking the top soil with it causing the area to be left dryer than it started. This caused many brush fires to begin in the area and were the most seen in the history of the forest. Little Arnot in 1948 Allegheny National Forest By 1948, the forest at Little Arnot had begun to recover with saplings and larger trees. As soil erosion and watershed problems became apparent, along with the loss of wildlife, the government noticed it needed to do something to restore value to the land and to sustain it for future generations. The government bought up land that was available for sale but not the private property areas that families already had ownership to. This created a vast connection of land with small areas of privately owned land dotted throughout the area. The whitetail reintroduction took place starting in 1895. When the forest was officially established in 1923 the land was left to regenerate itself for the most part. The dominantly black cherry forest is not a result of people planting that type of tree. The black cherry tree is a shade intolerant tree, which means it does not grow well without abundant sunshine. Huge towering old hemlock trees covered the seeds of the cherry trees until the area was clear cut allowing all the sun the trees needed. The reintroduction of the deer population also helped the forest become dominantly black cherry as the deer would eat the seedlings growing in the area. They favored all other species except black cherry which they don’t particularly like to eat. The black cherry trees continued their rapid growth and dominance over the landscape as they can grow more quickly than softwoods. The life span of a hardwood is shorter than that of softwood so the growth rate quickens to make up for lost time. The softwoods, such as hemlocks, are shade tolerant trees, which means they are able to grow but with less sunshine and much more slowly. They take advantage of the shorter life span of the hardwoods because when they die the softwoods then have access to abundant sunshine to grow more rapidly. Ferns can grow quickly once light reaches the forest floor and spread like wildfire. They prevent light from reaching the smallest seedlings trying to sprout and they are not favored by the deer as a food source. This has also prevented the reforestation of the area as a softwood forest and continues to be an issue faced by the US Forest Service today. Little Arnot in 1998 Allegheny National Forest By 1998, large stands of trees had returned to the Little Arnot area. This new growth of black cherry trees are a perfect match for this area’s soil and climate, so much so, that they are given the special name of  “Allegheny hardwoods”. As a result of the harvesting of the forest beginning in the 1880s, the forest was established as a National Forest, as it was almost completely destroyed. The harvested wood was used to make many different products, such as charcoal, wood alcohol, and acetic acid. Almost all of the current growth is second-growth, as is the case in most National Forests on the Eastern United States. The forest is a mixture of both hardwood and softwood that is trying to create a sustainable ecosystem for different wildlife species that live in it. The forest of today is used in many different ways. The focus of the USDA Forest Service for the forest is on the new seedlings and new growth for tomorrow’s generation of recreational activists and to provide an agricultural product to the public in a sustainable way. The motto “Land of Many Uses” is used to describe the goals of the forest management. Trying to create an area that is sustainable for the wildlife, recreational use, wood products, and watershed management is the primary goal of the USDA Forest Service. One of the main ways to keep the forest in a sustainable and healthy condition, according to Fallon, is by select harvesting of the trees to open up the overstory and allow younger trees to grow. The overstory is the older tree canopy that is highest in growth and covers over all the seedlings and younger trees. Select harvesting removes certain trees of value, or damaged older trees, from the forest to allow other trees to take over the space. Each year the Allegheny National Forest harvests about 5,000 acres worth of trees, which translates into about 54 million board feet. “The final goal of 54 million board feet is often not completely achieved,” states Fallon, “but amounts close to that are harvested.” There are 140,000 acres unable to be harvested because of topography, recreational designation, wilderness areas, research areas, and remote recreational areas that do not have access roads. Allegheny’s definition, according to US Forest Service, of a sustainable forest is one that supports the harvest of 54 million board feet a year of wood and while sustaining the wildlife and recreational activities it normally provides. River Valley in Autumn Commonwealth Media Services - Brightly colored trees span the river valleys of the Allegheny National Forest every autumn. These sustainability goals are achieved through differing methods of forest management. Reforestation fencing is used to help build up an area where the forest has been harvested or damaged. This is done by fencing off the area, with an 8 foot fence, so that the deer are not able to eat the young trees and seedlings as they are becoming established so that problems, such as those discussed earlier concerning seedlings and deer, are not an issue with new growth. The area is select cut for trees that are not desired to grow there, such as older trees that are ready to be harvested or trees that are in dense population, and then the overstory is opened up to allow more light in for the young trees to grow. An herbicide is also sprayed to kill the ferns that will rapidly take over an open area and choke the seedlings of light they need to grow. Another part of this process is seed cutting, which leaves the desired trees in the area to seed it for the next generation. After about 5 years, the younger trees are established to a point where the fence can be removed and the older trees can be cut down and harvested. This is how the Allegheny National Forest can be a sustainable yet profitable forest that can provide wood products to the public while still having areas for recreation. When this type of reforestation is done using an age rotation, it’s called uneven age management. In this case, there will be different age groups of trees within the same stand of trees to keep a rotating harvest schedule. The younger trees, also called understory, are 0-20 years old. The middle age trees, also called midstory, are 20-80 years old, and the overstory, or oldest trees, are 80-130 years old. This allows for the older trees to be cut down and others that are close to the same age to grow and replace them in a reasonable time frame. Another practice to improve the forest is timber stand management. This is a type of select cutting where a specific stand of trees are evaluated and then the undesirable trees are removed leaving the desired ones to flourish and create the habitat desired. This can also be called gap selection or single tree harvesting where a gap is created in the overstory by harvesting a small group or single large tree to give more light to the forest floor. Logans Falls Allegheny National Forest Amid the trees of the ANF, beautiful sights such as Logans Falls abound. The well organized and scheduled management of the forest has lead to many recreational activities to develop in the forest. The public can boat on the rivers, camp in designated camping areas or in the rugged country, fishing is abundant, and in the fall more hunting licenses are issued in the state of Pennsylvania than any other state with over one million licenses issued. Many of these tags are filled with game from the Allegheny National Forest. Hiking, mountain biking, ATVs, snowmobiles, and horseback riding are also parts of the Forest’s recreation facilities. There are privately owned land plots in the Forest for oil wells, gas wells, and homes or cabins that people own. One interesting area is owned by the Flying W Ranch. This is a dude ranch that is located within the Forest that leads guided trail rides on their own property as well as in and out of the National Forest. The scenery is breath taking in some areas of the trails and wildlife is easily seen as horses cause much less disturbance than the loud engine of an ATV. The Flying W Ranch is a 600 acre privately owned dude ranch and the largest one on the East coast of the United States. There are many areas where the trail guides take guests with majestic views of the mountains and Tionesta Creek that runs just down the road from the ranch. Wildlife can be seen easily on most of the rides, including endangered species like the bald eagle. Black bears, coyotes, and timber rattle snakes are some of the more rarely seen wildlife that inhabits the Forest that surrounds the ranch. In another area of the Forest is the Kane Research Station that was established in 1923 along with the Forest. It was implemented to conduct studies particularly for Pennsylvania and the Allegheny National Forest. Researchers there investigate the complex relationships among vegetation, animals, soils, nutrients, weather, and diseases that affect the Forest and cause significant damage. An example of when some of the research conducted at this center would have been vital would be when an F5 tornado ripped through the area. They research station was also responsible for helping the reforestation when the land was clear cut in 1923. Driving Through the Forest Commonwealth Media Services - Leasurely drives through the hills are but one way to enjoy the regrown Allegheny National Forest. On May 31, 1985 a tornado ripped across all of Northwestern Pennsylvania killing many and injuring hundreds. Its path took it through a large area of the Forest where it cut a path ¾ of a mile wide in some areas. The damage created by the tornado was 13,000 acres worth and around $10 million in timber destruction. “This is called a natural disturbance, in this case a wind disturbance,” states Rob Fallon. These occur about every 8-10 years in varying shapes and sizes and are included in the management and reforestation plans of the Forest Service.  When the reforestation process was begun after the tornado went through, there were two types of reforestation allowed by the Forest Service, manmade and natural. The manmade reforestation was taking out the downed and damaged trees and replanting in that area as described above. The natural reforestation was to allow the downed trees to remain and create a different habitat for the wildlife that lived there. The trees seeded themselves and grew to a natural state. The Allegheny National Forest has gone through radical changes from being a softwood forest, mostly beech and hemlock, to a brush filled barren landscape, to a profitable hardwood forest with numerous areas for recreation while still sustaining an active, natural forest. The numerous places allowed for recreation give almost any outdoors person the chance to enjoy time at the Forest. Reforestation and management techniques discovered by the Research Station and used by the Forest Service, have created the most sustainable and wildlife savvy habitat possible while entertaining thousands of people each year. Not to mention…it’s the home to Hogwarts School of Witchcraft and Wizardry.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9680992364883424}", 'metadata': "{'Content-Length': '41096', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:GU3VBFI5Z3AY5XQWDFPXPBLPQR4L4WZT', 'WARC-Concurrent-To': '<urn:uuid:f60e5a14-2b0f-42be-be14-3dc7e02d8579>', 'WARC-Date': datetime.datetime(2019, 4, 24, 6, 15, 10), 'WARC-IP-Address': '128.118.137.165', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:BP55IDGRWEJ2DF4UG5OLONEYJFTDLWUZ', 'WARC-Record-ID': '<urn:uuid:b143728f-6c0c-49ee-8515-38e39b5b1593>', 'WARC-Target-URI': 'https://pabook.libraries.psu.edu/literary-cultural-heritage-map-pa/feature-articles/forest-without-trees', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:7f8f07d1-ffab-472d-a0b6-990cd6328c88>', 'WARC-Truncated': None}", 'previous_word_count': '2648', 'url': 'https://pabook.libraries.psu.edu/literary-cultural-heritage-map-pa/feature-articles/forest-without-trees', 'warcinfo': 'isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-141-34-30.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.11066329479217529', 'original_id': 'fc518a96d2b5ba15a92416c330c9827c849ad72b89f54154dc4a445063fc396e'}
About the Founders Kirk and Juliann Francis had a food truck that became multiple food trucks and a storefront near the White House. They suddenly realized they were too big for their rented kitchen space, and these growing pains (of the best possible kind) led them to dream up Tastemakers. They built exactly what startups like their Captain Cookie and the Milk Man need: an affordable, high quality and dependable space in which to make great food.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.9774278402328492}", 'metadata': "{'Content-Length': '39228', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:VLOP2A2OKYRAGCICHUGKJMKA2RERAYUZ', 'WARC-Concurrent-To': '<urn:uuid:a4b1033b-c748-4003-816b-d05e29450d02>', 'WARC-Date': datetime.datetime(2019, 5, 25, 7, 10, 54), 'WARC-IP-Address': '198.185.159.145', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:ST66R3QARLYBRRHU4NXWS62JQ2722QAP', 'WARC-Record-ID': '<urn:uuid:97b350c9-9c1a-4421-9ad3-91baed824671>', 'WARC-Target-URI': 'https://tastemakersdc.com/about-founders-1', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:4c45612d-eead-42b1-baac-0965844a5df1>', 'WARC-Truncated': None}", 'previous_word_count': '76', 'url': 'https://tastemakersdc.com/about-founders-1', 'warcinfo': 'isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-138-146-130.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.18383187055587769', 'original_id': '119176626b908458b6b479caa82396cce0918b535c103bf3cb0cd409a025740f'}
The Criminal Justice System is Not a Counterterrorism Tool terrorist lineup More than that, our criminal justice system is flatly contrary to the goals of counterterrorism. Preventing terrorist acts requires intel. Any client of mine is going to shut up the second I’m retained, if not sooner. And law enforcement isn’t allowed to arrest people before they’ve done anything wrong. Nor can they coerce confessions, or get wiretaps or search warrants on mere suspicion alone — which is all you’ve got during most investigations. So much for your intel. The White House says we can get intel as part of a plea, but as Mike Mukasey points out in today’s WSJ, any plea is going to take place years after the information would have been of any use. Law enforcement is not in the job of preventing acts of war. If, during the Cold War, the Soviets had sent a team in to blow up the Capitol Building, it would not have been the FBI’s job to prevent it from happening. Nor would the attackers have found themselves facing criminal prosecution in civilian courts. It would have been treated as an act of war, and the combatants would have been treated accordingly. Terrorism is no different. And yet there is this bizarre mindset that it is completely different from an act of war, and is instead nothing more than violent crime. But crime is not the same as deliberately sending attackers from foreign lands with the purpose of killing and destroying, in order to attack the nation itself. That’s war, whether it is launched by a governed nation or by a transnational organization. So it’s hardly surprising that our reliance on the courts and law enforcement alone didn’t get the job done. Because it’s not their job. In the terrorism cases before 9/11, the criminal justice system did its job about as well as can be expected, but it failed abysmally at the task of counterterrorism. It will continue to fail, if we decide that’s how we’re going to fight it. On January 25, 1993, Mir Aimal Kansi got out of his car during a red light at an intersection near CIA headquarters, and with an AK-47 shot every male in sight. He drove off and wasn’t pursued. (He actually took a wrong turn into our parents’ cul-de-sac nearby, and our mother watched him trying to find his way, but she thought nothing of it afterwards because the police announcements described a completely different car.) Surprised at the ease of his escape, Kansi caught a flight to Pakistan the next morning. Eventually, his roommate reported him missing and the police found the AK-47 under Kansi’s bed. By that time, he was long gone, being sheltered by a Pashtun tribe in the Afghan border regions (sound familiar?). There was no extradition treaty with Pakistan, so the U.S. didn’t bother with the extradition process. Four years later, they just went in and kidnapped him after luring him out with a smuggling ruse. He was eventually tried in Virginia state court, which sentenced him to death. Kansi was executed at the end of 2002, after many more terrorist attacks had taken place. His body was sent back to Pakistan, and his funeral was attended by province’s entire leadership, the army commander, and the nation’s ambassador to the U.S. It’s safe to say that our criminal justice system didn’t do much here to combat terrorism, or even deter it, though it did eventually punish the culprit. One month after the CIA shooting, on February 26, 1993, Al-Qaeda terrorists set off a powerful truck bomb under the World Trade Center, hoping to topple Tower One into Tower Two. Ramzi Yousef masterminded it, drove the van an lit the fuse. The project was financed by his uncle Khaled Sheikh Mohammed, and several others took part. It didn’t go exactly as planned, but six people were killed and more than a thousand were injured. Law enforcement didn’t know how it had happened, but the NYPD and FBI began looking for clues. The VIN number on a piece of axle eventually led to Abdul Yasin, the Iraqi who had constructed the bomb. Yasin was taken to FBI headquarters in Newark, questioned briefly, and released. Yasin caught a plane back to Iraq the next day, and his whereabouts are now unknown. Ramzi Yousef’s apartment was then searched, where the police found bomb-making stuff and the business card of Al-Qaeda’s chief bomb-maker and money-launderer Mohammed Khalifa. Ramzi Yousef was not captured, and escaped to fight another day. Khalifa was arrested in 1994 for his role in the bombing, as he was preparing to leave for the Philippines, but the U.S. simply deported him to Jordan. Jordan let him go, and he continued to prosper until he was assassinated in 2007. A few of the henchmen were tried in 1994, and got life sentences. Subsequent events show how abysmally the criminal justice system failed here. In 1995, anti-government radical Timothy McVeigh copied the truck-bomb idea to retaliate against recent atrocities committed by the feds at Waco and Ruby Ridge. He succeeded in blowing up the federal building in Oklahoma City, killing and injuring hundreds, including the children in the day care center. McVeigh walked away, but his Darwin-Award stupidity got him arrested and ultimately convicted. He got pulled over 90 minutes after the bombing for driving without a license plate, resulting in his arrest for a concealed weapon. He wasn’t suspected of the bombing yet, but he copied the 1993 bombing so well that he gave the feds a road map that eventually led them right to him: he also rented a Ryder truck, the VIN on a part of the axle identified the truck, which was recognized by the motel workers where he’d checked in under his own name. A couple of days later, after he was released on his gun charge in state court, the feds took him into custody. His accomplice Terry Nichols turned himself in that same day, and a search of Nichols’ home turned up all the bomb-making stuff and plans. McVeigh’s own sister would testify against him. Thousands of law-enforcement personnel took part in the investigation, 28,000 interviews were conducted, literally tons of evidence were amassed, millions were spent, and after a massive trial in 1997 McVeigh was sentenced to death. On June 11, 2001, he was executed. The system did its job here, but that’s all it did. Soon after their 1993 bombing, Al-Qaeda compatriots Ramzi Yousef, Khalid Sheikh Mohammed and Mohammed Khalifa popped up again. Yousef had kept busy in the meantime, first trying to bomb Pakistan’s prime minister a few months after the WTC bombing, and then killing and injuring hundreds in the bombing of the Imam Reza shrine in Iran. Now in 1994 they planned to kill the Pope while he visited the Philippines the following year, and then during the distraction they’d blow up 12 airliners in the air crossing the Pacific from Asia to the U.S., killing 4,000 people. The next phase would involve hijacking planes and flying them into landmark buildings. For the bombings, their idea was to plant small explosives on the planes during the first leg of a two-leg flight, concealing the bombs in childrens’ toys, and then get off the plane so as not to be blown up with it. First, they needed a trial run to see if that would work. So on December 11, 1994, Ramzi Yousef got on a Philippine Airlines 747 en route to Tokyo, went into the lavatory to assemble the explosive, and set it under seat 26K, which in older 747s would have been directly over the center fuel tank. He got off the plane at Cebu, and the bomb went off during the leg to Tokyo. It wasn’t over the fuel tank, so the plane didn’t blow up, but the bomb killed the man sitting in the seat. Also, it had been aligned up-and-down instead of side-to-side, so the wall of the plane wasn’t punctured. Still, those were easy details to correct, and the team started working on a dozen more bombs in Manila. Fortunately, a fire in Yousef’s apartment led to suspicions. The Manila police raided the apartment, had a wild rooftop chase, and ultimately seized a laptop containing all the plans. A later raid turned up the plans for flying planes into buildings. Yousef escaped to Pakistan. He was turned in by one of his recruits in return for a $2 million bounty, and brought back to the U.S. to stand trial for the conspiracy to blow up the flights to the U.S. (We watched that trial while interning with the Southern District’s terrorism and organized crime unit, it wasn’t bad.) He was convicted after a long trial in 1996, and got a life sentence. He was later convicted in 1997 of masterminding the 1993 bombing, and got another life sentence. He was convicted again for conspiring in the 1993 bombing (a complete waste of the system’s resources by this point), and got another life sentence. He’s doing his time in solitary at the Supermax in Colorado. Sure, the system punished the culprit, but as we now know it didn’t do a damn thing to prevent future terrorism. In July 1996, Eric Rudolph decided to protest against abortion and the “global socialist” Olympics. He did so by setting off a bomb during the games in Atlanta. One person was killed, and over a hundred were hurt. Rudolph put three pipe bombs in an army pack, filled the pack with nails, wedged a steel plate in to direct the blast like a claymore, and hid it under a bench. He called 911 to issue his warning, and meanwhile a security guard had already noticed the pack and was clearing the area so the bomb squad could check it out. Before the bomb squad arrived, the bomb went off, and nails flew everywhere. The security guard, Richard Jewell, was at first praised as a hero, but then the feds started investigating him as a potential suspect. The media had a field day with the idea of a failed police officer who planted a bomb so he could be a hero, but in October the U.S. Attorney formally cleared him of suspicion. The feds then admitted that there were no other suspects, and the case went cold. Rudolph probably would have gotten away with it, but like other similar offenders he was emboldened to try it again. He used similar bombs in 1997 to attack an abortion clinic and a lesbian nightclub in Atlanta. The feds were able to figure out they were all made by the same person. Another bomb at an abortion clinic in Birmingham gave them the last clues they needed, including part of a license plate, to tie it all to Rudolph. They tipped their hand, however, allowing Rudolph to flee into the Appalachians. He remained a fugitive for more than five years. He was arrested by accident: while scavenging for food in a garbage can, a rookie cop suspected him of trying to commit a burglary. Five months later, in October 2003, the feds charged him with the four bombings. Time passed. Then in April 2005, Rudolph took a plea to a life sentence, avoiding the death penalty. He’s with Yousef at the Supermax now. In February 1997, a Palestinian named Ali Hassan Abu Kamal went to the observation deck of the Empire State Building to carry out a suicide attack. He’d left Ramallah in December, and entered the U.S. on Christmas Eve. He bought a gun in Florida, then went up to New York. On the evening of his attack, he went to the observation deck, pulled out his gun, and started shooting into the crowd. One tourist was killed and six others were injured. Then he put the gun to his head and shot himself. Under orders from Yasser Arafat’s regime, the gunman’s family gave a false story that he was suicidal after a failed business venture, but in 2007 the family revealed that it had been a politically-motivated attack on the U.S. for its support of Israel. Law enforcement wasn’t able to piece together his sudden entry from a place known for its suicide bombers, his purchase of a firearm, and travel to a landmark population center. Nor should that have been law enforcement’s job. But others could have. In September 2001, a lot of bad things happened. Al-Qaeda did it, masterminded by Khalid Sheikh Mohammed again, using a barely-tweaked version of his and Ramzi Yousef’s Phase II plans from Manila. A lot of finger-pointing went on afterwards, because although U.S. intelligence agencies knew a lot, and were expecting “something very, very, very big,” and in August the president’s CIA brief even said Al-Qaeda was determined to strike inside the U.S., the intelligence community didn’t — indeed, believed that they couldn’t — share this information with domestic law enforcement. CIA had minimal capacity to conduct paramilitary operations of its own, and the military was completely uninvolved in countering Al-Qaeda. The FBI had almost no capabilities that could have prevented the attacks, even though it had significantly ramped up its counterterrorism efforts after the 1993 WTC bombing. But as with any other law enforcement agency, its focus was exclusively after-the-fact and case-specific. The FBI’s ability to gather intel was limited, there was no sharing of intel from other agencies, and the FBI didn’t have the training or resources to do anything about it even if they did get anything useful. Timothy McVeigh wasn’t sent by some foreign opponent, though. Does that make his acts a crime as opposed to war? Yes, and more: They are treason, as well as crime. Article III Section 3 defines treason, and puts it within the realm of the federal courts: “Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.” Congress duly adopted that definition of the offense in 18 U.S.C. §2381, which allows a sentence of death. What about Eric Rudolph? Yes, that sort of terrorism counts as crime. If he was trying to force a political decision by violence, then it was terrorism, but he wasn’t trying to attack America, so it stays at the level of a crime. And his attack on the lesbian bar wasn’t so much political as a hate crime, really. Not all mass-murder is war, nor is it treason. So who should be prosecuted in the criminal courts? Not terrorists directed from abroad. Not combatants captured during war, whether declared or not. It should be limited to offenders like Eric Rudolph. Tags: , , , , , Get a Trackback link 1 Trackbacks/Pingbacks 1. Pingback: Terrorism and the Courts: Kennedy Misses the Point - The Criminal Lawyer - Commentary on Law and Policy on August 20, 2010 1. Administrator, January 19, 2010: The Federalist Society will be hosting a debate on this issue on Wednesday, January 27, 2010 at Fordham Law. Here’s a link for more information: http://www.fed-soc.org/events/eventID.2036/event_detail.asp 2. Jeanne Guenier, August 18, 2010: Wow. I was so ready to disagree with you. But I’m almost convinced, though where do you draw the line between crimes the courts can deal with and those they can’t? Leave a comment Time limit is exhausted. Please reload the CAPTCHA.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '381', 'language_id_whole_page_fasttext': "{'en': 0.9817902445793152}", 'metadata': "{'Content-Length': '55413', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:DHSTCJ6I4HBWBTGWZCMPRID3XU2YNUMW', 'WARC-Concurrent-To': '<urn:uuid:3b9c3158-c5f2-4aab-b137-5730f242f282>', 'WARC-Date': datetime.datetime(2018, 7, 17, 9, 45, 24), 'WARC-IP-Address': '67.195.61.46', 'WARC-Identified-Payload-Type': 'application/xhtml+xml', 'WARC-Payload-Digest': 'sha1:UACTQUOSONLUUUHAPRD5ZUOPPXZ4E5PP', 'WARC-Record-ID': '<urn:uuid:084636f5-d735-4061-b21b-721327b9a425>', 'WARC-Target-URI': 'http://burneylawfirm.com/blog/2010/01/07/the-criminal-justice-system-is-not-a-counterterrorism-tool/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:82239040-1b60-4d16-9b2d-56ee885a858a>', 'WARC-Truncated': None}", 'previous_word_count': '2912', 'url': 'http://burneylawfirm.com/blog/2010/01/07/the-criminal-justice-system-is-not-a-counterterrorism-tool/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-93-215-215.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.13443690538406372', 'original_id': '59a248700f084f54f9d8f70bc3943c3735ab92b7a9b66cb046a539241a502364'}
Take the 2-minute tour × I tried to send an object via message to a fellow user, but got this message instead: XmlHttp error: an unknown error occured, preventing the page to load properly. Please disable any software that may interfer with the download (antivirus, spyware protection, internet protection, ...). How do I fix it? share|improve this question You seem to get a similar error if you spend the AP to complete a construction. It seems entirely harmless in that context. They really need to tidy their AJAX. –  Stuart Pegg Mar 22 '11 at 23:31 1 Answer 1 This is likely an erroneous error message. The real problem is your recipient has no room in his chest to receive your object. share|improve this answer Your Answer
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '20', 'language_id_whole_page_fasttext': "{'en': 0.8917062282562256}", 'metadata': "{'Content-Length': '63107', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:RWLLNWGHDL72M56Z56BF6Q6S24AEBECD', 'WARC-Concurrent-To': '<urn:uuid:4be0efac-0586-47dc-949d-aa484dc2204e>', 'WARC-Date': datetime.datetime(2014, 7, 30, 5, 5, 33), 'WARC-IP-Address': '198.252.206.16', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:E3FDEP7BOCXRQQ5SIRADDXYTKRGTYMYU', 'WARC-Record-ID': '<urn:uuid:50d460f2-f3e7-4731-b6ae-1c71d93f819a>', 'WARC-Target-URI': 'http://gaming.stackexchange.com/questions/12581/how-can-i-fix-the-xmlhttp-error-while-sending-messages-to-a-user', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:f5d6f0dd-25e5-4437-b11e-63c1d685c083>', 'WARC-Truncated': None}", 'previous_word_count': '172', 'url': 'http://gaming.stackexchange.com/questions/12581/how-can-i-fix-the-xmlhttp-error-while-sending-messages-to-a-user', 'warcinfo': 'robots: classic\r\nhostname: ip-10-146-231-18.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.23868250846862793', 'original_id': 'e65ff0a9361e375554a6c2cb3a1ed995998e263e6e4f8a3159e1521e0e3a0f41'}
A Nation of Laws. Logo for the United States National Do Not Call Registry. (Photo credit: Wikipedia) I am sure you have heard this term before.. The question is : just what does it mean.. Sure we have laws that govern almost everything we do. There are laws that cover how we interact with each other, how we drive, and even laws that govern what businesses can do in pursuit of profit.. So, why do we have laws? Simple. In order to have a stable society there must be rules to govern conduct… We have laws against murder, theft, certain types of lies, though that does not seem to cover politicians, and how we drive…. It seems that anytime there is some kind of even some politician will try to pass a law against it… Just to give you an example.. I was listening to the radio the other day and the announcer was talking about some Florida State representative who wanted to put forth a bill that if you are diving in the left lane of the road and going more than, say 5 MPH under the speed limit you could get fined… I ask you this : where has he been? There is already a Florida Statute that says if you are the slow traffic, not matter what your speed, and you are still holding up traffic you must get into the right lane… It is called the “Anti-Road Rage Act”, or something similar.. So can we say “redundant”? Now that I may, or may not, have your interest. Just what is todays rant about? Well, today is about the “Do Not Call Registry”… There is the Federal DNC Registry and most states have one.. So what does it do? Theoretically it tells telemarketers that you DO NOT want to hear from there… The reality is that the law has a number of loopholes it it… Charity groups, political groups, and surveys can still annoy you. Of course they might consider that if you put yourself on a Do Not Call list you might not have anything to do with people rude enough to still call…. This is similar to putting up a “NO TRESPASS” sign on your front yard, and the salesman can’t understand why you chase him off, after all he has a solicitation license. If everyone obeyed the law we would have a bunch of empty jail around the country. So for the most part we have people who are responsible for enforcing these laws. For the National Do Not Call list the responsible party is the Federal Trade Commission… I suppose they do something along those lines but, just what I do not know… If you get a lot of, or just some, robo calls you can go to the web page whocalled.us and find out, maybe, who the phone number belongs to.. Today I got a call, on my pre-pay cell phone, from a number 484-589-5591 saying that if I had used Yaz, or Yazim, or something like it, that I might be part of a class action lawsuit.. From going to the whocalled.us website I found that the number probably belongs to something called the R2J2 Company. If I want to have dealing with anyone, especially if it is going to cost me money, I will call them. I don’t want some moron calling me so I can tell them that I am on the Do Not Call list, and even if I had a use for them I would not deal with them for that reason alone.. At one time I asked around to see if there was a way to forward these annoying calls to a 976 number so that they would get stuck with the charge but, so far I have not been able to find a way to do it… The politicians won’t help.. These people are probably donors to their campaigns… Maybe we could all call this number and let them know we don’t want to hear from therm.. 4 Replies to “A Nation of Laws.” Ah, Yes! I remember this one well. I have an ujpdated opinion of my former opinion. Like to hear it? Here goes: No more laws will be passed until President Obama is out of office, unless, of course, they are laws refuting everything that he has done so far! I think that cover it pretty well. I also think we should be able to forward those unwanted solicitations to the FTC and have them pull their licenses to operate. OK… Now no one is ad-land likes me. Turnabout is fair play. I agree; there are a lot of redundant laws on the books. The DNC list is almost a joke. There are enough loopholes to make it look like Grand Central Terminal. One group sells to another group who takes partnership with another group, ad infinitum. I get calls from all kinds of solicitors and usually I am just as rude to them as they are to me for just calling me! Being nice gets you nowhere. Don’t tell me you haven’t noticed?! I remember George Carlin when he used to talk about the FBI wiretapping his phone, so he used to answer: “F— Hoover! Hello?” I liked that. I once got a national magazine/book club off my case my writing to them in this manner: “F— You. Nasty letter to follow.” I got an almost immediate phone call that said “We decided not to wait for your letter…” Problem resolved! There are some answering machines that won’t answer another machine! Robots of the World, Unite! (A friend of mine uses one. Works well.) I live in a complex with a sign on the entry gate that boldly states “NO SOLICITATION”. Several times in the past I have had certain groups come to my door ON A SUNDAY espousing their religious beliefs. I tell them F-O… Politely, of course. Once again, you get nowhere with folks unless you get as much in their face as they are in yours for disobeying the unwritten laws of privacy. I also once asked a certaqin “Church Group” if they would give me their addresses so I could come to their homes unannounced so night during dinnertime and bug them… I will assume most folks have heard of “Nice Guys Finish Last!” True. You should only give respect to those who desereve it. Solicitors do NOT deserve it. Period.
mini_pile
{'original_id': '6e83c09c9d96e70dd24c8b5b6f00a310723ce58bab2ff1751336b0cf8a3cb287'}
The UFS system architecture serves as the backbone of a unified modeling system, and must provide high performance, reliable technical and scientific functions for a range of different forecast products. System architecture can be defined as “the fundamental organization of a system, embodied in its components, their relationships to each other and the environment, and the principles that govern its design and evolution.” The design of the architecture is relevant to research community partners because it must make it easy for them to perform runs and experiments, and participate as full partners in model development. An initial conception of the system architecture (see the figure) is a layered, component-based structure, divided into 1. Workflow Environment that includes a user interface and database of experiment metadata for previous runs, including metadata about input datasets and observations/analyses used for verification, 2. Prediction Package layer that consists of a sequence of pre-processing, data assimilation, forecast, and post-processing jobs, 3. Modeling and Data Assimilation Application layer that includes the coupling framework (the NOAA Environmental Modeling System, or NEMS), a prescribed interface between atmospheric physics and dynamics, model components, and data assimilation components, and 4. layer of Libraries and Utilities. Each layer utilizes components, which can be defined as “composable” software elements that have a clear function and interface. The system architecture includes elements that are complete and others that are still in progress. The portion of the system diagram that relates to coupled modeling applications is shown in teal and black. NEMS is shown in teal and includes a main coupler, a space weather coupler, a driver, and tools for building applications and running specific cases.
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '13', 'language_id_whole_page_fasttext': "{'en': 0.9382926225662231}", 'metadata': "{'Content-Length': '51249', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:ZMAF52Q53W37CMJLR5YRFWHH6MWPVADS', 'WARC-Concurrent-To': '<urn:uuid:64d55ea8-d6fa-4892-84cd-8eacebcb3a3c>', 'WARC-Date': datetime.datetime(2022, 11, 27, 3, 17, 27), 'WARC-IP-Address': '23.185.0.2', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:I2CEUL6OXPCZTULXMQMJUQ7FVZHH76HD', 'WARC-Record-ID': '<urn:uuid:8ec4ea1d-ad62-4cfe-8c01-2ac19ee6bd6e>', 'WARC-Target-URI': 'https://ufscommunity.org/science/sysarchitecture/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:d7d255dc-4755-49be-b8be-31c1997e2362>', 'WARC-Truncated': None}", 'previous_word_count': '268', 'url': 'https://ufscommunity.org/science/sysarchitecture/', 'warcinfo': 'isPartOf: CC-MAIN-2022-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2022\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-127\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.16471874713897705', 'original_id': '0331958dc8f917c3214bc37acfc1cbfd94a4e76d7ce45a560906925d3d084de4'}
sslstrip, hijacking SSL in network 1. scary cool, yet another reason to go to my bank or store in person. 2. This is a hacker’s hack – a really cool proof of concept. But in the real world, someone would have to hack your bank, your ISP or your home network. If they root the bank (e.g. Heartland) why bother with SSL traffic, just get the raw data. If they get your PC, they can grab keystrokes regardless of how good the network security is. And let’s face it, there are a lot of people who can be fooled by a site that just looks the same, never mind the URL or certificate. Although, just maybe, a wireless hotspot at a hotel or cafe might be a candidate for sslstrip. I think it would be hard – diverting traffic through a PC instead of going straight to a switch – but it’s probably easier than hacking an ISP or bank. The paper is worth a read: .. hey, maybe combine it with the BGP attack: (that was amazing – stole all the DEFCON traffic for an hour or so..) 3. Nick, with all due respect, doing business in person at a bank is way more statistically likely to have your information stolen. Most low-paid tellers get routine access to hundreds of thousands of dollars worth of accounts and make for easy marks in identity theft schemes. Typing in your bank URL and checking the certificate is still, despite this risk, safer in my opinion. 4. just goes to show everyone i was right in holding my money underneath my bed at home… you’ll never get it NEVER!!!!! all joking aside this is just another reason to be smarter online you never know who maybe watching you 5. I believe Firefox has patches this vulnerability to a degree by not allowing homographic characters to be used in IDN URLs. for more info 6. ex-parrot: So you just use an international tld. That’s exactly what he does in his his lecture, uses a .cn site. You get you own cert for it, etc. Even that isn’t really necessary since 99% of people wouldn’t be able to notice the difference between http and https. 7. question: As opposed to just bank, ISP and user PC, couldnt this be done on a dns server or someones router? or, as he said, on a Tor node. it would seem that the people that could get burned with this use the tor network and so, stereotypically dont want ppl seeing what they are doing. 8. that is an extremely dangerous program. for those who care about the security of their online transactions needs to be careful 9. heh crap — i read this article after completing a payment card industy self-assesment questionnaire for a client’s merchant account. i’ll pretend i never saw this. 10. atrain: even for TLD’s such as .cn, they have a filter in place for blocking fraudulent characters. check the list of links to policies I linked :) 11. Hey, this doesn’t hijack https! Hijacking would mean tack over a established connection. This redirects the user “before” a ssl connection is made, to a similar site. If you’re already loggen in to the bank, they can’t hijack you, the connection is encrypted. And there’s a simple way to tell if you’re on the right website before logging in: Just try to login with false data first. The fake website won’t know it’s false and will let you “login”, but the real website will give you “wrong password”. 12. This calls for some IDS to be installed. Anyone know some good one for OS X with not too much overhead and in a nice .dmg/.app package? 13. icebrain you should be called nobrain. Ive tested this on firefox and even if you type in the wrong pssword it wont log you in. 14. IceBrain says: a.b.z.: You’re right, I didn’t read the part where they “redirect” the user to the real webserver. AFAIK most phishing pages don’t do that. Is there any tips on how to avoid this? If we type the url by hand using “https” it should be safe, no? But my bank redirects me to http to login :facepalm: 15. pffft it is just phishing. Move along. 16. The key capture window is predicated on using a PS2 keyboard. Try again. 17. Also, the laser map key capture feels a bit off because: A: if it’s a laptop (where the screen is bolted on to the keyboard) it might be more simple to get a logger onto the machine via it’s weak wireless transfers. B: who is using a laptop outside doing anything worth capture? C: if someone is using a laptop outside while doing anything of sensitivity, and he or she is behind glass, how does that attenuate the signal’s strength? Window treatments? Polarization? At what point would proximity be hindered to a point of futility? D: the carrier laser would have to be in the non visible spectra to convey the data without detection of the target. That entails using a camera instead of a simple sensor to see the IR scatter from the laser on the “laptop”s screen or some area for alignment, greatly complicating things as the sample rate of the ccd would have to be very high, and thats contra indicative of using the on-board sound as an ADC. Sure, you could build some sort of alignment mechanics to compensate for a simple 3d index of the screen, with a reduction in return power over the angle of observation, but by then, the camera implementation would be cheaper. I would rather socially engineer my way into the cookie and boogie. Still, a nice paper though! 18. I just read about 8 comments of absolute drivel. I hereby declare half of you (at least) to be crap headed. If you were in binary form (a file) I would rm -rf every trace of you. Respectfully sincere, Web User 19. eric fajardo says: Moxie made a good presentation with defeating SSL over HTTPS. Cheating the traffic to be redirected to solely HTTP is very crafty in deed. This is basically true for public / not-so secured websites like Yahoo and Google and the rest, but I guess finding way to smash in for some corporate traffic would be hard if: 1. Force-all traffic as HTTPS in the infrastructure side. 2. Using a 2FA for all standard, remote access. 3. Combining 2FA with OTP for all logins. I believe that Two-Factor-Authentication is not fool-proof though, but it can definitely make a pain in the ass for a guy listening on your wire to gain access. 20. Lol all of you dunno anything it’s not phishing lol It’s arp poisoning + redirection through hacker computer then sslstrip do some makup… if u understand how internet works, you will never feel secure since the lower level isnt secure … Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '117', 'language_id_whole_page_fasttext': "{'en': 0.9300572276115416}", 'metadata': "{'Content-Length': '96074', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:5DWWD3IY5CKAAYE56F4KG5X2VT5J2N5G', 'WARC-Concurrent-To': '<urn:uuid:22eaf3a1-c283-4f7e-89c4-574a783343a2>', 'WARC-Date': datetime.datetime(2013, 12, 9, 2, 36, 6), 'WARC-IP-Address': '192.0.82.250', 'WARC-Identified-Payload-Type': None, 'WARC-Payload-Digest': 'sha1:L37VEY5PV6YN4HFKT7JVLGMMFFSDK4AD', 'WARC-Record-ID': '<urn:uuid:d3dd75a5-f216-493f-adb3-2859b5b35cae>', 'WARC-Target-URI': 'http://hackaday.com/2009/02/23/sslstrip-hijacking-ssl-in-network/', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:c1d57836-84d6-4376-bd28-b1cb67b4ae5b>', 'WARC-Truncated': 'length'}", 'previous_word_count': '1291', 'url': 'http://hackaday.com/2009/02/23/sslstrip-hijacking-ssl-in-network/', 'warcinfo': 'robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.14767056703567505', 'original_id': 'dd49fcef669648d0055ced5f5baa12d2e87791e395a3c36a52b840b5c880aa1b'}
LC Walker Arena The L.C. Walker Arena is a 5,100-seat multi-purpose arena in Muskegon, Michigan. It was built in 1960 by money from the estate of the late Louis Carlisle Walker at a cost of $1 million, and on October 27, 1960 was given to the City of Muskegon. It is currently home to the Muskegon Lumberjacks and West Michigan BlizzardIce hockey teams and was home to the Muskegon Thunder Indoor Football League team until 2009. The arena was built on a site of a former supermarket, and in addition to sports is also used for concerts, trade shows, conventions and other events. The arena measures 39 ft. from the arena floor to the ceiling. The arena contains 17,000 sq. ft. of arena floor space, and can seat between 5,178 to 6,000 for basketball, up to 5,600 for concerts, and 5,000 for ice shows and wrestling. A portion of a former Plumb's grocery store, built in 1936, was actually incorporated into the Arena; it is now known as the LC Walker Arena annex, used for conventions, banquets, meetings and other special events. The city took over operations of the facility in July of 2015 when the ownership of the Muskegon Lumberjacks filed for bankruptcy and were in the process of being sold. Louis Carlisle Walker (1875 - 1953) was a furniture maker, and founder of the Shaw-Walker company which revolutionized the office furniture industry. His success in business was matched by his generosity to the community, and the arena has bared his name since it first opened.
mini_pile
{'original_id': '6ffe3c85f134824f2daf6c4498e07efa71c44ff39c2c14b3dda28dde9b3c2552'}
Candy Kabob Cookout There’s nothing sweeter than hours of fun and friendship at a North Pole cookout when colorful gumdrops and marshmallows are the snacks of choice. 1. To start this party, your Scout Elf will pop out and assemble the pieces for the following projects from Scout Elves at Play® Paper Crafts: Cozy Campfire, Convertible Christmas Tree and Polar Peak. 2. Your elf will follow the instructions to finish these crafts. 3. Next, your elf will thread gumdrops and miniature marshmallows on wooden craft sticks. 4. Finally, your Scout Elf and friends will enjoy a well-deserved break at this special cookout. Legal [General 1, 2, 5, 6]
dclm_baseline
{'bff_contained_ngram_count_before_dedupe': '0', 'language_id_whole_page_fasttext': "{'en': 0.820694625377655}", 'metadata': "{'Content-Length': '33369', 'Content-Type': 'application/http; msgtype=response', 'WARC-Block-Digest': 'sha1:Y4OJXOLJRPDBZQRWCUBW6BG2PNXELSW7', 'WARC-Concurrent-To': '<urn:uuid:4205ba75-ca5a-455e-a950-26aaaf1f01b0>', 'WARC-Date': datetime.datetime(2020, 1, 18, 23, 2, 24), 'WARC-IP-Address': '54.192.30.60', 'WARC-Identified-Payload-Type': 'text/html', 'WARC-Payload-Digest': 'sha1:S4FHNYSEBSXT2RQAIIVUX253E6R2UYSP', 'WARC-Record-ID': '<urn:uuid:d97783c1-4afa-495c-a3fa-eb195e463963>', 'WARC-Target-URI': 'https://www.elfontheshelf.com/elf-ideas/candy-kabob-cookout', 'WARC-Type': 'response', 'WARC-Warcinfo-ID': '<urn:uuid:209562d9-698c-4940-8fca-8cc88131439f>', 'WARC-Truncated': None}", 'previous_word_count': '109', 'url': 'https://www.elfontheshelf.com/elf-ideas/candy-kabob-cookout', 'warcinfo': 'isPartOf: CC-MAIN-2020-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2020\r\noperator: Common Crawl Admin (info@commoncrawl.org)\r\nhostname: ip-10-67-67-27.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/', 'fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob': '0.6334877610206604', 'original_id': 'e0b42b12818eaecec8025a2d22147a9cbb1eb3aa838824d7bd28360bf2fc5cf0'}
The bodyguard, Dan Clark, didn’t mean for it to hurt, he was just demonstrating a fighting move called the brachial stun. That’s a strike to the side of the neck using a chopping motion with the hands — but when Clark hit me with it in a slow speed demonstration, the sudden burst of force whipped my whole head to the right, crashing my teeth together so hard that I thought I would lose a filling. That’s what Dan Clark is like — even his demonstrations are intense. He’s the kind of guy who throws around phrases like the “muay Thai clench with a double knee strike,” and who, when he emails you to invite you to his training session, reminds you politely to bring a cup. All of it — the gym, the training, and especially the punch — combine to send a clear message: Don’t mess with Buffett, or any of Clark’s other clients. And that’s kind of the point. The gym we’re standing in is attached to the offices of his company, Clark International, in Omaha, Neb. Clark, with his square build and close cropped red hair, looks every inch the former Omaha police officer he once was. But then he met Warren Buffett, the billionaire investor known as the Oracle of Omaha, and in 1995 became Buffett’s go-to guy for personal security. When you see Buffett walking the floor at his annual investor conference, Clark is usually positioned just to Buffett’s side — keeping the crowd from surging too close to the elderly billionaire, and making sure the camera crews don’t trample anybody. Clark International training session Such close proximity to an icon of American business inspired an entrepreneurial instinct in Clark, so he founded his own security company. Today, Clark International provides security services for high profile people including former Alaska Governor Sarah Palin and actor George Clooney, along with a list of others he declines to name. We flew to Nebraska to spend some time with him this spring, during a two-day executive training session Clark had organized for dozens of full- and part-time security guards. Only a handful are full-time employees. The rest are contractors on call for big jobs that require more bodies on the ground. The men — and one woman — clearly respect the man who’s training them, occasionally clobbering them, and who may just sign their next pay check. Two or three are veterans of the mixed martial arts fighting circuit. But even they call Clark “sir.” Training with Dan Clark and his team I’ve never even seen a machine gun fired in person before. But Clark’s team has access to the same outdoor gun range that the Omaha National Guard SWAT team uses, and they’ve rolled an old car onto the dirt strip in front of the targets. Eamon Javers at the firing range They’re working with M-4 carbines, which are a little shorter and lighter version of the military M-16. Those are handy features for security guards, because they train to be able to use them instantly from inside the front seat of a car, responding to an ambush attack so quickly that there’s no time to even get out of the car and take up a firing stance. I’m sitting in the back seat as two of Clark’s men begin, blasting away with their machine guns from the front seat, through the windshield, and onto the targets. It’s hot, and its noisy. Shell casings fly out of the M-4s. One of them hits me in the head, and I’m a little surprised at how hot it is. When it’s all over, I count: one of the men fired 15 rounds, but with such a steady hand that there are only three holes in the windshield. The training sessions start early and go late. Over the course of the two days, we watch as Clark’s team practices formations for guiding VIPs through crowds, conduct more weapons training and practice advanced driving techniques to avoid roadside ambushes. They let me fire a Glock .40, a pistol that is lighter in the hand than I thought but has a more powerful kick than I was expecting. For the last exercise, they take turns deliberately smashing into a parked car in a maneuver designed escape a roadside trap. The technique involves crashing the right front of the escaping car into a spot just behind the right rear wheel well of the blocking car, which, if you do it at a high enough speed, causes the blocking car to spin out of the way. They do this again and again, switching drivers in the lead and follow-on cars each time so that everyone gets a chance to practice the move. CNBC producer Kelly Lin has affixed small portable cameras to both cars to record the moments of impact, and somehow they survive. But the lead car, an old white Cadillac STS, is rendered undrivable. Clark’s men say they’ll bring it to the scrap yard the next day. The way my neck tightens up, I know just how that car feels.
mini_pile
{'original_id': '0f4cce650e3b6225da15503c3923349617eab6b9cbdd27bb4dcabfc8b9e60f27'}
TIME22:26ONLINE356 TIME22:27ONLINE356 TIME22:27ONLINE356 TIME22:28ONLINE356 1599229699188:174172290:手头宽裕的老爷上个船船吧! TIME22:28ONLINE405 TIME22:29ONLINE405 1599229765013:2836780:∠( ᐛ 」∠)_ TIME22:29ONLINE454 1599229784874:2836780:你今晚想几点睡(`・ω・´) 1599229787345:430091486:嗷嗷 1599229799155:174172290:一根辣条也是情,一个吃瓜也是爱! 1599229813199:430091486:进来听到了什么!!! TIME22:30ONLINE454 1599229830835:229019087:今天有点晚啊 TIME22:30ONLINE503 TIME22:31ONLINE503 1599229899899:174172290:手头宽裕的老爷上个船船吧! TIME22:31ONLINE554 1599229907228:229019087:粉丝团怎么就26了 TIME22:32ONLINE554 1599229944386:313568808:我可以私信发给你个图片吗,是个表情漫画。 TIME22:32ONLINE604 TIME22:33ONLINE604 1599229999135:174172290:谁没点关注抓起来煮火锅! TIME22:33ONLINE657 TIME22:34ONLINE657 TIME22:34ONLINE709 1599230096457:229019087:当时我回来看没直播我还以为下播了 1599230099171:174172290:谁没点关注抓起来煮火锅! TIME22:35ONLINE709 TIME22:35ONLINE762 TIME22:36ONLINE762 1599230199147:174172290:一根辣条也是情,一个吃瓜也是爱! TIME22:36ONLINE815 TIME22:37ONLINE815 TIME22:37ONLINE816 TIME22:38ONLINE816 1599230299189:174172290:嗷爷超帅的,点个关注吧! TIME22:38ONLINE820 TIME22:39ONLINE820 TIME22:39ONLINE825 1599230399161:174172290:嗷爷超帅的,点个关注吧! TIME22:40ONLINE825 1599230419193:229019087:粉丝团又掉了一个 1599230428855:2836780:在疯狂的补笔记 1599230432612:2836780:( ̄▽ ̄) TIME22:40ONLINE831 1599230458338:15348699:嗷嗷晚上好 1599230467711:229019087:先睡啦晚安 TIME22:41ONLINE831 1599230488626:26268184:怎么今天听起来好像有点难受? 1599230499198:174172290:谁没点关注抓起来煮火锅! TIME22:41ONLINE841 1599230517230:229019087:? 1599230517230:4375151:来了er 1599230519077:26268184:看什么去了。 1599230530271:26268184:那我懂了。 TIME22:42ONLINE841 1599230533618:4375151:别刀了别刀了 1599230542396:26268184:那你是自己去的? TIME22:42ONLINE841 1599230574778:421675879:晚安,睡觉去了 1599230577455:421675879:拜拜 1599230579194:26268184:我现在就在等姜子牙。 1599230583452:26268184:姜子牙怎么还不来。 TIME22:43ONLINE841 1599230599169:174172290:一根辣条也是情,一个吃瓜也是爱! 1599230609626:4375151:突然四级 TIME22:43ONLINE848 1599230626347:26268184:真的吗? 1599230646340:26268184:懂了。 TIME22:44ONLINE848 1599230657147:26268184:国庆怎么说也得出去看。 TIME22:44ONLINE849 1599230686878:4375151:羡慕有人一起去看电影的 1599230699176:174172290:一根辣条也是情,一个吃瓜也是爱! 1599230711538:26268184:就是啊。(便乘。) TIME22:45ONLINE849 1599230722203:2836780:挺好_(:3」∠)_ TIME22:45ONLINE847 1599230758088:2836780:我虽然有对象了 1599230766751:2836780:但是我过得和单身狗没区别 1599230771891:2836780:( ´_ゝ`) TIME22:46ONLINE847 1599230774947:313568808:我有个技术问题要问您? 1599230774947:26268184:啊这。 1599230782466:4375151:你!!!!! 1599230786832:26268184:判处异端! 1599230799179:174172290:手头宽裕的老爷上个船船吧! TIME22:46ONLINE848 1599230804567:313568808:美术如何? 1599230804567:4375151:审判!!! 1599230811321:4375151:开庭!!! TIME22:47ONLINE848 1599230840519:2836780:威~武~ 1599230858272:15348699:(⌒▽⌒)没啥电影想看,再等几个月叭 TIME22:47ONLINE846 1599230870305:4375151:嗷嗷看全职高手嘛? TIME22:48ONLINE846 1599230899164:174172290:嗷爷超帅的,点个关注吧! 1599230909315:4375151:写啥? 1599230914541:4375151:在加班 TIME22:48ONLINE856 1599230924365:4375151:听到一半没听清一半 1599230931437:4375151:可以der 1599230944693:26268184:还要写观后感? TIME22:49ONLINE856 TIME22:49ONLINE860 1599230995851:313568808:那么您的工作是做海报? 1599230999161:174172290:一根辣条也是情,一个吃瓜也是爱! 1599231007124:207452679:竹鼠咆哮 嗷呜~ TIME22:50ONLINE860 TIME22:50ONLINE869 TIME22:51ONLINE869 1599231099180:174172290:一根辣条也是情,一个吃瓜也是爱! TIME22:51ONLINE876 TIME22:52ONLINE876 TIME22:52ONLINE880 1599231187252:313568808:您现在加夜班? TIME22:53ONLINE880 1599231199190:174172290:一根辣条也是情,一个吃瓜也是爱! TIME22:53ONLINE882 TIME22:54ONLINE882 TIME22:54ONLINE888 1599231299176:174172290:一根辣条也是情,一个吃瓜也是爱! TIME22:55ONLINE888 TIME22:55ONLINE888 1599231351093:4375151:我在加班,嗷嗷……是正常上班 TIME22:56ONLINE888 1599231399184:174172290:嗷爷超帅的,点个关注吧! TIME22:56ONLINE890 1599231430481:4375151:讲真,最近想……期待全职高手第二季 1599231430481:313568808:我所打得字表面看普通的,但事实上我想诉说 TIME22:57ONLINE890 1599231436214:313568808:自己的心情。 TIME22:57ONLINE893 TIME22:58ONLINE893 1599231500203:174172290:谁没点关注抓起来煮火锅! 1599231510118:86605667:晚上好 TIME22:58ONLINE894 TIME22:59ONLINE894 TIME22:59ONLINE895 1599231599163:174172290:谁没点关注抓起来煮火锅! TIME23:0ONLINE895 TIME23:0ONLINE896 TIME23:1ONLINE896 1599231686940:26268184:明天没课,我舒服。 1599231686940:4375151:欸? 1599231695905:4375151:对呀 1599231697583:26268184:? 1599231699623:174172290:谁没点关注抓起来煮火锅! TIME23:1ONLINE900 1599231704796:4375151:你被盗号了 1599231732485:313568808:我想到德国的森林以及工厂中的齿轮。 TIME23:2ONLINE900 1599231733871:4375151:欸? 1599231735742:4375151:多大 1599231741692:4375151:等等 TIME23:2ONLINE904 1599231776195:4375151:查了一下,确实,这个名字没有第二个欸 1599231783745:2871388:想看信条 TIME23:3ONLINE904 1599231799464:174172290:一根辣条也是情,一个吃瓜也是爱! 1599231799464:2836780:发生了啥 TIME23:3ONLINE904 1599231844330:4375151:进来了一个和嗷嗷一样ID的观众 TIME23:4ONLINE904 1599231858709:31982140:? TIME23:4ONLINE907 1599231884040:4375151:但是我刚刚看一下,可能是偶然的吧 1599231890160:31982140:相似的名字吧 1599231899416:174172290:谁没点关注抓起来煮火锅! 1599231902743:4375151:也没看到有啥区别的吧 1599231902743:37271699:没亮 1599231911166:37271699:亮了 TIME23:5ONLINE907 1599231914986:37271699:舒服了 1599231936194:31982140:然而我们又看不到那个名字 TIME23:5ONLINE910 1599231945468:18102639:嗷嗷! 1599231951508:18102639:抱一个! 1599231955115:28641496:芜湖 1599231959715:28641496:牌子都没了 1599231960822:4375151:我看到了 1599231962355:313568808:有无哪些粉丝知道你的账号及密码? 1599231968410:31982140:一般只能看到自己的 1599231970626:4375151:嗷嗷家的狗子? TIME23:6ONLINE910 1599231999908:174172290:谁没点关注抓起来煮火锅! 1599232003200:4375151:干得漂亮 TIME23:6ONLINE916 1599232006203:31982140:只能看到自己进直播间 1599232031778:31982140:看不到 TIME23:7ONLINE916 1599232039558:31982140:手机端电脑端都看不到 1599232044090:37271699:看什么 1599232054386:31982140:也看不到 1599232056244:37271699:看什么 TIME23:7ONLINE914 1599232067029:31982140:看别人进直播间 1599232070429:37271699:哦 1599232074636:37271699:看到到 1599232078057:26268184:太怪了。 1599232091318:37271699:你看不到是因为没人进直播间 TIME23:8ONLINE914 1599232099912:174172290:一根辣条也是情,一个吃瓜也是爱! 1599232102814:37271699:我退出重进一下 1599232102814:31982140:我刚又进了一下 TIME23:8ONLINE920 1599232127432:37271699:单纯是因为没人进直播间 1599232131720:31982140:确实没看到 TIME23:9ONLINE920 1599232178558:313568808:我刚才点了,一定是粉丝想用下你的账号 TIME23:9ONLINE922 1599232201466:174172290:嗷爷超帅的,点个关注吧! TIME23:10ONLINE922 1599232223975:37271699:我刀的 1599232235215:26268184:啊这/ 1599232237887:4375151:已截图发群 TIME23:10ONLINE928 TIME23:11ONLINE928 1599232281436:37271699:就是静步偷偷绕后然后给你刀了 1599232299576:174172290:谁没点关注抓起来煮火锅! TIME23:11ONLINE931 TIME23:12ONLINE931 1599232362525:111097107:晚上好 TIME23:12ONLINE930 1599232378244:37271699:我人称老六 TIME23:13ONLINE930 1599232399216:174172290:谁没点关注抓起来煮火锅! TIME23:13ONLINE942 TIME23:14ONLINE942 TIME23:14ONLINE954 1599232499194:174172290:手头宽裕的老爷上个船船吧! TIME23:15ONLINE954 1599232519160:4375151:让我们康康!! TIME23:15ONLINE964 TIME23:16ONLINE964 1599232580163:430091486:嗷 1599232599194:174172290:一根辣条也是情,一个吃瓜也是爱! 1599232601620:37271699:让我康康 TIME23:16ONLINE959 TIME23:17ONLINE959 TIME23:17ONLINE958 1599232686958:37271699:你说句话啊 1599232690410:37271699:嗷嗷 TIME23:18ONLINE958 1599232699191:174172290:谁没点关注抓起来煮火锅! TIME23:18ONLINE956 TIME23:19ONLINE956 TIME23:19ONLINE960 1599232798840:174172290:嗷爷超帅的,点个关注吧! TIME23:20ONLINE960 1599232836457:4375151:话说为什么叫嗷嗷做“嗷爷” 1599232842030:37271699:我的每月5b币已经给别的地方了 TIME23:20ONLINE968 TIME23:21ONLINE968 1599232876051:111097107:天之弱啊,我听习惯中文那首 1599232899199:174172290:一根辣条也是情,一个吃瓜也是爱! TIME23:21ONLINE974 1599232909484:37271699:跑了跑了 1599232910610:4375151:嗷这…… 1599232931731:111097107:最后的旅途,好像是,太久没听了 TIME23:22ONLINE974 1599232955650:111097107:纪念绘梨衣的 TIME23:22ONLINE977 TIME23:23ONLINE977 1599232999188:174172290:谁没点关注抓起来煮火锅! 1599232999188:111097107:江南老贼,写死了我最爱的几个配角 1599233010098:111097107:龙族3 TIME23:23ONLINE977 1599233052945:111097107:龙族5没兴趣看了 TIME23:24ONLINE977 TIME23:24ONLINE983 1599233088732:111097107:龙族4把师兄写得太惨了 1599233099394:174172290:手头宽裕的老爷上个船船吧! TIME23:25ONLINE983 1599233114421:28641496:牌子都给你丢咯 1599233119197:111097107:我对龙族5已经没爱了 1599233127238:111097107:空白! 1599233135140:28641496:龙5写一写的重新推翻了 1599233135140:111097107:muaヽ(*´з`*)ノ 1599233142209:28641496:小圆! TIME23:25ONLINE979 1599233148367:28641496:不mua! 1599233161204:111097107:我就要亲! TIME23:26ONLINE979 1599233173599:28641496:拍开! 1599233199201:174172290:一根辣条也是情,一个吃瓜也是爱! TIME23:26ONLINE973 TIME23:27ONLINE973 TIME23:27ONLINE972 TIME23:28ONLINE972 1599233299225:174172290:嗷爷超帅的,点个关注吧! TIME23:28ONLINE972 1599233338412:111097107:龙族是从2开始就越写越(治愈)。。。。。 TIME23:29ONLINE972 TIME23:29ONLINE967 1599233399201:174172290:手头宽裕的老爷上个船船吧! TIME23:30ONLINE967 1599233415062:4375151:awsl 1599233419374:4375151:声控表示 TIME23:30ONLINE961 1599233464722:111097107:龙2写死了夏弥,龙3写死了绘梨衣,龙4差点就写死了脸瘫师兄 TIME23:31ONLINE961 1599233492280:111097107:江南老贼,呸 1599233499235:174172290:一根辣条也是情,一个吃瓜也是爱! TIME23:31ONLINE960 TIME23:32ONLINE960 TIME23:32ONLINE958 TIME23:33ONLINE958 1599233599198:174172290:手头宽裕的老爷上个船船吧! TIME23:33ONLINE956 1599233647165:8533035:口胡suki TIME23:34ONLINE956 TIME23:34ONLINE956 1599233695874:37271699:我回来了 1599233699195:174172290:手头宽裕的老爷上个船船吧! TIME23:35ONLINE956 TIME23:35ONLINE954 TIME23:36ONLINE954 1599233781963:309471730:我回来啦,狗子晚上好! 1599233793996:37271699:这个头衔 1599233799214:174172290:一根辣条也是情,一个吃瓜也是爱! 1599233801371:37271699:永远加载不出来 TIME23:36ONLINE950 1599233816501:37271699:换个头衔 TIME23:37ONLINE950 1599233842434:37271699:这个应该能显示吧 1599233852971:8533035:我比较喜欢我整个头衔 TIME23:37ONLINE972 1599233889739:37271699:这个头衔永远加载不出来 1599233891041:1598199:啊哈哈哈哈哈 TIME23:38ONLINE972 1599233895543:37271699:快升级了 1599233899296:174172290:嗷爷超帅的,点个关注吧! 1599233919547:111097107:我一直都是一见倾心 1599233919547:37271699:差一百w就能升级了 TIME23:38ONLINE965 1599233929304:37271699:但是没抽奖机了 1599233937799:309471730:还是不能禁言主播,一点也不人性化 1599233937799:37271699:怎么升级啊 1599233942684:22344983:晚上好!还没休息啊 TIME23:39ONLINE965 1599233968416:37271699:没有扭蛋了 1599233981672:37271699:用掉了 1599233983167:111097107:我原石300个 TIME23:39ONLINE960 1599233999346:174172290:手头宽裕的老爷上个船船吧! 1599234001121:37271699:还差一百w 1599234012478:111097107:我早够了 TIME23:40ONLINE960 1599234014687:37271699:头衔里 1599234018465:37271699:点升级 1599234026602:8533035:礼物和石头都可以升级 1599234029631:111097107:头衔功能 1599234036627:8533035:等级到上限自己就升了 TIME23:40ONLINE950 1599234045477:8533035:没有时间限制吧 1599234072456:37271699:点自己头衔 TIME23:41ONLINE950 1599234082202:309471730:一个星期没回来,攒了一万个视频可以看了 1599234099664:174172290:手头宽裕的老爷上个船船吧! TIME23:41ONLINE946 1599234116418:309471730:我没有~ 1599234125493:309471730:我说了我是单推嘛 1599234128885:1598199:啊哈哈哈哈哈哈 TIME23:42ONLINE946 1599234144329:309471730:不欢迎呆梓爱你嗷~ TIME23:42ONLINE947 1599234178800:37271699:单推 1599234182956:309471730:只是有好多视频可以看了,不是dd 1599234182956:37271699:哪有单推 TIME23:43ONLINE947 1599234194891:309471730:你要相信我啊 1599234199289:174172290:谁没点关注抓起来煮火锅! 1599234204827:37271699:找不到什么 1599234218127:309471730:在你面前就是一个单推(挺胸) 1599234221368:8533035:在玩法里 TIME23:43ONLINE947 TIME23:44ONLINE947 1599234254746:8533035:直播中心 1599234255923:8533035:玩法 1599234260340:8533035:头衔 1599234264289:37271699:直接升级 1599234269007:37271699:不多bb 1599234280569:37271699:升级呗 TIME23:44ONLINE945 1599234286004:37271699:闲着也是闲着 1599234299232:174172290:嗷爷超帅的,点个关注吧! 1599234313005:37271699:富婆 TIME23:45ONLINE945 1599234316640:37271699:能养我吗 1599234340147:37271699:考虑考虑呗 1599234340147:8533035:贤者之石能换头像 TIME23:45ONLINE943 1599234344571:8533035:记得留着 TIME23:46ONLINE943 1599234378150:309471730:那养一下你的单推粉呗(疯狂暗示) 1599234399231:174172290:手头宽裕的老爷上个船船吧! TIME23:46ONLINE952 1599234418118:309471730:切,小气 1599234420120:8533035:头衔 1599234422418:8533035:打错了 TIME23:47ONLINE952 1599234462495:309471730:倒数第三声有点那味儿了 TIME23:47ONLINE957 TIME23:48ONLINE957 1599234499324:174172290:嗷爷超帅的,点个关注吧! 1599234502157:309471730:好了,没那味儿了 TIME23:48ONLINE964 TIME23:49ONLINE964 1599234559501:309471730:我明天可以看一天的新视频,舒服 1599234582905:37271699:把提醒关掉呗 TIME23:49ONLINE969 1599234589916:37271699:这样好尴尬的 1599234599254:174172290:手头宽裕的老爷上个船船吧! 1599234599254:309471730:我没有去dd,你要相信我~ 1599234611308:37271699:就是 TIME23:50ONLINE969 1599234618558:37271699:我也相信他 1599234641059:309471730:对嘛 TIME23:50ONLINE970 TIME23:51ONLINE970 1599234691782:309471730:我们没有~ 1599234699238:174172290:谁没点关注抓起来煮火锅! 1599234700519:37271699:单推 TIME23:51ONLINE974 TIME23:52ONLINE974 1599234745415:309471730:看什么视频? TIME23:52ONLINE971 1599234764991:309471730:基本很固定,几个生活区up 1599234792512:309471730:游戏区,,美食区 TIME23:53ONLINE971 1599234799247:174172290:一根辣条也是情,一个吃瓜也是爱! TIME23:53ONLINE969 1599234827280:309471730:好,那猜一个比较简单的 1599234845136:309471730:凡是认识他的都知道这个梗 TIME23:54ONLINE969 TIME23:54ONLINE963 1599234899305:174172290:一根辣条也是情,一个吃瓜也是爱! TIME23:55ONLINE963 TIME23:55ONLINE959 1599234959538:37271699:新来的dd听好了 TIME23:56ONLINE959 1599234973802:37271699:我们单推是你们最好的老大哥 1599234988120:37271699:你们如果有不懂的地方可以问我们 1599234994007:309471730:哦,我才发现,我发的东西被屏蔽了 1599234998071:37271699:我们会亲切的告诉你们 1599234999269:174172290:嗷爷超帅的,点个关注吧! TIME23:56ONLINE954 1599235021725:309471730:提示 1599235028791:309471730:生活区的骄傲 TIME23:57ONLINE954 1599235047052:37271699:现在每个人把自己的姓名d过多少人都报一遍 1599235050444:309471730:游戏区的chi辱 1599235062347:37271699:大猩猩 TIME23:57ONLINE950 1599235068916:37271699:从你那开始 TIME23:58ONLINE950 1599235099273:174172290:手头宽裕的老爷上个船船吧! 1599235112523:309471730:单推人说对了,是中国boy TIME23:58ONLINE945 1599235147209:309471730:D过多少人? TIME23:59ONLINE945 1599235154383:309471730:才没有嘞,我是单推 TIME23:59ONLINE940 1599235187975:309471730:舞蹈区,你是舞蹈区(受到惊吓) 1599235199275:174172290:手头宽裕的老爷上个船船吧! SPEAKERNUM21;1598199:呆梓爱你嗷:2,2836780:才密斯提:10,2871388:希甸H:1,4375151:织田之野望:33,8533035:高性能萝卜子:13,15348699:摸鱼の呆毛:2,18102639:苏小八_:2,22344983:伦戈米尼亚德404:1,26268184:氯氣先生official:17,28641496:空白荏爱你嗷:7,31982140:412の燚龘:11,37271699:坚定不移单推人:56,86605667:鞠亚爱你嗷:1,111097107:叛逆の小圆:19,174172290:狂犬爱你嗷:56,207452679:小竹鼠ちゃん:1,229019087:子木木木木子:6,309471730:灵圣梦:30,313568808:Himzhang:10,421675879:旭宝宝贼啦爱你:2,430091486:狐羽桜channel:3 V2
the_stack
{'hexsha': '048d0b9a5dcb16c257e8200c0ed6531350d12876', 'size': '13226', 'ext': 'txt', 'lang': 'Text', 'max_stars_repo_path': '126556/2020-9-4.txt', 'max_stars_repo_name': 'dd-center/bilibili-vtuber-danmaku', 'max_stars_repo_head_hexsha': '5fd5c685e420cc0abd00cefff33491d35fec0046', 'max_stars_repo_licenses': "['MIT']", 'max_stars_count': '160', 'max_stars_repo_stars_event_min_datetime': '2019-09-13T12:32:50.000Z', 'max_stars_repo_stars_event_max_datetime': '2022-03-30T07:44:45.000Z', 'max_issues_repo_path': '126556/2020-9-4.txt', 'max_issues_repo_name': 'dd-center/bilibili-vtuber-danmaku', 'max_issues_repo_head_hexsha': '5fd5c685e420cc0abd00cefff33491d35fec0046', 'max_issues_repo_licenses': "['MIT']", 'max_issues_count': '20', 'max_issues_repo_issues_event_min_datetime': '2020-05-02T15:49:30.000Z', 'max_issues_repo_issues_event_max_datetime': '2022-02-05T01:43:47.000Z', 'max_forks_repo_path': '126556/2020-9-4.txt', 'max_forks_repo_name': 'dd-center/bilibili-vtuber-danmaku', 'max_forks_repo_head_hexsha': '5fd5c685e420cc0abd00cefff33491d35fec0046', 'max_forks_repo_licenses': "['MIT']", 'max_forks_count': '35', 'max_forks_repo_forks_event_min_datetime': '2019-09-13T12:32:51.000Z', 'max_forks_repo_forks_event_max_datetime': '2022-03-13T01:50:03.000Z', 'avg_line_length': '27.9619450317', 'max_line_length': '404', 'alphanum_fraction': '0.8837138969', 'original_id': '4c88dd4fa25fe6a34161b09430257957ae42d14c372e13dd026d92a0080a8c1f'}